<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: purplehat_</title><link>https://news.ycombinator.com/user?id=purplehat_</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 08:09:12 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=purplehat_" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by purplehat_ in "Show HN: Ghost Pepper – Local hold-to-talk speech-to-text for macOS"]]></title><description><![CDATA[
<p>Hi Matt, there's lots of speech-to-text programs out there with varying levels of quality. 100% local is admirable but it's always a tradeoff and users have to decide for themselves what's worth it.<p>Would you consider making available a video showing someone using the app?</p>
]]></description><pubDate>Mon, 06 Apr 2026 21:35:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47667494</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47667494</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47667494</guid></item><item><title><![CDATA[New comment by purplehat_ in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>Have you (or anyone reading this) been able to "beat" fingerprint.com without Tor or turning JavaScript off outright?<p>I've tried it various times over the last couple years, using different browsers with various privacy settings enabled and a VPN.<p>I can get good partial results and am able to reset my fingerprint by changing my OS and browser at the same time, so it's not entirely there with regards to sniffing the hardware. But I can never revisit the site and have it not recognize me. Is there no one but me using (for example) Debian testing Librewolf with resistFingerprinting on Proton VPN? If there are others, then resistFingerprinting is doing a bad job hiding my hardware.<p>That's depressing! Despite our genuine best efforts, enough identifiers leak that it seems to me there's no practical solution. I am genuinely at a loss for what we can do.<p>(If you're reading this and think it doesn't matter, it's possible you're not realizing that this means that any site collecting and storing these identifiers now will be able to talk to any site <i>in the future</i> and link your identity. Your past actions on every website on a given piece of hardware are liable to be linked to create a detailed profile in the future, so even if Reddit and Pornhub and Discord and the government aren't talking to each other now, you can put some decent probability in the fact that if they decided to share identifiers, they could link all your historical (signed out) activity to your real-world identity without much effort. I use those sites as examples because they're sites where people tend to generate information that they may want private, but they visit using the same hardware identifiers.)</p>
]]></description><pubDate>Fri, 03 Apr 2026 03:32:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47622901</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47622901</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47622901</guid></item><item><title><![CDATA[New comment by purplehat_ in "Your phone is an entire computer"]]></title><description><![CDATA[
<p>Fair point, but that solution doesn't address the market for theft, so there's a tradeoff there.</p>
]]></description><pubDate>Fri, 13 Mar 2026 19:56:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47369005</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47369005</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47369005</guid></item><item><title><![CDATA[New comment by purplehat_ in "Your phone is an entire computer"]]></title><description><![CDATA[
<p>Can you elaborate on "fairly well documented exploit tactics"? My impression is that most of these are either social engineering, for which we need to hire better designers, or complicated chains of hard-to-find primitives only accessible to state actors.<p>There's definitely problems but the solution isn't to make the iPhone a general purpose computer. We definitely need to defend the existence of general purpose computing at a time where regulation is likely to begin encroaching on it, but the promise of the App Store is "pay a 30% tax and any app you download here will be <i>safe</i>." In my mind, at least, that's the promise, and perhaps one solution to the situation would be to erect consequences to breaking that promise.</p>
]]></description><pubDate>Fri, 13 Mar 2026 19:51:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47368926</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47368926</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47368926</guid></item><item><title><![CDATA[New comment by purplehat_ in "Your phone is an entire computer"]]></title><description><![CDATA[
<p>I really don't understand the argument here. That the product is locked down by design is a feature, not a limitation.<p>Yes, this has the side effect of making them more money and allowing a walled garden to form, but given that the vast majority of users wouldn't do anything different with their phones if a shell was present, this is in my opinion not that large of an effect.<p>The snide around "clicking on links is dangerous" and locking down the bootloader is unwarranted, because for most people a phone is not a toy (or at least, not just a toy) - it has their communications history, their bank information, their passwords, any many more. And it's really easy to steal people's phones on the subway. This isn't about freedom of computing, this is about the fact that an iPhone in BFU is nearly as secure as a GrapheneOS phone.<p>There are many problems with Apple software. It's buggy, uses proprietary formats that you can't export, and interoperable with open standards. It's bad, and is the primary reason why I won't buy another iPhone, but Macs have that same problem. On the other hand, being cryptographically locked-down is an optional feature. If you don't like it, buy a computer without that feature. It's harmful to us, to tinkerers and people who want to see how things work, but the average person does not care at all and just wants to be able to open LOVE-LETTER-FOR-YOU.TXT.vbs without having their 401k get drained.</p>
]]></description><pubDate>Fri, 13 Mar 2026 19:37:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47368734</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47368734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47368734</guid></item><item><title><![CDATA[New comment by purplehat_ in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>I'm not sure anyone is being this explicitly malicious. Parents' groups, child safety organizations, and researchers have been at this for years, and while I agree with you that the solutions are very misguided, I think it does our own priorities a disservice to stick our fingers in our ears with regards to their concerns.<p>Can you give an example of how less private solutions will benefit them and their sponsors? I could see big tech / adtech and government surveillance benefitting but I don't think they're the ones behind this push.<p>As another example, consider the "small web" community, say at Bear Blog, which is a group of technically sophisticated people who routinely complain about the harms of traditional social media. I doubt most of them would support this particular implementation, but they show that there is popular support for solving the ills of at least one of the targets of this legislation.<p>So to answer your question, yes, I do see this as an attempt to protect people. The restriction of free speech is in my opinion a side effect of this legislation opening the way to worse-designed laws in the future.</p>
]]></description><pubDate>Fri, 06 Mar 2026 10:05:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47273068</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47273068</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47273068</guid></item><item><title><![CDATA[New comment by purplehat_ in "Show HN: Swarm – Program a colony of 200 ants using a custom assembly language"]]></title><description><![CDATA[
<p>there is a `theme set` command</p>
]]></description><pubDate>Fri, 06 Mar 2026 09:01:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47272675</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47272675</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272675</guid></item><item><title><![CDATA[New comment by purplehat_ in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>I'm surprised zero-knowledge proofs have not been mentioned. This is a technique where (for example) the government signs your digital license, then you can present a proof that you are over 18 to a site without revealing anything else about yourself. ZKPassport exists, Privacy Pass is an implementation being standardized by the IETF, and Google is working on a similar implementation. Granted, these are not yet widely used, but I'd be very interested in hearing HN's thoughts on this.<p>Let's try to figure out what a good policy solution looks like:<p>- entities with harmful or adult content must require proof of the user being over 18<p>- entities cannot ask for, store, or process more detailed information without explicit business needs (this should be phrased in a way that disallows Instagram from asking for your birth year, for example)<p>- entities cannot share this data with other sites, to avoid privacy leaks, unless there is an explicit business need (this is tricky to get right; someone might try to set up a centralized non-anonymous age-verification service, erasing many benefits)<p>- entities must in general not store or process information about the user that is not strictly relevant to their function<p>- there ought to be different treatment for anonymous users (which ideally these protocols will allow, just submit proof of work plus a ZKP that you are a human and authorized to access the resource) compared to pseudonymous and non-anonymous users, who are more at risk of being censored or tracked.<p>There's some loopholes here, but if the government can enact good policy on this I personally think it's feasible. Please share your thoughts, if you have a minute to do so.<p>There's also an interesting political split to note among the opposition here. I see a lot of people vehemently against this, and as far as I can see this is largely for concerns regarding one of 1) privacy abuses, 2) censorship, or 3) restriction of general computing. Still, there is a problem with harmful content and platforms on the web. (Not just for minors, I don't think we should pretend it doesn't harm adults too.) The privacy crowd seems to be distinctly different from the computing-freedom crowd; the most obvious example is in attitudes towards iOS. As I personally generally align more towards what I perceive as the privacy-focused side, I'm very interested in what people more focused on software freedom think about zero-knowledge proofs as a politically workable solution here.</p>
]]></description><pubDate>Fri, 06 Mar 2026 08:54:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47272626</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47272626</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272626</guid></item><item><title><![CDATA[New comment by purplehat_ in "MyFirst Kids Watch Hacked. Access to Camera and Microphone"]]></title><description><![CDATA[
<p>The quote seems to imply that if the watch receives the payload from any source, even without a compromised AP, it'll pop the shell.<p>The easiest source of this is local network attacks, and it's not that unusual. In this case you could imagine a teacher at school who knows how to use Metasploit.<p>It doesn't seem like it has to be local network, though, the computer just has to receive the packet somehow. So for example if the watch loads a website or connects to some service on the internet (firmware updates, cloud sync, telemetry, whatever), an attacker could try to receive/intercepts/redirect that traffic and serve the payload through that channel.<p>You might need the watch has no certificate pinning or weak certificate validation if it's using TLS but IoT devices often skip TLS.<p>Let me know if I'm misunderstanding the quote.</p>
]]></description><pubDate>Wed, 04 Mar 2026 20:10:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47253110</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47253110</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47253110</guid></item><item><title><![CDATA[New comment by purplehat_ in "Text-Based Google Directions"]]></title><description><![CDATA[
<p>Yes, to self-host it you will need a Google maps API key.<p>In the related links at the bottom, <a href="https://gdir.telae.net/links.html" rel="nofollow">https://gdir.telae.net/links.html</a>, the Git repo <a href="https://github.com/pafoster/gdir.telae.net" rel="nofollow">https://github.com/pafoster/gdir.telae.net</a> is available along with some other cool things.</p>
]]></description><pubDate>Wed, 25 Feb 2026 19:46:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47156805</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=47156805</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47156805</guid></item><item><title><![CDATA[New comment by purplehat_ in "Omega-3 is inversely related to risk of early-onset dementia"]]></title><description><![CDATA[
<p>Omega-3 good, Omega-6 bad has been known for many years.<p>For example, Scott Alexander wrote in 2014 on his blog Slate Star Codex about how Omega-3 lowers crime rates and Omega-6 increases crime rates. And he links to some cool RCTs where you can check the methodology yourself.<p><a href="https://slatestarcodex.com/2014/02/18/proposed-biological-explanations-for-historical-trends-in-crime/" rel="nofollow">https://slatestarcodex.com/2014/02/18/proposed-biological-ex...</a><p>Eat your fish!</p>
]]></description><pubDate>Sun, 08 Feb 2026 20:15:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46938082</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46938082</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46938082</guid></item><item><title><![CDATA[New comment by purplehat_ in "1 kilobyte is precisely 1000 bytes?"]]></title><description><![CDATA[
<p>To be fair, the octet as the byte has been dominant for decades. POSIX even has the definition “A byte is composed of a contiguous sequence of 8 bits.” I would wager many software engineers don't even know that a non-octet bytes were a thing, given that college CS curricula typically just teach a byte is 8 bits.<p>I found some search results about Texas Instruments' digital signal processors using 16-bit bytes, and came across this blogpost from 2017 talking about implementing 16-bit bytes in LLVM: <a href="https://embecosm.com/2017/04/18/non-8-bit-char-support-in-clang-and-llvm/" rel="nofollow">https://embecosm.com/2017/04/18/non-8-bit-char-support-in-cl...</a>. Not sure if they actually implemented it, but that was surprising to me that non octet bytes still exist, albeit in a very limited manner.<p>Do you know of any other uses for bytes that are not 8 bits?</p>
]]></description><pubDate>Wed, 04 Feb 2026 07:14:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46882525</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46882525</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46882525</guid></item><item><title><![CDATA[New comment by purplehat_ in "New York’s budget bill would require “blocking technology” on all 3D printers"]]></title><description><![CDATA[
<p>I hear sentiment like this occasionally and I genuinely wonder if this is conspiracy theory stuff or if this sort of thing actually happened in the past.<p>I'm aware of the programs Snowden revealed, Tempora / XKeyscore / Longhaul / the like, plus I've heard J. Edgar Hoover did bad things and lots of CIA meddling internationally was bad. Still, these seem qualitatively different to the explicit blackmail you're referring to.<p>Do you (or someone else reading this) know of historical examples that demonstrate a pattern of this sort of thing? You can interpret "this sort of thing" as you wish.<p>That's a lot to ask for on the spot, so if not, I would be interested in what generally makes you approach the situation from this cynical angle, especially given that it's the FBI. In my experience, which is fairly limited but is as a US citizen, most of the time the US government mostly follows the law and doesn't do this sort of thing to citizens.</p>
]]></description><pubDate>Wed, 04 Feb 2026 06:51:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46882381</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46882381</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46882381</guid></item><item><title><![CDATA[New comment by purplehat_ in "Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC"]]></title><description><![CDATA[
<p>For anyone else who got a little too excited at the title, ECC here is error correction codes, not elliptic curve crypto.<p>Very cool writeup, thanks for digging into all those data sheets and sharing it with us! I feel like the hands-on electronics stuff has always been a little bit inaccessible to me, but posts like these always make me a little more excited to start doing little projects myself. So thanks for posting.</p>
]]></description><pubDate>Sat, 17 Jan 2026 08:17:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46656231</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46656231</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46656231</guid></item><item><title><![CDATA[New comment by purplehat_ in "Bubblewrap: A nimble way to prevent agents from accessing your .env files"]]></title><description><![CDATA[
<p>Why do you say that?<p>Bubblewrap is a it's a very minimal setuid binary. It's 4000 lines of C but essentially all it does is parse your flags ask the kernel to do the sandboxing (drop capabilities, change namespaces) for it. You do have to do cgroups yourself, though. It's very small and auditable compared to docker and I'd say it's safer.<p>If you want something with a bit more features but not as complex as docker, I think the usual choices are podman or firejail.</p>
]]></description><pubDate>Thu, 15 Jan 2026 07:58:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46629478</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46629478</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46629478</guid></item><item><title><![CDATA[New comment by purplehat_ in "Elegance is Bullshit"]]></title><description><![CDATA[
<p>Thanks for linking to the essay. I just read it and really enjoyed it. I think I'll try to put the ideas into practice in my writing (and hope I'll succeed).</p>
]]></description><pubDate>Sun, 04 Jan 2026 04:55:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46485072</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46485072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46485072</guid></item><item><title><![CDATA[New comment by purplehat_ in "Is Mozilla trying hard to kill itself?"]]></title><description><![CDATA[
<p>That's really funny. Yes, in case it wasn't clear for others reading this and thinking about installing these, it's almost certain that uBlock Origin and Brave browser will not cause you any problems and if you're using stock Chrome I really encourage you improve your situation dramatically for ~5 minutes worth of effort.</p>
]]></description><pubDate>Wed, 17 Dec 2025 11:49:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46300931</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46300931</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46300931</guid></item><item><title><![CDATA[New comment by purplehat_ in "AI's real superpower: consuming, not creating"]]></title><description><![CDATA[
<p>I often see things like this and get a little bit of FOMO because I'd love to see what I can get out of this but I'm just not willing to upload all these private documents of mine to other people's computers where they're likely to be stored for training or advertising purposes.<p>How are you guys dealing with this risk? I'm sure on this site nobody is naive to the potential harms of tech, but if you're able to articulate how you've figured out that the risk is worth the benefits to you I'd love to hear it. I don't think I'm being to cynical to wait for either local LLMs to get good or for me to be able to afford expensive GPUs for current local LLMs, but maybe I should be time-discounting a bit harder?<p>I'm happy to elaborate on why I find it dangerous, too, if this is too vague. Just really would like to have a more nuanced opinion here.</p>
]]></description><pubDate>Wed, 17 Dec 2025 11:28:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46300786</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46300786</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46300786</guid></item><item><title><![CDATA[New comment by purplehat_ in "Is Mozilla trying hard to kill itself?"]]></title><description><![CDATA[
<p>I've tried a few times to convince people in my life who would self describe as "bad with computers" to download an adblocker, but they usually find the friction too high. Adding extensions is unfamiliar for most, and even if it seems very basic for us, the non-tech people I know don't really want to deal with the risk of unknown unknowns from that, let alone switching to a healthier browser. (Perhaps reasonable since it feels like these days half the extensions on the Chrome Web Store are spyware or adware behind the scenes.)<p>I also suspect that those who lived through the days of frequent Windows errors and Chrome running out of memory all the time often expect software to fail in weird and unexpected ways, and a lot of people adopt a "don't fix it if it isn't broken" mindset.<p>Still, uBlock Lite and Brave browser are definitely easy wins and I'm glad to see more random people in my life using them than I would have expected. :)</p>
]]></description><pubDate>Wed, 17 Dec 2025 11:21:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46300720</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46300720</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46300720</guid></item><item><title><![CDATA[New comment by purplehat_ in "Google releases its new Google Sans Flex font as open source"]]></title><description><![CDATA[
<p>Thanks for sharing this!!<p>I like using silly fonts, e.g. Comic Sans Mono has been my daily driver for the past year or so, and it's really fun to see the Minecraft fonts and old DOS and VT323 fonts. If anyone's into retro computing, it's worth checking those out, particularly the website link for the IBM VGA 9x16, which has loads and loads more old fonts.<p>I think I'll try using Monocraft in the shell for a while and see if it works well for me, though I might stick to Comic Sans for actual coding :)</p>
]]></description><pubDate>Fri, 12 Dec 2025 23:40:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46250406</link><dc:creator>purplehat_</dc:creator><comments>https://news.ycombinator.com/item?id=46250406</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46250406</guid></item></channel></rss>