<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: quohort</title><link>https://news.ycombinator.com/user?id=quohort</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 13:51:56 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=quohort" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by quohort in "CORS Is Stupid"]]></title><description><![CDATA[
<p>Hmm, true. But perhaps you could mitigate this with cookies as OP suggests. Simply don't return anything unless the GET request has a valid intranet cookie?<p>Or perhaps the client can tell the server what webpage it's fetching from and the security check can be done server-side?<p>It is just strange to me that this security check has to be done on client-side (in the browser) as opposed to on the web server actually responsible for distributing the content.</p>
]]></description><pubDate>Sat, 24 Aug 2024 20:53:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=41341410</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41341410</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41341410</guid></item><item><title><![CDATA[New comment by quohort in "Windows 0-day was exploited by North Korea to install advanced rootkit"]]></title><description><![CDATA[
<p>the purpose of having engineers write software is that they can transparently prove that it works reliably, and they can be professionally held accountable and learn if it fails.<p>You're suggesting that reliability should be improved by being obfuscating the code through transpilation or by merit of being generated by a black box (LLM).<p>I really suspect that simply transpiling code to rust or ada or some other "safe" language largely wouldn't improve its security. The whole point of these "safe" languages is that they encourage safer practices by design, and that in porting the code to rust you have to restructure the program to conform to the new practices (as opposed to just directly re-implementing it).<p>I haven't seen a LLM that is reliably capable of logic/reasoning or can even reliably answer technical questions, much less synthesize source code that isn't some trivial modification of something it has been trained on. And it's not clear that future models will necessarily be capable of doing that.</p>
]]></description><pubDate>Sat, 24 Aug 2024 19:39:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=41340862</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41340862</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41340862</guid></item><item><title><![CDATA[New comment by quohort in "Valve New Employee Handbook (2012) [pdf]"]]></title><description><![CDATA[
<p>Steam isn't a monopoly. I, and everyone I know who uses steam is familiar with GOG or Epic games or Battle.net or some other service. You can even distribute your game independently (e.g. in the case of minecraft and some of the most successful PC games of all time) or just distribute it as a web game (increasingly feasible as WebGL, WebGPU, WASM etc. continue to advance).<p>Steam is successful because it has good user experience compared to alternatives, and has a lot of major titles.</p>
]]></description><pubDate>Fri, 23 Aug 2024 15:31:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=41329838</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41329838</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41329838</guid></item><item><title><![CDATA[New comment by quohort in "Microsoft begins cracking down on people dodging Windows 11 system requirements"]]></title><description><![CDATA[
<p>> Would any OEM dare to use workarounds to install windows 11 on not officially supported hardware? I feel like most OEMs would simply upgrade the hardware no questions asked. Simply because should any problem occur, Microsoft would just tell them your problem not ours.<p>Well on a basic level, if the consumer buys your motherboard or laptop and it doesn't work out of the box (but your competitors do) then you are going to have a massive customer satisfaction problem.<p>> Doesn't 90% of the push for this come from Media companies to implement DRM?<p>I don't think so. DRM is an old lens of understanding the problem from the last generation. See <a href="https://www.youtube.com/watch?v=HUEvRyemKSg" rel="nofollow">https://www.youtube.com/watch?v=HUEvRyemKSg</a> . The new methods use a softer approach.  Consider something like iOS where the developers can just make it very uncomfortable to do something like download a video and watch it. There's no bittorrent app or p2p file-sharing, there's no real filesystem, and there is no real standalone video player. So users rely on streaming services to do this for them, and you can charge money to middle-man that service.<p>You don't need to strictly enforce copyright like with DRM, just use trusted computing so that the entire system discourages general computer-like operations (including copying files, running programs, etc.) and encourages acting like a thin client to some server. This is a much better model because some small fraction of users still DO need to have general-purpose computing to make consumables in the first place (for example, video editors or musicians, writers, programmers) but the majority of the user-base is discouraged for a variety of reasons. The more you can separate the creator of information from the user of information, the more you can charge the user to access the creator.<p>You can't replace the OS or any of the parts of the machine because of trusted computing, so you cannot really use reverse engineering to simply break the system (and if you do, it may break the trust chain you now need to access now-networked services). Another example is that on a lot of phones and laptops these days, you can't add removable storage, so you are heavily encouraged to use cloud storage. And you are discouraged from using cloud services from any third party (usually on an API level, as services provided from the OS vendor can integrate better with the system). Consider how Apple pushes iCloud and Microsoft pushes OneCloud.</p>
]]></description><pubDate>Sun, 18 Aug 2024 17:50:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=41283930</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41283930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41283930</guid></item><item><title><![CDATA[New comment by quohort in "Microsoft begins cracking down on people dodging Windows 11 system requirements"]]></title><description><![CDATA[
<p>Sure, it's motivated by a bit of license turnover like you suggest. But mostly it's a case of securing their OS against adversaries (including their users). You can lock down the system a lot more with TPM on your side: Now you can keep secrets away from users reliably.<p>I think we are seriously nearing the point of no return. Once you have manufacturers start implementing TC, that will really hamper reverse engineering efforts. Over time, the side channels will get ironed out.<p>Enforcing TPM requirements isn't about making users make changes, it's to scare OEMs into including TPMs by default so they don't get complaints from users. Microsoft wants a more controlled hardware environment like Apple does, because it's more profitable for a variety of reasons.</p>
]]></description><pubDate>Sun, 18 Aug 2024 17:23:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=41283721</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41283721</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41283721</guid></item><item><title><![CDATA[New comment by quohort in "Ask HN: Do we need to pay billions in fees to Stripe, Block, PayPal and Visa/MC?"]]></title><description><![CDATA[
<p>It's pretty much how every cryptocurrency works, with separation of public (receive) and private (send) keys.<p>The fact that invoices are temporary in LN is a weakness of the design, not an intentional choice. The lightning network represents a regression from the typical use-case of cryptocurrency because both sender and receiver need to be online to make a payment.</p>
]]></description><pubDate>Sun, 18 Aug 2024 01:20:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=41279408</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41279408</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41279408</guid></item><item><title><![CDATA[New comment by quohort in "topoBuilder"]]></title><description><![CDATA[
<p>link broken, use <a href="https://www.usgs.gov/programs/national-geospatial-program/topobuilder" rel="nofollow">https://www.usgs.gov/programs/national-geospatial-program/to...</a></p>
]]></description><pubDate>Sat, 17 Aug 2024 21:27:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=41278120</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41278120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41278120</guid></item><item><title><![CDATA[New comment by quohort in "Mpv – A free, open-source, and cross-platform media player"]]></title><description><![CDATA[
<p>try celluloid <a href="https://github.com/celluloid-player/celluloid">https://github.com/celluloid-player/celluloid</a></p>
]]></description><pubDate>Sat, 17 Aug 2024 21:26:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=41278106</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41278106</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41278106</guid></item><item><title><![CDATA[New comment by quohort in "China's manufacturers are going broke"]]></title><description><![CDATA[
<p>IA into BS, BSDF LJL your AJS IoK. From NJBW Chinese UAU in BA PFF‽</p>
]]></description><pubDate>Sat, 17 Aug 2024 19:30:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=41277252</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41277252</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41277252</guid></item><item><title><![CDATA[New comment by quohort in "China's manufacturers are going broke"]]></title><description><![CDATA[
<p>> It's just statecraft and covert influence campaigns<p>I'm sure that has something to do with it, but such campaigns are catalyzed by china's military aggression in the south pacific. Morality is an afterthought.</p>
]]></description><pubDate>Sat, 17 Aug 2024 19:24:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=41277206</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41277206</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41277206</guid></item><item><title><![CDATA[New comment by quohort in "There Is No Website"]]></title><description><![CDATA[
<p>How difficult is it to test your site on the 3 major browser engines? I have done some web development before and when I'm on linux, I just test my site with chromium, firefox, and epiphany.<p>I think the onus is on the developer to use standards that are well supported and to try to avoid standards like webUSB that are niche. To use semantic HTML and such so that the website fails in a more useful way to the end user when the standards aren't supported.</p>
]]></description><pubDate>Sat, 17 Aug 2024 19:13:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=41277115</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41277115</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41277115</guid></item><item><title><![CDATA[New comment by quohort in "Inside the "3 billion people" national public data breach"]]></title><description><![CDATA[
<p>I wonder if you could create a national or federated ID system that takes advantage of blind signatures/ZKP to improve privacy. For example, you could create an unlimited number of identities to hand out to different buisnesses, and they could use ZKP to prove that you are above 18, a non-felon, or an organ donor etc. Dunno how something like photo ID would work.</p>
]]></description><pubDate>Thu, 15 Aug 2024 01:13:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41252288</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41252288</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41252288</guid></item><item><title><![CDATA[New comment by quohort in "Inside the "3 billion people" national public data breach"]]></title><description><![CDATA[
<p>Good news loyal customer, we now support 2-factor authentication!<p>... over SMS!</p>
]]></description><pubDate>Thu, 15 Aug 2024 00:51:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=41252203</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41252203</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41252203</guid></item><item><title><![CDATA[New comment by quohort in "Inside the "3 billion people" national public data breach"]]></title><description><![CDATA[
<p>How about this: without barcodes, you can't replace your clerks with self-checkout machines</p>
]]></description><pubDate>Thu, 15 Aug 2024 00:42:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41252158</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41252158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41252158</guid></item><item><title><![CDATA[New comment by quohort in "Inside the "3 billion people" national public data breach"]]></title><description><![CDATA[
<p>It doesn't need to be a national ID, it could just operate on a state-level like drivers licenses currently do.</p>
]]></description><pubDate>Thu, 15 Aug 2024 00:39:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=41252143</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41252143</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41252143</guid></item><item><title><![CDATA[New comment by quohort in "Rust Atomics and Locks (2023)"]]></title><description><![CDATA[
<p>Why do programming books always have some random unrelated illustration on the front?<p>Usually when you have a textbook, they will have some nice illustration that is tangentially related to the content of the book (like fibonacci spiral for a math book or some chemical reaction for a chemistry book for example). But I suppose that there isn't really such an equivalent unless it's a computer graphics book.<p>I guess it's also like how every project has to have its own "cutesey" mascot.</p>
]]></description><pubDate>Wed, 14 Aug 2024 02:17:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=41241936</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41241936</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41241936</guid></item><item><title><![CDATA[New comment by quohort in "Y'all are sleeping on HTTP/3"]]></title><description><![CDATA[
<p>Sort of. The solution i'm suggesting would occupy the "decentralized" and "secure" position of zooko's triangle (<a href="https://en.wikipedia.org/wiki/Zooko%27s_triangle" rel="nofollow">https://en.wikipedia.org/wiki/Zooko%27s_triangle</a>).<p>Whereas the problem that Namecoin, ENS, and others (presumably namebase as well?) are trying to solve is squaring the whole triangle with a petname system that sacrifices security for human-meaningful names. They are what's referred to as a petname system.</p>
]]></description><pubDate>Mon, 12 Aug 2024 00:33:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=41220240</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41220240</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41220240</guid></item><item><title><![CDATA[New comment by quohort in "Pentagon is growing more comfortable talking about offensive weapons in space"]]></title><description><![CDATA[
<p>It's true that china has been developing anti-satellite weapons recently (<a href="https://en.wikipedia.org/wiki/ASAT_program_of_China" rel="nofollow">https://en.wikipedia.org/wiki/ASAT_program_of_China</a>). To respond in kind with "kinetic" weapons as mentioned sets a dangerous precedent for kessler syndrome in the same way that nuclear proliferation does for nuclear winter.</p>
]]></description><pubDate>Mon, 12 Aug 2024 00:25:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=41220209</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41220209</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41220209</guid></item><item><title><![CDATA[New comment by quohort in "Pentagon is growing more comfortable talking about offensive weapons in space"]]></title><description><![CDATA[
<p>Are you being sarcastic? Historically, programs like SDI have had a destabilizing effect on nuclear war due to the dynamics of MAD</p>
]]></description><pubDate>Mon, 12 Aug 2024 00:19:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=41220181</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41220181</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41220181</guid></item><item><title><![CDATA[New comment by quohort in "KnitScape"]]></title><description><![CDATA[
<p>makes me wonder if there is some sort of generic CAD for processes that involve bending and folding. For example, knitting fabric, bending wire, bending sheet metal, tying knots.<p>For example, you could have a parametric design for a custom/designer piece of clothing and adjust parameters to tailor to individual wearers while having some automated manufacturing</p>
]]></description><pubDate>Mon, 12 Aug 2024 00:13:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=41220161</link><dc:creator>quohort</dc:creator><comments>https://news.ycombinator.com/item?id=41220161</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41220161</guid></item></channel></rss>