<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: runningmike</title><link>https://news.ycombinator.com/user?id=runningmike</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 11:15:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=runningmike" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by runningmike in "Security Concerns in Generative AI Coding Assistants"]]></title><description><![CDATA[
<p>Original title:
Security Concerns in Generative AI Coding Assistants: Insights from Online Discussions on GitHub Copilot<p>"the sentiment expressed across all concern areas is generally skewed toward the negative end of the polarity scale."</p>
]]></description><pubDate>Tue, 14 Apr 2026 08:03:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47762693</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47762693</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47762693</guid></item><item><title><![CDATA[Security Concerns in Generative AI Coding Assistants]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2604.08352">https://arxiv.org/abs/2604.08352</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47762692">https://news.ycombinator.com/item?id=47762692</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 14 Apr 2026 08:03:21 +0000</pubDate><link>https://arxiv.org/abs/2604.08352</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47762692</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47762692</guid></item><item><title><![CDATA[New comment by runningmike in "Google has a secret reference desk"]]></title><description><![CDATA[
<p>Nice article. But the warning can be stronger imho:
Instead of: "Don’t assume your results are the same as anyone else’s."<p>"The results search you get from G*gle results are unique."<p>G*gle does not use the easy to use Lucene search syntax but has many 'magic' things, like:<p>Searching for high-quality Open Access content or solid technical answers on software challenges requires a rigorous scientific methodology, combined with creativity and extensive experience. Despite being a crucial competency, it is rarely taught in depth.<p>Even with the rise of LLMs, effectively navigating search results remains an unsolved problem.</p>
]]></description><pubDate>Tue, 14 Apr 2026 07:37:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47762488</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47762488</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47762488</guid></item><item><title><![CDATA[New comment by runningmike in "How Complex is my Code?"]]></title><description><![CDATA[
<p>To do a Simple Cyclomatic Complexity check, operating on the principle that secure systems are simple systems, you can use <a href="https://github.com/nocomplexity/codeaudit" rel="nofollow">https://github.com/nocomplexity/codeaudit</a> or try the wasm version on <a href="https://nocomplexity.com/codeauditapp/dashboardapp.html" rel="nofollow">https://nocomplexity.com/codeauditapp/dashboardapp.html</a><p>Complexity directly impacts security. Simple systems are:
Maintainable: Easier to change and manage.
Reliable: Less prone to logic errors.
Testable: Easier to validate and test.</p>
]]></description><pubDate>Sun, 12 Apr 2026 06:23:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47736677</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47736677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47736677</guid></item><item><title><![CDATA[New comment by runningmike in "Open source died in March. It just doesn't know it yet"]]></title><description><![CDATA[
<p>100% click bait title indeed!<p>We are brainwashed by commercial vendors to advocate for complex, expensive cyber security solutions that are costly to implement and lack transparency.<p>Most (commercial) cyber security solutions are not future-proof and not maintainable in the long term. Most cyber security improvements programs end with more paperwork and more new fancy software tools, without increased security resilience.</p>
]]></description><pubDate>Sat, 11 Apr 2026 15:15:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47731326</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47731326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47731326</guid></item><item><title><![CDATA[New comment by runningmike in "I Quit. The Clankers Won"]]></title><description><![CDATA[
<p>Love the one-armed code bandit on the home page of this blog!
Nice UX experience!
See: <a href="https://dbushell.com/" rel="nofollow">https://dbushell.com/</a></p>
]]></description><pubDate>Wed, 01 Apr 2026 17:01:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47603517</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47603517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47603517</guid></item><item><title><![CDATA[Can LLMs Hack Enterprise Networks?]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/andreashappe/cochise">https://github.com/andreashappe/cochise</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47410198">https://news.ycombinator.com/item?id=47410198</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 17 Mar 2026 09:07:46 +0000</pubDate><link>https://github.com/andreashappe/cochise</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47410198</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47410198</guid></item><item><title><![CDATA[Static Application Security Testing (SAST): Simplicity Matters]]></title><description><![CDATA[
<p>Article URL: <a href="https://nocomplexity.substack.com/p/static-application-security-testing">https://nocomplexity.substack.com/p/static-application-security-testing</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47366580">https://news.ycombinator.com/item?id=47366580</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 13 Mar 2026 16:32:47 +0000</pubDate><link>https://nocomplexity.substack.com/p/static-application-security-testing</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47366580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47366580</guid></item><item><title><![CDATA[New comment by runningmike in "Unlocking Python's Cores:Energy Implications of Removing the GIL"]]></title><description><![CDATA[
<p>Title shortened - Original title:<p>Unlocking Python’s Cores: Hardware Usage and Energy Implications of Removing the GIL<p>I am curious about the NumPy workload choice made, due to more limited impact on CPython performance.</p>
]]></description><pubDate>Fri, 06 Mar 2026 08:41:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47272532</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47272532</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272532</guid></item><item><title><![CDATA[Unlocking Python's Cores:Energy Implications of Removing the GIL]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2603.04782">https://arxiv.org/abs/2603.04782</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47272531">https://news.ycombinator.com/item?id=47272531</a></p>
<p>Points: 132</p>
<p># Comments: 103</p>
]]></description><pubDate>Fri, 06 Mar 2026 08:41:37 +0000</pubDate><link>https://arxiv.org/abs/2603.04782</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47272531</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272531</guid></item><item><title><![CDATA[New comment by runningmike in "Odido Security Breach – 6M Customers (Full Timeline and Analysis)"]]></title><description><![CDATA[
<p>Odido’s Biggest Failures misses the key points, in my opinion: 1) a lack of "security by design" and 2) insufficient security monitoring.<p>By centralising and outsourcing all data to what appears to be a Salesforce Cloud solution, this was a disaster waiting to happen. If even minimal security monitoring had been active, someone should have noticed something. It is also possible that the security management department was competent, but senior management failed to understand or act upon the advice provided.</p>
]]></description><pubDate>Thu, 05 Mar 2026 08:36:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47259169</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47259169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47259169</guid></item><item><title><![CDATA[Security Is Not Enough]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2603.00841">https://arxiv.org/abs/2603.00841</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47259052">https://news.ycombinator.com/item?id=47259052</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 05 Mar 2026 08:21:23 +0000</pubDate><link>https://arxiv.org/abs/2603.00841</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47259052</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47259052</guid></item><item><title><![CDATA[New comment by runningmike in "Security Risks of AI Agents Hiring Humans: An Empirical Marketplace Study"]]></title><description><![CDATA[
<p>Study based on the website <a href="https://rentahuman.ai/" rel="nofollow">https://rentahuman.ai/</a>
Minority Report next level?</p>
]]></description><pubDate>Wed, 25 Feb 2026 09:00:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47149112</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47149112</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47149112</guid></item><item><title><![CDATA[Security Risks of AI Agents Hiring Humans: An Empirical Marketplace Study]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2602.19514">https://arxiv.org/abs/2602.19514</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47149111">https://news.ycombinator.com/item?id=47149111</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 25 Feb 2026 09:00:39 +0000</pubDate><link>https://arxiv.org/abs/2602.19514</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47149111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47149111</guid></item><item><title><![CDATA[New comment by runningmike in "Simplify IT: The art and science towards simpler IT solutions(2025)[pdf]"]]></title><description><![CDATA[
<p>Problem Solving Methods (PSMs) are key for solving complex problems.</p>
]]></description><pubDate>Wed, 18 Feb 2026 20:36:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47066039</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47066039</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47066039</guid></item><item><title><![CDATA[Simplify IT: The art and science towards simpler IT solutions(2025)[pdf]]]></title><description><![CDATA[
<p>Article URL: <a href="https://nocomplexity.com/documents/reports/SimplifyIT.pdf">https://nocomplexity.com/documents/reports/SimplifyIT.pdf</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47066038">https://news.ycombinator.com/item?id=47066038</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 18 Feb 2026 20:36:14 +0000</pubDate><link>https://nocomplexity.com/documents/reports/SimplifyIT.pdf</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=47066038</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47066038</guid></item><item><title><![CDATA[From Hours to Seconds: Automating Python Security with AI?]]></title><description><![CDATA[
<p>Article URL: <a href="https://nocomplexity.substack.com/p/from-hours-to-seconds-automating">https://nocomplexity.substack.com/p/from-hours-to-seconds-automating</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46776533">https://news.ycombinator.com/item?id=46776533</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 27 Jan 2026 07:22:39 +0000</pubDate><link>https://nocomplexity.substack.com/p/from-hours-to-seconds-automating</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=46776533</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46776533</guid></item><item><title><![CDATA[New comment by runningmike in "What came first: the CNAME or the A record?"]]></title><description><![CDATA[
<p>The end of this blog is …. “ To learn more about our mission to help build a better Internet,”<p>Reminds me of <a href="https://news.ycombinator.com/item?id=37962674">https://news.ycombinator.com/item?id=37962674</a> or see <a href="https://tech.tiq.cc/2016/01/why-you-shouldnt-use-cloudflare/" rel="nofollow">https://tech.tiq.cc/2016/01/why-you-shouldnt-use-cloudflare/</a></p>
]]></description><pubDate>Mon, 19 Jan 2026 20:11:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46683854</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=46683854</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46683854</guid></item><item><title><![CDATA[New comment by runningmike in "The recurring dream of replacing developers"]]></title><description><![CDATA[
<p>“ AI: The Latest Chapter in a Long Story” More the current chapter. Curious about the next one!</p>
]]></description><pubDate>Sat, 17 Jan 2026 22:00:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46662534</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=46662534</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46662534</guid></item><item><title><![CDATA[The Return of NASA's SpaceX Crew-11]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.nasa.gov/">https://www.nasa.gov/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46629109">https://news.ycombinator.com/item?id=46629109</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 15 Jan 2026 07:07:41 +0000</pubDate><link>https://www.nasa.gov/</link><dc:creator>runningmike</dc:creator><comments>https://news.ycombinator.com/item?id=46629109</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46629109</guid></item></channel></rss>