<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sangel</title><link>https://news.ycombinator.com/user?id=sangel</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 02:33:25 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sangel" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by sangel in "Amazon confirms 14,000 job losses in corporate division"]]></title><description><![CDATA[
<p>My totally uneducated guess is that they leak exaggerated numbers on purpose to make the real numbers look less bad in comparison. The idea being that a few days before the official news everyone is talking about a potential 30 or 40K people layoff. Then, when the official news come out and state that they are laying off 14K people, it sounds less dramatic (in relative terms). This makes people (who are not affected by this) to feel like the news were overblown and are not as significant.</p>
]]></description><pubDate>Tue, 28 Oct 2025 12:28:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45731950</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=45731950</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45731950</guid></item><item><title><![CDATA[New comment by sangel in "Verus: Verified Rust for low-level systems code"]]></title><description><![CDATA[
<p>Obviously not. Suppose the input to my function is a 64-bit integer. My test cannot possibly try every possible 64-bit integer. It would take years for such a test to finish.<p>This is why tools like formal verification and symbolic analyses can help you establish that for all possible integers X, your function does the right thing (for some definition of “right”). You get this assurance without having to actually enumerate all X.</p>
]]></description><pubDate>Wed, 23 Apr 2025 13:20:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=43771843</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=43771843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43771843</guid></item><item><title><![CDATA[New comment by sangel in "Cryptographers solve decades-old privacy problem"]]></title><description><![CDATA[
<p>Very inefficient. Like wildly so. Specifically if you have a very small database and you preprocess it with their techniques, the resulting database is petabytes in size. But the results are very beautiful.<p>There are no obvious ways to improve on this work, so it is not a matter of engineering. We really do need another breakthrough result to get us closer to practicality.</p>
]]></description><pubDate>Sat, 18 Nov 2023 18:21:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=38322655</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=38322655</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38322655</guid></item><item><title><![CDATA[Retentive Network: A Successor to Transformer for Large Language Models]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2307.08621">https://arxiv.org/abs/2307.08621</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=36831956">https://news.ycombinator.com/item?id=36831956</a></p>
<p>Points: 112</p>
<p># Comments: 19</p>
]]></description><pubDate>Sun, 23 Jul 2023 02:12:31 +0000</pubDate><link>https://arxiv.org/abs/2307.08621</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=36831956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36831956</guid></item><item><title><![CDATA[New comment by sangel in "I thought I wanted to be a professor, then I served on a hiring committee (2021)"]]></title><description><![CDATA[
<p>At least in my department, this will not work as long as the applicant's supervisor or dissertation committee members are still in the department. The crux of the issue, in my mind, is that it is hard to have candid and unbiased  discussion about a candidate when the supervisor / dissertation committee is part of that discussion.</p>
]]></description><pubDate>Sat, 22 Jul 2023 19:19:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=36828958</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=36828958</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36828958</guid></item><item><title><![CDATA[New comment by sangel in "I thought I wanted to be a professor, then I served on a hiring committee (2021)"]]></title><description><![CDATA[
<p>This is strange to me. Many universities, including mine, avoid interviewing applicants with a PhD or postdoc from the same institution to which they are applying.</p>
]]></description><pubDate>Sat, 22 Jul 2023 14:25:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=36826501</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=36826501</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36826501</guid></item><item><title><![CDATA[New comment by sangel in "Spiral’s Homomorphic Encryption – Is This the Future of Privacy?"]]></title><description><![CDATA[
<p>This is basically what we did in our project: <a href="https://www.cis.upenn.edu/~sga001/papers/pung-osdi16.pdf" rel="nofollow">https://www.cis.upenn.edu/~sga001/papers/pung-osdi16.pdf</a>.<p>We never built it into a product because we couldn't figure out a way to monetize it to pay for the servers.</p>
]]></description><pubDate>Mon, 21 Nov 2022 18:48:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=33696288</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=33696288</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33696288</guid></item><item><title><![CDATA[New comment by sangel in "Graduate students question career options"]]></title><description><![CDATA[
<p>From my experience your first number is off by 3X and sometimes more depending on the university.<p>But yes, you make less as a professor than you do in industry.</p>
]]></description><pubDate>Tue, 08 Nov 2022 04:05:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=33515764</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=33515764</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33515764</guid></item><item><title><![CDATA[New comment by sangel in "Show HN: Read Wikipedia privately using homomorphic encryption"]]></title><description><![CDATA[
<p>They are called PIR with sublinear online computation or offline/online PIR.<p>Key idea is the client issues a query that is independent of what they really want. This is the “offline” query. This query is linear (unavoidable) and the client gets some hints as a result<p>Then later, the client can issue one or more queries for elements they want and those queries can be sublinear in terms of computation. The client uses hints to make that happen.<p>Some papers on this are:<p><a href="https://eprint.iacr.org/2019/1075.pdf" rel="nofollow">https://eprint.iacr.org/2019/1075.pdf</a><p><a href="https://eprint.iacr.org/2021/1438" rel="nofollow">https://eprint.iacr.org/2021/1438</a><p><a href="https://eprint.iacr.org/2022/081.pdf" rel="nofollow">https://eprint.iacr.org/2022/081.pdf</a></p>
]]></description><pubDate>Wed, 08 Jun 2022 16:49:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=31670136</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=31670136</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31670136</guid></item><item><title><![CDATA[New comment by sangel in "MongoDB Releases Queryable Encryption Preview"]]></title><description><![CDATA[
<p>High risk compared to what? The alternative is absolutely no privacy (status quo) or no/limited functionality (not very useful). Seems like strictly better than having no privacy.</p>
]]></description><pubDate>Wed, 08 Jun 2022 03:25:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=31662831</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=31662831</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31662831</guid></item><item><title><![CDATA[New comment by sangel in "Formal methods only solve half my problems"]]></title><description><![CDATA[
<p>You can formally verify all the way to C, C#, Haskell, or even assembly if you use tools like Dafny, Coq, or Vale (for verified assembly). Several projects do this. It’s a lot of work for sure though.</p>
]]></description><pubDate>Sat, 04 Jun 2022 02:20:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=31616288</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=31616288</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31616288</guid></item><item><title><![CDATA[New comment by sangel in "Confess your love with zero-knowledge"]]></title><description><![CDATA[
<p>Non interactive zero knowledge allows one proof to be checked by many verifiers. I think folks would still consider that to be a zero knowledge proof no?<p>That said, yeah this hashing example is not zero knowledge because, among other things, the hash is not hiding.</p>
]]></description><pubDate>Fri, 03 Jun 2022 20:28:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=31613240</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=31613240</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31613240</guid></item><item><title><![CDATA[New comment by sangel in "Grade Inflation: Over 82% of Harvard '22 Graduating With Over a 3.7 (A-) GPA"]]></title><description><![CDATA[
<p>This hasn’t really been my experience at all. I find students at my university (an ivy) to be pretty reasonable and only complain if there is a mistake during grading. In that case they are absolutely entitled to do so. They also seem to really enjoy challenging classes.</p>
]]></description><pubDate>Sat, 28 May 2022 04:18:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=31537576</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=31537576</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31537576</guid></item><item><title><![CDATA[New comment by sangel in "Cities with Nice Weather"]]></title><description><![CDATA[
<p>It is 40 degrees F right now… in mid May. And has been all month and basically all year since last November.<p>I don’t see how you can call that good temperature.</p>
]]></description><pubDate>Fri, 13 May 2022 04:53:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=31363479</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=31363479</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31363479</guid></item><item><title><![CDATA[New comment by sangel in "Unredacted Antitrust Complaint Shows Google’s Ad Biz Even Scummier Than Imagined"]]></title><description><![CDATA[
<p>I don't know if the allegations in this antitrust are true or not. However, about a decade ago I wrote a paper (<a href="https://www.cis.upenn.edu/~sga001/papers/vex-sigcomm13.pdf" rel="nofollow">https://www.cis.upenn.edu/~sga001/papers/vex-sigcomm13.pdf</a>) discussing all the ways in which ad exchanges could misbehave without such actions being detectable and some technical mechanisms to prevent violations. I recall some colleagues telling me that surely ad exchanges would never misbehave because deviations from honest behavior would affect companies' reputations, and ethical people within these companies would whistle-blow immediately.<p>I'm really curious to see where the government acquired their evidence (and what solid evidence do they have), and whether it ends up holding up in court.</p>
]]></description><pubDate>Mon, 17 Jan 2022 16:11:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=29968020</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=29968020</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29968020</guid></item><item><title><![CDATA[New comment by sangel in "Hashing is not encryption"]]></title><description><![CDATA[
<p>I think this requires assuming H is a random oracle, no?<p>Suppose H(s||k) is a collision-resistant hash function. Let's build another CRHF from H as follows: H'(s || k) = H(s || k) || last-bit-of-k.<p>Now let's instantiate the cryptosystem you proposed with H'. Suppose m is message and that it is of length equal to the length of the bitstring produced by H'.<p>We have C = H'(s||k) XOR m.<p>The ciphertext is thus: (k, C).<p>What can an attacker do? Well, the attacker can XOR the last bit of C with the last bit of k and get the last bit of m. This is already enough to violate semantic security.</p>
]]></description><pubDate>Sun, 09 Jan 2022 17:44:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=29865551</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=29865551</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29865551</guid></item><item><title><![CDATA[New comment by sangel in "How Rainbow Tables Work"]]></title><description><![CDATA[
<p>You are right. I'm missing an H at the end.<p>You first compare target-digest with all endpoints.
If it's a match with any of them, good. Then you know a pre-image is in that column.<p>If not, then try H(R_last(target-digest)). Does it match any endpoint?<p>If not, then try H(R_last(H(R_second-to-last(target-digest))).<p>Rinse and repeat.</p>
]]></description><pubDate>Wed, 25 Nov 2020 15:44:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=25210390</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=25210390</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25210390</guid></item><item><title><![CDATA[New comment by sangel in "How Rainbow Tables Work"]]></title><description><![CDATA[
<p>The table looks like this:<p>Column 1            Column 2<p>start-text1        start-text2<p><intermediate>    <intermediate><p>last-hash1       last-hash2<p>You only store the start text and the last hash for each column. <intermediate> consists of a mix of passwords ("text ") and hashes. To see how they are computed, let us narrow our attention to a single column.<p>text1<p><hash-1>      computed using H(text1)<p><text-2>      computed using R_1(hash-1)<p><hash-2>      computed using H(text-2)<p><text-3>      computed using R_2(hash-2)<p>last-hash   computed using H(text-3)<p>Each column will look like that. I'm using <stuff> to denote things that are not stored. H is the hash function you are creating the rainbow table for. R_1, R_2, etc. are the reduction functions. Each column uses the same hash function and reduction functions but uses a different starting text.<p>Note that in a rainbow table that consists of k columns, there is no need to recompute hash/reduction functions for each chain. Instead, the attacker computes R_last(target-digest), and checks that against all the endpoints (last hash) of all column. If it matches any endpoint, then that chain likely has the corresponding password. Otherwise, compute R_last(H(R_second_to_last(target-digest))), and compare the result with all endpoints. Rinse and repeat. In the worst case, you have to compute as many hash/reduction functions as there are rows (regardless of the number of columns since all columns use the same hash and reduction functions).</p>
]]></description><pubDate>Tue, 24 Nov 2020 23:03:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=25204060</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=25204060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25204060</guid></item><item><title><![CDATA[New comment by sangel in "IBM Fully Homomorphic Encryption Toolkit for Linux"]]></title><description><![CDATA[
<p>How would you compare this toolkit to something like SEAL? Are there particular selling points or things that I should be aware as a potential user?</p>
]]></description><pubDate>Sun, 02 Aug 2020 19:31:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=24030976</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=24030976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24030976</guid></item><item><title><![CDATA[New comment by sangel in "Show HN: LaTeX Search – Quickly Lookup LaTeX Notation"]]></title><description><![CDATA[
<p>ah, this is indeed quite neat. thanks for sharing.</p>
]]></description><pubDate>Sun, 15 Sep 2019 18:57:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=20978858</link><dc:creator>sangel</dc:creator><comments>https://news.ycombinator.com/item?id=20978858</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20978858</guid></item></channel></rss>