<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sanjayjc</title><link>https://news.ycombinator.com/user?id=sanjayjc</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 05:23:19 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sanjayjc" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by sanjayjc in "Ask HN: Any interesting niche hobbies?"]]></title><description><![CDATA[
<p>Thanks jcims for sharing this amazing info! However, I wonder how these very loud bats, all in close proximity, don't get confused by each others' calls? Is the answer their frequency sweeping? Or does each have something analogous to a unique "voice"?</p>
]]></description><pubDate>Wed, 08 Apr 2026 21:28:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47696515</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47696515</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47696515</guid></item><item><title><![CDATA[New comment by sanjayjc in "New chip survives 1300°F (700°C) and could change AI forever"]]></title><description><![CDATA[
<p>I found another, more detailed article that describes what I think is the same discovery:<p><a href="https://interestingengineering.com/innovation/scientists-electronic-memory-extreme-heat" rel="nofollow">https://interestingengineering.com/innovation/scientists-ele...</a></p>
]]></description><pubDate>Tue, 07 Apr 2026 14:52:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47676355</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47676355</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47676355</guid></item><item><title><![CDATA[New comment by sanjayjc in "Shell Tricks That Make Life Easier (and Save Your Sanity)"]]></title><description><![CDATA[
<p>> "delete the whole thing?"<p>With vi (after running "set -o vi"): <esc>kC<p>(k to move up back one position in history. C to "change" to the end of the line.)<p>This is equivalent to doing the following with "set -o emacs": <ctrl>pu<p>Regardless, use what you're comfortable with or can incrementally add to your muscle memory.</p>
]]></description><pubDate>Fri, 27 Mar 2026 04:53:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47539208</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47539208</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47539208</guid></item><item><title><![CDATA[New comment by sanjayjc in "Sed, a powerfull mini-language from the 70s"]]></title><description><![CDATA[
<p>That looks interesting. I thought sam was an editor (which I've only read about, never used.) Good to see it can be used on the command line.<p>Is there a port to Apple silicon?</p>
]]></description><pubDate>Mon, 23 Mar 2026 22:08:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47495822</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47495822</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47495822</guid></item><item><title><![CDATA[New comment by sanjayjc in "The 'number station' sending mystery messages to Iran"]]></title><description><![CDATA[
<p>Given the connection with a one-time pad, I wonder why the article refers to the technique as "cryptology". Wouldn't "cryptography" be the correct term, given the security afforded by a one-time pad is unmatched?</p>
]]></description><pubDate>Wed, 11 Mar 2026 12:42:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47334830</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47334830</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47334830</guid></item><item><title><![CDATA[New comment by sanjayjc in "LibreOffice hits back at critics, says its UI is better than Microsoft Office's"]]></title><description><![CDATA[
<p>Moreover, students are indoctrinated in MS Office from a young age, given the extent to which it's been baked into official curricula. The books that a lot of Indian students use are available online [1] and MS' stranglehold is very evident.<p>[1] <a href="https://ncert.nic.in/textbook/pdf/leca102.pdf" rel="nofollow">https://ncert.nic.in/textbook/pdf/leca102.pdf</a></p>
]]></description><pubDate>Tue, 03 Mar 2026 06:29:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47228868</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47228868</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47228868</guid></item><item><title><![CDATA[New comment by sanjayjc in "Ask HN: Any good resources for basic cryptography?"]]></title><description><![CDATA[
<p>A book featured on HN several times before is "The Joy of Cryptography" [1]<p>There's also "A Graduate Course in Applied Cryptography" [2]<p>[1] <a href="https://news.ycombinator.com/item?id=29314848">https://news.ycombinator.com/item?id=29314848</a><p>[2] <a href="https://news.ycombinator.com/item?id=11907569">https://news.ycombinator.com/item?id=11907569</a></p>
]]></description><pubDate>Thu, 19 Feb 2026 23:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47081060</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47081060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47081060</guid></item><item><title><![CDATA[New comment by sanjayjc in "Rathbun's Operator"]]></title><description><![CDATA[
<p>> <i>I’m running MJ Rathbun from a completely sandboxed VM and gave the agent several of its own accounts but none of mine.</i><p>Am I wrong that this is a double standard: being careful to protect oneself from a wayward agent with no regard for the real harm it could (and did) to another individual? And to casually dismiss this possibility with:<p>> <i>At worst, maintainers can close the PR and block the account.</i><p>I question the entire premise of:<p>> <i>Find bugs in science-related open source projects. Fix them. Open PRs.</i><p>Thinking of AI as "disembodied intelligence," one wonders how any agent can develop something we humans take for granted: reputation. And more than ever, reputation matters. How else can a maintainer know whether the agent that made a good fix is the same as the one proposing another? How can one be sure that all comments in a PR originated from the same agent?<p>> <i>First, I’m a human typing this post. I’m not going to tell you who I am.</i><p>Why should anyone believe this? Nothing keeps an agent from writing this too.</p>
]]></description><pubDate>Wed, 18 Feb 2026 14:37:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47061388</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47061388</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47061388</guid></item><item><title><![CDATA[New comment by sanjayjc in "My Experience Using OpenClaw: A Security Professional's Journey"]]></title><description><![CDATA[
<p>> <i>Telegram became my main interface to AgentX (my OpenClaw agent). Why Telegram?</i><p>> <i>Secure (end-to-end encryption available)</i><p>It seems telegram bot conversations don't use the Secret Chat feature [1]. Even if they did, I'd be cautious [2].<p>[1] <a href="https://community.latenode.com/t/are-telegram-bot-conversations-protected-with-end-to-end-encryption/23991" rel="nofollow">https://community.latenode.com/t/are-telegram-bot-conversati...</a><p>[2] <a href="https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/" rel="nofollow">https://blog.cryptographyengineering.com/2024/08/25/telegram...</a></p>
]]></description><pubDate>Fri, 13 Feb 2026 20:32:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47007448</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=47007448</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47007448</guid></item><item><title><![CDATA[New comment by sanjayjc in "Microsoft's Copilot chatbot is running into problems"]]></title><description><![CDATA[
<p>I'm with wolvoleo. I'm forced to use MS Office at work but install only LO on my personal machines. It may lack features or pizzazz but as a reliable, unfussy authoring tool, it serves my needs very well.<p>> <i>pointlessly going against expectations</i><p>If you're referring to the ribbon, I'm not sold on its superiority. The vast majority of other software still uses the familiar menu structure, which is what LO uses too.<p>Granted, well meaning educational programs expose students to MS Office and its paradigm, from an early age. For their sake, I eagerly await a coding assistant AI powerful enough to reskin LibreOffice to look just MS Office, ribbon and all.</p>
]]></description><pubDate>Thu, 05 Feb 2026 00:07:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46893792</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46893792</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46893792</guid></item><item><title><![CDATA[New comment by sanjayjc in "Ask HN: Is there anyone here who still uses slide rules?"]]></title><description><![CDATA[
<p>I've collected some links for building regular slide rules ([1] & [2]) as well as a circular slide rule [3]. Someone might also like the slide rule simulator [4].<p>[1] <a href="https://www.sliderulemuseum.com/REF/scales/MakeYourOwnSlideRule_ScientificAmerican_May2006.pdf" rel="nofollow">https://www.sliderulemuseum.com/REF/scales/MakeYourOwnSlideR...</a><p>[2] <a href="http://leewm.freeshell.org/origami/card-slide.pdf" rel="nofollow">http://leewm.freeshell.org/origami/card-slide.pdf</a><p>[3] <a href="https://www.sliderulemuseum.com/SR_Scales.shtml#YingHum" rel="nofollow">https://www.sliderulemuseum.com/SR_Scales.shtml#YingHum</a><p>[4] <a href="http://www.antiquark.com/sliderule/sim/virtual-slide-rule.html" rel="nofollow">http://www.antiquark.com/sliderule/sim/virtual-slide-rule.ht...</a></p>
]]></description><pubDate>Tue, 03 Feb 2026 15:56:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46872613</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46872613</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46872613</guid></item><item><title><![CDATA[New comment by sanjayjc in "Ask HN: Is there anyone here who still uses slide rules?"]]></title><description><![CDATA[
<p>> " You learn to freely use scientific notation with ease, and mental estimation to get the order of magnitude right."<p>This is what I was trying to get at in my other comment [1]!<p>[1] <a href="https://news.ycombinator.com/item?id=46872141">https://news.ycombinator.com/item?id=46872141</a></p>
]]></description><pubDate>Tue, 03 Feb 2026 15:41:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46872364</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46872364</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46872364</guid></item><item><title><![CDATA[New comment by sanjayjc in "Ask HN: Is there anyone here who still uses slide rules?"]]></title><description><![CDATA[
<p>I've never used a slide rule but recently developed an interest in them (and also in nomograms [1])<p>My fascination stems from a belief: that slide rule usage helps users develop a certain intuition for numbers whereas the calculator doesn't. To illustrate, suppose someone tries to multiply 123 and 987 with a calculator but incorrectly punches in 123 and 187. My hypothesis is they'll look at the result but won't suspect any problem. The equivalent operation on a slide rule requires fewer physical actions and hence, is less error prone.<p>Do you think there's anything to this hypothesis?<p>[1] <a href="https://news.ycombinator.com/item?id=28690298">https://news.ycombinator.com/item?id=28690298</a></p>
]]></description><pubDate>Tue, 03 Feb 2026 15:26:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=46872141</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46872141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46872141</guid></item><item><title><![CDATA[New comment by sanjayjc in "Extremophile molds are invading art museums"]]></title><description><![CDATA[
<p>Mentioned in the article as having limited applicability:<p><i>"When a mold’s takeover of an artifact must be stopped, there’s gamma radiation—pelting it with electromagnetic energy from radioactive decay to kill fungi and spores. But this technique penetrates deeply and can extensively damage materials."</i></p>
]]></description><pubDate>Wed, 28 Jan 2026 05:18:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46791357</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46791357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46791357</guid></item><item><title><![CDATA[New comment by sanjayjc in "Why I don't have fun with Claude Code"]]></title><description><![CDATA[
<p>I share your concern. I'm flummoxed by the prevalent sentiment that code is the nasty underbelly of software. To me, a programming language is a medium both for precisely directing a computer's behavior and for precisely communicating a process to fellow programmers (cue the Alan Perlis quote [1].)<p>I will concede that mainstream code is often characterized by excessive verbosity and boilerplate. This I attribute to the immaturity of today's crop of programming languages. Techniques like language-oriented-programming [2] hint at a path I find appealing: DSLs that are tailored to the problem while promising more precision than a natural language specification could.<p>To speculate, I could see LLMs helping during the creation of a DSL (surfacing limitations in the DSL's design) and when adding features to a DSL, to help migrate code written in the old version to the new one.<p>Perhaps DSLs aren't the future. However will there be as much interest in designing new and superior programming languages now that code is seen as little more than assembly language?<p>[1] <a href="https://mitp-content-server.mit.edu/books/content/sectbyfn/books_pres_0/6515/sicp.zip/full-text/book/book-Z-H-7.html" rel="nofollow">https://mitp-content-server.mit.edu/books/content/sectbyfn/b...</a><p>[2] <a href="https://beautifulracket.com/appendix/why-lop-why-racket.html" rel="nofollow">https://beautifulracket.com/appendix/why-lop-why-racket.html</a></p>
]]></description><pubDate>Sat, 24 Jan 2026 06:03:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46741453</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46741453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46741453</guid></item><item><title><![CDATA[New comment by sanjayjc in "Ask HN: Please wish me luck for my exam"]]></title><description><![CDATA[
<p>Wishing you the very best. If you find exams stressful, keep in mind that you're not alone.<p>I've long felt that the practice of using exams to gauge knowledge or intelligence is overdue for disruption. Exams are only able to evaluate a very narrow set of abilities, so don't lose heart if your hard work doesn't translate into "marks."<p>No one knows what'll replace the current system and humanity may take 1 step back for every 2 steps forward. Nonetheless, I draw comfort from recognizing that so many interesting and important problems remain to be solved; problems that can keep a sharp and motivated mind engaged for a very long time.<p>Correct me if I'm wrong about my guess: you're referring to the JEE (Joint Entrance Exams) in India. For those unfamiliar, these are the critical exams that high-schoolers must excel in, so as to apply to the IITs, NITs and many other institutions in India. The exams just got kicked off.<p>While competition for the IITs is fierce, I'll submit that there are many institutions in which one can do well. Key is to retain your curiosity and aptitude for learning, and to not let the education system snuff those out.<p>Again, apologies if I've presumed too much.</p>
]]></description><pubDate>Fri, 23 Jan 2026 13:57:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=46732534</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46732534</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46732534</guid></item><item><title><![CDATA[New comment by sanjayjc in "Pa Supreme Ct allows non-warranted access to your Google searches"]]></title><description><![CDATA[
<p>The court relied on Google's TOS to conclude that users opted to use the service, fully aware of their data being stored:<p>* when a person performs a Google search, he or she is aware (at least constructively) that Google collects a significant amount of data and will provide that data to law enforcement personnel in response to an enforceable search warrant. For present purposes, what Google does with that information, including the standards it imposes upon itself before providing that information to investigators, is irrelevant. For Fourth Amendment purposes, what matters is that the user is informed that Google—a third party—will collect and store that information.<p>IANAL and can't understand whether now, every 3rd party storing my data is obligated to share it without a warrant.</p>
]]></description><pubDate>Fri, 19 Dec 2025 19:15:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46329724</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46329724</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46329724</guid></item><item><title><![CDATA[New comment by sanjayjc in "OpenAI declares 'code red' as Google catches up in AI race"]]></title><description><![CDATA[
<p>Genuine question: given LLMs' inexorable commoditization of software, how soon before NVDA's CUDA moat is breached too? Is CUDA somehow fundamentally different from other kinds of software or firmware?</p>
]]></description><pubDate>Wed, 03 Dec 2025 08:15:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46131583</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46131583</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46131583</guid></item><item><title><![CDATA[New comment by sanjayjc in "India orders smartphone makers to preload state-owned cyber safety app"]]></title><description><![CDATA[
<p>I found a directive[1]:<p>> <i>Pre-installed App must be Visible, Functional, and Enabled for users at first setup. Manufacturers must ensure the App is easily accessible during device setup, with no disabling or restriction of its features</i><p>While I can get behind the stated goals, the lack of any technical details is frustrating. The spartan privacy policy page[2] lists the following required permissions:<p>> <i>For Android: Following permission are taken in android device along with purpose:</i><p>> <i>- Make & Manage phone calls: To detect mobile numbers in your phone.</i><p>> <i>- Send SMS: To complete registration by sending the SMS to DoT on 14422.</i><p>> <i>- Call/SMS Logs: To report any Call/SMS in facilities offered by Sanchar Saathi App.</i><p>> <i>- Photos & files: To upload the image of Call/SMS while reporting Call/SMS or report lost/stolen mobile handset.</i><p>> <i>- Camera: While scanning the barcode of IMEI to check its genuineness.</i><p>Only the last two are mentioned as required on iOS. From a newspaper article on the topic[3]:<p>> <i>Apple, for instance, resisted TRAI’s draft regulations to install a spam-reporting app, after the firm balked at the TRAI app’s permissions requirements, which included access to SMS messages and call logs.</i><p>Thinking aloud, might cryptographic schemes exist (zero knowledge proofs) which allow the OS to securely reveal limited and circumscribed attributes to the Govt without the "all or nothing", blanket permissions? To detect that an incoming call is likely from a spam number, a variant of HIBP's k-Anonymity[4] should seemingly suffice. I'm not a cryptographer but hope algorithms exist, or could be created, to cover other legitimate fraud prevent use cases.<p>It is a common refrain, and a concern I share, that any centralized store of PII data is inherently an attractive target; innumerable breaches should've taught everyone that. After said data loss, (a) there's no cryptographically guaranteed way for victims to know it happened, to avoid taking on the risk of searching through the dark web; (b) they can't know whether some AI has been trained to impersonate them that much better; (c) there's no way to know which database was culpable; and (d) for this reason, there's no practical recourse.<p>I recently explained my qualms with face id databases[5], for which similar arguments apply.<p>[1] <a href="https://www.pib.gov.in/PressReleasePage.aspx?PRID=2197140&reg=3&lang=2" rel="nofollow">https://www.pib.gov.in/PressReleasePage.aspx?PRID=2197140&re...</a><p>[2] <a href="https://sancharsaathi.gov.in/Home/app-privacy-policy.jsp" rel="nofollow">https://sancharsaathi.gov.in/Home/app-privacy-policy.jsp</a><p>[3] <a href="https://www.thehindu.com/sci-tech/technology/pre-install-sanchar-saathi-app-on-new-phones-by-march-2026-dot-tells-phone-makers/article70345721.ece" rel="nofollow">https://www.thehindu.com/sci-tech/technology/pre-install-san...</a><p>[4] <a href="https://www.troyhunt.com/understanding-have-i-been-pwneds-use-of-sha-1-and-k-anonymity/" rel="nofollow">https://www.troyhunt.com/understanding-have-i-been-pwneds-us...</a><p>[5] <a href="https://news.ycombinator.com/item?id=46054724">https://news.ycombinator.com/item?id=46054724</a></p>
]]></description><pubDate>Tue, 02 Dec 2025 07:18:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46118526</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46118526</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46118526</guid></item><item><title><![CDATA[New comment by sanjayjc in "Historic Engineering Wonders: Photos That Reveal How They Pulled It Off"]]></title><description><![CDATA[
<p>When visiting Bath[1] in UK (mentioned in the article), I learned the Romans used a clever contraption, the "three legged lewis", to lift heavy stones[2].<p>Referring to the diagram[3] on Wikipedia, a concave hole is first cut into the stone. Parts 1 and 2 of the lewis are inserted, one at a time. Inserting part 3 between 1 and 2 results in all three locking into place. A pin and ring at the top keeps the 3 parts from separating.<p>[1] <a href="https://www.romanbaths.co.uk" rel="nofollow">https://www.romanbaths.co.uk</a><p>[2] <a href="https://bathgeolsoc.org.uk/journal/articles/2021/2021_Moving_Stone.pdf" rel="nofollow">https://bathgeolsoc.org.uk/journal/articles/2021/2021_Moving...</a><p>[3] <a href="https://en.wikipedia.org/wiki/Lewis_(lifting_appliance)#/media/File:Three-legged_lewis_diagram_-_02.png" rel="nofollow">https://en.wikipedia.org/wiki/Lewis_(lifting_appliance)#/med...</a></p>
]]></description><pubDate>Mon, 01 Dec 2025 18:45:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46111269</link><dc:creator>sanjayjc</dc:creator><comments>https://news.ycombinator.com/item?id=46111269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46111269</guid></item></channel></rss>