<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: spb</title><link>https://news.ycombinator.com/user?id=spb</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 15:49:35 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=spb" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[How to Store Data on Paper]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.monperrus.net/martin/store-data-paper">https://www.monperrus.net/martin/store-data-paper</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=32040661">https://news.ycombinator.com/item?id=32040661</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Sun, 10 Jul 2022 00:25:34 +0000</pubDate><link>https://www.monperrus.net/martin/store-data-paper</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=32040661</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32040661</guid></item><item><title><![CDATA[New comment by spb in "Hush, a modern shell scripting language"]]></title><description><![CDATA[
<p>This looks excellent - I outlined wanting something like a cross between Lua and Bash back in 2016, and at first glance, it would seem that this project by and large fits the bill: <a href="https://github.com/stuartpb/lash" rel="nofollow">https://github.com/stuartpb/lash</a></p>
]]></description><pubDate>Tue, 26 Apr 2022 10:38:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=31165807</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=31165807</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31165807</guid></item><item><title><![CDATA[New comment by spb in "Changing std:sort at Google’s scale and beyond"]]></title><description><![CDATA[
<p>Recent versions of Lua use this trick as well.</p>
]]></description><pubDate>Thu, 21 Apr 2022 08:21:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=31107105</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=31107105</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31107105</guid></item><item><title><![CDATA[New comment by spb in "Moreutils: A collection of Unix tools that nobody thought to write long ago"]]></title><description><![CDATA[
<p>I tried to prototype my own implementation of `vidir` in Node.JS a while back (not realizing that it existed under this name in moreutils), and I ended up getting derailed after realizing how incomplete Node.JS's support was for getting the group / username corresponding to a G/UID: <a href="https://github.com/stuartpb/whomst" rel="nofollow">https://github.com/stuartpb/whomst</a></p>
]]></description><pubDate>Sun, 17 Apr 2022 16:03:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=31061799</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=31061799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31061799</guid></item><item><title><![CDATA[New comment by spb in "Insane state of today's advertising part 3"]]></title><description><![CDATA[
<p>This is what the Cluetrain Manifesto was saying... in 1999.<p><a href="http://www.cluetrain.com/" rel="nofollow">http://www.cluetrain.com/</a></p>
]]></description><pubDate>Fri, 01 Sep 2017 14:16:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=15148469</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=15148469</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15148469</guid></item><item><title><![CDATA[New comment by spb in "Bashfill – art for your terminal"]]></title><description><![CDATA[
<p>That's what `vipe` is for: <a href="https://joeyh.name/code/moreutils/" rel="nofollow">https://joeyh.name/code/moreutils/</a></p>
]]></description><pubDate>Thu, 13 Jul 2017 08:05:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=14759557</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14759557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14759557</guid></item><item><title><![CDATA[New comment by spb in "The Decline of Imgur on Reddit and the Rise of Reddit's Native Image Hosting"]]></title><description><![CDATA[
<p>No. See <a href="http://www.cluetrain.com/" rel="nofollow">http://www.cluetrain.com/</a> - paid advertising is inherently unethical on a network where genuine mass interaction is free.</p>
]]></description><pubDate>Tue, 20 Jun 2017 20:31:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=14598326</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14598326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14598326</guid></item><item><title><![CDATA[New comment by spb in "Be Careful with UUID or GUID as Primary Keys"]]></title><description><![CDATA[
<p>> Other than DNA sequences I can't think of a good person key.<p>In theory, one could use 3D geoposition at time of birth, time of birth, and sibling order (for twins / triplets / etc delivered surgically), where said order is dictated by the parent(s) or ob/gyn present. Of course, the main problem with this in practice is that not everybody has this information.<p>I would have said you could do something via retinal imagery, but not everybody has eyes. If we had non-invasive neural imagery, would it maybe be possible to derive a key from a simplification of a person's physical brain topology?</p>
]]></description><pubDate>Tue, 13 Jun 2017 06:50:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=14543251</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14543251</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14543251</guid></item><item><title><![CDATA[New comment by spb in "Intel Discontinues the Intel Developer Forum; IDF17 Cancelled"]]></title><description><![CDATA[
<p>> But pretty much no one thought CMOS features could be made arbitrarily small.<p>Pretty much no one <i>qualified</i>, maybe. There are lots of laymen (including many True Believers in The Singularity) who operate under the impression that it's a fixed law of nature.</p>
]]></description><pubDate>Mon, 24 Apr 2017 12:22:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=14183660</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14183660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14183660</guid></item><item><title><![CDATA[New comment by spb in "Show HN: NilPass, the only password manager that's truly impenetrable"]]></title><description><![CDATA[
<p>While I first wrote an article about the absurdities of information security [in 2011][1], this specific extension is an idea I've had since [June 2015][2] - due to the absurd nature of the idea, I wanted to launch it on April Fools' Day, but that ended up causing it to be [dismissed as a joke out of hand altogether][3], so I figured I'd wait a day before posting it to Hacker News.<p>While the premise of the extension sounds like a joke, it's legitimately a good idea, and [one others have had independent of this][4]. I explain some of the thoughts and motivations behind NilPass's design here: <a href="https://nilpass.com/seriously/" rel="nofollow">https://nilpass.com/seriously/</a><p>[1]: <a href="http://www.cracked.com/article_18962_5-things-we-all-do-that-make-hackers-lives-incredibly-easy.html" rel="nofollow">http://www.cracked.com/article_18962_5-things-we-all-do-that...</a><p>[2]: <a href="https://github.com/nilpass/nilpass-branding/commit/6090b5cc972378832799d1c2a13ee8b12db88ca7" rel="nofollow">https://github.com/nilpass/nilpass-branding/commit/6090b5cc9...</a><p>[3]: <a href="https://www.reddit.com/r/netsec/comments/62sgrp/presenting_nilpass_the_only_password_manager/dfova33/" rel="nofollow">https://www.reddit.com/r/netsec/comments/62sgrp/presenting_n...</a><p>[4]: <a href="https://rempel.world/passwordless-method.html" rel="nofollow">https://rempel.world/passwordless-method.html</a></p>
]]></description><pubDate>Sun, 02 Apr 2017 22:23:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=14019400</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14019400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14019400</guid></item><item><title><![CDATA[Show HN: NilPass, the only password manager that's truly impenetrable]]></title><description><![CDATA[
<p>Article URL: <a href="https://nilpass.com/">https://nilpass.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14019327">https://news.ycombinator.com/item?id=14019327</a></p>
<p>Points: 13</p>
<p># Comments: 4</p>
]]></description><pubDate>Sun, 02 Apr 2017 22:09:24 +0000</pubDate><link>https://nilpass.com/</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14019327</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14019327</guid></item><item><title><![CDATA[New comment by spb in "The Passwordless Method"]]></title><description><![CDATA[
<p>I spent all of yesterday making an extension for this, and now HN won't let me post it as an article: <a href="https://nilpass.com/" rel="nofollow">https://nilpass.com/</a></p>
]]></description><pubDate>Sat, 01 Apr 2017 23:48:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=14014851</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=14014851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14014851</guid></item><item><title><![CDATA[New comment by spb in "Amazon to hand over Echo audio from alleged murder after defendant consents"]]></title><description><![CDATA[
<p>Though, of course, this still means trusting the <i>compiler</i>: <a href="https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thomp...</a></p>
]]></description><pubDate>Tue, 07 Mar 2017 21:08:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=13814902</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13814902</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13814902</guid></item><item><title><![CDATA[New comment by spb in "An app that lets you pretend to receive a call when a co-worker distracts you"]]></title><description><![CDATA[
<p>I made a similar app to this for Pebble at a hackathon in 2015: <a href="https://github.com/phoneyscape" rel="nofollow">https://github.com/phoneyscape</a><p>We got an offer from Madrona Ventures for it that I never ended up following up on.</p>
]]></description><pubDate>Mon, 06 Mar 2017 14:03:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=13802643</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13802643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13802643</guid></item><item><title><![CDATA[New comment by spb in "Adding a SHA1 collision vulnerability test hoses WebKit's source repository"]]></title><description><![CDATA[
<p>He seems to have changed his tune now that he can't behind the "that's only an imaginary possibility" cover: <a href="http://marc.info/?l=git&m=148787047422954" rel="nofollow">http://marc.info/?l=git&m=148787047422954</a><p>> Do we want to migrate to another hash? Yes.</p>
]]></description><pubDate>Fri, 24 Feb 2017 18:25:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=13726200</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13726200</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13726200</guid></item><item><title><![CDATA[New comment by spb in "List of Sites Affected by Cloudflare's HTTPS Traffic Leak"]]></title><description><![CDATA[
<p>Holy crap, really? I've been drawing up [profiles for the user account systems of a bunch of websites for the past few years][1], and I think I've only seen that <i>once</i> before (on a Washington State website, no less).<p>[1]: <a href="https://github.com/opws/domainprofiles" rel="nofollow">https://github.com/opws/domainprofiles</a></p>
]]></description><pubDate>Fri, 24 Feb 2017 14:31:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=13723922</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13723922</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13723922</guid></item><item><title><![CDATA[New comment by spb in "Show HN: Alphabinary Encoding"]]></title><description><![CDATA[
<p>Precisely - calling it an "encoding" here is more of a tongue-in-cheek nod to how simple the steganographic rule is than an intention to imply that it be used as a straightforward representation.<p>Also, "steganography" tends to imply that the intent is to <i>hide</i> the underlying message, and that's not necessarily the case here, such as when employing alphabi for mnemonic purposes ("Baywatch hologram lemonade asteroid" being easier to remember than "52.84.24.108").<p>Furthermore, the purpose of the "encoding" being so <i>flexible</i> (and, consequently, low-density) is that it can be used, then, as a <i>medium of expression</i> - it's not that the "message" is <i>hidden</i>, it's that, well, [the medium is the message][], and per Article 19 of the Universal Declaration of Human Rights linked there (emphasis mine):<p>> Everyone has the right to freedom of opinion <i>and expression</i>; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas <i>through any media</i> and regardless of frontiers.<p>[the medium is the message]: <a href="https://en.wikipedia.org/wiki/The_medium_is_the_message" rel="nofollow">https://en.wikipedia.org/wiki/The_medium_is_the_message</a></p>
]]></description><pubDate>Thu, 26 Jan 2017 22:38:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=13495989</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13495989</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13495989</guid></item><item><title><![CDATA[New comment by spb in "Show HN: Alphabinary Encoding"]]></title><description><![CDATA[
<p>So, this is an idea I had a while back, inspired by how ideas like [illegal primes][] are fundamentally irrepressible as free speech, due to the intrinsically fluid nature of abstract data.<p>It's not just useful on a free-speech axis, though: in terms of just bare usability, it opens the door for a simple way to represent arbitrary numbers (like IP addresses) mnemonically, without having to lug around huge arbitrary dictionaries that might have proprietary restrictions to them, like the one what3words uses to encode geo coordinates.<p>I'm interested in hearing what uses Hacker News readers could come up with for this, and other thoughts around these kinds of concepts.<p>[illegal primes]: <a href="https://en.wikipedia.org/wiki/Illegal_prime" rel="nofollow">https://en.wikipedia.org/wiki/Illegal_prime</a></p>
]]></description><pubDate>Thu, 26 Jan 2017 22:07:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=13495699</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13495699</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13495699</guid></item><item><title><![CDATA[Show HN: Alphabinary Encoding]]></title><description><![CDATA[
<p>Article URL: <a href="https://alpha.bi/">https://alpha.bi/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=13495621">https://news.ycombinator.com/item?id=13495621</a></p>
<p>Points: 3</p>
<p># Comments: 3</p>
]]></description><pubDate>Thu, 26 Jan 2017 21:59:10 +0000</pubDate><link>https://alpha.bi/</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13495621</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13495621</guid></item><item><title><![CDATA[C – How can I use a macro, in a macro, to transform a macro's arguments?]]></title><description><![CDATA[
<p>Article URL: <a href="http://stackoverflow.com/questions/41395464/how-can-i-use-a-macro-in-a-macro-to-transform-a-macros-arguments/">http://stackoverflow.com/questions/41395464/how-can-i-use-a-macro-in-a-macro-to-transform-a-macros-arguments/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=13286248">https://news.ycombinator.com/item?id=13286248</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 30 Dec 2016 18:48:02 +0000</pubDate><link>http://stackoverflow.com/questions/41395464/how-can-i-use-a-macro-in-a-macro-to-transform-a-macros-arguments/</link><dc:creator>spb</dc:creator><comments>https://news.ycombinator.com/item?id=13286248</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13286248</guid></item></channel></rss>