<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tdullien</title><link>https://news.ycombinator.com/user?id=tdullien</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 22:12:43 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tdullien" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tdullien in "Safer vibecoding via old hacker habits"]]></title><description><![CDATA[
<p>That's a clever and intriguing idea. I have to think through the security implications a bit though - I don't actually know much about how git operates with regards to hooks etc.<p>I'd imagine you lose the ability to have the coding agent do the commits for you? E.g. if you just mount the code directory, then an agent running on the remote side can't commit anything, right?<p>So you'd have to mount the .git directory from the remote side to then push?</p>
]]></description><pubDate>Wed, 25 Mar 2026 11:58:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47516178</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=47516178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47516178</guid></item><item><title><![CDATA[Safer vibecoding via old hacker habits]]></title><description><![CDATA[
<p>Article URL: <a href="http://addxorrol.blogspot.com/2026/03/slightly-safer-vibecoding-by-adopting.html">http://addxorrol.blogspot.com/2026/03/slightly-safer-vibecoding-by-adopting.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47513092">https://news.ycombinator.com/item?id=47513092</a></p>
<p>Points: 1</p>
<p># Comments: 3</p>
]]></description><pubDate>Wed, 25 Mar 2026 04:03:08 +0000</pubDate><link>http://addxorrol.blogspot.com/2026/03/slightly-safer-vibecoding-by-adopting.html</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=47513092</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47513092</guid></item><item><title><![CDATA[New comment by tdullien in "SCiZE's Classic Warez Collection"]]></title><description><![CDATA[
<p>The old warez cracking scene had an outsize impact on computer security. GRSecurity, Heartbleed vulnerability, most reverse engineering tools for security, etc. etc. etc.<p>There's so much history here, touching on all sorts of insanity including selling 0-day to the US government that was then used to apprehend high-level Al-Qaida personnel, random warez busts leading to people taking oversea jobs, etc. etc. etc.<p>If anyone still has old .NFO archives from 1990-2000, I'd be very interested in getting as many as possible.</p>
]]></description><pubDate>Tue, 06 Jan 2026 13:02:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46511715</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=46511715</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46511715</guid></item><item><title><![CDATA[New comment by tdullien in "Kidnapped by Deutsche Bahn"]]></title><description><![CDATA[
<p>The privatization of the train system in Germany was a particularly insane disaster that is only now, 30 years later, being undone/repaired.<p>If you look at an org chart of the DB these days, the most fascinating part is that DB consists of almost 600 separate corporate entities that are all supposed to invoice each other.<p>Speaking with insiders, it appears that when the privatization happened, the new corporate structure took what was essentially every mid-size branch of the org chart and created a separate corporate entity, with cross-invoicing for what would normally normal intra-company cooperation. I think the (misguided) goal was to obtain some form of accountability inside a large organisation that had been state-funded and not good at internal accounting.<p>This fragmentation lead to insane inflexibility, as each of the 600 entities has a separate PnL and is loathe to do anything that doesn’t look good on their books.<p>Add to this a history of incompetent leadership (Mehdorn, who also ran AirBerlin into the ground, and who was also responsible for the disastrous BER airport build-out), repeated rounds of cost-cutting that prioritized “efficiency” over “resiliency of the network” etc. etc.<p>DB is currently undergoing a massive corporate restructuring to simplify the 600+ entity structure, but there has been a massive loss of expertise, underinvestment in infrastructure, poor IT (if you see a job ad for a Windows NT4 admin, it’s likely DB), etc. etc. — it’ll take a decade or more to dig the org out of the hole it is in.</p>
]]></description><pubDate>Mon, 29 Dec 2025 15:57:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46421921</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=46421921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46421921</guid></item><item><title><![CDATA[New comment by tdullien in "How does a "you interview for US company, we do the work" scam work?"]]></title><description><![CDATA[
<p>There's been an ongoing issue with North Korean state agents infiltrating SV companies, and this proposal helps them pass the interview process more easily.<p>There's multipronged benefit for them: Access to company infrastructure to potentially cause harm or ransom in the future, access to technology / intelligence, but also simply foreign currency.</p>
]]></description><pubDate>Fri, 12 Dec 2025 11:20:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=46243058</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=46243058</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46243058</guid></item><item><title><![CDATA[Ask your LLM for receipts: What I learned teaching Claude C++ crash triage]]></title><description><![CDATA[
<p>Article URL: <a href="http://addxorrol.blogspot.com/2025/12/ask-your-llm-for-receipts-what-i.html">http://addxorrol.blogspot.com/2025/12/ask-your-llm-for-receipts-what-i.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46243037">https://news.ycombinator.com/item?id=46243037</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 12 Dec 2025 11:17:59 +0000</pubDate><link>http://addxorrol.blogspot.com/2025/12/ask-your-llm-for-receipts-what-i.html</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=46243037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46243037</guid></item><item><title><![CDATA[New comment by tdullien in "Broccoli Man, Remastered"]]></title><description><![CDATA[
<p>Xoogler here (2011-2018). It's heartwarming that a core part of Google culture ("for every problem we have 3 solutions: 2 that are deprecated and 1 that is experimental") is alive and well.</p>
]]></description><pubDate>Wed, 26 Nov 2025 13:30:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46057219</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=46057219</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46057219</guid></item><item><title><![CDATA[New comment by tdullien in "Leaving Meta and PyTorch"]]></title><description><![CDATA[
<p>I only remember 2015 TF and I was wondering: why would I use Python to assemble a computational graph when what I really want is to write code and then differentiate through it?</p>
]]></description><pubDate>Fri, 07 Nov 2025 10:11:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=45845063</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45845063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45845063</guid></item><item><title><![CDATA[Tongyi Deep Research – relatively lightweight hi-perf open-source model]]></title><description><![CDATA[
<p>Article URL: <a href="https://tongyi-agent.github.io/blog/introducing-tongyi-deep-research/">https://tongyi-agent.github.io/blog/introducing-tongyi-deep-research/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45761047">https://news.ycombinator.com/item?id=45761047</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 30 Oct 2025 15:22:09 +0000</pubDate><link>https://tongyi-agent.github.io/blog/introducing-tongyi-deep-research/</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45761047</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45761047</guid></item><item><title><![CDATA[New comment by tdullien in "ChkTag: x86 Memory Safety"]]></title><description><![CDATA[
<p>So there's a long intellectual history behind these technologies, and Intel had multiple chances of taking the leadership on this around 2018 - they failed to do so, some of the talent went to Apple, and now Intel has to play catch-up.<p>I'm pretty certain it'll be the x86 variant of either MTE or MIE.</p>
]]></description><pubDate>Tue, 21 Oct 2025 08:25:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45653672</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45653672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45653672</guid></item><item><title><![CDATA[New comment by tdullien in "ChkTag: x86 Memory Safety"]]></title><description><![CDATA[
<p>I don't know tbh, and I gave that talk when I was in terrible shape, so I'm not upset ;).<p>If people care a lot, I can record a YouTube video on the topic.</p>
]]></description><pubDate>Tue, 21 Oct 2025 08:20:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=45653642</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45653642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45653642</guid></item><item><title><![CDATA[New comment by tdullien in "ChkTag: x86 Memory Safety"]]></title><description><![CDATA[
<p>With all the negative comments here: This is existing technology on ARM64 (MTE) and on modern iPhones (<a href="https://security.apple.com/blog/memory-integrity-enforcement/" rel="nofollow">https://security.apple.com/blog/memory-integrity-enforcement...</a>).<p>For a good intuition why this (coupled with instrumenting all allocators accordingly) is a game-changer for exploitation, check <a href="https://docs.google.com/presentation/d/1V_4ZO9fFOO1PZQTNODu2XarcXhlZTGaktBwc4EAHjL8/edit?usp=sharing" rel="nofollow">https://docs.google.com/presentation/d/1V_4ZO9fFOO1PZQTNODu2...</a><p>In general, having this come to x86 is long-overdue and very welcome.</p>
]]></description><pubDate>Mon, 20 Oct 2025 22:32:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=45650267</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45650267</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45650267</guid></item><item><title><![CDATA[New comment by tdullien in "Spyware maker NSO Group confirms acquisition by US investors"]]></title><description><![CDATA[
<p>The usual story they tell themselves is that the software is used against criminals and child pornography and terrorism. Which is not wrong, the majority of the use cases are probably that, in the majority of jurisdictions.</p>
]]></description><pubDate>Sun, 12 Oct 2025 11:01:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=45557231</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45557231</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45557231</guid></item><item><title><![CDATA[New comment by tdullien in "Anthropic raises $13B Series F"]]></title><description><![CDATA[
<p>It's just off by a factor of 35?</p>
]]></description><pubDate>Tue, 02 Sep 2025 16:47:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45105630</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=45105630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45105630</guid></item><item><title><![CDATA[New comment by tdullien in "Exit Tax: Leave Germany before your business gets big"]]></title><description><![CDATA[
<p>The obvious solution is for the state to accept illiquid securities as payment for tax.</p>
]]></description><pubDate>Fri, 08 Aug 2025 08:52:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=44834916</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=44834916</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44834916</guid></item><item><title><![CDATA[New comment by tdullien in "Exit Tax: Leave Germany before your business gets big"]]></title><description><![CDATA[
<p>German here. I fully agree that German companies tend to be crazy hierarchical.</p>
]]></description><pubDate>Thu, 07 Aug 2025 19:32:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=44829282</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=44829282</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44829282</guid></item><item><title><![CDATA[New comment by tdullien in "Leonardo Chiariglione – Co-founder of MPEG"]]></title><description><![CDATA[
<p>Every predictor is a compressor, every compressor is a predictor.<p>If you're interested in this, it's a good idea reading about the Hutter prize (<a href="https://en.wikipedia.org/wiki/Hutter_Prize" rel="nofollow">https://en.wikipedia.org/wiki/Hutter_Prize</a>) and going from there.<p>In general, lossless compression works by predicting the next (letter/token/frame) and then encoding the difference from the prediction in the data stream succinctly. The better you predict, the less you need to encode, the better you compress.<p>The flip side of this is that all fields of compression have a lot to gain from progress in AI.</p>
]]></description><pubDate>Thu, 07 Aug 2025 11:55:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=44823308</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=44823308</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44823308</guid></item><item><title><![CDATA[New comment by tdullien in "EPA says it will eliminate its scientific research arm"]]></title><description><![CDATA[
<p>Thank you for pointing out that it was Nixon that created the EPA.</p>
]]></description><pubDate>Sat, 19 Jul 2025 06:37:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=44613121</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=44613121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44613121</guid></item><item><title><![CDATA[Comparing PyTorch code optimization Gemini vs. Claude]]></title><description><![CDATA[
<p>Article URL: <a href="http://addxorrol.blogspot.com/2025/07/understand-neural-nets-better-post-5-of.html">http://addxorrol.blogspot.com/2025/07/understand-neural-nets-better-post-5-of.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44532047">https://news.ycombinator.com/item?id=44532047</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 11 Jul 2025 13:42:09 +0000</pubDate><link>http://addxorrol.blogspot.com/2025/07/understand-neural-nets-better-post-5-of.html</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=44532047</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44532047</guid></item><item><title><![CDATA[New comment by tdullien in "A non-anthropomorphized view of LLMs"]]></title><description><![CDATA[
<p>I think the Anthropic "omg blackmail" article clearly talks about both LLMs and their "goals".</p>
]]></description><pubDate>Tue, 08 Jul 2025 14:30:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=44500347</link><dc:creator>tdullien</dc:creator><comments>https://news.ycombinator.com/item?id=44500347</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44500347</guid></item></channel></rss>