<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: te7447</title><link>https://news.ycombinator.com/user?id=te7447</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 08:37:23 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=te7447" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by te7447 in "I won a championship that doesn't exist"]]></title><description><![CDATA[
<p>> ... eventually the only thing that accrues is things that the factions agree on, or at least what ArbCom has demanded they stop fighting over<p>Or what the faction with the most favored access to ArbCom manages to make stick by getting the other faction banned.<p>A state actor could absolutely cause immense damage to Wikipedia at scale, because most admins aren't experts in the subjects whose articles they police. I'm just surprised that nobody has done so already.</p>
]]></description><pubDate>Wed, 29 Apr 2026 12:11:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47947236</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=47947236</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47947236</guid></item><item><title><![CDATA[New comment by te7447 in "I won a championship that doesn't exist"]]></title><description><![CDATA[
<p>See also the SNAFU principle: <a href="http://ftp.informatik.rwth-aachen.de/jargon300/SNAFUprinciple.html" rel="nofollow">http://ftp.informatik.rwth-aachen.de/jargon300/SNAFUprincipl...</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 12:02:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47947142</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=47947142</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47947142</guid></item><item><title><![CDATA[New comment by te7447 in "Store birth date in systemd for age verification"]]></title><description><![CDATA[
<p>It's trusted in the sense that it lets the person with power (the root of trust) trust the hardware.<p>That person just isn't you.<p>It's a way to enforce power relations by making the hardware respect them. From this perspective, it's pretty evident how it degrades adversarial interoperability, which is about ignoring power relations to build your own system.</p>
]]></description><pubDate>Tue, 24 Mar 2026 13:31:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47502331</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=47502331</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47502331</guid></item><item><title><![CDATA[New comment by te7447 in "Babylon 5 is now free to watch on YouTube"]]></title><description><![CDATA[
<p>Travelers definitely has a very distinct "seat-of-your-pants" form of plotting, though, that can seem inconsistent if you're used to something more consistently planned in advance like Babylon 5. Two big changes during S1 also made me bounce off it.<p>I won't claim my taste is universal: it's just something to be aware of.</p>
]]></description><pubDate>Sat, 14 Feb 2026 17:34:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47016424</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=47016424</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47016424</guid></item><item><title><![CDATA[New comment by te7447 in "Show HN: I spent 3 years reverse-engineering a 40 yo stock market sim from 1986"]]></title><description><![CDATA[
<p>Whatever it is that caused "It's not X, It's Y", it's more recent than LLMs as a whole.<p>As far as I remember, neither GPT3.5, GPT4, nor Claude Instant did it. I think Gemini was the first to really do it, and then out of nowhere, everybody was doing it.</p>
]]></description><pubDate>Sat, 14 Feb 2026 11:43:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47013751</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=47013751</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47013751</guid></item><item><title><![CDATA[New comment by te7447 in "Gemini 3 Deep Think"]]></title><description><![CDATA[
<p>> There's a term for this, but I can't think of it at the moment.<p>Moravec's paradox: <a href="https://epoch.ai/gradient-updates/moravec-s-paradox" rel="nofollow">https://epoch.ai/gradient-updates/moravec-s-paradox</a></p>
]]></description><pubDate>Fri, 13 Feb 2026 12:09:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47001811</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=47001811</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47001811</guid></item><item><title><![CDATA[New comment by te7447 in "Case study: Creative math – How AI fakes proofs"]]></title><description><![CDATA[
<p>I imagine you would use something that errs on the side of safety - e.g. insist on total functional programming and use something like Idris' totality checker.</p>
]]></description><pubDate>Mon, 26 Jan 2026 13:52:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46765621</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46765621</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46765621</guid></item><item><title><![CDATA[New comment by te7447 in "A flawed paper in management science has been cited more than 6k times"]]></title><description><![CDATA[
<p>Something "systems that are attacked by entities that adapt often need to be defended by entities that adapt".</p>
]]></description><pubDate>Sun, 25 Jan 2026 17:10:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46755854</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46755854</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46755854</guid></item><item><title><![CDATA[New comment by te7447 in "Lock-Picking Robot"]]></title><description><![CDATA[
<p>> use a $200 camera and photograph your keyring from a couple blocks away<p>I suppose serious defenders will need to get an EVVA MCS, if that's their threat model :-) Just don't let the really serious lockpickers near the lock with a contact microphone.<p><a href="https://www.evva.com/int-en/products/mechanical-locking-systems/mcs-locking-system/" rel="nofollow">https://www.evva.com/int-en/products/mechanical-locking-syst...</a></p>
]]></description><pubDate>Fri, 16 Jan 2026 19:52:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46651300</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46651300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46651300</guid></item><item><title><![CDATA[New comment by te7447 in "The Vietnam government has banned rooted phones from using any banking app"]]></title><description><![CDATA[
<p>> Cellular radios in a PC? You don't get root on those. Same situation as they are in a cell phone: They are licensed-band transmitters, and they are required to be tamper proof to protect the licensee.<p>The original post said:<p>> Locking down the bootloader and enforcing TEE signatures does stop malware. But it also kills user agency. We are moving to a model where the user is considered the adversary on their own hardware. The genius of the modders in that XDA thread is undeniable, but they are fighting a war against the fundamental architecture of modern trust and the architecture is winning.<p>So, as I read it, Fiveplus is saying that we are moving to an architecture where the user is an adversary on the computer (the phone) as a whole. While licenses may require that specific components are out of bounds, the new thing is that the whole platform is denying the user the ability to do what they want with the parts that are not explicitly off-limits.<p>IIRC, a Blu-Ray drive is required to store data about revoked keys and to stop playing discs if its own key is revoked. Presumably the BR license also states that the user can't be allowed to wipe this revocation list and start playing Blu-Rays again. But BR drives can still be fitted in computers where the user has root access, just like PC cellular radios.<p>Phones are made to be default-deny instead of default-allow, and I think that makes it different from "enclosed modules you don't have control of".</p>
]]></description><pubDate>Fri, 09 Jan 2026 19:07:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46557769</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46557769</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46557769</guid></item><item><title><![CDATA[New comment by te7447 in "The Vietnam government has banned rooted phones from using any banking app"]]></title><description><![CDATA[
<p>> That has been the model since day one, since you are using spectrum that, because the end users are not licensed, requires it. Radios in 100% of commercially available phones are locked to prevent user tampering.<p>Why, then, can users be root on PCs that have wifi cards, SDRs or cellular radios?</p>
]]></description><pubDate>Fri, 09 Jan 2026 18:41:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46557382</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46557382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46557382</guid></item><item><title><![CDATA[New comment by te7447 in "The rise of industrial software"]]></title><description><![CDATA[
<p>If you want to track how many times users revisit the site, you could do that anonymously by setting a visit counter cookie, e.g. VISITS: 1, VISITS: 2, etc. This would track the user over different IPs, but since the cookie only has a counter, it doesn't tell you if two people with "VISITS: 2" set is the same user.<p>That's the first example I can think of off the top of my head.</p>
]]></description><pubDate>Wed, 31 Dec 2025 13:59:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46444077</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46444077</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46444077</guid></item><item><title><![CDATA[New comment by te7447 in "New mathematical framework reshapes debate over simulation hypothesis"]]></title><description><![CDATA[
<p>I've always wondered how you'd be able to rigorously distinguish breaking out of the simulation from just discovering novel things about your current universe.<p>Is a black hole a bug or a feature? If you find a way to instantly observe or manipulate things at Alpha Centauri by patterning memory in a computer on Earth a special way, is that an exploit or is it just a new law of nature?<p>Science is a descriptive endeavor.<p>I guess that some extreme cases would be obvious - if a god-admin shows up and says "cut that out or we'll shut your universe down", that's a better indication of simulation than the examples I gave. But even so, it could be a power bluff, someone pretending to be a god. Or it could be comparable to aliens visiting Earth rather than gods revealing themselves - i.e. some entity of a larger system visiting another entity of the same system, not someone outside it poking inside.</p>
]]></description><pubDate>Sun, 21 Dec 2025 13:12:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=46344600</link><dc:creator>te7447</dc:creator><comments>https://news.ycombinator.com/item?id=46344600</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46344600</guid></item></channel></rss>