<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: varenc</title><link>https://news.ycombinator.com/user?id=varenc</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 09:25:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=varenc" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by varenc in "Backblaze has stopped backing up OneDrive and Dropbox folders and maybe others"]]></title><description><![CDATA[
<p>I don't think that's how the 30 day timer works. Once a file is replaced by a new one, the old copy should persist for 30 days.  So if it was overwrote 2 days ago, should have 28 days to recover it. But don't know about this situation</p>
]]></description><pubDate>Wed, 15 Apr 2026 15:57:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47780958</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47780958</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47780958</guid></item><item><title><![CDATA[New comment by varenc in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>I keep a bookmarklet handy that blocks all keypress listeners to disable this stuff. Agreed it's quite annoying! Can share if desired, though pretty straightforward.</p>
]]></description><pubDate>Wed, 15 Apr 2026 00:13:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47773129</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47773129</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47773129</guid></item><item><title><![CDATA[New comment by varenc in "Backblaze has stopped backing up OneDrive and Dropbox folders and maybe others"]]></title><description><![CDATA[
<p>I thought you said Dropbox overwrote a file, meaning that file was also being synced by Dropbox, and that Dropbox sync was working. So likely the older file version would also have been synced by Dropbox, which it then overwrote. Dropbox itself keeps old versions of files for 30 days. I think you're saying in this situation Dropbox wasn't syncing though?<p>My comment was pretty orthogonal to all the Backblaze stuff, which I realize now was confusing.</p>
]]></description><pubDate>Wed, 15 Apr 2026 00:02:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47773046</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47773046</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47773046</guid></item><item><title><![CDATA[New comment by varenc in "Backblaze has stopped backing up OneDrive and Dropbox folders and maybe others"]]></title><description><![CDATA[
<p>Dropbox itself should already keep version history of files for 30 days with the free plan, or more if you pay.</p>
]]></description><pubDate>Tue, 14 Apr 2026 22:24:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47772260</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47772260</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47772260</guid></item><item><title><![CDATA[New comment by varenc in "Most people can't juggle one ball"]]></title><description><![CDATA[
<p>I do some light juggling adjacent activity, and I think it's absolutely improved coordination in other ways. When things randomly fall unexpectedly now I feel like my hands snap out and catch them so much more deftly than before. And with a crawling baby in my life now, I'm often catching them as well.<p>Greatest pride was catching a tumbling beer at a party, and getting called spider-man.</p>
]]></description><pubDate>Mon, 13 Apr 2026 14:46:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47752786</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47752786</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47752786</guid></item><item><title><![CDATA[New comment by varenc in "Ask HN: What Are You Working On? (April 2026)"]]></title><description><![CDATA[
<p>This sounds very cool! AI really seems like it should enable smart, real-time, and fully private on-device parental safety controls.  Would be eager to try out a macOS or Windows client.  Also a bit a of feedback: the "view on github" link on the homepage just links to /features, and seems like the real github repo is empty.</p>
]]></description><pubDate>Mon, 13 Apr 2026 02:26:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47746857</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47746857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47746857</guid></item><item><title><![CDATA[New comment by varenc in "Ask HN: What Are You Working On? (April 2026)"]]></title><description><![CDATA[
<p>How are you able to track all screen time on an iOS device? I had thought the APIs to do this aren't available.</p>
]]></description><pubDate>Mon, 13 Apr 2026 01:28:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47746488</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47746488</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47746488</guid></item><item><title><![CDATA[New comment by varenc in "Show HN: Pardonned.com – A searchable database of US Pardons"]]></title><description><![CDATA[
<p>Extracted all the raw pardons here: <a href="https://gist.githubusercontent.com/varenc/cb2e2dacf1c92d36bcee2fab04a44631/raw/pardonned.com_2026-04-11_paradons.json" rel="nofollow">https://gist.githubusercontent.com/varenc/cb2e2dacf1c92d36bc...</a><p>I wanted to do some stuff with this data so need a raw format.<p>(process was so easy since its included on a single page load, so I assume you don't mind! thanks for making this )</p>
]]></description><pubDate>Sat, 11 Apr 2026 20:24:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47733714</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47733714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47733714</guid></item><item><title><![CDATA[New comment by varenc in "Show HN: A game where you build a GPU"]]></title><description><![CDATA[
<p>consider a colorblind mode that uses patterns instead of colors for those of us that are color-challenged</p>
]]></description><pubDate>Sat, 04 Apr 2026 23:03:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47644460</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47644460</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47644460</guid></item><item><title><![CDATA[New comment by varenc in "Tell HN: Anthropic no longer allowing Claude Code subscriptions to use OpenClaw"]]></title><description><![CDATA[
<p>Realistically, they can likely prevent the majority of this sort of use. You're right that's it's impossible to prevent 100%, but they can likely stop most of it. Particularly because each user is linked with an account which has an extra high cost to the user if penalized. Abuse prevention is harder when you permit anonymous users. (Like OAI's battle against people turning the free logged out chatgpt.com into an API)</p>
]]></description><pubDate>Sat, 04 Apr 2026 02:58:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47635209</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47635209</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47635209</guid></item><item><title><![CDATA[New comment by varenc in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>It is depressing how robust it is!<p>I can beat it, but only be changing my IP. Since I'm not using a shared IP like a university/company might, my IP is giving them a lot of bits about me since I'm the only entity using it...  No matter the browser switch, if I hit it from the same IP, it correctly assumes that my IP is still me. But the moment I switch to a different browser and change IPs I get a new fingerprint.  Haven't dug deep on it though, like would an incognito window in Chrome on a new IP, have the same fingerprint as a non-incognito Chrome window on another IP? Not sure<p>I would love to play around with that fingerprint demo while on a large shared IP, where they the IP itself provides less signal and is less unique.</p>
]]></description><pubDate>Fri, 03 Apr 2026 03:41:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47622956</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47622956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47622956</guid></item><item><title><![CDATA[New comment by varenc in "Tailscale's new macOS home"]]></title><description><![CDATA[
<p>By 'stream US TV' I assume they just mean using popular streaming services like Netflix.  If that's the case, than UDP multicast packets aren't involved at all, since it's all unicast.<p>Your advice would apply if they're using a local TV tuner or IPTV setup to share live TV on the local network or something, but that seems unlikely. But for content coming from mainstream Internet streaming services, it's good bet they're not using multicast.</p>
]]></description><pubDate>Fri, 03 Apr 2026 01:35:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47622358</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47622358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47622358</guid></item><item><title><![CDATA[New comment by varenc in "Tailscale's new macOS home"]]></title><description><![CDATA[
<p>> Actually one of the tools that you could use to admin your mum & dad computer<p>I do exactly this! I keep Tailscale running my family's shared iMac, making it easy for me to remotely connect to it and screen share if necessary to help. I went a more complicated route[0] and installed Tailscale as a system background daemon that runs as root and starts up before the first user login.  Which also means no GUI interface, so more protected from user error.<p>[0] <a href="https://github.com/tailscale/tailscale/wiki/Tailscaled-on-macOS" rel="nofollow">https://github.com/tailscale/tailscale/wiki/Tailscaled-on-ma...</a>  (the standalone variant is also entirely opensource, unlike their macOS GUI app)</p>
]]></description><pubDate>Fri, 03 Apr 2026 01:32:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47622344</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47622344</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47622344</guid></item><item><title><![CDATA[New comment by varenc in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>> A few years ago, intentionally fingerprinting or tracking your users without disclosure was spyware and unethical. Alas, here we are.<p>For over 15 years reCAPTCHA has relied on browser fingerprinting to help distinguish humans from bots. And fingerprintjs.com has been around for well more than a couple years.<p>That said, sniffing the browser extensions someone is using is NOT a common fingerprinting method used by my examples, but just saying fingerprinting itself without explicit disclosure has been around for quite a long time. It happens on literally every CAPTCHA service. I hate it of course, but the ship sailed a long time ago.<p>--<p>I like this demo for testing my browser's resilence against fingerprinting: <a href="https://fingerprint.com/demo/" rel="nofollow">https://fingerprint.com/demo/</a></p>
]]></description><pubDate>Thu, 02 Apr 2026 23:52:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47621732</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47621732</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47621732</guid></item><item><title><![CDATA[New comment by varenc in "Tailscale's new macOS home"]]></title><description><![CDATA[
<p>I always change my screen resolution to avoid the notch on my Mac. It's non-obvious how to do this but you end up with a slightly shorter resolution than the default.<p>I know this means I'm wasting potential pixels, and wasting all the engineer effort that went into the nearly bezel-free design, but worth it IMHO.</p>
]]></description><pubDate>Thu, 02 Apr 2026 21:59:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47620716</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47620716</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47620716</guid></item><item><title><![CDATA[New comment by varenc in "People inside Microsoft are fighting to drop mandatory Microsoft Account"]]></title><description><![CDATA[
<p>An Apple account also isn't required on an iPhone. They certainly encourage you create or link one on device setup, but it's not required to use the phone. Though one IS required to download apps, so you could argue it functionally is required.</p>
]]></description><pubDate>Fri, 27 Mar 2026 18:23:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546376</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47546376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546376</guid></item><item><title><![CDATA[New comment by varenc in "Running Tesla Model 3's computer on my desk using parts from crashed cars"]]></title><description><![CDATA[
<p>From the article<p>> <i>Tesla offers a “Root access program” on their bug bounty program. Researchers who find at least one valid “rooting” vulnerability will receive a permanent SSH certificate for their own car, allowing them to log in as root and continue their research further.</i><p>Pretty interesting. Sounds like Apple's Security Research Device Program[0], where you're loaned a rooted iPhone, but with a clear qualification criteria.<p>It strikes a nice balance, because to qualify you have to 1) show you have the skills to get root access anyway and 2) show you're willing to participate in the bug bounty program and get things patched.<p>I would of course love root on everything I own, but I can understand Tesla's motivation here since root for everyone would make vulnerability discovery easier for malicious actors. And if everyone had root on their Tesla, it'd be much easier to make naughty modifications that might catch the ire of regulators. (like disabling driver attentiveness checks in self-driving mode).<p>[0] <a href="https://security.apple.com/research-device/" rel="nofollow">https://security.apple.com/research-device/</a></p>
]]></description><pubDate>Thu, 26 Mar 2026 01:01:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47525493</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47525493</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47525493</guid></item><item><title><![CDATA[New comment by varenc in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>What is the rational for the attacker spamming the relevant issue with bot replies? does this benefit them? Maybe it makes discussion impossible to confuse maintainers and delay the time to a fix?</p>
]]></description><pubDate>Tue, 24 Mar 2026 23:06:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47510835</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47510835</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47510835</guid></item><item><title><![CDATA[New comment by varenc in "Arm AGI CPU"]]></title><description><![CDATA[
<p>"AGI" continues to lose all meaning.</p>
]]></description><pubDate>Tue, 24 Mar 2026 21:09:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47509362</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47509362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47509362</guid></item><item><title><![CDATA[New comment by varenc in "France's aircraft carrier located in real time by Le Monde through fitness app"]]></title><description><![CDATA[
<p>No amount of OPSEC lectures or packet inspection is going to sufficiently keep the carrier's private information private. There's thousands of sailors on these things. When details like its location and readiness level actually need to be secret, all regular internet access should just be cut off. Radio silence. I assume this person had internet access to use Strava because the carrier isn't yet in some higher level of readiness and its location isn't yet considered much of a secret.</p>
]]></description><pubDate>Fri, 20 Mar 2026 20:50:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47460405</link><dc:creator>varenc</dc:creator><comments>https://news.ycombinator.com/item?id=47460405</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47460405</guid></item></channel></rss>