<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: vinay_ys</title><link>https://news.ycombinator.com/user?id=vinay_ys</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 08:45:10 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=vinay_ys" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by vinay_ys in "AirPods Max 2"]]></title><description><![CDATA[
<p>I'm not buying another expensive AirPods from Apple until they have their story straight w.r.t battery health and battery repair that is cost-effective. I'm done wasting money on these only to have battery issues, clicking noises etc in less than 2 years of continuous use.<p>Irritating thing is how Apple hides bluetooth headphones pairing 2-3 clicks deeper than AirPods pairing – on iPhones and Apple TV.</p>
]]></description><pubDate>Mon, 16 Mar 2026 18:45:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47403043</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=47403043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47403043</guid></item><item><title><![CDATA[New comment by vinay_ys in "I verified my LinkedIn identity. Here's what I handed over"]]></title><description><![CDATA[
<p>> that require legal to get involved and you do end up with documents that sound excessively broad<p>If you let your legal team use such broad CYA language, it is usually because you are not sure what's going on and want CYA, or you actually want to keep the door open for broader use with those broader permissive legal terms. 
On the other hand, if you are sure that you will preserve user's privacy as you are stating in marketing materials, then you should put it in legal writing explicitly.</p>
]]></description><pubDate>Sat, 21 Feb 2026 19:30:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47103849</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=47103849</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47103849</guid></item><item><title><![CDATA[New comment by vinay_ys in "Google Antigravity"]]></title><description><![CDATA[
<p>This. I got overload error on the very first prompt just now. Didn't expect google to run into overload error.</p>
]]></description><pubDate>Wed, 19 Nov 2025 18:54:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45983500</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=45983500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45983500</guid></item><item><title><![CDATA[New comment by vinay_ys in "A story on home server security"]]></title><description><![CDATA[
<p>If cheap is what you are looking for, then yes, a wireguard running on your home server is the way to go. Instead of exposing your home-server directly to Internet, I would put it behind a cloudflare zero trust network access product (costs free).</p>
]]></description><pubDate>Sun, 05 Jan 2025 18:01:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=42603573</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42603573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42603573</guid></item><item><title><![CDATA[New comment by vinay_ys in "A story on home server security"]]></title><description><![CDATA[
<p>Well, you are better off using Google Photos for securely accessing your photos over Internet. It is not a matter of securing it once, but one of keeping it secure all the time.</p>
]]></description><pubDate>Sun, 05 Jan 2025 17:30:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=42603336</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42603336</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42603336</guid></item><item><title><![CDATA[New comment by vinay_ys in "How NAT Traversal Works (2020)"]]></title><description><![CDATA[
<p>Interesting blast from the past. We built an oblivious p2p mesh network that did this in 2010. Back then, nobody cared about security as much as we thought they should. Since then, nobody still cares about security as much as they should. Devices have increased and their value has increased, and still, they are quite insecure. Truly secure endpoints with hardware root-of-trust and secure chains of trust for authn/authz and minimal temporary privileges is still hard, and network perimeter security theater is still ongoing in home networks, corp networks and even large production datacenter networks. Only reason we don't find these to be the primary root-cause for security breaches is because more easier attack chains are still easily available!</p>
]]></description><pubDate>Sun, 05 Jan 2025 16:43:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=42602965</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42602965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42602965</guid></item><item><title><![CDATA[New comment by vinay_ys in "Ask HN: What's Your Morning Routine?"]]></title><description><![CDATA[
<p>Find Zen in mundane daily repetitive tasks. Avoid all screens for first hour after you wake up (and the hour before you sleep). Stay focused in the moment – focus on your body and mind. First/last thing everyday, do these activities with mindfulness – personal hygiene, exercise, gratitude/prayer, set positive realistic intentions for the day, set intention to act, prepare, eat/pack fresh healthy food.<p>Then start your materialistic business end of your day. Learn to breathe and keep your mind calm and present throughout the day. Watch/catch yourself if your mind runs wild with background threads – try and disable background jobs in your mind for a few weeks.<p>If you have a spouse/partner, discuss these goals with them and ask for their cooperation while you are trying to change your habits. Have realistic expectations, and be generous towards others.<p>Coming to materialistic business hours of your day, focus on problem-solving and living in reality.<p>Work through your own personal Maslov's hierarchy of needs. Be strategic, be realistic, and try to build a reasonable position of confidence. Then, launch yourself further from there. Don't overextend yourself.<p>All the best!</p>
]]></description><pubDate>Mon, 30 Dec 2024 18:45:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=42552247</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42552247</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42552247</guid></item><item><title><![CDATA[New comment by vinay_ys in "Passkey technology is elegant, but it's most definitely not usable security"]]></title><description><![CDATA[
<p>The most common lock and key ergonomics that everyone is familiar with is the following:<p>1. You have a lock, you have a corresponding physical key. You can have more identical physical keys. All of them will unlock the lock. If you lose the physical key, you can call the locksmith to change the lock. Physical key is anonymous. Only you know which key unlocks which lock. If a random person finds your physical key on the street, they shouldn't be able to find their way to your lock to try and unlock it.<p>2. That's all well and good. Now, comes a magic key. That's your personal magic key. Any lock you are permitted to unlock, your magic key can unlock it. Any key you are not permitted to unlock, your magic key cannot unlock. Now, you can more than one magic key – where only some of the locks you are allowed to unlock can be unlocked by one magic key vs another.
And if you happen to lose your magic key, you can call your locksmith to cancel your magic key – actually, that's a keysmith than a locksmith!<p>3. Your magic key is still anonymous. Only you know which magic key can open which locks. A random person who finds your magic key shouldn't be able to find their way to all the locks it can unlock.<p>4. When you see a lock, you are prompted to insert a key. The prompt doesn't say which key. You try one of the magic keys have that you think should unlock it. If it happens to the wrong key, not a big deal. You just try another magic key you have, and if that's the correct key it will unlock it.<p>5. When you buy a new lock (sign-up), you decide which magic key you have that should be the one to unlock it. This pairing of the key to the lock is done simply by asking pair a key to the lock. You are not being told to use a specific vendor of magic keys. You are not being peddled only magic key vendor over another!<p>6. If you want to change the magic key paired to a lock, you can do so at anytime on your own as long as you are in possession of the current magic key.<p>7. And of course, you can have multiple magic keys paired to the lock, so that you can unlock with any of the keys.<p>8. When you use a key to unlock a lock, the lock can tell which paired key was used – you can give nicknames to the paired keys that the lock remembers. The lock will tell you which nicknamed keys were used to unlock it previously and when.<p>-----<p>Here's where I think passkeys went awry. They became yet another platform war. The OSes and browsers are supposed to be neutral and provide an unobtrusive prompt for user to pair a key or use a key, that's it. And the user should invoke a keyring against that prompt. If the keyring provider has features – like portability or non-portability of keys etc that's unique to each key ring provider and as long as the user is comfortable with it, everyone should be good with it. The prompt needs to be unassuming. Today it is very assuming and that's the problem!</p>
]]></description><pubDate>Mon, 30 Dec 2024 18:24:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=42552043</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42552043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42552043</guid></item><item><title><![CDATA[New comment by vinay_ys in "From where I left"]]></title><description><![CDATA[
<p>When someone puts a significant and useful software under an open license (like BSD) and nurtures a vibrant open-source community around it, sure, everyone else can definitely take it and use it for free. But nobody serious will use it just because it is free. They will consider other intangible but critical aspects like risks to themselves w.r.t future viability of the project, ability to get custom work done to it or around it, keeping up with hardware and software ecosystem trends etc. These things have second order implications – how healthy the broader developer ecosystem is, is there a broad base of core committers we can hire, how easy it is to upstream our changes, who else is using it at similar scale, criticality, cost efficiency; is commercial support available (sometimes 3rd party commercial business support ecosystem is essential due to regulatory/compliance reasons), do hardware vendors actively participate in the open-source community and ensure it runs well on their hardware etc.<p>Apart from free users, even the contributors have very similar considerations for their participation.<p>But the starting point is the license – it has to be a clear and unambiguous open-source license that is widely well-understood – especially w.r.t the blast-radius or infection radius of the license. Does it infect the library code that is linked/loaded into it? Does it infect the independent binary/processes that scaffold around it (say, control-plane, orchestrator, proxy etc)? What are the obligations if it does?
If we have to get lawyers involved to answer these questions because it is a custom license that is vaguely written or it has never been challenged in a court or the license holder is of unknown reputation, these are huge red flags.<p>Another equally important consideration is the motivations of the stewards of the project. While this isn't explicitly stated, one cannot be naive about it. Contributors and users will have to consider a gamut of scenarios – best/base/worst scenarios and make their judgement. With smaller steward organizations, there are one kind of risks while with larger organizations open-sourcing there are other kinds of risks. If they are competitors in some way that's another challenge. If there is no natural alignment of use-cases functionally or non-functionally, that's another issue etc.<p>With recent changes in Redis, all these things have become less clear and straightforward.</p>
]]></description><pubDate>Wed, 11 Dec 2024 07:56:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=42385762</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42385762</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42385762</guid></item><item><title><![CDATA[New comment by vinay_ys in "Sora is here"]]></title><description><![CDATA[
<p>co-develop := we are in f** around and f** out mode, please bear with us.</p>
]]></description><pubDate>Mon, 09 Dec 2024 21:12:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=42370592</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42370592</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42370592</guid></item><item><title><![CDATA[New comment by vinay_ys in "The Rules of Programming (2023)"]]></title><description><![CDATA[
<p>Any modern software design has to meet these 3-4 key aspects:<p>1. Make the software scalable w.r.t machines.<p>2. Make the software scalable w.r.t humans.<p>3. Make the software maintainable over time.<p>4. Make the software reusable to reduce startup costs.<p>Motivated by these, we make a lot of choices:<p>1. decompose a large complex problem into smaller, isolated, modular problems that can be worked on by different small teams, and run on different servers with inter-server communication.<p>2. organize code along with its documentation for easy understanding, readability and modifiability over time by same developers and different developers.<p>3. organize reusable and independently upgradable parts of the code for ease of upgrade with stable interfaces and stable test suites.<p>4. maintain the build/package/deploy toolchains for ease of underlying hardware and operating systems upgrades without affecting all of the code.<p>5. reuse is the only way to reduce costs – both time and effort – for anything. thinking carefully and setting up for reuse of services, systems, libraries, toolchains, processes, practices etc are critical to any large successful software project.<p>These are general rules for normal times. But there are inflection points when it is profitable to violate these rules.<p>Things that distort the cost/benefit tradeoffs and make it profitable to violate these rules:<p>1. When tech ecosystem is rapidly evolving and toolchains and libraries ecosystem isn't mature.<p>2. When time to market is super critical and if successful we will have more than enough money to deal with these problems later, and if we are late even with good software we would have failed and shut shop.<p>3. When we can't hire talented skilled engineers and still it is worthwhile to win in the short-term.<p>With these rules and violations, you can get stuck in an early local optima. A culture of continuous safe refactors is a super-power that can make you immune to it. Ossification of any kind is bad.</p>
]]></description><pubDate>Mon, 09 Dec 2024 06:34:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42363537</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42363537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42363537</guid></item><item><title><![CDATA[New comment by vinay_ys in "Testosterone, sexual desire and courtship efforts association in young men"]]></title><description><![CDATA[
<p>More than hormonal physiological effects, isn't psychological conditioning a much more dominant factor in consciously self-aware/acknowledged sexual desire? (Especially when it is being measured through self-reporting).<p>Until we invent some sort of non-obtrusive brain observability system (like a no-op continuous observability implant) that can take precise and accurate measurements with timestamps that can be correlated with other measurements taken across the boday of a person living their normal life, it is going to be difficult to form an effective study for this.</p>
]]></description><pubDate>Mon, 09 Dec 2024 06:12:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=42363444</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42363444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42363444</guid></item><item><title><![CDATA[New comment by vinay_ys in "Historically, 4NF explanations are needlessly confusing"]]></title><description><![CDATA[
<p>Performance characteristics of the underlying hardware dictate the software abstractions that make sense. In today's machines, we still have differential cost for sequential, aligned, rightly sized block io operations vs random io operations of random sizes. And we have a hierarchy of storages with different latency, performance and costs – cpu caches, ram – and ram, ssd, spinning disks – and these via local attached vs in disaggregated and distributed clusters.
So, if you want absolutely optimal performance, you still have to care about your column sizes and order of columns in your records and how your records are keyed and how your tables involved in join operations are organized and what kinds of new queries are likely in your application. This matters for both very small scale (embedded devices) and very large scale systems. For mid-scale systems with plenty of latency and cost margins, it matters a lot less than it used. Hence, we have the emergence of nosql in the last decade and distributed sql in this decade.</p>
]]></description><pubDate>Sun, 08 Dec 2024 15:09:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42357556</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42357556</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42357556</guid></item><item><title><![CDATA[New comment by vinay_ys in "Ask HN: How can I grow as an engineer without good seniors to learn from?"]]></title><description><![CDATA[
<p>Couple of important lessons that will keep you in good stead for a long time:<p>1. Learn how to learn well, continuously, and sustainably. Tech changes rapidly. And you will want to hop from one domain to another, just for keeping things interesting and to move with markets. This is both a blessing and a curse. It is a blessing because you can start late and still be in the top percentile if you have the brains and work hard for it. It is a curse because you will be doing this no matter how many years of experience you have.<p>2. Hone your non-technical skills– caution: these are compounding over time (both good and bad habits) – being disciplined, thinking clearly, articulating clearly, being professional, being trustworthy, managing your physical and mental health, being dependable/reliable, having a growth mindset, thriving in ambiguity and uncertainty etc. then, honing your communication skills – effectively  collaborating with people, give/receive effective feedback, do/get mentoring/coaching, working with cross-functional people, working with very seniors, very juniors, peers etc. read a lot, develop mental models, deeply craft your personal approach to first principles problem solving, to making tradeoffs/bets etc.<p>You can do the above all by yourself, through reading, and observing people from afar, and engaging with people (even strangers on forum like this one) in dialog.</p>
]]></description><pubDate>Sun, 01 Dec 2024 19:57:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=42290327</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42290327</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42290327</guid></item><item><title><![CDATA[New comment by vinay_ys in "Z-Library Helps Students to Overcome Academic Poverty, Study Finds"]]></title><description><![CDATA[
<p>It takes a lot of effort to build a system that is both user-friendly and does implement sophisticated mechanisms to prevent bypassing permissions controls. Apple has taken the pains to do that well and then to maintain it against an unending barrage of attacks. So they deserve to make money.</p>
]]></description><pubDate>Thu, 21 Nov 2024 09:07:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=42202434</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42202434</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42202434</guid></item><item><title><![CDATA[New comment by vinay_ys in "Nutrient levels in retail grocery stores"]]></title><description><![CDATA[
<p>A lot of people who eat this produce and don't take any supplements are healthy and doing fine. If the nutrient levels have really fallen so much, then, how come malnutrition isn't an epidemic?</p>
]]></description><pubDate>Tue, 05 Nov 2024 12:25:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=42050965</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=42050965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42050965</guid></item><item><title><![CDATA[New comment by vinay_ys in "Ask HN: What are you working on (September 2024)?"]]></title><description><![CDATA[
<p>> For example, if you love football, and you're good enough at it, you can get paid a lot to play it.<p>good enough doesn't get you paid enough to cover your injuries.</p>
]]></description><pubDate>Mon, 30 Sep 2024 17:00:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=41699430</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=41699430</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41699430</guid></item><item><title><![CDATA[New comment by vinay_ys in "Ask HN: Does anyone use sound effects in their dev environment?"]]></title><description><![CDATA[
<p>Hook up different kinds of alerts/notifications to office intercom and announce outages and pages! Gives the feeling of a real sense of urgency and danger! :-)
Sev1 alerts, DDOS attacks etc. You can do this for positive things too – like a e-commerce product launch going out of stock in record time, or hitting a sales target etc.</p>
]]></description><pubDate>Tue, 17 Sep 2024 14:10:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=41567753</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=41567753</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41567753</guid></item><item><title><![CDATA[New comment by vinay_ys in "Memorizing the first 100 perfect squares (2022)"]]></title><description><![CDATA[
<p>This is beautiful. Maybe useless, but still a lot of fun to learn.</p>
]]></description><pubDate>Tue, 10 Sep 2024 15:18:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=41501650</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=41501650</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41501650</guid></item><item><title><![CDATA[New comment by vinay_ys in "The vagus nerve orchestrates the mind-body connection"]]></title><description><![CDATA[
<p>Surprised to find a bunch of anesthesiologists hanging around here. How come?</p>
]]></description><pubDate>Mon, 02 Sep 2024 14:52:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=41425821</link><dc:creator>vinay_ys</dc:creator><comments>https://news.ycombinator.com/item?id=41425821</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41425821</guid></item></channel></rss>