<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: vueko</title><link>https://news.ycombinator.com/user?id=vueko</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 08:34:39 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=vueko" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by vueko in "Cozy video games can quell stress and anxiety"]]></title><description><![CDATA[
<p>> You could mix and match socialization, questing and exploration to find your preferred flavor of coziness.<p>For sure. I think one of the big reasons successful MMOs were successful and were such comfortable places to exist in for a lot of people was the broad internal variance of intensity of activities - even if you were in a top raiding guild or a big PvPer or whatever, odds were you probably still spent a solid amount of time running around a meadow picking flowers, enchanting other players' gear, or just trying to jump onto the head of the statue outside the bank while chatting with friends. When you just felt like taking it easy, the game had plenty of things for you to do that matched that vibe, just as there was plenty of challenge on offer for when that was what you were after. I feel like a big part of what theme-park MMOs miss out on, and why they often feel so hollow and unsatisfying, is insufficiently fleshed-out low-intensity activities.<p>Up-thread, someone was wondering about how a Fromsoft game could ever be considered "cozy" - I think contrast helps engender coziness; Majula or Firelink are definitely cozy, if admittedly a somewhat wistful variety of it. That dynamic of contrasting intensity allows coziness to exist in a game where you're also saving the world on a weekly basis.</p>
]]></description><pubDate>Sat, 19 Apr 2025 08:32:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=43735071</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=43735071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43735071</guid></item><item><title><![CDATA[New comment by vueko in "The protester's guide to smartphone security"]]></title><description><![CDATA[
<p>The fact that rubber-hose cryptanalysis exists doesn't mean that cryptography is useless. While settings nerding is indeed probably of limited use if you have a direct encounter with authorities, settings nerding can prevent being caught up in a dragnet search for, say, every cell service subscriber present at a protest gone sour, just as ubiquitous cryptography probably can't keep you safe from dedicated NSA attention but can protect against warrantless dragnet fishing expeditions.<p>As pointed out elsewhere, the line between legal and illegal protest is very blurry and can shift rapidly; if anything, the only way to be sure you're not going to a protest that could eventually be classed as illegal is to never go to a protest, regardless of how pure your intentions are.</p>
]]></description><pubDate>Sun, 26 Jan 2025 22:49:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=42835046</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=42835046</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42835046</guid></item><item><title><![CDATA[New comment by vueko in "Platforms systematically removed a user because he made "most wanted CEO" cards"]]></title><description><![CDATA[
<p>I don't think that it being a specific list makes any difference, because the lawless action theoretically incited by this speech is still not imminent; it's abstract in the sense that there's not a direct link between the actor and the speaker. The guy making these cards doesn't know that someone will see them and choose go kill the named CEO. It's possible, sure, but that's not the standard (and if it was, saying something like "Trump is a threat to democracy" would be incitement - it's naming a specific individual target, and it's entirely possible some deranged individual would take that statement as an instruction to carry out an assassination). The Brandenburg test requires that the speaker hold specific knowledge that their speech will result in lawless action; merely knowing that it is possible that the speech inspires lawless action isn't enough. If the guy were handing the cards out to a squad of hitmen, then that wouldn't be protected - such an act would be specific instruction to commit lawless action, not just inspiration as we see here.<p>And actually, regarding the Brandenburg case itself, this is what was said:<p>> We're not a revengent organization, but if our President, our Congress, our Supreme Court, continues to suppress the white, Caucasian race, it's possible that there might have to be some revengeance taken.<p>So, actually, the speech was specifically directed against a named group of individuals - "our President, our Congress, our Supreme Court" - but is still protected because of the lack of imminence. I'll note that there is a distinction between "the President should be killed" and "I will kill the President" - the latter is a true threat, the former is not.<p>As the ruling says: "the mere abstract teaching . . . of the moral propriety or even moral necessity for a resort to force and violence is not the same as preparing a group for violent action and steeling it to such action."</p>
]]></description><pubDate>Tue, 14 Jan 2025 20:33:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=42703443</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=42703443</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42703443</guid></item><item><title><![CDATA[New comment by vueko in "Platforms systematically removed a user because he made "most wanted CEO" cards"]]></title><description><![CDATA[
<p>> There's a MASSIVE and obvious 1st amendment issue here, but in the sense of "Incitement to murder isn't covered under the 1st amendment" sense.<p>It's not as clear-cut as you make it sound, and that's why the Brandenburg test is such an important concept: <a href="https://www.law.cornell.edu/wex/brandenburg_test" rel="nofollow">https://www.law.cornell.edu/wex/brandenburg_test</a><p>> The test determined that the government may prohibit speech advocating the use of force or crime if the speech satisfies both elements of the two-part test:<p>> The speech is “directed to inciting or producing imminent lawless action,” AND The speech is “likely to incite or produce such action.”<p>Imminent is the keyword there. Saying "let's go kill that CEO" at the head of a mob outside their home isn't protected, as it passes the test - it is genuinely likely to result in the mob storming the house, as the mob is positioned to be able to do so as an immediate reaction to the speech telling them to, and the speaker knows it.<p>In contrast, consider some of the speech found to be protected by this standard:<p>> a KKK leader gave a speech at a rally to his fellow Klansmen, and after listing a number of derogatory racial slurs, he then said that  “it's possible that there might have to be some vengeance [sic] taken.”<p>> In NAACP v. Claiborne Hardware Co . (1982), Charles Evers threatened violence against those who refused to boycott white businesses. The Supreme Court applied the Brandenburg test and found that the speech was protected : “Strong and effective extemporaneous rhetoric cannot be nicely channeled in purely dulcet phrases. An advocate must be free to stimulate his audience with spontaneous and emotional appeals for unity and action in a common cause. When such appeals do not incite lawless action, they must be regarded as protected speech.”<p>Advocating violence in the abstract doesn't satisfy the imminence requirement. Unless there's a direct connection in time and place between the speaker and the lawless actor, it's protected.</p>
]]></description><pubDate>Tue, 14 Jan 2025 19:48:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=42702806</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=42702806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42702806</guid></item><item><title><![CDATA[New comment by vueko in "Show HN: I built a(nother) house optimized for LAN parties"]]></title><description><![CDATA[
<p>Oh true, good point, being wired for ethernet is another valid usecase. I'm lucky in that my ONT is just a commodity Nokia switch I can slap any sfp+ form factor transceiver I want in the appropriate port of for the connection to the router, so in my case 10gbe is truly banishable to the devices I can't get a pcie card into. I'm still in the phase of masking taping cables to the ceiling instead of doing real wall pulls, but when I do get around to that I feel like I'm going to pick up an aliexpress fiber splicer and pull single-mode fiber to futureproof it and make sure I never have to deal with pulls again (and not be stuck on an old ethernet standard in the magical future where I can get a 100gbit wan link).</p>
]]></description><pubDate>Sun, 17 Nov 2024 02:02:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=42161364</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=42161364</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42161364</guid></item><item><title><![CDATA[New comment by vueko in "Show HN: I built a(nother) house optimized for LAN parties"]]></title><description><![CDATA[
<p>+1 ebay x520 cards. My entire 10g sfp+ home network runs on a bunch of x520s, fs.com DACs/AOCs, Mikrotik switches, and an old desktop running FreeBSD with a few x520s in it as the core router. Very very cheap to assemble and has been absolutely bulletproof. IME at this point in time the ixgbe driver is extremely stable.<p>x520s with full-height brackets do exist (I have a box full of them), but you may pay like $3-5/ea more than the more common lo-pro bracket ones. If you're willing to pop the bracket off, you can also find full-height brackets standalone and install your own.<p>Also, in general: in my experience avoiding 10gbe rj45 is very worthwhile. More expensive, more power consumption, more heat generation. If you can stick a sfp+ card in something, do it. IMO 10gbe rj45 is only worthwhile when you've got a device that supports it but can't easily take a pcie nic, like some intel NUCs.</p>
]]></description><pubDate>Sat, 16 Nov 2024 23:39:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=42160567</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=42160567</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42160567</guid></item><item><title><![CDATA[New comment by vueko in "Teaching old assert() new Tricks"]]></title><description><![CDATA[
<p>One reason I like assert strings is that they can assist bug triage in a large organization, assuming that (as in my environment) the string is available outside of the core/kernel dump, probably in the kernel ring buffer/logs. Often, keying off of line number won't work across different branches, maintenance releases, patches and the like, so having a unique-ish string to search known issues/chat history/etc with is valuable. Sure, you can check out the code corresponding to the build that produced the core and find the code context from there, but that's another step that takes time, especially if you have to traverse a bunch of mappings like "oh, the core's from a machine on B_FOO_1337, which according to this one service corresponds to commit abcdef123, which is in repo baz, which I don't actually have checked out and/or fetched recently, oops." In an environment of this sort, it's also frequently not super quick or straightforward to get a debugger set up with the appropriate symbols to open the core and see the context - if a person running through a big list of defects can simply plug the string into a search and go oh, yup, it's known issue #12345 vs. having to hunt for the correct symbols, copy the (potentially several gb!) core around, get gdb to happily open it, etc, that eventually adds up to big time savings. Finally, compiler optimizations can make it so that, while a value is present in the core, the debugger can't automatically find it and gives you that <value optimized out> thing. While you usually can go digging around in the registers to extract it, that's a pain and yet more time. If you put the value(s) of the failed assertion in the string, that's one less spot for someone doing triage to get hung up on when trying to tell whether an issue is something new or just frequency of a known issue.<p>For stuff I'm just writing by and for myself, yeah, I take your approach. For software that will generate failures I may not be the first person in an organization to have to look at, I add friendly strings.</p>
]]></description><pubDate>Sat, 19 Oct 2024 03:36:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=41885465</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41885465</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41885465</guid></item><item><title><![CDATA[New comment by vueko in "Beirut airport bans pagers, walkie-talkies on all flights"]]></title><description><![CDATA[
<p>Interesting, thanks!</p>
]]></description><pubDate>Thu, 19 Sep 2024 22:25:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=41596974</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41596974</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41596974</guid></item><item><title><![CDATA[New comment by vueko in "Beirut airport bans pagers, walkie-talkies on all flights"]]></title><description><![CDATA[
<p>A traditional FM walkie-talkie, yes, passive, but a P25/DMR handheld radio, especially operating in trunked mode, not necessarily. One notorious example of this is P25's use of packet retransmission requests: <a href="https://www.mattblaze.org/papers/p25sec.pdf" rel="nofollow">https://www.mattblaze.org/papers/p25sec.pdf</a><p>A lot of worksite-oriented handheld radios these days are not just oldschool FM and use digital protocols to efficiently manage bandwidth, which can involve transmitting when not actually sending voice data. I haven't seen any confirmation of whether the affected devices were digital or not, but if they were buying COTS radio equipment there's a decent chance that they were.</p>
]]></description><pubDate>Thu, 19 Sep 2024 22:06:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=41596866</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41596866</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41596866</guid></item><item><title><![CDATA[New comment by vueko in "Flipper Zero Gets Major Firmware Update, Can Eavesdrop on Walkie-Talkies"]]></title><description><![CDATA[
<p>While definitely better than the non-encryption of CTCSS etc, P25 encryption has some relatively concerning implementation problems. It's possible none of these actually matter for your usecase as many are related to UX around configuring and using encryption in an institutional setting, but the unauthenticated traffic injection, induced transmission and jamming issues are, well, not great no matter how you look at it.<p><a href="https://www.mattblaze.org/blog/p25" rel="nofollow">https://www.mattblaze.org/blog/p25</a><p><a href="https://www.mattblaze.org/papers/p25sec.pdf" rel="nofollow">https://www.mattblaze.org/papers/p25sec.pdf</a><p>I will grant that the open-source kfdtool keyloader boxes are neat.<p>I have been meaning to see if I can repro the induced transmission via retransmission requests thing when the data packet stuff is fully disabled via CPS, but a friend permanently borrowed my hackrf so that project is on hold for now. I'm not optimistic, though, due to the comments in the paper about where in the stack the retransmission request is processed.</p>
]]></description><pubDate>Wed, 11 Sep 2024 03:03:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=41507672</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41507672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41507672</guid></item><item><title><![CDATA[New comment by vueko in "Flipper Zero Gets Major Firmware Update, Can Eavesdrop on Walkie-Talkies"]]></title><description><![CDATA[
<p>You're going to want to look into CHIRP: <a href="https://chirpmyradio.com/projects/chirp/wiki/Home" rel="nofollow">https://chirpmyradio.com/projects/chirp/wiki/Home</a></p>
]]></description><pubDate>Wed, 11 Sep 2024 03:00:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41507656</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41507656</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41507656</guid></item><item><title><![CDATA[New comment by vueko in "Flipper Zero Gets Major Firmware Update, Can Eavesdrop on Walkie-Talkies"]]></title><description><![CDATA[
<p>Interesting! I was under the impression that the FCC was actually somewhat strict about part 90.35 eligibility, in that you have to provide fairly detailed specifics of your business use case or how you fall under the various educational/nonprofit exemptions, and that if you told them you wanted it for personal use or supplied a thinly veiled excuse they'd tell you to get lost. Maybe that understanding is outdated. I can imagine a HAM club having an easier time justifying that than you would as a random individual.</p>
]]></description><pubDate>Wed, 11 Sep 2024 00:11:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41506964</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41506964</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41506964</guid></item><item><title><![CDATA[New comment by vueko in "Flipper Zero Gets Major Firmware Update, Can Eavesdrop on Walkie-Talkies"]]></title><description><![CDATA[
<p>Seriously. People really need to understand that CTCSS and DCS aren't actually privacy features, but convenience features for filtering out _other_ people's transmissions a user isn't interested in. It's the exact opposite of privacy. I guess the marketing as "privacy codes" worsens the situation.</p>
]]></description><pubDate>Tue, 10 Sep 2024 22:13:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=41506156</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41506156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41506156</guid></item><item><title><![CDATA[New comment by vueko in "FBI recommends using an ad blocker (2022)"]]></title><description><![CDATA[
<p>So, I actually think that if YouTube went poof tomorrow, totally gone, and was not replaced by a similar ad-supported medium, it'd be a boon for makers of quality video content and disproportionately harmful to clickbait chum-farms. Ad-supported video is the incentive system that delivered us Elsagate, and the scale of YouTube w.r.t. feasibility of paid hosting isn't all that it seems.<p>Every single YouTube creator I watch with any degree of regularity has a Patreon, merch shop, or some other way for those who appreciate their stuff to directly contribute to its production and continued existence. Many say that they rely on those sources of income a lot more than ad revenue, especially those in non-advertiser-friendly niches who have to worry about demonetization. In a no-YouTube world, even assuming p2p video streaming never works out, those folks would be able to pay for hosting with those non-ad income streams, because YouTube's scale is deceptive. Most of the ones I watch don't even have all that many views relative to the big boys - five to six digit, usually - so their viewer:contributor ratio is a lot higher than that of a successful clickbait slop video with ~zero genuine dedicated supporters but a lot of incidental ad views. This dynamic implies that creators with dedicated followings would have a decent shot at supporting themselves even if they had to pay for bandwidth, because their bandwidth spend to revenue ratio is a lot better than average.<p>The thing about YouTube is that slop outweighs quality content by such a massive margin that if you do napkin math around the raw cost of hosting n hours of streaming video, you end up with a way higher number than you'd have if you stripped out the bulk of the material that wouldn't be economically feasible in a non-ad-supported environment.<p>A corollary is that without competition from low-quality ad-supported material that couldn't hack it in a donation-centric environment, the good stuff stands out that much more. It's kinda like how you can't really post a recipe without it drowning in an ocean of algorithmically generated fake-ass life stories about grandma's cookies with seven ads before you hit the first ingredient. Without those, organic content, even paid/donation-supported organic content, has a much better shot at encountering the kind of eyeball that'll shell out for the good stuff.<p>I think the existence of spaces like Bandcamp (for now, anyway, fingers crossed re acquisition) demonstrates that donation-supported streaming can be economically viable. I've spent far more on Bandcamp albums I could have just kept streaming indefinitely for free than I ever did on CDs, because I know that the bulk of that money is actually going to the people who made the stuff I liked, rather than getting siphoned off into corporate middlemen a la legacy record businesses / Spotify and its ilk. Direct-to-artist support in places like Bandcamp has enabled a flowering of high-quality, niche content. People may complain about a simplistic top 40 or whatever, but I'm running into more music right up my alley than ever before, and that's largely due to the newfound ability to cut out the middleman and go right to the creator. YouTube is like the old record industry; it benefits the lowest-common-denominator painfully-focus-grouped artist far more than it does the auteur.</p>
]]></description><pubDate>Mon, 09 Sep 2024 01:17:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=41484692</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41484692</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41484692</guid></item><item><title><![CDATA[New comment by vueko in "Navy chiefs conspired to get themselves illegal warship Wi-Fi"]]></title><description><![CDATA[
<p>Yes, it's pretty trivially easy to detect, even without fancy EW equipment. At one point I admin'd a college dorm's network, wifi/wired, and we didn't allow personal APs for interference reasons (you could run your own switch or router as long as it wasn't a WAP). Our run-of-the-mill networking hardware could find signals and triangulate them down to a couple of feet. A couple residents were flummoxed to learn that the "hidden network" thing doesn't actually do anything, which was hopefully at least a useful educational moment.<p>Any decent SDR can notice such things, presumably not to mention actual EW equipment. It's only really with sub-noise-floor gold code type stuff where a signal doesn't jump out on a waterfall spectrum chart, and even then it's generally fairly obvious at close range. I can only speculate as to why that didn't actually happen here.</p>
]]></description><pubDate>Wed, 04 Sep 2024 04:40:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=41441965</link><dc:creator>vueko</dc:creator><comments>https://news.ycombinator.com/item?id=41441965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41441965</guid></item></channel></rss>