<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: w8rbt</title><link>https://news.ycombinator.com/user?id=w8rbt</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 02:35:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=w8rbt" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by w8rbt in "We are clueless about how long things should take"]]></title><description><![CDATA[
<p>If managers come to developers with problems that are NP complete, no matter how well they transfer the idea/vision, or set time expectations, the problem cannot be solved efficiently. And, unless the developers have been trained in CS/Math they may not even understand that what they are being asked to do cannot be done.<p>For example, say a manager has an idea to find the largest group of friends in a massive social network. He wants a developer to write an app for that and has a 20K budget and 2 months. You could not write this app with 10 times that budget or time.<p>How can you determine which group of friends is the largest?<p><a href="https://en.wikipedia.org/wiki/Clique_problem" rel="nofollow">https://en.wikipedia.org/wiki/Clique_problem</a><p><a href="https://en.wikipedia.org/wiki/List_of_NP-complete_problems" rel="nofollow">https://en.wikipedia.org/wiki/List_of_NP-complete_problems</a></p>
]]></description><pubDate>Wed, 25 Sep 2019 13:42:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=21070677</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21070677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21070677</guid></item><item><title><![CDATA[New comment by w8rbt in "OSSU: A path to a free self-taught education in computer science"]]></title><description><![CDATA[
<p>You could also get a free Udacity account and watch the Georgia Tech CS Master classes (OMSCS). Algorithms, Machine Learning, Operating Systems, etc. It's a good program.</p>
]]></description><pubDate>Tue, 24 Sep 2019 19:27:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=21063663</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21063663</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21063663</guid></item><item><title><![CDATA[New comment by w8rbt in "Ask HN: How do you handle/maintain local Python environments?"]]></title><description><![CDATA[
<p>This is my biggest issue with Python. I absolutely love the language, but Python 3 ought to be Python 3 no matter where/how you got it. If you are using 3.5 and I'm using 3.7 we ought to be able to share code and things just work. Unfortunately, that is not the case.</p>
]]></description><pubDate>Tue, 24 Sep 2019 01:18:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=21055517</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21055517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21055517</guid></item><item><title><![CDATA[New comment by w8rbt in "Breaking Pills"]]></title><description><![CDATA[
<p>If you majored in CS at university, you probably suffered through a lot of it. It sinks in after awhile and is rather useful.</p>
]]></description><pubDate>Fri, 20 Sep 2019 10:56:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=21025234</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21025234</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21025234</guid></item><item><title><![CDATA[New comment by w8rbt in "The Czech Cyber Billionaire Who Founded Avast"]]></title><description><![CDATA[
<p>I did use it then and I never experienced that. I bet it was some unrelated coincidence. They would not do that.</p>
]]></description><pubDate>Thu, 19 Sep 2019 16:12:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=21017617</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21017617</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21017617</guid></item><item><title><![CDATA[New comment by w8rbt in "The Czech Cyber Billionaire Who Founded Avast"]]></title><description><![CDATA[
<p>I have never heard this. Can you provide a link with more details?</p>
]]></description><pubDate>Thu, 19 Sep 2019 15:30:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=21017133</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21017133</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21017133</guid></item><item><title><![CDATA[New comment by w8rbt in "Handshake: Decentralizing DNS to Improve the Security of the Internet"]]></title><description><![CDATA[
<p>Right, thanks. And I hope my question does not sound too critical. I was just genuinely curious why JS was used.<p>I think JS is fine for small to mid-sized tasks, prototyping and testing ideas. However, for real DNS servers, used by a lot of clients, I believe C, C++, Go or Rust would be an absolute requirement.</p>
]]></description><pubDate>Wed, 18 Sep 2019 01:37:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=21001738</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=21001738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21001738</guid></item><item><title><![CDATA[New comment by w8rbt in "The boring technology behind a one-person Internet company (2018)"]]></title><description><![CDATA[
<p>Absolutely, but a great idea when combined with other defensive tactics. Obscurity is why armies use camouflage.</p>
]]></description><pubDate>Tue, 17 Sep 2019 01:01:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=20990158</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20990158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20990158</guid></item><item><title><![CDATA[New comment by w8rbt in "DNSCrypt encrypts communications between a DNS client and a DNS resolver"]]></title><description><![CDATA[
<p>I use CoreDNS as a stub resolver to do DNS over TLS. It works great. <a href="https://coredns.io/" rel="nofollow">https://coredns.io/</a></p>
]]></description><pubDate>Mon, 16 Sep 2019 22:41:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=20989277</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20989277</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20989277</guid></item><item><title><![CDATA[New comment by w8rbt in "LastPass bug leaks credentials from previous site"]]></title><description><![CDATA[
<p>It's 2^15 rounds of pbkdf2 with long inputs. There is no master password as nothing is stored. Good luck.</p>
]]></description><pubDate>Mon, 16 Sep 2019 17:23:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=20986414</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20986414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20986414</guid></item><item><title><![CDATA[New comment by w8rbt in "LastPass bug leaks credentials from previous site"]]></title><description><![CDATA[
<p>This is one reason why I believe that browser based password managers are flawed. I've written about this in the past (link below). These apps are popular with normal people (due to convenience), but long-term, we should not trust web browsers plugins or add-ons as password managers.<p><a href="https://github.com/w8rbt/dpg#why-traditional-password-managers-are-flawed" rel="nofollow">https://github.com/w8rbt/dpg#why-traditional-password-manage...</a></p>
]]></description><pubDate>Mon, 16 Sep 2019 15:26:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=20985002</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20985002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20985002</guid></item><item><title><![CDATA[New comment by w8rbt in "Why Go and Not Rust?"]]></title><description><![CDATA[
<p>I like to think that Go is C for the Cloud.<p>And don't let detractors get you down. No matter what you do, or how successful you are, there will always be critics. Ignore them.</p>
]]></description><pubDate>Mon, 16 Sep 2019 14:25:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=20984320</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20984320</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20984320</guid></item><item><title><![CDATA[New comment by w8rbt in "Building a Better Go Linker"]]></title><description><![CDATA[
<p>Ken Thompson wrote B which is the direct predecessor of C. He was and is certainly a language designer and implementer.<p><a href="https://en.wikipedia.org/wiki/B_(programming_language)" rel="nofollow">https://en.wikipedia.org/wiki/B_(programming_language)</a></p>
]]></description><pubDate>Fri, 13 Sep 2019 10:54:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=20960928</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20960928</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20960928</guid></item><item><title><![CDATA[New comment by w8rbt in "Why Ada Is the Language You Want to Be Programming Your Systems With"]]></title><description><![CDATA[
<p>C would recognize it, but not over-react. Log it and continue rather than going full abort/self destruct which is what ada did.</p>
]]></description><pubDate>Wed, 11 Sep 2019 12:28:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=20939304</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20939304</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20939304</guid></item><item><title><![CDATA[New comment by w8rbt in "Turn off DoH, Firefox"]]></title><description><![CDATA[
<p>Absolutely. This warning seems disingenuous and will confuse many normal people. DNS over HTTPs and DNS over TLS are good things and increase our privacy. People should switch to them.</p>
]]></description><pubDate>Wed, 11 Sep 2019 12:09:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=20939102</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20939102</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20939102</guid></item><item><title><![CDATA[New comment by w8rbt in "DontDuo: Bypass 2FA with DTMF Tones"]]></title><description><![CDATA[
<p>IT admins at your org can enable or disable 2FA methods allowed via the Duo administration console. Many US edus disable TOTP.</p>
]]></description><pubDate>Wed, 11 Sep 2019 10:54:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=20938600</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20938600</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20938600</guid></item><item><title><![CDATA[New comment by w8rbt in "DontDuo: Bypass 2FA with DTMF Tones"]]></title><description><![CDATA[
<p>I think the point is that relying on phone calls and DTMF tones for two factor authentication is trivial to bypass. Anyone can record DTMF tones in a voicemail message and forward calls to that number.</p>
]]></description><pubDate>Wed, 11 Sep 2019 02:26:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=20936002</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20936002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20936002</guid></item><item><title><![CDATA[Google Offers MS Active Directory as a Service]]></title><description><![CDATA[
<p>Article URL: <a href="https://cloud.google.com/managed-microsoft-ad/">https://cloud.google.com/managed-microsoft-ad/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=20895313">https://news.ycombinator.com/item?id=20895313</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 06 Sep 2019 13:14:45 +0000</pubDate><link>https://cloud.google.com/managed-microsoft-ad/</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20895313</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20895313</guid></item><item><title><![CDATA[New comment by w8rbt in "Richard Stallman spoke at Microsoft Research this week"]]></title><description><![CDATA[
<p>Telling them to use GNU/Linux.</p>
]]></description><pubDate>Fri, 06 Sep 2019 11:32:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=20894705</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20894705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20894705</guid></item><item><title><![CDATA[New comment by w8rbt in "Software U2F Authenticator for macOS"]]></title><description><![CDATA[
<p>Does oathtool take stdin? Last time I looked it did not. I keep my TOTP secrets PGP encrypted and pipe them to goathgen.<p><pre><code>    $ gpg -d encrypted-secret.txt | goathgen
</code></pre>
<a href="https://github.com/w8rbt/goathgen" rel="nofollow">https://github.com/w8rbt/goathgen</a></p>
]]></description><pubDate>Fri, 06 Sep 2019 01:16:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=20892156</link><dc:creator>w8rbt</dc:creator><comments>https://news.ycombinator.com/item?id=20892156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20892156</guid></item></channel></rss>