<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: whyever</title><link>https://news.ycombinator.com/user?id=whyever</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 12:23:40 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=whyever" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by whyever in "Someone bought 30 WordPress plugins and planted a backdoor in all of them"]]></title><description><![CDATA[
<p>LLMs are vulnerable to prompt injection attacks, so I'm not sure they are in advantage.</p>
]]></description><pubDate>Tue, 14 Apr 2026 22:31:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47772321</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=47772321</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47772321</guid></item><item><title><![CDATA[New comment by whyever in "Rust in Android: move fast and fix things"]]></title><description><![CDATA[
<p>Note that N=1 for the memory safety vulnerabilities they had with Rust, so the error of the estimated average number of vulnerabilities per LOC is quite large.</p>
]]></description><pubDate>Thu, 13 Nov 2025 23:11:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=45921956</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45921956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45921956</guid></item><item><title><![CDATA[New comment by whyever in "Notes by djb on using Fil-C"]]></title><description><![CDATA[
<p>It's missing which point?</p>
]]></description><pubDate>Sun, 02 Nov 2025 11:34:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=45789574</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45789574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45789574</guid></item><item><title><![CDATA[New comment by whyever in "A brief history of random numbers (2018)"]]></title><description><![CDATA[
<p>I agree, but <a href="https://www.pcg-random.org/" rel="nofollow">https://www.pcg-random.org/</a> still advertizes PCG as "challenging" to predict, and critizises other RNGs as predictable and insecure.</p>
]]></description><pubDate>Wed, 29 Oct 2025 19:55:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=45752185</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45752185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45752185</guid></item><item><title><![CDATA[New comment by whyever in "Statistical Physics with R: Ising Model with Monte Carlo"]]></title><description><![CDATA[
<p>Yes, but this relation does but apply to statistical mechanics and statistical physics, they mean the same: <a href="https://en.wikipedia.org/wiki/Statistical_mechanics" rel="nofollow">https://en.wikipedia.org/wiki/Statistical_mechanics</a><p>What is included in "statistical physics" that is not included in "statistical mechanics"?</p>
]]></description><pubDate>Fri, 19 Sep 2025 15:52:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45303027</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45303027</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45303027</guid></item><item><title><![CDATA[New comment by whyever in "Statistical Physics with R: Ising Model with Monte Carlo"]]></title><description><![CDATA[
<p>They are synonyms.</p>
]]></description><pubDate>Fri, 19 Sep 2025 14:11:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45301878</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45301878</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45301878</guid></item><item><title><![CDATA[New comment by whyever in "Signal Secure Backups"]]></title><description><![CDATA[
<p>Signal asks you to repeat the key immediately before even enabling backups. It cannot fail much later unless you modify the digit after the check.</p>
]]></description><pubDate>Tue, 09 Sep 2025 14:44:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=45182643</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45182643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45182643</guid></item><item><title><![CDATA[New comment by whyever in "Polars Cloud and Distributed Polars now available"]]></title><description><![CDATA[
<p>That's a good question! Especially after Frank McSherry's COST paper [1], it's hard to imagine where the sweet spot for Spark is. I guess for Databricks it makes sense to push Spark, since they are the ones who created it. In a way, it's their competitive advantage.<p>[1]: <a href="https://www.usenix.org/system/files/conference/hotos15/hotos15-paper-mcsherry.pdf" rel="nofollow">https://www.usenix.org/system/files/conference/hotos15/hotos...</a></p>
]]></description><pubDate>Thu, 04 Sep 2025 10:35:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=45125682</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=45125682</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45125682</guid></item><item><title><![CDATA[New comment by whyever in "Everything is correlated (2014–23)"]]></title><description><![CDATA[
<p>It's a quantitative problem. How big is the error introduced by the simplification?</p>
]]></description><pubDate>Fri, 22 Aug 2025 07:38:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=44981907</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44981907</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44981907</guid></item><item><title><![CDATA[New comment by whyever in "Code review can be better"]]></title><description><![CDATA[
<p>I know some people who do trunk-based development with pair programming: You write the code together, and once you are satisfied, you merge it to the main branch, from where it is deployed to production if the tests pass. It works well for them.</p>
]]></description><pubDate>Thu, 21 Aug 2025 07:48:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=44970210</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44970210</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44970210</guid></item><item><title><![CDATA[New comment by whyever in "Guid Smash"]]></title><description><![CDATA[
<p>It would require a lot more memory, because you have to remember every generated UUID. And how would you do the partial match? You are not going to observe any collisions.</p>
]]></description><pubDate>Mon, 18 Aug 2025 08:39:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=44938543</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44938543</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44938543</guid></item><item><title><![CDATA[New comment by whyever in "Guid Smash"]]></title><description><![CDATA[
<p>Doesn't the clustering make collisions strictly more likely?</p>
]]></description><pubDate>Mon, 18 Aug 2025 08:33:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=44938522</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44938522</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44938522</guid></item><item><title><![CDATA[New comment by whyever in "Guid Smash"]]></title><description><![CDATA[
<p>You can also look at the expected number of collisions instead, which is approximately the number of random numbers squared, divided by the size of the space of random numbers.<p>Then you can choose how many collisions to accept on average. (If the answer is zero, then it makes more sense to look at the probability of one or more collisions.)</p>
]]></description><pubDate>Mon, 18 Aug 2025 08:31:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=44938510</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44938510</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44938510</guid></item><item><title><![CDATA[New comment by whyever in "GDPR meant nothing: chat control ends privacy for the EU [video]"]]></title><description><![CDATA[
<p>> With that access you can also "do" things, like sending messages or delete stuff.<p>If you break E2E encryption, you can likely also impersonate and "do" things.</p>
]]></description><pubDate>Sun, 17 Aug 2025 07:20:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=44929602</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44929602</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44929602</guid></item><item><title><![CDATA[New comment by whyever in "Rules by which a great empire may be reduced to a small one (1773)"]]></title><description><![CDATA[
<p>I know some conservative newspapers (Frankfurter Allgemeine Zeitung) kept using the old orthography for a while, but even they started using the new one in 2007, ten years after the reforms.</p>
]]></description><pubDate>Fri, 08 Aug 2025 10:13:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=44835342</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44835342</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44835342</guid></item><item><title><![CDATA[New comment by whyever in "Emailing a one-time code is worse than passwords"]]></title><description><![CDATA[
<p>Yes, in this case it would be easier to brute-force the key instead of the password, so the additional characters don't really help.</p>
]]></description><pubDate>Thu, 07 Aug 2025 11:52:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=44823290</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44823290</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44823290</guid></item><item><title><![CDATA[New comment by whyever in "Emailing a one-time code is worse than passwords"]]></title><description><![CDATA[
<p>Such long passwords are silly, they will be effectively truncated by the key length of the underlying cryptography.</p>
]]></description><pubDate>Thu, 07 Aug 2025 07:09:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=44821475</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44821475</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44821475</guid></item><item><title><![CDATA[New comment by whyever in "Air Force unit suspends use of Sig Sauer pistol after shooting death of airman"]]></title><description><![CDATA[
<p>That's not how errors add up, it's nonlinear. You have to take the sum of squares. So in your case, it wouldn't be 10 * 0.01 = 0.1, but sqrt(10 * 0.01^2) = 0.032, which is less than one third of a tenth.</p>
]]></description><pubDate>Fri, 25 Jul 2025 12:30:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=44682382</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44682382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44682382</guid></item><item><title><![CDATA[New comment by whyever in "Meta says it won’t sign Europe AI agreement, calling it an overreach"]]></title><description><![CDATA[
<p>I think the argument was about automated killing, not automated weapons.<p>There are already drones from Germany capable of automatic target acquisition, but they still require a human in the loop to pull the trigger. Not because they technically couldn't, but because they are required to.</p>
]]></description><pubDate>Sat, 19 Jul 2025 17:16:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=44617339</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44617339</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44617339</guid></item><item><title><![CDATA[New comment by whyever in "Deno 2.4"]]></title><description><![CDATA[
<p>All the attacks you described also apply to downloading and executing a file. I don't think `curl | sh` is worse in this regard.</p>
]]></description><pubDate>Mon, 07 Jul 2025 10:33:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=44488744</link><dc:creator>whyever</dc:creator><comments>https://news.ycombinator.com/item?id=44488744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44488744</guid></item></channel></rss>