<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: witrak</title><link>https://news.ycombinator.com/user?id=witrak</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 22 Apr 2026 11:48:08 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=witrak" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by witrak in "Judge orders government to begin refunding more than $130B in tariffs"]]></title><description><![CDATA[
<p>>A product can be both<p>LOL... A tent is a single product. What about a car? Do you expect to pay separately for the aluminum in the motor and gearbox, as well as for the entire car?</p>
]]></description><pubDate>Fri, 06 Mar 2026 21:04:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47281040</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=47281040</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47281040</guid></item><item><title><![CDATA[New comment by witrak in "Encrypt your PC's disk without giving the keys to Microsoft"]]></title><description><![CDATA[
<p>Is the described method good for Enterprise and IoT Windows versions?</p>
]]></description><pubDate>Tue, 27 Jan 2026 20:38:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46786240</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=46786240</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46786240</guid></item><item><title><![CDATA[New comment by witrak in "Show HN: A 2mm micro-bearing ring that spins like a real fidget spinner"]]></title><description><![CDATA[
<p>>They just want you to log in. This costs nothing.<p>You pay with your data...</p>
]]></description><pubDate>Sat, 06 Dec 2025 12:01:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46172652</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=46172652</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46172652</guid></item><item><title><![CDATA[New comment by witrak in "Email immutability matters more in a world with AI"]]></title><description><![CDATA[
<p>>> What matters is domain age, IP, and compliance with DKIM/DMARC.<p>>Maybe it was my IP, but I cycled a few with my hosting provider and none of them made a difference. If I am unable to reliable obtain a 'trusted' IP, what good does it do?<p>That's true. I have a Class C IP range and a domain registered for 30 years and yet Gmail still started ignoring my email server a couple of years ago...</p>
]]></description><pubDate>Thu, 02 Oct 2025 21:24:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=45455748</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45455748</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45455748</guid></item><item><title><![CDATA[New comment by witrak in "When I say “alphabetical order”, I mean “alphabetical order”"]]></title><description><![CDATA[
<p>Perhaps, but if you set your browser  language to US English you have dates displayed as MM.DD.YYYY and there's no way to change it neither to European nor ISO (YYYY-MM-DD) format.</p>
]]></description><pubDate>Mon, 29 Sep 2025 22:43:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=45419768</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45419768</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45419768</guid></item><item><title><![CDATA[New comment by witrak in "When I say “alphabetical order”, I mean “alphabetical order”"]]></title><description><![CDATA[
<p>Your concept appears to have coherence until you consider that numbers are not necessarily expressed in decimal notation. What about hexadecimal numbers in filenames? Should they be sorted your way?<p>And what about very long strings of digits in the filenames - so long that they are too long for even the longest available numerical representation? In some apps, they are converted to floating point...</p>
]]></description><pubDate>Mon, 29 Sep 2025 22:30:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=45419633</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45419633</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45419633</guid></item><item><title><![CDATA[New comment by witrak in "GNU Midnight Commander"]]></title><description><![CDATA[
<p>It seems nobody remembers the reason for the F-key assignment in the original i.e. Norton Commander... The assignment was very logical and easy to remember (and use) on the original PC keyboard, where F-keys were located in two columns on the left edge of the keyboard: F1, F2, then F3, F4, and so on. You can immediately see the advantages of the F9 location (the leftmost key at the bottom) and of the proximity of the Browse and Edit keys. I used my left thumb to press F10 - it was in the correct place almost without palm movement...<p>Nowadays I almost don't use Mc (except for file manipulation) because the Linux version has a serious weak point - it blocks the most important keystroke in shell: Tab. It is of course traditionally reserved for panel switching but this role could be deactivated when instead a single command line zone MC would allow to have a multi-line (in NC it was 3 or 4 line) zone for the shell scrolled display. This way it would be possible to have the full-size panel display (with the Tab switching panes) and one keystroke away reduced-size panels with full functionality of the shell tab key in the alternative panel mode... 
Another disadvantage is the complicated way of changing settings (especially the colors and file attributes display format) in practice forcing trial and error mode... True, it's not needed often but spending hours on it is rather deterrent.</p>
]]></description><pubDate>Wed, 17 Sep 2025 07:07:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=45272739</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45272739</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45272739</guid></item><item><title><![CDATA[New comment by witrak in "Password1: Scammers exploit variations of your logins"]]></title><description><![CDATA[
<p>Until there are no unified, standard solutions this is too difficult to be achieved in practice.</p>
]]></description><pubDate>Sun, 14 Sep 2025 14:26:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45239966</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45239966</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45239966</guid></item><item><title><![CDATA[New comment by witrak in "Good EU regulations"]]></title><description><![CDATA[
<p>What the hell is gpf? I don't like to be forced to search the web to find each locally used unit.<p>And when will Americans finally learn that instead of the imperial system of units, the rest of the world uses SI?</p>
]]></description><pubDate>Sun, 24 Aug 2025 10:16:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=45002992</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45002992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45002992</guid></item><item><title><![CDATA[New comment by witrak in "Good EU regulations"]]></title><description><![CDATA[
<p>Hmm... In all the cases I saw the prices were mentioned in EUR not USD as the unit. I consider it a clear indication that the discussion participants are mainly non-Americans ;-)</p>
]]></description><pubDate>Sun, 24 Aug 2025 08:35:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45002476</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45002476</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45002476</guid></item><item><title><![CDATA[New comment by witrak in "Good EU regulations"]]></title><description><![CDATA[
<p>>most car manufacturers have 3-10% gross margins.<p>I remember some analysis saying that it is true for classic versions like sedan. But on SUVs it is a couple of times bigger...</p>
]]></description><pubDate>Sun, 24 Aug 2025 08:07:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45002324</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=45002324</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45002324</guid></item><item><title><![CDATA[New comment by witrak in "Million Times Million"]]></title><description><![CDATA[
<p>It is used in all European countries (I don't know any European country that doesn't use it). I know the long scale under the name  "European" and the short scale as "American".</p>
]]></description><pubDate>Wed, 09 Jul 2025 12:25:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=44509185</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=44509185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44509185</guid></item><item><title><![CDATA[New comment by witrak in "AGI and ASI Will Hack the Human Subconscious via Subliminal Messaging"]]></title><description><![CDATA[
<p>If you substitute subliminal messaging with any other technique allowing:<p>- to influence human behavior, 
 - to prevent an effective countermeasure, 
 - to be controlled by a single issuer, you 
 - use in a selective or mass scale mode against a freely selected population,<p>then you have an equivalent recipe without SF flavor, because the same analysis shows that humanity cannot defend itself.<p>Of course, you can ignore existing social media and some cybercrime threats... unless they get included in the military weapons arsenals.</p>
]]></description><pubDate>Sun, 06 Jul 2025 21:37:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=44484301</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=44484301</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44484301</guid></item><item><title><![CDATA[New comment by witrak in "AT&T Email-to-Text Gateway Service Ending June 17"]]></title><description><![CDATA[
<p>As a result there always be a company accepting messages with false sender identity so scammers can operate easily...</p>
]]></description><pubDate>Sat, 05 Apr 2025 04:51:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=43590855</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=43590855</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43590855</guid></item><item><title><![CDATA[New comment by witrak in "AT&T Email-to-Text Gateway Service Ending June 17"]]></title><description><![CDATA[
<p>Because to check email your active participation is needed so you must start an application while to accept texting no such action is needed. Thus for short information (read-and-forget) short messaging (SMS or RCS) is more convenient. Of course, you could use a specialized application to check your email account and filter those needing immediate notification, but if such a service is already available what is the reason to generate additional much bigger traffic?</p>
]]></description><pubDate>Sat, 05 Apr 2025 04:37:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43590783</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=43590783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43590783</guid></item><item><title><![CDATA[New comment by witrak in "Spammers are better at SPF, DKIM, and DMARC than everyone else"]]></title><description><![CDATA[
<p>>You are categorically mistaken and lack a true understanding of these things.<p>>If you lack the expertise and context, you have no business dictating how things ought to be, and rabble rousing is vile.<p>Your response seems to be typical for persons who are right because they are right - no args related to the content you respond to and ad personam args instead.</p>
]]></description><pubDate>Thu, 27 Mar 2025 09:52:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=43491856</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=43491856</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43491856</guid></item><item><title><![CDATA[New comment by witrak in "Spammers are better at SPF, DKIM, and DMARC than everyone else"]]></title><description><![CDATA[
<p>>The literature is a way of adding cost to those that would send spam, it also adds cost in other ways.<p>It is an oversimplified way of evaluating of consequences of overwhelming control the two monopolists have over access of small providers to email services. And it leads to wrong conclusions at least in respect to the range of its influence.
Yes, it makes difficult life for the small amateur spammers as strongly as for beginner administrators and service providers.<p>However while for the determined spammers to hire experts isn't a problem for small entrepreneurs and for non-profit personal activities it is a blocking barrier.<p>Of course, they can use the services of established providers with all the limitations and other disadvantages of such solutions or accept slavery joining millions of users and firms accepting full and unlimited control of MS and Google (to their undisguised satisfaction).<p>About the consequences of sudden and totally unexpected interruption of email services without giving reasons we all can read often enough.</p>
]]></description><pubDate>Wed, 26 Mar 2025 12:35:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=43481530</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=43481530</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43481530</guid></item><item><title><![CDATA[New comment by witrak in "Understanding Memory Management, Part 1: C"]]></title><description><![CDATA[
<p>Taking into account how thoroughly you explain all the intricate details of memory handling it's strange that in the example you haven't clearly commented on the fact of oversimplification of handling unsuccessful allocation (leading to the potentially risky situation).<p>To say that "this is a nice example of how fiddly C memory management is" in the discussion is a bit too little - perhaps intended readers of the article would prefer an explicit warning there, just to be aware that they shouldn't forget to abort the program as you do.</p>
]]></description><pubDate>Fri, 17 Jan 2025 16:53:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=42740158</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=42740158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42740158</guid></item><item><title><![CDATA[New comment by witrak in "Magic/tragic email links: don't make them the only option"]]></title><description><![CDATA[
<p>This scenario is a solution only in simplest cases. It doesn't work when someone routinely uses a VPN on the phone (when often uses free public wi-fi in airports, railway stations, markets etc) because of possible MITM attacks.</p>
]]></description><pubDate>Wed, 08 Jan 2025 03:55:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=42630736</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=42630736</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42630736</guid></item><item><title><![CDATA[New comment by witrak in "New Research Shows AI Strategically Lying"]]></title><description><![CDATA[
<p>>Its really hard to say just how clever AI is getting IMO (as a non-expert in the field).<p>>But then when you give a LLM a completely new problem, not similar to anything they have been trained on - For example, give it a snippet of code and ask it to find the bug. And they can do this. [...] I have done this when stuck on various things with great success.<p>I'm afraid you follow the same way of thinking about AI as used by the authors of the article: you accept the anthropomorphization of AI programs. Plus you use an unconfirmed assumption in your anecdotal example ("completely new problem, not similar to anything they have been trained on") to support your unjustified delight in AI capabilities.<p>Both are - in my opinion - bad for AI developments as they support misunderstanding and false image of LLMs and their application in the real world just like "I, Robot" did to create a false understanding of robotics (and AI...).</p>
]]></description><pubDate>Sat, 21 Dec 2024 06:51:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=42477953</link><dc:creator>witrak</dc:creator><comments>https://news.ycombinator.com/item?id=42477953</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42477953</guid></item></channel></rss>