<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: wslh</title><link>https://news.ycombinator.com/user?id=wslh</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 11 Apr 2026 21:06:45 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=wslh" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by wslh in "Bitcoin miners are losing on every coin produced as difficulty drops"]]></title><description><![CDATA[
<p>I understand that there was a problem finding a useful PoW from the computer science perspective.<p>Now, it doesn't necessarily lower the cost of an attack because you can adjust the required output to a cost that is suitable.</p>
]]></description><pubDate>Sat, 11 Apr 2026 20:33:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47733783</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47733783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47733783</guid></item><item><title><![CDATA[New comment by wslh in "Bitcoin miners are losing on every coin produced as difficulty drops"]]></title><description><![CDATA[
<p>There is a breakthrough on a more productive Po(useful)W: <a href="https://news.ycombinator.com/item?id=47430951">https://news.ycombinator.com/item?id=47430951</a></p>
]]></description><pubDate>Sat, 11 Apr 2026 17:56:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47732605</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47732605</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47732605</guid></item><item><title><![CDATA[The Agents at USV: Arthur, Ellie, Sally, and Friends]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.usv.com/meet-the-agents">https://blog.usv.com/meet-the-agents</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47726990">https://news.ycombinator.com/item?id=47726990</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 11 Apr 2026 03:17:57 +0000</pubDate><link>https://blog.usv.com/meet-the-agents</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47726990</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47726990</guid></item><item><title><![CDATA[New comment by wslh in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>I'm starting to wonder whether what Glasswing really shows is that parts of security have already gone underground: black-hat teams and state actors may already know about many more bugs than the public record suggests, while many security professionals and clients still treat the relatively small set of disclosed bugs as the state of the art.</p>
]]></description><pubDate>Fri, 10 Apr 2026 15:18:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47719445</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47719445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47719445</guid></item><item><title><![CDATA[New comment by wslh in "France to ditch Windows for Linux to reduce reliance on US tech"]]></title><description><![CDATA[
<p>I hope they also help in improving battery management on Linux notebooks, even pressing vendors via regulations.</p>
]]></description><pubDate>Fri, 10 Apr 2026 13:33:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47717896</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47717896</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47717896</guid></item><item><title><![CDATA[Adam Back: I'm not Satoshi]]></title><description><![CDATA[
<p>Article URL: <a href="https://twitter.com/adam3us/status/2041811857732768148">https://twitter.com/adam3us/status/2041811857732768148</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47704674">https://news.ycombinator.com/item?id=47704674</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 09 Apr 2026 15:02:16 +0000</pubDate><link>https://twitter.com/adam3us/status/2041811857732768148</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47704674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47704674</guid></item><item><title><![CDATA[Harshita Arora Joins YC as General Partner]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.ycombinator.com/blog/welcome-harshita">https://www.ycombinator.com/blog/welcome-harshita</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47704204">https://news.ycombinator.com/item?id=47704204</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 09 Apr 2026 14:26:24 +0000</pubDate><link>https://www.ycombinator.com/blog/welcome-harshita</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47704204</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47704204</guid></item><item><title><![CDATA[ScienceClaw: Framework for Autonomous Scientific Investigation]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/lamm-mit/scienceclaw">https://github.com/lamm-mit/scienceclaw</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47704025">https://news.ycombinator.com/item?id=47704025</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 09 Apr 2026 14:10:57 +0000</pubDate><link>https://github.com/lamm-mit/scienceclaw</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47704025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47704025</guid></item><item><title><![CDATA[DeepTutor: Agent-Native Personalized Tutoring]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/HKUDS/DeepTutor">https://github.com/HKUDS/DeepTutor</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47703911">https://news.ycombinator.com/item?id=47703911</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 09 Apr 2026 14:01:24 +0000</pubDate><link>https://github.com/HKUDS/DeepTutor</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47703911</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47703911</guid></item><item><title><![CDATA[New comment by wslh in "Who is Satoshi Nakamoto? My quest to unmask Bitcoin's creator"]]></title><description><![CDATA[
<p>If you're following the Satoshi "archeology", you should definitely check out Sergio Lerner's analysis of the early mining patterns. He provides a fascinating forensic look at the actual machines Satoshi likely used, using data like endianness and nonce-incrementing behavior to reconstruct the original mining environment [1][2].<p>[1] <a href="https://www.youtube.com/watch?v=iwVXC1Lf00k" rel="nofollow">https://www.youtube.com/watch?v=iwVXC1Lf00k</a><p>[2] <a href="https://bitslog.com/2020/08/22/the-patoshi-mining-machine/" rel="nofollow">https://bitslog.com/2020/08/22/the-patoshi-mining-machine/</a></p>
]]></description><pubDate>Thu, 09 Apr 2026 13:37:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47703593</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47703593</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47703593</guid></item><item><title><![CDATA[Building pro-worker artificial intelligence [pdf]]]></title><description><![CDATA[
<p>Article URL: <a href="https://economics.mit.edu/sites/default/files/2026-03/Building%20Pro-Worker%20Artificial%20Intelligence.pdf">https://economics.mit.edu/sites/default/files/2026-03/Building%20Pro-Worker%20Artificial%20Intelligence.pdf</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47695913">https://news.ycombinator.com/item?id=47695913</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 08 Apr 2026 20:35:46 +0000</pubDate><link>https://economics.mit.edu/sites/default/files/2026-03/Building%20Pro-Worker%20Artificial%20Intelligence.pdf</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47695913</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47695913</guid></item><item><title><![CDATA[New comment by wslh in "Iran demands Bitcoin fees for ships passing Hormuz during ceasefire"]]></title><description><![CDATA[
<p>That would be very risky for Iran because the top stablecoins could be freezed. They are centralized.</p>
]]></description><pubDate>Wed, 08 Apr 2026 15:14:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47691369</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47691369</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47691369</guid></item><item><title><![CDATA[New comment by wslh in "System Card: Claude Mythos Preview [pdf]"]]></title><description><![CDATA[
<p>LLMs and human intelligence overlap, but they are not the same. What LLMs show is that we don't need AGI to be impressed. For example, LLMs are not good playing games such as Go [1].<p>[1] <a href="https://arxiv.org/abs/2601.16447" rel="nofollow">https://arxiv.org/abs/2601.16447</a></p>
]]></description><pubDate>Tue, 07 Apr 2026 21:08:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47681389</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47681389</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47681389</guid></item><item><title><![CDATA[New comment by wslh in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>> Big opportunity for the other labs, if that's true.<p>It sounds like this is considered military grade technology as cryptography in the 90s. The big difference is it's very expensive to create, and run those models. It's not about the algorithm. If the story rhymes it could be a big opportunity to other regions in the world.</p>
]]></description><pubDate>Tue, 07 Apr 2026 20:31:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47680970</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47680970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47680970</guid></item><item><title><![CDATA[New comment by wslh in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>I imagine that some levels of patching would be improving as well, even as a separate endeavor. This is not to say that legacy systems could be completely rewritten.</p>
]]></description><pubDate>Tue, 07 Apr 2026 19:25:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47680153</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47680153</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47680153</guid></item><item><title><![CDATA[Anthropic Claude Mythos: The More Capable AI Becomes, the More Security It Needs]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-founding-member-anthropic-mythos-frontier-model-to-secure-ai/">https://www.crowdstrike.com/en-us/blog/crowdstrike-founding-member-anthropic-mythos-frontier-model-to-secure-ai/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47679626">https://news.ycombinator.com/item?id=47679626</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 07 Apr 2026 18:45:36 +0000</pubDate><link>https://www.crowdstrike.com/en-us/blog/crowdstrike-founding-member-anthropic-mythos-frontier-model-to-secure-ai/</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47679626</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47679626</guid></item><item><title><![CDATA[What we learned about TEE security from auditing WhatsApp's Private Inference]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.trailofbits.com/2026/04/07/what-we-learned-about-tee-security-from-auditing-whatsapps-private-inference/">https://blog.trailofbits.com/2026/04/07/what-we-learned-about-tee-security-from-auditing-whatsapps-private-inference/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47678760">https://news.ycombinator.com/item?id=47678760</a></p>
<p>Points: 19</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 07 Apr 2026 17:40:11 +0000</pubDate><link>https://blog.trailofbits.com/2026/04/07/what-we-learned-about-tee-security-from-auditing-whatsapps-private-inference/</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47678760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47678760</guid></item><item><title><![CDATA[New comment by wslh in "Sam Altman Is Ignoring a Secret Weapon for His IPO"]]></title><description><![CDATA[
<p><a href="https://archive.is/EgwS4" rel="nofollow">https://archive.is/EgwS4</a></p>
]]></description><pubDate>Tue, 07 Apr 2026 10:02:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47672852</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47672852</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672852</guid></item><item><title><![CDATA[Sam Altman Is Ignoring a Secret Weapon for His IPO]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.bloomberg.com/opinion/articles/2026-04-07/microsoft-could-be-openai-s-ipo-secret-weapon">https://www.bloomberg.com/opinion/articles/2026-04-07/microsoft-could-be-openai-s-ipo-secret-weapon</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47672851">https://news.ycombinator.com/item?id=47672851</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 07 Apr 2026 10:02:52 +0000</pubDate><link>https://www.bloomberg.com/opinion/articles/2026-04-07/microsoft-could-be-openai-s-ipo-secret-weapon</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47672851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672851</guid></item><item><title><![CDATA[The Sales Learning Curve (2006)]]></title><description><![CDATA[
<p>Article URL: <a href="https://hbr.org/2006/07/the-sales-learning-curve">https://hbr.org/2006/07/the-sales-learning-curve</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47664809">https://news.ycombinator.com/item?id=47664809</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 06 Apr 2026 18:21:50 +0000</pubDate><link>https://hbr.org/2006/07/the-sales-learning-curve</link><dc:creator>wslh</dc:creator><comments>https://news.ycombinator.com/item?id=47664809</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47664809</guid></item></channel></rss>