<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: yokto</title><link>https://news.ycombinator.com/user?id=yokto</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 28 Apr 2026 23:46:47 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=yokto" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by yokto in "Ask HN: Who is hiring? (March 2026)"]]></title><description><![CDATA[
<p>Journee | Berlin, Germany, Europe | REMOTE (CET +/- 2h) | Full-time | <a href="https://journee.ai" rel="nofollow">https://journee.ai</a> & <a href="https://ojin.ai/" rel="nofollow">https://ojin.ai/</a><p>==========<p>Journee is a technology startup founded in 2020. Our in-house low-latency streaming technology and GPU fleet orchestration systems are the engines behind our award-winning work with brands such as BMW, H&M, and Siemens.<p>We are now building and launching Ojin (<a href="https://ojin.ai/" rel="nofollow">https://ojin.ai/</a>), a real-time generative AI platform for developers. Ojin provides the APIs and inference infrastructure for developers to build and scale interactive applications and AI agents. For this new venture, we are building a small, ambitious team of highly talented individuals and are hiring for the following position:<p>* Senior Product Engineer<p>* VP of Technology<p>Our tech stack: TypeScript, React, Python, PostgreSQL, WebRTC, AWS, Infrastructure as Code,  Unreal Engine<p>Apply here: <a href="https://job-boards.eu.greenhouse.io/journee" rel="nofollow">https://job-boards.eu.greenhouse.io/journee</a></p>
]]></description><pubDate>Tue, 03 Mar 2026 08:55:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47229930</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=47229930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47229930</guid></item><item><title><![CDATA[New comment by yokto in "Shai-Hulud compromised a dev machine and raided GitHub org access: a post-mortem"]]></title><description><![CDATA[
<p>It's most likely two or more separate attackers operating. The first malware, Shai Hulud 2, exfiltrates credentials from the infected dev machine to new public GitHub repositories. As the repositories are public and searchable via GitHub's interfaces, any malicious attacker aware of the attack can easily grab the credentials and launch any attack, whether it's a noisy destructive script or some sophisticated ransomware.</p>
]]></description><pubDate>Mon, 15 Dec 2025 06:35:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46271131</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=46271131</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46271131</guid></item><item><title><![CDATA[New comment by yokto in "Show HN: Safe-NPM – only install packages that are +90 days old"]]></title><description><![CDATA[
<p>Yarn has a configurable npmMinimalAgeGate setting as well since version 4.10: <a href="https://yarnpkg.com/configuration/yarnrc#npmMinimalAgeGate" rel="nofollow">https://yarnpkg.com/configuration/yarnrc#npmMinimalAgeGate</a></p>
]]></description><pubDate>Thu, 27 Nov 2025 14:44:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46069698</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=46069698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46069698</guid></item><item><title><![CDATA[New comment by yokto in "Ask HN: Who is hiring? (August 2025)"]]></title><description><![CDATA[
<p>That's my bad, apologies. This job post will be published next week and I somehow removed this mention from my comment while editing it. I've put it back now. In the meantime, feel free to apply through the Platform Engineer role while stating your targeted role and I will re-categorize your application later. Thank you!</p>
]]></description><pubDate>Tue, 05 Aug 2025 17:54:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=44801661</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=44801661</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44801661</guid></item><item><title><![CDATA[New comment by yokto in "Andrej Karpathy: Software in the era of AI [video]"]]></title><description><![CDATA[
<p>This is (in part) what "world models" are about. While some companies like Tesla bring together a fleet of small specialised models, others like CommaAI and Wayve train generalist models.</p>
]]></description><pubDate>Thu, 19 Jun 2025 07:31:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=44316357</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=44316357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44316357</guid></item><item><title><![CDATA[New comment by yokto in "Launch HN: Better Auth (YC X25) – Authentication Framework for TypeScript"]]></title><description><![CDATA[
<p>What issues did you encounter with WorkOS? I'm currently evaluating it and would love to avoid repeating knowable mistakes.</p>
]]></description><pubDate>Mon, 26 May 2025 16:47:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=44099102</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=44099102</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44099102</guid></item><item><title><![CDATA[New comment by yokto in "GPT-4.1 in the API"]]></title><description><![CDATA[
<p>It does, shockingly well in my experience. Check out this blog post outlining such an approach, called Literate Development by the author: <a href="https://news.ycombinator.com/item?id=43524673">https://news.ycombinator.com/item?id=43524673</a></p>
]]></description><pubDate>Mon, 14 Apr 2025 19:55:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=43685587</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=43685587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43685587</guid></item><item><title><![CDATA[New comment by yokto in "GPT-4.1 in the API"]]></title><description><![CDATA[
<p>Whenever an LLM struggles with a particular library version, I use Cursor Rules to auto-include migration information and that generally worked well enough in my cases.</p>
]]></description><pubDate>Mon, 14 Apr 2025 19:52:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=43685537</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=43685537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43685537</guid></item><item><title><![CDATA[The open-source DIAMOND interactive world model is now playable online]]></title><description><![CDATA[
<p>Article URL: <a href="https://next.journee.ai/xyz-diamond">https://next.journee.ai/xyz-diamond</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42392362">https://news.ycombinator.com/item?id=42392362</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 11 Dec 2024 20:14:13 +0000</pubDate><link>https://next.journee.ai/xyz-diamond</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=42392362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42392362</guid></item><item><title><![CDATA[New comment by yokto in "A counter-intuitive guide to better leadership"]]></title><description><![CDATA[
<p>This reminds me of this quote I love:<p>> "[They] placed too much weight on the introspections that they generated at that moment in time, and thus lost sight of their more enduring attitudes.” [1]<p>The quote refers to this study [2] in which subjects had to chose a poster to take home. The group who was instructed to think about their reasons for their initial choice, and had the option to change it, were less satisfied with it three weeks later. As the abstract says:<p>> When people think about reasons, they appear to focus on attributes of the stimulus that are easy to verbalize and seem like plausible reasons but may not be important causes of their initial evaluations.<p>This suggests that satisfaction is more correlated with initial gut feeling than reasoning, at least for aesthetic choices, but I think in many other cases as well.<p>[1] <a href="https://sci-hub.st/10.1016/S0065-2601(08)00401-2" rel="nofollow">https://sci-hub.st/10.1016/S0065-2601(08)00401-2</a><p>[2] <a href="https://journals.sagepub.com/doi/abs/10.1177/0146167293193010" rel="nofollow">https://journals.sagepub.com/doi/abs/10.1177/014616729319301...</a></p>
]]></description><pubDate>Thu, 07 Nov 2024 20:40:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=42080721</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=42080721</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42080721</guid></item><item><title><![CDATA[New comment by yokto in "Show HN: SuperSplat – open-source 3D Gaussian Splat Editor"]]></title><description><![CDATA[
<p>Not a reading guide, but Computerphile have a good introductory video on Gaussian Splats: <a href="https://youtu.be/VkIJbpdTujE?si=8hoMbMx6tKuMZo2S" rel="nofollow">https://youtu.be/VkIJbpdTujE?si=8hoMbMx6tKuMZo2S</a><p>Individualkex also has a couple videos on the high level ideas: <a href="https://youtu.be/GQXDjzNWuPc?si=zlAN7dO9STGATKad" rel="nofollow">https://youtu.be/GQXDjzNWuPc?si=zlAN7dO9STGATKad</a></p>
]]></description><pubDate>Wed, 06 Nov 2024 21:17:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=42069541</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=42069541</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42069541</guid></item><item><title><![CDATA[New comment by yokto in "Oasis: A Universe in a Transformer"]]></title><description><![CDATA[
<p>It generates the pixels, including the blurry UI at the bottom.</p>
]]></description><pubDate>Fri, 01 Nov 2024 11:47:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=42015992</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=42015992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42015992</guid></item><item><title><![CDATA[New comment by yokto in "Show HN: I built a free in-browser Llama 3 chatbot powered by WebGPU"]]></title><description><![CDATA[
<p>It is, but only within the same origin, which  already enables users to not re-download jquery.js or Google Fonts if they previously visited another website that downloaded the same file from the same (usually cross-) origin.</p>
]]></description><pubDate>Sat, 04 May 2024 12:41:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=40257223</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=40257223</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40257223</guid></item><item><title><![CDATA[New comment by yokto in "Stable Cascade"]]></title><description><![CDATA[
<p>fal.ai is nice and fast: <a href="https://news.ycombinator.com/item?id=39360800">https://news.ycombinator.com/item?id=39360800</a>
Both in performance and for how quickly they integrate new models apparently: they already support Stable Cascade.</p>
]]></description><pubDate>Tue, 13 Feb 2024 23:05:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=39364087</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=39364087</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39364087</guid></item><item><title><![CDATA[New comment by yokto in "You can deactivate anyone's WhatsApp account by simply sending an email"]]></title><description><![CDATA[
<p>I'm not sure how relevant that threat model is (OS level security would probably be enabled for people susceptible to be targeted in such a way. Support could advise to do it before toggling the flag, etc.), but anyway the hypothetical flag would only be about making sure the automation doesn't happen and the ticket goes to support. Support can then manually handle the rare edge case and place more burden on the person attempting to deactivate the account.</p>
]]></description><pubDate>Tue, 18 Jul 2023 20:17:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=36778521</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=36778521</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36778521</guid></item><item><title><![CDATA[New comment by yokto in "You can deactivate anyone's WhatsApp account by simply sending an email"]]></title><description><![CDATA[
<p>What is the abuse your referring to?<p>With your suggested approach, the attacker is free to use the account to impersonate the victim until they get a new SIM card, which could easily take days or weeks.<p>This seems like a degredation compared to the current abuse potential which is mostly limited to logging you out.</p>
]]></description><pubDate>Tue, 18 Jul 2023 08:15:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=36769363</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=36769363</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36769363</guid></item><item><title><![CDATA[New comment by yokto in "You can deactivate anyone's WhatsApp account by simply sending an email"]]></title><description><![CDATA[
<p>This is trivial to mitigate with per-account rate limiting.<p>On top of that, if a specific account is targeted at the rate-limit, a flag could be put in place to let support disable the automation for that account.</p>
]]></description><pubDate>Tue, 18 Jul 2023 07:28:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=36769044</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=36769044</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36769044</guid></item><item><title><![CDATA[New comment by yokto in "You can deactivate anyone's WhatsApp account by simply sending an email"]]></title><description><![CDATA[
<p>Whoops, my comment isn't very clear, sorry. I meant: "but their account would still be active and in the hands of the thief, if there is no way to quickly deactivate it, e.g. before receiving a new SIM card from their operator that would enable you to prove your identity to WhatsApp."</p>
]]></description><pubDate>Tue, 18 Jul 2023 07:20:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=36768991</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=36768991</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36768991</guid></item><item><title><![CDATA[New comment by yokto in "You can deactivate anyone's WhatsApp account by simply sending an email"]]></title><description><![CDATA[
<p>As YetAnotherNick said, logout might be the better word to describe the impact here (plus, a fairly aggressive inactivity deletion period).<p>I agree with you in principle, but I still don’t understand how else to mitigate this: WhatsApp must get a lot of cases of stolen unprotected phones. The victim can ask their operator to lock the SIM card, but their WhatsApp account would still be out in the open.<p>With the continuous improvements in mobile OS security defaults, I’d expect this scenario to become less and less of a problem, but it must still be accounted for.<p>The process still goes through support ticketing, so I’d expect a spike to be noticed and stopped.</p>
]]></description><pubDate>Tue, 18 Jul 2023 00:01:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=36765884</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=36765884</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36765884</guid></item><item><title><![CDATA[New comment by yokto in "You can deactivate anyone's WhatsApp account by simply sending an email"]]></title><description><![CDATA[
<p>Isn't this flow what more ore less what you would expect? Could someone suggest what would be the appropriate alternative here?<p>- The inconvenience to the deactivated account is minor: one SMS verification code and the account is back, queued messages get received, etc.<p>- Persons who lost their phones probably don't have a good fast way of proving their identity, as their identity is tied to their phone number in WhatsApp's model.<p>- Needing to quickly lock out spammers, thiefs or hackers is probably far more frequent than abuse of this feature.<p>- If abuse of this feature becomes a recurring problem, I'd expect WhatsApp to react and adjust the flow to place more burden on its user.<p>The auto-delete part is slightly more worrying, but if you don't use WhatsApp during 30 days, your account and group membership probably isn't very precious. Backups are automated and separate. You can still easily re-create an account with the same number then.<p>The story might be "Apps should stop using SMS and phones numbers as the source of identity", and while I generally agree, most comments don't seem to be about this and WhatsApp is maybe _the_ one app whose success was based on this very idea.</p>
]]></description><pubDate>Mon, 17 Jul 2023 23:20:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=36765459</link><dc:creator>yokto</dc:creator><comments>https://news.ycombinator.com/item?id=36765459</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36765459</guid></item></channel></rss>