<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: zekica</title><link>https://news.ycombinator.com/user?id=zekica</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 22 Apr 2026 13:53:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=zekica" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by zekica in "Framework Laptop 13 Pro"]]></title><description><![CDATA[
<p>Mainly because Microsoft wants to have "connected standby": the CPU is running in a low power mode (not powered off like "old" S3 sleep), can be turned on periodically and can turn on other devices even when the computer is "sleeping".<p>My Zen2 based Lenovo laptop has 6-7 hours of battery when doing basic tasks in both Windows and Linux, but sleep on Linux lasts a week while on Windows it's empty in 24 hours.</p>
]]></description><pubDate>Tue, 21 Apr 2026 19:25:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47853348</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47853348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47853348</guid></item><item><title><![CDATA[New comment by zekica in "Keep Android Open"]]></title><description><![CDATA[
<p>This post is everything wrong with the world today. Installing software should not be gate-kept.<p>Who's to say that some current or future government in the US wouldn't use the data to prosecute dissent guaranteed by the constitution?</p>
]]></description><pubDate>Thu, 16 Apr 2026 17:22:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47796615</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47796615</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47796615</guid></item><item><title><![CDATA[New comment by zekica in "Claude Code Down"]]></title><description><![CDATA[
<p>And it can fail in great ways. Last example: I asked claude for a non-trivial backup and recovery script using restic. I gave it the whole restic repo and it still made up parameters that don't exist in the code (but exist in a pull request that's been sitting not merged for 10+ months).</p>
]]></description><pubDate>Mon, 06 Apr 2026 17:05:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47663683</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47663683</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47663683</guid></item><item><title><![CDATA[New comment by zekica in "Ubuntu now requires more RAM than Windows 11"]]></title><description><![CDATA[
<p>I think this is a snap issue.</p>
]]></description><pubDate>Sun, 05 Apr 2026 13:03:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47648999</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47648999</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47648999</guid></item><item><title><![CDATA[New comment by zekica in "Renewables reached nearly 50% of global electricity capacity last year"]]></title><description><![CDATA[
<p>And they are the only real solution. Demand fitting production is never going to work unless we give up all the autonomy.</p>
]]></description><pubDate>Thu, 02 Apr 2026 18:28:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47618292</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47618292</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47618292</guid></item><item><title><![CDATA[New comment by zekica in "New patches allow building Linux IPv6-only"]]></title><description><![CDATA[
<p>SNI routing is such a bad way to do what should be L3 problem that people implemented PROXY protocol to send information about user's endpoint address without doing MITM.</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:42:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604822</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47604822</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604822</guid></item><item><title><![CDATA[New comment by zekica in "New patches allow building Linux IPv6-only"]]></title><description><![CDATA[
<p>All desktop/mobile OSes today use "Stable privacy addresses" for inbound traffic (only if you are hosting something long-term) and "Temporary addresses" for outbound traffic and P2P (video/voice calls, muliplayer games...) that change quickly (old ones are still assigned to not break long-lived connections but are not used for new ones).</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:39:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604782</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47604782</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604782</guid></item><item><title><![CDATA[New comment by zekica in "New patches allow building Linux IPv6-only"]]></title><description><![CDATA[
<p>You can do fc00::/7 in addition to public addresses so your lights don't have public address while your phone does.</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:34:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604733</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47604733</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604733</guid></item><item><title><![CDATA[New comment by zekica in "New patches allow building Linux IPv6-only"]]></title><description><![CDATA[
<p>And the worst part about CGNAT is that you have two bad solutions:<p>Either EIM/EIF (preferably with hairpinning) where you can practically do direct connections but you have to limit users to a really low number of "connections" breaking power users.<p>Or EDM/EDF where users have a higher number of "connections" but it's completely impossible to do direct connections (at least not in any video/voice calling system).</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:33:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604713</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47604713</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604713</guid></item><item><title><![CDATA[New comment by zekica in "New patches allow building Linux IPv6-only"]]></title><description><![CDATA[
<p>Trivially easy do direct connections between devices (if desired), no issues when creating VPNs between networks using private ranges.<p>What would be the disadvantage?</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:26:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604640</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47604640</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604640</guid></item><item><title><![CDATA[New comment by zekica in "New patches allow building Linux IPv6-only"]]></title><description><![CDATA[
<p>Temporary addresses are used by any Linux distro using NetworkManager (all desktop ones). For server distros, it can differ.</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:25:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604628</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47604628</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604628</guid></item><item><title><![CDATA[New comment by zekica in "Hacking old hardware by renaming to .zip [video]"]]></title><description><![CDATA[
<p>.docx and .xlsx are also just zip files with XML and attachments. The bad thing is that the XML is Word's internal document structure serialized and behavior for some values is only defined in Microsoft's code.</p>
]]></description><pubDate>Sat, 28 Mar 2026 07:54:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47552502</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47552502</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47552502</guid></item><item><title><![CDATA[New comment by zekica in "The gold standard of optimization: A look under the hood of RollerCoaster Tycoon"]]></title><description><![CDATA[
<p>Even gcc's -O0 will do the bitshift, but even dividing with 5 on x86_64 will not do idiv:<p><pre><code>        imul    rdx, rdx, 1717986919
        shr     rdx, 32
        sar     edx
        sar     eax, 31
        sub     edx, eax
        mov     eax, edx</code></pre></p>
]]></description><pubDate>Mon, 23 Mar 2026 11:05:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47487762</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47487762</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47487762</guid></item><item><title><![CDATA[New comment by zekica in "WireGuard Is Two Things"]]></title><description><![CDATA[
<p>Minor nitpick: dynamic memory allocation is not used when processing packets, but is when adding/removing clients via netlink.</p>
]]></description><pubDate>Thu, 12 Mar 2026 05:59:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47347037</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47347037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47347037</guid></item><item><title><![CDATA[New comment by zekica in "AirSnitch: Demystifying and breaking client isolation in Wi-Fi networks [pdf]"]]></title><description><![CDATA[
<p>Yes, VLAN isolation prevents this - devices in different VLANs use different GMK keys even when connected to the same network.</p>
]]></description><pubDate>Fri, 27 Feb 2026 07:45:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47177745</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47177745</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47177745</guid></item><item><title><![CDATA[New comment by zekica in "AirSnitch: Demystifying and breaking client isolation in Wi-Fi networks [pdf]"]]></title><description><![CDATA[
<p>This only works for one SSID. Even then, one thing that can mitigate this is using Private-PSK/Dynamic-PSK on WPA2, or using EAP/Radius VLAN property.<p>On WPA3/SAE this is more complicated: the standard supports password identifiers but no device I know of supports selecting an alternate password aside from wpa_supplicant on linux.</p>
]]></description><pubDate>Thu, 26 Feb 2026 16:25:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47168200</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=47168200</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47168200</guid></item><item><title><![CDATA[New comment by zekica in "LLMs as the new high level language"]]></title><description><![CDATA[
<p>You can't think all the way about refining your prompt for LLMs as they are probabilistic. Your re-prompts are just retrying until you hit a jackpot - refining only works to increase the chance to get what you want.<p>When making them deterministic (setting the temperature to 0), LLMs (even new ones) get stuck in loops for longer streams of output tokens. The only way to make sure you get the same output twice is to use the same temperature and the same seed for the RNG used, and most frontier models don't have a way for you to set the RNG seed.</p>
]]></description><pubDate>Sun, 08 Feb 2026 07:12:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46932017</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=46932017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46932017</guid></item><item><title><![CDATA[New comment by zekica in "Microsoft will give the FBI a Windows PC data encryption key if ordered"]]></title><description><![CDATA[
<p>Only if that authenticator/password manager app is not end-to-end encrypted.</p>
]]></description><pubDate>Sat, 24 Jan 2026 15:08:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46744204</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=46744204</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46744204</guid></item><item><title><![CDATA[New comment by zekica in "Wine 11.0"]]></title><description><![CDATA[
<p>Both. LGPL doesn't distinguish between commercial and non-commercial use.</p>
]]></description><pubDate>Mon, 19 Jan 2026 06:41:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46675689</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=46675689</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46675689</guid></item><item><title><![CDATA[New comment by zekica in "GrapheneOS is the only Android OS providing full security patches"]]></title><description><![CDATA[
<p>They have different goals:<p>GrapheneOS wants to make a FOSS Android with the security model that makes it hard for any bad party to break into the phone.<p>LineageOS wants to make a FOSS Android that respects user's privacy first and foremost - it implements security as best as it can but the level of security protections differs on different supported devices.<p>Good news is that if you have a boot passphrase, it's security is somewhat close to GrapheneOS - differing in that third parties with local access to the device can still brute-force their access whereas with GrapheneOS they can't - unless they have access to hardware level attacks.</p>
]]></description><pubDate>Sat, 06 Dec 2025 17:10:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46174856</link><dc:creator>zekica</dc:creator><comments>https://news.ycombinator.com/item?id=46174856</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46174856</guid></item></channel></rss>