<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: zeropointsh</title><link>https://news.ycombinator.com/user?id=zeropointsh</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 09:54:35 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=zeropointsh" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by zeropointsh in "Ask HN: The government of my country blocked VPN access. What should I use?"]]></title><description><![CDATA[
<p>The great thing about China's Great Firewall is that really good options to circumvent censorship have been around for a while. Was waiting for someone to bring up XRay! Alternatively, here is a great write up of using V2Ray[1]. May be worth OP looking into, as a blogger I found noted[2] is an alternative to a VPN, and may work.
[1]: <a href="https://www.v2ray.com/en/" rel="nofollow">https://www.v2ray.com/en/</a>
[2]: <a href="https://sequentialread.com/v2ray-caddy-to-access-the-internet-in-china/" rel="nofollow">https://sequentialread.com/v2ray-caddy-to-access-the-interne...</a></p>
]]></description><pubDate>Thu, 28 Aug 2025 20:06:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=45056478</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=45056478</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45056478</guid></item><item><title><![CDATA[New comment by zeropointsh in "It seems like the AI crawlers learned how to solve the Anubis challenges"]]></title><description><![CDATA[
<p>You could go viral[1] for implementing a Monero Miner[2][3] in Anubis. The check no longer denies someone; it lets EVERYONE in once they've paid the price (mining). This now makes false positives impossible, solving a lot of problems[4].
[1] <a href="https://torrentfreak.com/the-pirate-bay-website-runs-a-cryptocurrency-miner-170916/" rel="nofollow">https://torrentfreak.com/the-pirate-bay-website-runs-a-crypt...</a>
[2] <a href="https://lock.cmpxchg8b.com/anubis.html" rel="nofollow">https://lock.cmpxchg8b.com/anubis.html</a> [Where they bring up CoinHive and JSEcoin].
[3] <a href="https://github.com/JSEcoin/website" rel="nofollow">https://github.com/JSEcoin/website</a>
[4] <a href="https://anubis.techaro.lol/blog/2025/cpu-core-odd/" rel="nofollow">https://anubis.techaro.lol/blog/2025/cpu-core-odd/</a></p>
]]></description><pubDate>Thu, 28 Aug 2025 19:42:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45056221</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=45056221</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45056221</guid></item><item><title><![CDATA[New comment by zeropointsh in "Will AI Replace Human Thinking? The Case for Writing and Coding Manually"]]></title><description><![CDATA[
<p>AI can churn out code that works, but usable, secure code is written for humans first; clear, predictable, and safe by design. Until AI can reason like a team lead and think like an attacker, it’s still just guessing. Usability and security aren’t side effects, they’re intentions, and AI doesn’t have those yet. Code without security is useless[0].
[0] <a href="https://www.npr.org/2025/08/02/nx-s1-5483886/tea-app-breach-hacked-whisper-networks" rel="nofollow">https://www.npr.org/2025/08/02/nx-s1-5483886/tea-app-breach-...</a></p>
]]></description><pubDate>Thu, 28 Aug 2025 18:10:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=45055185</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=45055185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45055185</guid></item><item><title><![CDATA[New comment by zeropointsh in "It seems like the AI crawlers learned how to solve the Anubis challenges"]]></title><description><![CDATA[
<p>It would be more like using a javascript webminer to mine for you a bit before you get access. This would be the "proof-of-work" needed to then proceed to scrape.</p>
]]></description><pubDate>Fri, 15 Aug 2025 22:53:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=44918204</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=44918204</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44918204</guid></item><item><title><![CDATA[New comment by zeropointsh in "It seems like the AI crawlers learned how to solve the Anubis challenges"]]></title><description><![CDATA[
<p>Look into JavaScript web miners for Monero. It exists but just hasn't been implemented into a proof-of-work concept to make a bot/AI scraper "pay" to access your site. Or if it has been used, not at scale.</p>
]]></description><pubDate>Fri, 15 Aug 2025 22:51:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=44918190</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=44918190</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44918190</guid></item><item><title><![CDATA[New comment by zeropointsh in "It seems like the AI crawlers learned how to solve the Anubis challenges"]]></title><description><![CDATA[
<p>Exactly, instead of trying to totally prevent the bots/AI scrapers, make them "pay you" in compute to access and scrape. It needs to be solved.</p>
]]></description><pubDate>Fri, 15 Aug 2025 22:49:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=44918171</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=44918171</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44918171</guid></item><item><title><![CDATA[New comment by zeropointsh in "It seems like the AI crawlers learned how to solve the Anubis challenges"]]></title><description><![CDATA[
<p>How about using on-chain proof-of-work? It flips the script.<p>If a bot wants access, let it earn it—and let that work be captured, not discarded. Each request becomes compensation to the site itself. The crawler feeds the very system it scrapes. Its computational effort directly funds the site owner's wallet, joining the pool to complete its proof.<p>The cost becomes the contract.</p>
]]></description><pubDate>Fri, 15 Aug 2025 20:23:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44916912</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=44916912</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44916912</guid></item><item><title><![CDATA[New comment by zeropointsh in "Static as a Server"]]></title><description><![CDATA[
<p>My exact thoughts[1] when it comes to hosting, things should be static, although I seek joy in Astro and Markdown. 
[1]<a href="https://zeropoint.sh/blog/astro-as-static/" rel="nofollow">https://zeropoint.sh/blog/astro-as-static/</a></p>
]]></description><pubDate>Thu, 08 May 2025 23:42:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43932454</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=43932454</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43932454</guid></item><item><title><![CDATA[New comment by zeropointsh in "Ask HN: I have excess compute, how can I contribute positively to the Internet?"]]></title><description><![CDATA[
<p>> Should I run an exit relay from my home?<p>A bridge is different than running an exit relay. A Bridge allows someone who's ISP blocks access to the TOR network to bypass that by connecting to your bridge.[0]
Bridge relays are Tor relays that are not listed in the public Tor directory.<p>That means that ISPs or governments trying to block access to the Tor network can’t simply block all bridges. Bridges are useful for Tor users under oppressive regimes, and for people who want an extra layer of security because they’re worried somebody will recognize that they are contacting a public Tor relay IP address.<p>A bridge is just a normal relay with a slightly different configuration.[1]<p>[0] - <a href="https://www.miskatonic.org/2024/04/07/how-i-set-up-a-tor-bridge/" rel="nofollow">https://www.miskatonic.org/2024/04/07/how-i-set-up-a-tor-bri...</a>
[1] - <a href="https://support.torproject.org/censorship/" rel="nofollow">https://support.torproject.org/censorship/</a></p>
]]></description><pubDate>Tue, 11 Mar 2025 17:19:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=43334809</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=43334809</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43334809</guid></item><item><title><![CDATA[New comment by zeropointsh in "Ask HN: I have excess compute, how can I contribute positively to the Internet?"]]></title><description><![CDATA[
<p>I would say folding@home is always good for medical advancement.<p>Running a TOR bridge, i2p router or re-seed server if your more interested in internet freedom for those in restricted countries.</p>
]]></description><pubDate>Tue, 11 Mar 2025 16:57:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=43334549</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=43334549</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43334549</guid></item><item><title><![CDATA[New comment by zeropointsh in "Ask HN: Firefox may be selling our data. Can you recommend an alternative?"]]></title><description><![CDATA[
<p>Ah, I recommend LibreWolf - A hardened fork of Firefox, stripped of telemetry, with privacy settings locked down by default.</p>
]]></description><pubDate>Fri, 28 Feb 2025 20:29:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=43210110</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=43210110</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43210110</guid></item><item><title><![CDATA[New comment by zeropointsh in "Warn HN: AI is the new Golden Calf"]]></title><description><![CDATA[
<p>> Revelation 13:15.<p>Revelation 13:15 is about deception, not innovation. The passage is about a false prophet breathing life into an image to deceive the world. AI isn't deceiving anyone—it's an advanced autocomplete machine. The only ones fooled are those who choose to believe it’s something more than that.<p>If AI is the golden calf, then so is every other human-made creation that people have ever revered. The argument doesn't hold because it isn't about AI—it's about human nature.</p>
]]></description><pubDate>Thu, 06 Feb 2025 00:19:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=42957339</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=42957339</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42957339</guid></item><item><title><![CDATA[New comment by zeropointsh in "Warn HN: AI is the new Golden Calf"]]></title><description><![CDATA[
<p>Just wrong, perception is the real issue here. The golden calf was not dangerous because it was a statue; it was dangerous because people assigned it reverence beyond its function. That fate is not unique to AI—people have deified power, money, even their own self-importance. AI is simply the newest mirror reflecting our collective narcissism.</p>
]]></description><pubDate>Wed, 05 Feb 2025 23:58:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=42957151</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=42957151</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42957151</guid></item><item><title><![CDATA[New comment by zeropointsh in "Warn HN: AI is the new Golden Calf"]]></title><description><![CDATA[
<p>Respectfully, if AI is the golden calf, then so were the printing press, the steam engine, and the microprocessor before it. Every era births its own Promethean fire—each time, there are those who claim it will unseat the divine, and others who bow before it as if it were divine itself. But in the end, all of these are just tools, reflections of human will, neither inherently sacred nor inherently profane.<p>The argument that AI is a false idol is a purely religious appeal—one that could be applied to anything humans elevate beyond its intended function. If AI is the golden calf, then so is wealth, celebrity, ideology, even the veneration of one’s own intellect. False idols are not technological phenomena; they are human ones.<p>And yet, AI is uniquely unsettling because it forces us to ask: What makes us different? What part of our intellect, our reasoning, our creativity is truly ours? But these are philosophical, not theological, questions. The fear is not that AI will replace God, but that it will challenge the very constructs by which we define ourselves.<p>To worship AI is foolish. To fear it as divine competition is equally so. The wiser path is to recognize it for what it is—a recursive artifact of human intelligence, built to serve, not to be served.</p>
]]></description><pubDate>Wed, 05 Feb 2025 23:48:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=42957066</link><dc:creator>zeropointsh</dc:creator><comments>https://news.ycombinator.com/item?id=42957066</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42957066</guid></item></channel></rss>