<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: zxilly</title><link>https://news.ycombinator.com/user?id=zxilly</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 08 Apr 2026 10:27:31 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=zxilly" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by zxilly in "Living Dangerously with Claude"]]></title><description><![CDATA[
<p>I should like to know how much this would cost? Even Claude's largest subscription appears insufficient for such token requirements.</p>
]]></description><pubDate>Thu, 23 Oct 2025 19:19:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45685740</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=45685740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45685740</guid></item><item><title><![CDATA[New comment by zxilly in "Loading Pydantic models from JSON without running out of memory"]]></title><description><![CDATA[
<p>Maybe using mmap would also save some memory, I'm not quite sure if this can be implemented in Python.</p>
]]></description><pubDate>Thu, 22 May 2025 20:21:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=44066445</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=44066445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44066445</guid></item><item><title><![CDATA[New comment by zxilly in "Show HN: CLI that spots fake GitHub stars, risky dependencies and licence traps"]]></title><description><![CDATA[
<p>I checked your past submissions and yes, they are also ai generated.<p>I know it's the age of ai, but one should do a little checking oneself before posting ai generated content, right? Or at least one should know how to use git and write meaningful commit messages?</p>
]]></description><pubDate>Mon, 12 May 2025 21:07:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=43967463</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43967463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43967463</guid></item><item><title><![CDATA[New comment by zxilly in "Show HN: CLI that spots fake GitHub stars, risky dependencies and licence traps"]]></title><description><![CDATA[
<p>Frankly, I think this program is ai generated.<p>1. there are hallucinatory descriptions in the Readme (make test), and also in the code, such as the rate limit set at line 158, which is the wrong number<p>2. all commits are done on github webui, checking the signature confirms this<p>3. too verbose function names and a 2000 line python file<p>I don't have a complaint about ai, but the code quality clearly needs improvement, the license only lists a few common examples, the thresholds for detection seem to be set randomly, _get_stargazers_graphql the entire function is commented out and performs no action, it says "Currently bypassed by get_ stargazers", did you generate the code without even reading through it?<p>Bad code like this gets over 100stars, it seems like you're doing a satirical fake-star performance art.</p>
]]></description><pubDate>Mon, 12 May 2025 21:00:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=43967418</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43967418</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43967418</guid></item><item><title><![CDATA[New comment by zxilly in "Show HN: Using eBPF to see through encryption without a proxy"]]></title><description><![CDATA[
<p>There's a similiar tool <a href="https://github.com/gojue/ecapture">https://github.com/gojue/ecapture</a></p>
]]></description><pubDate>Thu, 08 May 2025 19:37:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=43930439</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43930439</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43930439</guid></item><item><title><![CDATA[New comment by zxilly in "Abusing DuckDB-WASM by making SQL draw 3D graphics (Sort Of)"]]></title><description><![CDATA[
<p>You can use requestAnimationFrame to prevent race in the renderer</p>
]]></description><pubDate>Wed, 23 Apr 2025 02:27:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=43768145</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43768145</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43768145</guid></item><item><title><![CDATA[New comment by zxilly in "Writing C for Curl"]]></title><description><![CDATA[
<p>What about performance overheads? I think the reason a lot of people write C is that they have direct control over the generated assembly to maximise performance.</p>
]]></description><pubDate>Mon, 07 Apr 2025 12:17:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=43610440</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43610440</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43610440</guid></item><item><title><![CDATA[New comment by zxilly in "Gemini 2.5"]]></title><description><![CDATA[
<p>There is no point in asking such questions, the model doesn't know what it is on its own, and you could get many different answers if you repeat it a few more times.</p>
]]></description><pubDate>Tue, 25 Mar 2025 18:12:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=43474175</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43474175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43474175</guid></item><item><title><![CDATA[New comment by zxilly in "Launch HN: A0.dev (YC W25) – React Native App Generator"]]></title><description><![CDATA[
<p>It doesn't seem like a good idea to come up with a name that is directly reminiscent of v0.dev.</p>
]]></description><pubDate>Wed, 12 Feb 2025 10:49:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=43024023</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=43024023</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43024023</guid></item><item><title><![CDATA[New comment by zxilly in "Suspension of inbound parcels from China and Hong Kong"]]></title><description><![CDATA[
<p>"tariffs"<p>My memory is not very good, but it seems that something similar has happened 4 years ago, do you remember?</p>
]]></description><pubDate>Wed, 05 Feb 2025 17:38:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=42952157</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42952157</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42952157</guid></item><item><title><![CDATA[New comment by zxilly in "Remote Code Execution in Marvel Rivals Game"]]></title><description><![CDATA[
<p>Looks like a typical mitm attack, which confuses me a bit, don't the developers use something like tls or dtls to protect their communications?
The most recent game I analysed was helldivers 2, which uses dtls. i would have thought that would be fairly common knowledge.</p>
]]></description><pubDate>Mon, 03 Feb 2025 21:27:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=42923448</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42923448</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42923448</guid></item><item><title><![CDATA[New comment by zxilly in "Fixing a uname bug (Apache NuttX RTOS)"]]></title><description><![CDATA[
<p>I had recently run into an embedded problem where when switching the order of two functions in the source code, one of them would refuse to work. I tried a number of things without identifying the real error, and finally had to add a comment warning any later parties not to do this.
I even checked the assembly and they seem to be consistent. But when I upload to firmware, the error keeps coming back over and over again.</p>
]]></description><pubDate>Tue, 21 Jan 2025 13:20:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=42779789</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42779789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42779789</guid></item><item><title><![CDATA[New comment by zxilly in "Analyzing North Korean Malware"]]></title><description><![CDATA[
<p>I'm not quite sure what the RAT refers to in the article.</p>
]]></description><pubDate>Sun, 29 Dec 2024 02:00:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=42536760</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42536760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42536760</guid></item><item><title><![CDATA[New comment by zxilly in "Skia Canvas: Browserless implementation of the HTML Canvas drawing API for node"]]></title><description><![CDATA[
<p>yes, generated by napi-rs</p>
]]></description><pubDate>Tue, 03 Dec 2024 18:03:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=42309100</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42309100</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42309100</guid></item><item><title><![CDATA[New comment by zxilly in "Ask HN: What open source projects need help?"]]></title><description><![CDATA[
<p>go-size-analyzer, a tool for analysing different dependency volumes in go binaries.<p>Specifically, I'm looking for help from some people who have experience with reversing on the Mac OS platform, and I'd like to address this issue, which is about how binary relocations handle memory addresses on Mac OS.<p><a href="https://github.com/Zxilly/go-size-analyzer/issues/242">https://github.com/Zxilly/go-size-analyzer/issues/242</a><p>gsa obtains the memory address by calculating the address expression in the dwarf, and subsequently looks for the static content in the binary that actually corresponds to the memory address, but when the macho file contains relocations, the calculated memory address needs to be relocated with the same logic to get the correct binary content. I've been working on this problem for a while, but I'm really not familiar with the macho structure and I don't own a macbook, I'd like to get help from developers who have experience in this area.</p>
]]></description><pubDate>Sat, 16 Nov 2024 22:52:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=42160169</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42160169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42160169</guid></item><item><title><![CDATA[New comment by zxilly in "New haptic patch transmits complexity of touch to the skin"]]></title><description><![CDATA[
<p>Come on, when can we use this for games?</p>
]]></description><pubDate>Sat, 16 Nov 2024 22:42:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=42160062</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42160062</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42160062</guid></item><item><title><![CDATA[New comment by zxilly in "Pirating "The Pirate Bay" TV Series Is Ironically Difficult"]]></title><description><![CDATA[
<p>Mostly the police don't care about this, it's the owners of the copyrights who care , they might send an email to your ISP and then you'll have to pay.</p>
]]></description><pubDate>Fri, 08 Nov 2024 19:33:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=42089778</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42089778</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42089778</guid></item><item><title><![CDATA[New comment by zxilly in "Pirating "The Pirate Bay" TV Series Is Ironically Difficult"]]></title><description><![CDATA[
<p>Maybe not related to this topic, but I was thinking about certain games I purchased from Ubisoft. Whenever I open Uplay, it asks me to log back in and enter a 2FA code. 
So basically all my Ubisoft games are playing pirated versions after purchase.
By the way the anti-cheat system Ubisoft uses, EAC, also refuses to work at the same time as GoLand, so I can say that I really don't have a choice.</p>
]]></description><pubDate>Fri, 08 Nov 2024 19:30:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=42089757</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42089757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42089757</guid></item><item><title><![CDATA[New comment by zxilly in "Mozilla is eliminating its advocacy division"]]></title><description><![CDATA[
<p>"Fighting for a free and open internet", and got paid by Google.<p>Well, it's really hard.</p>
]]></description><pubDate>Wed, 06 Nov 2024 19:48:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=42068230</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42068230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42068230</guid></item><item><title><![CDATA[New comment by zxilly in "The rise of the U.S., the rise of China"]]></title><description><![CDATA[
<p>Based on my experience with China, access to drugs is very difficult, or impossible</p>
]]></description><pubDate>Fri, 01 Nov 2024 19:13:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=42020495</link><dc:creator>zxilly</dc:creator><comments>https://news.ycombinator.com/item?id=42020495</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42020495</guid></item></channel></rss>