<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: zzo38computer</title><link>https://news.ycombinator.com/user?id=zzo38computer</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 09:20:46 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=zzo38computer" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by zzo38computer in "Model-Based Testing for Dungeons & Dragons"]]></title><description><![CDATA[
<p>To me, the role playing, and the crunchy bits, as well as tactics, combat, and other stuff, are all significant and important part of TTRPG; it should not be only one of those things.</p>
]]></description><pubDate>Sun, 12 Apr 2026 01:46:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47735503</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47735503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47735503</guid></item><item><title><![CDATA[New comment by zzo38computer in "Model-Based Testing for Dungeons & Dragons"]]></title><description><![CDATA[
<p>You are not only one trying to do it. There are others, and in other programming languages (Pokemon Showdown is one already implemented, but uses TypeScript with dependencies and I wanted to avoid those issues). What programming language did you intend to use?<p>I intended to do as a C library (which would then be available for other programs in C to call). I know many of the rules of Pokemon but not all of the cases, and then, knowing the data structures to make, etc. I also wanted to make the rules customizable (and to implement all generations, although perhaps only some of them will be implemented the first time and others later) and I have some ideas about that.<p>I would hope that some people can work on something together.</p>
]]></description><pubDate>Sat, 11 Apr 2026 17:00:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47732126</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47732126</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47732126</guid></item><item><title><![CDATA[New comment by zzo38computer in "Shell Tricks That Make Life Easier (and Save Your Sanity)"]]></title><description><![CDATA[
<p>CTRL+C will send a interrupt signal; in some programs (and some circumstances in some programs) that does not work, but then you might try CTRL+\ which will send a quit signal; sometimes that works even if interrupt does not work.</p>
]]></description><pubDate>Sun, 29 Mar 2026 17:55:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47565453</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47565453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47565453</guid></item><item><title><![CDATA[New comment by zzo38computer in "GitHub is once again down"]]></title><description><![CDATA[
<p>I do not care about much of it other than the git and API. I also sometimes use the Issues, although only with the API. But if it stops working sometimes, that is not too significantly a problem since the files can be sent after they start to work again; it does not have to be immediately.</p>
]]></description><pubDate>Wed, 25 Mar 2026 03:38:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47512970</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47512970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47512970</guid></item><item><title><![CDATA[New comment by zzo38computer in "Google details new 24-hour process to sideload unverified Android apps"]]></title><description><![CDATA[
<p>I think it would be a bad idea to require an internet connection (for one thing, you might want to write your own app that does not require a internet connection); but, even if it doesn't, would not mean you can set the clock to avoid the delay, because it could be made to reset the delay if the clock is set.</p>
]]></description><pubDate>Fri, 20 Mar 2026 03:44:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47450234</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47450234</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47450234</guid></item><item><title><![CDATA[New comment by zzo38computer in "Google details new 24-hour process to sideload unverified Android apps"]]></title><description><![CDATA[
<p>What might help better is having permissions that you can set separate settings that can be read for different apps (including the possibility to return errors instead of the actual values), even if they can be read by default you can also change them per apps. (This has other benefits as well, including possibility of some settings not working properly due to a bug, you can then work around it.)</p>
]]></description><pubDate>Thu, 19 Mar 2026 22:19:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47447134</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47447134</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47447134</guid></item><item><title><![CDATA[New comment by zzo38computer in "The “small web” is bigger than you might think"]]></title><description><![CDATA[
<p>> People will still do financial transactions on an unencrypted web because the utility outweighs the risk. Removing encryption just guarantees the risk is high.<p>That does not necessarily require TLS to mitigate (although TLS does help, anyways). There are other issues with financial transactions, whether or not TLS is used. (I had idea, and wrote a draft specification of, "computer payment file", to try to improve security of financial transactions and avoid some kinds of dishonesty; it has its own security and does not require TLS (nor does it require any specific protocol), although using TLS with this is still helpful.) (There are potentially other ways to mitigate the problems as well, but this is one way that I think would be helpful.)</p>
]]></description><pubDate>Mon, 16 Mar 2026 20:57:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47404771</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47404771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47404771</guid></item><item><title><![CDATA[New comment by zzo38computer in "The “small web” is bigger than you might think"]]></title><description><![CDATA[
<p>> If your microcontroller can't do TLS then it probably won't do GPG either.<p>It is not a problem if you are only serving static files.</p>
]]></description><pubDate>Mon, 16 Mar 2026 20:55:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47404742</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47404742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47404742</guid></item><item><title><![CDATA[New comment by zzo38computer in "The “small web” is bigger than you might think"]]></title><description><![CDATA[
<p>> I think that the "small web" should reject encryption, which is the opposite direction that Gemini is taking.<p>I think it should allow but not require encryption.<p>> Removing encryption means that you can't reasonably do financial transactions, accounts and access restriction, exchange of private information, etc... You only share what you want to share publicly, with no restrictions. It seriously limits commercial potential which is the point.<p>Note that the article linked to says "the Gemini protocol is so limited that it’s almost incapable of commercial exploitation", even though Gemini does use TLS. (Also, accounts and access restriction can sometimes be used with noncommercial stuff as well; they are not only commercial.)<p>> It also helps technically. If you want to make a tiny web server, like on a microcontroller, encryption is the hardest part.<p>This is one of the reasons I think it should not be required. (Neither the client side nor server side should require it. Both should allow it if they can, but if one or both sides cannot (or does not want to) implement encryption for whatever reason, then it should not be required.)<p>> Anyone can man-in-the-middle and change the web page, TLS prevents that. But what I think is an even better solution is to do it at the content level: sign the content, like a GPG signature<p>Using TLS only prevents spies (except Cloudflare) from seeing or altering the data, and does not prevent the server operator from doing so (or from reassigned domain names, if you are using the standard certificate authorities for WWW; especially if you are using cookies for authentication rather than client certificates which would avoid that issue (but the other issues would not entirely be avoided)).<p>Cryptographic signatures of the files is helpful, especially for static files, and would help even if the files are mirrored, so it does have benefits. However, these are different benefits than those of using TLS.<p>In other cases, if you already know what the file is and it is not changing, then using a cryptographic hash will help, and a signature might not be needed (although you might have that too); the hash can also be used to identify the file so that you do not necessarily need to access it from one specific server if it is also available elsewhere.<p>> Well, if want to protect yourself, TLS won't save you, you will be given away by your IP address, they may not see exactly what you are looking at, but the simple fact you are connecting to a server containing sensitive data may be evidence enough.<p>There is also SNI. Depending on the specific server implementation, using false SNI might or might not work, but even if it does, the server might not provide a certificate with correct data in that case (my document of Scorpion protocol mentions this possibility, and suggestions of what to do about it).</p>
]]></description><pubDate>Mon, 16 Mar 2026 20:48:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47404664</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47404664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47404664</guid></item><item><title><![CDATA[New comment by zzo38computer in "Glassworm is back: A new wave of invisible Unicode attacks hits repositories"]]></title><description><![CDATA[
<p>I think a "force visible ASCII for files whose names match a specific pattern" mode would be a simple thing to help. (You might be able to use the "encoding" command in the .gitattributes file for this, although I don't know if this would cause errors or warnings to be reported, and it might depend on the implementation.)</p>
]]></description><pubDate>Sun, 15 Mar 2026 19:13:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47390823</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47390823</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47390823</guid></item><item><title><![CDATA[New comment by zzo38computer in "Glassworm is back: A new wave of invisible Unicode attacks hits repositories"]]></title><description><![CDATA[
<p>I use non-Unicode mode in the terminal emulator (and text editors, etc), I use a non-Unicode locale, and will always use ASCII for most kind of source code files (mainly C) (in some cases, other character sets will be used such as PC character set, but usually it will be ASCII). Doing this will mitigate many of this when maintaining your own software. I am apparently not the only one; I have seen others suggest similar things. (If you need non-ASCII text (e.g. for documentation) you might store them in separate files instead. If you only need a small number of them in a few string literals, then you might use the \x escapes; add comments if necessary to explain it.)<p>The article is about in JavaScript, although it can apply to other programming languages as well. However, even in JavaScript, you can use \u escapes in place of the non-ASCII characters. (One of my ideas in a programming language design intended to be better instead of C, is that it forces visible ASCII (and a few control characters, with some restrictions on their use), unless you specify by a directive or switch that you want to allow non-ASCII bytes.)</p>
]]></description><pubDate>Sun, 15 Mar 2026 19:05:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47390703</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47390703</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47390703</guid></item><item><title><![CDATA[New comment by zzo38computer in "XML is a cheap DSL"]]></title><description><![CDATA[
<p>JSON does have data types, although there are not very many and not very good. For example, there is no octet string type (so you will have to use hex or base64 instead), no non-string keys (so you have to use strings instead), no character sets other than Unicode, no proper integer type (you will either have to use the existing numeric type or use a string instead; I have seen both ways done), etc.<p>YAML is worse in many ways, though.<p>XML has no data types but does have data structures.<p>I prefer to use DER (which also has some problems, but they are much less bad in my opinion).</p>
]]></description><pubDate>Sat, 14 Mar 2026 22:01:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47381712</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47381712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47381712</guid></item><item><title><![CDATA[New comment by zzo38computer in "XML is a cheap DSL"]]></title><description><![CDATA[
<p>They mention those things, but they do not mention ASN.1.</p>
]]></description><pubDate>Sat, 14 Mar 2026 21:54:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47381640</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47381640</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47381640</guid></item><item><title><![CDATA[New comment by zzo38computer in "I beg you to follow Crocker's Rules, even if you will be rude to me"]]></title><description><![CDATA[
<p>I agree it makes sense to specify that it is not certain, by adding "it looks like" (or "it seems like", or other wording that would not be too long; as another comment mentions, "looks" can sometimes be wrong). The other stuff might be unnecessary, although it might depend if it is implied or expected according to the context (in many contexts I would expect it to be unnecessary; another comment mentions how it can even be wrong sometimes).<p>(Your message is better than the one with a lot of noise, though.)</p>
]]></description><pubDate>Sat, 14 Mar 2026 02:35:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47372721</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47372721</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47372721</guid></item><item><title><![CDATA[New comment by zzo38computer in "John Carmack about open source and anti-AI activists"]]></title><description><![CDATA[
<p>I would want to use the license that does not ask for credit; the only requirement is that any further restrictions are not legally effective (except that, for practical reasons, it is allowed to be relicensed by GPL and AGPL (if you are able to follow all of the requirements of those licenses) in order to combine it with software having such licenses).</p>
]]></description><pubDate>Fri, 13 Mar 2026 19:51:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47368931</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47368931</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47368931</guid></item><item><title><![CDATA[New comment by zzo38computer in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>In my opinion, a separate software should be used for the end-to-end encryption than for the communication, although there are other things to do for security other than only programming the computer correctly (such as securely agreeing the keys and ciphers in person).</p>
]]></description><pubDate>Wed, 04 Mar 2026 19:06:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47252258</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47252258</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47252258</guid></item><item><title><![CDATA[New comment by zzo38computer in "Don't make me talk to your chatbot"]]></title><description><![CDATA[
<p>I mostly agree (although sometimes it is necessary to talk to someone about it); it would be better to actually have good documentation (so that you do not need to talk to someone about it).<p>A warning label like you mention is a possibility if that is considered to be necessary, although I think it might be better to have a file that you can download and read (or request by mail or telephone or fax, if this becomes necessary in some circumstances; do not assume the computer always works and is compatible with your file), instead of a searchable wiki.</p>
]]></description><pubDate>Wed, 04 Mar 2026 00:10:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47241091</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47241091</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47241091</guid></item><item><title><![CDATA[New comment by zzo38computer in "The Windows 95 user interface: A case study in usability engineering (1996)"]]></title><description><![CDATA[
<p>> You could change the option to hide file extensions in the explorer settings windows; no registry tweak was needed.<p>The is a setting in Explorer, but it does not affect all file types; some (such as .lnk) are not affected by that setting and hide the extension anyways.</p>
]]></description><pubDate>Sun, 01 Mar 2026 22:34:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47211429</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47211429</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47211429</guid></item><item><title><![CDATA[New comment by zzo38computer in "The Windows 95 user interface: A case study in usability engineering (1996)"]]></title><description><![CDATA[
<p>Status lights can be helpful, although they should be dim, and should be red or green (or possibly yellow) rather than blue or white (unless you have already used the other colours and now you need more colours).</p>
]]></description><pubDate>Sun, 01 Mar 2026 06:00:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47204119</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47204119</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47204119</guid></item><item><title><![CDATA[New comment by zzo38computer in "The Windows 95 user interface: A case study in usability engineering (1996)"]]></title><description><![CDATA[
<p>> The issue with this type of design is that it completely tanks discoverability.<p>There are still ways to help, such as having a menu bar, and having good documentation. (Documentation is more important, in my opinion; but both are helpful.)</p>
]]></description><pubDate>Sun, 01 Mar 2026 05:56:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47204105</link><dc:creator>zzo38computer</dc:creator><comments>https://news.ycombinator.com/item?id=47204105</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47204105</guid></item></channel></rss>