Hacker Newsnew | past | comments | ask | show | jobs | submit | VLM's commentslogin

The purpose of a LLM ban is to encourage use of LLMs to submit PRs, not discourage. The longer term effect is to eliminate FOSS competency from the hiring process.

It takes some human effort to set up a slop generator. Have the slop generator make 100 buckets of slop, humans will work hard accepting or rejecting the buckets, somewhat less than 100 buckets will be approved, the payoff for the owner of the slop generator is now they have "verified FOSS developer contribution" on their resume which translates directly into job offers and salary. Its a profitable grift, profitable enough that the remaining humans are being flooded out. The ban makes successful submission to Redox even MORE valuable than before. They can expect infinite floods of PRs now that a successful PR "proves" that Redox thinks the human owner of the slop generator did the work and should therefore be offered more jobs, paid more, etc. Technically, they're hiring and paying based on ability to set up a slop generator which is not zero value, but not as valuable as being an Official Redox Contributor.

In the long run, this eliminates FOSS competency from the hiring process. Currently FOSS competency and coding experience indicates a certain amount, however minimal, of human skill and ability to work with others. Soon, it'll mean the person claiming to be a contributor has no problem violating orders and rules, such as the ones forbidding AI submissions, and it'll be a strong signal they actively work to subvert teams for their own financial reward and benefit. Which might actually be a hiring bullet point for corporate management in more dysfunctional orgs, but probably not help individual contributors get hired.


Hi. No, the purpose of a ban is to ban the behavior. I hope this helps.

DCS World to the rescue?

There's open source intel on google that Iran has SU-27s. Under combat conditions you have an instant to tell them apart. Clearly, its possible to misidentify them at least one time historically as the F-15s did get shot down.

I can assure you from having flown around a lot, if you are wildly outnumbered 3 SU-27 (err, F15) to your 1 F-18 you do not attempt a radar lock you do an IR only attack. The article mentions getting a radar lock first but that is unnecessary for IR guided weapons and in a 3-1 situation will just get you shot down.

Waiting for confirmation from the ground means 1 of the 3 will surely notice and you will be shot down.

Ironically if it were a flight of 4 F-18 they'd probably not have been as skittish at radar locking a mere 3 aircraft and the IFF (assuming its probably configured and working etc) would have informed them they're friendlies. IFF can only tell you if everything on both sides is working perfectly and powered up, if you don't get a friendly response all you know is it didn't work. Not unlike a network ping command. If ping works you know they're up and accepting pings from you, if ping doesn't work, you don't really know anything for sure.

Possibly the primary fault was the Kuwaiti lack of situational awareness. Somehow he's in shoot down range of three other A/C and he's got maybe 3 to 5 seconds to shoot them down or be shot down himself.

Somehow there is no discussion on what both A/C were doing. Usually a landing on an airfield would not look like a bombing run but possibly the F15s were doing something "weird" for which they could be blamed. The total censorship of what they were doing points to them being up to something dumb "lets buzz the airfield during active combat would could possibly go wrong" and they get shot down for looking like an attack run. Or a mix up where there's a published ahead of time safe altitude window around 15K but these guys for who knows why were 1000 feet off the ground doing who knows what. Maybe they had a good tactical reason to do it but its damning that nothing is being reported as an excuse.

Clearly any passive IR detector thats theorized to exist for years either doesn't exist or doesn't work very well. In theory, a smart enough IR camera should be able to notice something very warm indeed is getting rapidly brighter as it approaches you. In practice, these don't exist, or don't work. "Oh yeah they didn't have those when I was in, but they totally have them now" for the last 30 years. Apparently, not yet in 2026.

I find it unfortunate that people who do this for a living can't legally comment, people who do this for a hobby are not asked or actively ignored despite extensive practical experience, and people who mostly have a grift of looking authoritative for legacy media get automatic blind belief despite sometimes spouting total nonsense. This is the typical journalistic response in ALL disaster situations not just military aviation.


Defensive warning: AN/AAR-57

Countermeasure AN/ALE-47

I don't think they had radar lock, I think they were firing IR missiles. They wouldn't have had much time to respond, and IR missiles are normally much smaller than beyond visual range radar missiles, which would explain how all 6 pilots survived.

Rumor is there was a problem with the IFF identification system sync. If that's true, the Kuwaiti pilot just saw 3 jets coming into their airspace with no IFF working, under a very compressed timeframe with lots of inbound UAS and potentially aircraft.


"AN/AAR-57" Yes the small yellow subwoofer looking things that people speculate endlessly about. Supposedly BAE systems marketing released a picture of the whole system LOL, who needs spies if you have a marketing dept, also supposedly just about everything about this is classified. They supposedly come in four packs and there are "many" public pictures of them one under each cockpit rail on the F15 and the other two are unknown location? Or maybe the mythology online that they come in four packs is false and they actually come in two packs which seems more likely. Plausibly they install 4-packs on helicopters not fixed wing.

I could see some logic in not putting cams pointing forward because theoretically the pilot is looking where they're going and not putting one facing back because flight time to impact is so low they can't evade anyway, but a side attack is survivable if detected early enough... Also facing back they're going to be "seeing" their own exhaust most of the time.

The total non-reaction by the pilots in the public videos would indicate that if those planes even had -57s they were not working or not working well enough to matter or not working fast enough to matter.

I would agree some monster sized BVR missile will be easier to detect. In practice does it matter if the missile detector works at short range if the attacker would likely be in guns mode at short enough range anyway?


>I can assure you from having flown around a lot, if you are wildly outnumbered 3 SU-27 (err, F15) to your 1 F-18 you do not attempt a radar lock you do an IR only attack. The article mentions getting a radar lock first but that is unnecessary for IR guided weapons and in a 3-1 situation will just get you shot down.

Slaving heatseekers to radar is the standard way of employing them. I reckon by "having flown around" you're referring to DCS, which is absolutely unrealistic when it comes to engagements.

>Clearly any passive IR detector thats theorized to exist for years either doesn't exist or doesn't work very well. In theory, a smart enough IR camera should be able to notice something very warm indeed is getting rapidly brighter as it approaches you. In practice, these don't exist, or don't work. "Oh yeah they didn't have those when I was in, but they totally have them now" for the last 30 years. Apparently, not yet in 2026.

MAWS exist and they're employed on a lot of aircraft. I don't believe Strike Eagles have them though. An F-35 would get a missile warning for a heatseeker, it's not science fiction technology for quite a while now.

>I find it unfortunate that people who do this for a living can't legally comment, people who do this for a hobby are not asked or actively ignored despite extensive practical experience, and people who mostly have a grift of looking authoritative for legacy media get automatic blind belief despite sometimes spouting total nonsense.

You don't get practical experience by playing flight simulators, it's not comparable to how planes are employed as weapons systems.


400 yen for a ten pack is more like $2.50 than $5

Typical markup in the USA is 100% from wholesaler to retail. Running brick and mortar is very expensive. So if Walgreens were selling this, the wholesale price would be $1.25. I think it reasonable to expect the Yakult Ladies are pulling in the same $1.25 per package that walgreens gets.

The key, I think, is "Most of them are self-employed". Its a gig economy idea. You have to eat. If you're walking home from the store anyway (or kids school or on the way home from work or whatever), you may as well deliver packages for $1.25 each on the way home. You're walking home anyway, you may as well make free money on the walk.


Maybe they enjoy doing it so the tiny pay doesn't matter too much.


Like uber drivers!

There's been a lot of historical work done in the past and I used NIST FIPS181 to implement this.

Note: FIPS181 was intended for passwords and I was using them as handy short human-readable record IDs as per your post. You probably shouldn't use FIPS181 for passwords in 2026 LOL.

Describing FIPS181 as pronounceable is optimistic. However its better than random text wrt human conversations. They start looking like mysterious assembly language mnemonics after awhile.


Its a small tech bit but a big architecture / management decision.

Basically, who runs golang?

The perfectionists are correct, UUIDs are awful and if there's a pile of standards that all have small problems the best thing you can do is make a totally new standard to add to the already too long list.

The in-the-trenches system software devs want this BAD. Check out https://en.wikipedia.org/wiki/Universally_unique_identifier#... They want a library that flawlessly interops with everything on that list, ideally. Something you can trust and will not deprecate a function you need for live code and it just works. I admit a certain affinity to this perspective.

The cryptobros want to wait, there is some temporary current turmoil in UUID land. Not like "drama" but things are in flux and it would be horrible for golang to be stuck permanently supporting forever some interim thing that officially gets dropped (or worse, under scrutiny has a security hole or something, but for reverse compatibility with older/present golang would need permanent-ish reverse compatibility) Can't we just wait until 2027 or so? This is not the ideal time to set UUID policy in concrete. Just wait a couple more months or a year or two? https://datatracker.ietf.org/doc/html/rfc9562

I think I covered the three groups that are fighting pretty accurately and at least semi fairly, I did make fun of the perfectionists a little but cut me a break everyone makes fun of those guys.

So, yeah, a "small technical bit" but its actually a super huge architectural / leadership / management decision.

I hope they get it correct, I love golang and have a side thing with tinygo. If you're doing something with microcontrollers that doesn't use networking and you're not locked in to a framework/rtos, just use tinygo its SO cool. Its just fun. I with tinygo had any or decent networking. Why would I need zephyr if I have go routines? Hmm.

I've been around the block a few times with UUID-alike situations and the worst thing they could decide is to swing to an extreme. They'll probably be OK this is not golangs first time around the block either.

It'll probably be OK. I hope.


Cheap, nearly free voice phone calls killed old fashioned phone service. Once the incoming spam exceeded 95% I shut off the ringer and no longer use voice phone calls.

Once the cost of generating push media drops low enough (close enough to zero) the media is dead.

Pull requests are (ironically) a push media, and infinite zero effort PRs can be generated, therefore PRs are dead.

The proper way to handle the situation is to no longer accept PRs.

In github, enter a repo, "settings" "General" scroll down to Features, then uncheck "Pull requests". Or at least set to collaborators only. Probably need to shut off issues.

It gitlab, (I'm not as certain about this) enter a repo, "Settings", Visibility, "Merge Requests" change to "Only project members"

Its a post AI world, those features cannot be enabled on the internet anymore. Anything that accepts push from the public will get spammed into inability to use it. As a social activity PRs are dead. They were nice, but they are dangerous to leave enabled on the internet now. Oh well thats the cost of AI.


"The law" There is no "The law" there are multiple levels of government implementing multiple solutions all different and somewhat incompatible.

Honestly, probably by intention. Its sort of a SLAPP attack on the entire world population.


I'm talking about the one in California and Colorado, which is the most recent outrage wave.


Two meta observations about the comments:

1) The issue doesn't matter much. Corporate takeover of the internet caused severe damage, but overrunning social media with LLM generated content is a mortal wound. Roughly the same number of humans will be using social media in 2030 as currently use CB radio. Remember near a fifth of the population was using CB radio at the peak in the late 70s. Its too little, too late, closing the barn door after the horses have left is pointless. Like re-arranging deck chairs on the titanic after it hit the iceberg. Once the advertisers get wise to the scam that nobody is seeing their ads except bots, the problem will kind of fix itself. I think TPTB want to use "protecting kids from social media" as the public face of why social media will crash and burn soon to avoid discussion of how LLMs actually killed it, because authoritarians love LLMs and they're in charge (although seemingly everyone else hates LLMs, so I'm sure this will end well).

2) Most of the anti commentary reads a lot like addict speak IRL. Talk to a drunk about how it would be a great idea not to drink or a carb addict about how they should not eat donuts and you'll get absolutely rage blasted in return for threatening their addiction, which in the case of an addict, is their identity. "Well it would be the end of the world if people (me) were not drunk and other people (projection of me) will do anything to feed their addiction so obviously no effort should be made to limit addictions and it won't work anyway because other people (me) will even drink mouthwash or homebrew their own moonshine to get drunk" etc. Note I'm not completely against the anti's and they make some very good points that should be considered, but raging like an addict after their drug of choice is threatened is a VERY bad look and is not helping their case at all, if anything it strengthens the case against the anti's. What the pro's don't understand is you can't fix an addiction externally, addicts gotta addict and punishing them and making them miserable might help the pro's feel superior or at least thankful they're not addicted, but it never helped no one. Social media is "an ill of society" and should be treated as such including sensible regulation, protection of threatened groups, treatment for the addicts, and some compassion and acceptance of the addicts either returning to the real world or dying in the addicted world.


A better analogy would be regulation of addictive activities like gambling and regulation of addictive substances like painkillers. Given that the platforms being regulated were intentionally engineered to maximize addictive potential, this seems a fair and reasonable response.


But you can just block the domains on the device or router... This law is wholly unnecessary.


No you can't, because the software industry spent a lot of effort encrypting DNS and HTTP so that intermediaries can't tamper with or spy on it.


I am a parent. The devices my child uses have root certs that allow me to decrypt traffic that must pass through my proxy to be relayed to the internet. Voila. Problem solved with current tech.


You're lucky the browsers eventually relented and allowed custom root certs. That was seen as a vulnerability and almost patched.


Yes, and the next battle is ech-pinned params in apps. The browser can at least single that ech isn't supported. For apps, you'll just have to strip the ech and downgrade the connection and live with the server dropping you. But that's fine. My kids don't need tiktok if I, the parent, can't decrypt the info.

I would assume its fake and an attempt at identify theft at some level of the system. Is their PC infected at the OS level or just a fraudulent browser extension or something more like a popup ad masquerading as a system dialogue? A less trusting person would assume any request made by a computer is totally non-fraudulent and would gladly submit any requested private information.

"Dad, I can't do my math homework, a pop up says you need to provide a copy of your bank statement, your mom's maiden name, and a copy of your birth certificate, SS card, and drivers license, and can you hurry up Dad, my homework is due tomorrow morning." And people will fall for this once they get used to the system being absurd enough.

The fraud machine must be kept fed...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: