Hacker Newsnew | past | comments | ask | show | jobs | submit | fluffet's commentslogin

I've been using Linux on all PC's for a long time.

Experience is slowly getting better. There is nothing I haven't been able to get to work, but with tricks or adjustments.

I think the "best bonus" is using LLM's in deep research mode to wade through all the blog post, reddit posts etc to get something to work by discovering forementioned tricks. Before, you had to do that by yourself and it sucked. Now I get 3 good ideas from Claude in "ranking order" of how likely it is to make it work => 99% of games I get to run in 5 minutes with a shell command or two. Lutris is also pretty good.

Omarchy on my laptop has finally made computers fun for me again, it's so great and nostalgic. Happy to be back after my brief work-mandated adventure into MacOS.


Happy to see this :-)

This guy starring my chip-8 implementation was a moment of pride for me. It was buggy but before this guide there wasn't too much material out there that was made for stupid people like me.

It's a great starter project for emulation. You'll realise how all emulators work, and as a bonus, interpreted languages. Really recommend it.


Great! I worked a lot with parquet like 5 years ago. The frustration and tilt working with the tooling was immense. Thank you for building this, it feels like resolving some old knot in my soul.

Some kind soul made this repository then, and I found it on like the 13th page of Google while in the depths of despair. It is my most treasured GitHub star, a the shining beacon that saved me. I see it has saved 17 other people too.

https://github.com/casidiablo/parquet-tools-for-dumb-people-...


I take away that the combination is the problem. Bleach and ammonia isn't so bad on their own, but mixing the two is not a good idea. MCP would provide crazy attack vectors.

Especially if you could ask another AI "I have access to an MCP running on a Victim computer with these tools. What can you do with them?" => "Well, start by reading .ssh/id_rsa and I'd look for any crypto wallets. Then you can move on to reading personal files for blackmailing or sniff passwords..." and just let it "do its thing" as an attacking agent in an automated way. It could be automated which creeps me out!


My intuition tells me that blackmailing at scale has the potential to be quite terrifying if you ask for favors that each seem innocent enough on their own. E.g. one favor may be as simple as asking the guy walking his dog to delay it for half an hour. He will surely comply without hesitation. But hidden reason was that he would otherwise witness a murder.


Don't you give THEM ideas!


Woah, I had no idea. Thanks for the article.

I feel like some cycle phenomenon has been reached here..

The first protocols of the internet were very naive. Why'd you need to encrypt traffic? What do you mean exploit DNS, why would anyone do that?

Then people realised that the internet is a really, really wild place and that won't do.

I suddenly feel old, because this new AI tool era seems to have forgotten that lesson.

I feel it's like watching crypto learn by any% speedrunning why regulations and oversight might be a good in the first place (FTX and such).

I hope the next generation of AI tech/protocols are more robust, trust just doesn't cut it, or we'll see plenty of fingers being burnt at the stove.


I did a presentation on AI Agents from the perspective of an AI newbie and one of my comments/conclusions was that it felt like releasing a browser from 2000 in the middle of today's scary 2025 environment. MCP and similar are missing 20+ years of responding to new and emerging threats, and the hype men (executives everywhere) don't realize, care or have the ability to respond.


Is the presentation public?


In early days it's always best to push security risk onto users in a bid to gain as much market share as possible. By the time they realize they've been screwed, technology will have matured and you can hand wave those old criticisms away, and even trumpet them as new innovations and upgrades.


It's a new technology so it is understandable that practitioners are not aware of the security best practices, like https://genai.owasp.org/

Also, the security tooling is still nascent.


Solid points!

Shame the author doesn't mention the Swedish secret of snus. That's the best productivity hack I know bar none. Anyone else out there?


What a nostalgia trip!

I did my MSc thesis about document vectors of STE.

STE has incredibly useful rules for technical communication/documentation; especially if you're a non-native English speaker like me. I wish it was more commonplace!! Documentation is usually horrible.


Thanks for bringing that up. I ran into a whole thread on how "bad English" (so called) was/is a lingua franca ...

... and ran into STE, which sounds like a grand idea.-


Love the term.

People should call it for what it is. Tried to find some answers on Google earlier in the day, and the first result pages were 100% generated slop. Funnily enough, any AI summary of the slop would be slop squared.

It's everywhere, and I hate it. What ways do people have to combat it out of their day?


Its infesting google image search too. I tried to find a picture of a guitarist playing a certain guitar. I got hits from “openart” where it looked like kurt cobain got crossed with a sand worm


Interesting read.

Is there a case for KYC versions of platforms? Maybe platform knows who you are, but you can remain anonymous "outwards"?

All forms of automated detection and generation will work like GANs and race each other.. Leads me to believe something else is the answer.


I'm sure that Facebook could get rid of it if they wanted to. The same way that they could get rid of only fans creators flashing you pictures of their privates in their short videos. The same way they could get rid of racists and transphobes and other bigots. The same way that Google could get rid of the 20 paragraph essays on basic facts you can find in Wikipedia.

It's just that getting rid of these things would be less engaging and lead to a deficit in ad revenues. And they have nothing else to show instead. Because authentic contents do not give them enough ad revenue.

So they can't actually get rid of them without collapsing the business model.


I'm Swedish. We have quite a few of these guys. For every "public" one of these, there are many that are absolute monster programmers that don't market themselves at all. I've worked with a few.

I'm just gonna throw in this link because I think it's great:

https://internetmuseum.se/english/

Among other crazy stories, Daniel is featured there. My favourite story is that the TLD .se was was ran by a guy in in his living room for years until The Swedish Internet foundation took it over.

There's also Kazaa and the guys behind The Pirate Bay. Real OG hackers from that era.

W.r.t. to your question I think it's relevant to say that "most things invented then" were "simple" ideas but hard to implement due to the tooling in that time and lack of programmers. But if you were good, you could go at it alone or with a small team. I think that it's a little bit inverted now: finding good, novel ideas in the space that can be done by one person or a small team is hard, but building and shipping it, if you do, is probably a lot easier due to OSS.

Oh and naturally the all-Swedish version is better at https://internetmuseum.se/


Regarding Kazaa (and also later, Skype), the OG developers were all Estonian. Zennström and Friis were the business people (and Friis is Danish).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: