Hacker Newsnew | past | comments | ask | show | jobs | submit | dmitrygr's commentslogin

> Terafab, Tenstorrent, SMIC and Cerebras Systems are a few more TSMC competitors.

Huh? Tenstorrent is a fabless Si company designing cores and does not complete with TSMC. Cerebras is a fabless joke, also not competing with TSMC.


>> How exactly do drones project power globally?

> https://en.wikipedia.org/wiki/Operation_Spiderweb

"The next country over" != Worldwide


You could do this anywhere in the world for a very small amount of money.

The implications of the Ukrainian war have changed the balance of power for ever. No airport will ever be safe again.


sneaking weapons into some countries is harder than into others, making things that fly long distances gets exponentially harder as distance goes up linearly.

That's true, but when things get cheaper you can afford to lose a lot of them. Suddenly every container vessel is suspect. That trick has a lot of potential and harbors are relatively soft targets and easily accessible from just outside international waters. You could do a shitload of damage to most countries by just targeting a few key locations well within the reach of a basic drone and what sub $1000 drones can do is changing by the day.

Armor and artillery are basically useless against a fleet of seaborne drones.


you don't have to do a lot of damage to have a dramatic effect either. Imagine an airport near the coast, you don't have to destroy the airport but if one drone flattens the tires on one out of ever 50 planes on a runway the airport might as well be a smoldering crater. It's like a ddos attack and similar to what's happening in Iran today. All it takes is one drone to hit one tanker and a > 0% of it happening again and no one is sailing because their payload is uninsurable. In the same way, all it takes is one drone to disable one airliner and a credible threat it could happen again and no plane is taking off from that airport ever again.

Now do it without those pre-written tests. Spec only. Else, the writers of those tests deserve a LOT of credit.

If there is one thing that that agents/LLMs have highlighted, it is how much credit those test writers do deserve. Teams that were already following a TDD-style approach seem to be able to realize value from agents most easily because of their tests.

The tests are what enable: building a brand new JS runtime that works, rewriting a complex piece of code in a different language (e.g. Golang instead of TypeScript) that is more performant for that task, or even migrating off of an old stack (.NET WebForms) to something newer.


You can prompt an LLM to generate tests from the spec and I'd bet it would easily get most of the way there, especially if you give it a reference implementation to test against. I did just that, though on a small scale - just for feature tests. The last few percent would be the real challenge, you probably don't want it to just imitate another implementation's bugs.

> Now do it without those pre-written tests

That's probably the most important thing, actually. I've tried my hardest to get Claude to build an APL VM using only the spec and it's virtually impossible to get full compliance as it takes too many shortcuts and makes too many assumptions. That's part of the challenge though, to see how far the daffy robots have come.


Hehe I tried gving it a minesweeper CSP I've been working on and asked it to develop the feature I was working on at the moment just to compare. I was working on adding non chronological backtracking to the search engine.

I gave it the proper compile flags, I gave it test cases and their expected output, and everything it would have needed. The test cases were specifically hand picked to be hard on the search algorithm. And the base program was correct and gave the correct results (I was only adding an optimization), and were what I was using as a baseline for testing my implementation. You know, with a debugger and breakpoints, printfs and all that.

In the end it couldn't get the thing to work (I asked it to compile and verify) then it proudly declared that in all of the test cases I gave it, everything was solved through constraint propagation and the search didn't even trigger. So it didn't introduce any bugs. It tried to gaslight me. Even though it got a segfault in the new code it added (which would obviously not have been triggered if the search didn't actually execute)


We've had brainless clones for a while already. Governments are full of them. Are we sure we need more?

Makes sense, with Iran offline, the world needs oil from elsewhere, which means Russia. Countries will start to run out of oil soon. eg: https://www.reddit.com/r/EconomyCharts/comments/1s3t580/new_...

Russia needs the money too, their economy is struggling, but Putin does not want to stop attacking Ukraine. It's only fair that Ukraine does what it takes to keep Russia at a distance. Ukraine has absolutely no choice but to fight back. I understand Putin does not want to go home without a prize but if he had stopped the war 2 years ago Russia would now be in a much stronger position, selling oil at a very nice profit. If the war keeps on going on Ukraine may actually win the war and Russia could completely collapse.

I do not trust that graph in your example

> The article does not claim the app requests the location. It claims it can do it with a single JS call.

so can ... any other code anywhere on a mobile device? That is how API work...


You need to state the permissions you *may* request/use in AndroidManifest.xml. This data can then be displayed to users pre-installation.

From the (limited) article, it doesn't seem they do this: https://thereallo.dev/blog/decompiling-the-white-house-app#p...

----

EDIT: I'm mistaken. From the Play Store[0] it has access to

* approximate location (network-based)

* precise location (GPS and network-based)

[0] https://play.google.com/store/apps/details?id=gov.whitehouse...

This seems to disagree with:

> The location permissions aren't declared in the AndroidManifest but requested at runtime

*shrug*, someone should dig deeper. It looks like the article may not match reality.


What version do you see? 47.0.1 doesn't have that for me: https://news.ycombinator.com/item?id=47557033

Very unusual: 47.0.1 is showing these permissions when on my MacBook viewing the store entry.

The Play Store doesn't show these permissions when viewed on my Pixel 9 Pro, and the APK doesn't have these permissions when downloaded/extracted.


No apple product REQUIRES an iCloud account. I have an iphone without one and a mac without one

> No apple product REQUIRES an iCloud account

Except an iPhone and iPad,to install apps people want and need. The number of people who use an iPhone without apps can be rounded down to 0


Detecting properly-written malicious code is undecidable. No amount of snake oil fixes that

Yes. news.ycomhinator.com

In the US, not disclosing a password is explicitly protected (5th amndmnt), SCOTUS has been clear. not so for biometrics, but so for PIN/passwd

> In the US, not disclosing a password is explicitly protected (5th amndmnt),

That's great but of exactly zero help if you're trying to travel to the US and CBP (or ICE) are staring you down. Even if they don't gulag you, they can always just reject entry for any non-citizen (and these days even some citizens it seems.)


Any country can reject non-citizen entry, for any reason or no reason at all. In fact, part of a definition of a country is ability to practice control over its territory and who is and is not there. This necessarily includes border controls, which any country can decide to make as onerous as they please. No non-citizen of a country has any right to be present in it, except as permitted by its government, so any country if free to make it as hard as they wish to enter for non-citizens. This may not be a good idea, but control over a territory is literally part of the definition.

> Any country can reject non-citizen entry, for any reason or no reason at all. […] This necessarily includes border controls, which any country can decide to make as onerous as they please.

Or, a country could set rules that specify what they will and won't do as part of their entry controls. Just because it's a kind of an "absolute" power doesn't mean you can't still self-impose rules. The benefit being attracting more leisure and business travellers.


Which i acknowledged with "This may not be a good idea,"

They have? What was the relevant case? It was my understanding that some lower courts have ruled one way, others the opposite. There are also many nuances in particular cases (e.g., the police wanting a broad search of a device for something that may or may not be there versus them knowing for a fact a device has certain information they want).

The 5th amendment only protects citizens, and we are only talking about visiting (as far as I can tell).

Ah yes, the US government still respects the 5th amendment... like they respect the other amendments as well as the constitution.

The constitution doesn't say shooting citizens is illegal, right?


Federal agents couldn't possibly have been aware that executing people on the streets is a violation of those people's rights, so they are covered by QI.

Haha, here's some random AI generated content:

    At least 225 judges have ruled in more than 700 cases that the administration's mandatory immigration detention policy likely violates the right to due process[1] The Fifth Amendment's Due Process Clause generally requires those having federal funds cut off to receive notice and an opportunity for a hearing, which was not provided in many of DOGE's spending freezes[2]
(there's more but what's the point)

1. https://www.justsecurity.org/107087/tracker-litigation-legal...

2. https://www.cbpp.org/research/federal-budget/many-trump-admi...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: