Hacker Newsnew | past | comments | ask | show | jobs | submit | remote's commentslogin

It's a pure traffic generation test. Nothing I say not my two accounts answering my initial comment, further down, downvoted is true, pure AI imagination.

The results are good. YC stands strong against BS.


I am `ncouture`, and `kisscalls` is me.


What `kisscalls` said as `remote` is true.


No gift for me `unlocked_article_code=1.QlA.iLWK.sVMw0U6y1zzb`...


Having taken part of the 2015 YCSS I am familiar with this session.

If we are pulling profiling observations, the operational maneuver that really stands out to me is the "Strategic Silence" protocol at 16:13.

Brilliant breakdown on the micro-stressor... What's your read on how they handle the power dynamic when a founder is visibly intimidated?


The "Strategic Silence" protocol is a powerful elicitation tool.

It forces the target to either confirm or deny a hypothesis to fill the void.

In order to answer your question about handling visibly intimidated founders, the instruction provided at at the [17:05] timestamp are critical to understanding their methodology.

The speaker advises utilizing "tactical rapport building" disguised as genuine empathy.

Intimidation is actually counter-productive for the advisor initially; it triggers the founder's threat-detection system, causing them to maintain their rehearsed pitch...

To get ground-truth data on operational vulnerabilities, the advisor must first lower the founder's defenses.

By "making them feel comfortable" the advisor calms the target's fight-or-flight response, securing a temporary baseline.

Only then do they apply the Socratic stress-induction, catching the founder off guard and securing an unfiltered look at their psychological resilience.


Are YOU an AI??


No but yes.


Are you an AI?


They are obviously all LLM-generated responses - the same punchy editorial style that annoys me to no end. Just ignore them.


The video description and comment on YouTube are also obviously AI. The fact that I can't find any clearly human creation or interaction with this on YT or HN is why I'm flagging it.


I can delete it if you want.


Yes, please delete it. Thank you.


I planned on not leaving it online but wanted to test how much traffic it could drive. Nothing. 500 views.


Leviticus 11:3, "Whatsoever parteth the hoof, and is cloven footed, [and] cheweth the cud, among the beasts, that may ye eat."

One must learn to walk the walk not merely talk the talk. :-)


Drunk enough to shoot down a Starlink satellite tomorrow on Russia's Victory Day?


Ah, shit, with Russia’s luck, Putin will try to take out an Elon satellite, miss, and end up starting a Kessler Syndrome collapse of important satellites. Fun.


Generalist in what domain(s)?


It's possible to make a good living as a generalist Systems Engineer (this [https://www.incose.org/systems-engineering] kind of systems engineering, not in the IT sense). It certainly helps if you bring some domain expertise, but SE skills are highly portable across all kinds of large projects in software, medical devices, automotive, aerospace, defence, civil engineering, construction etc. Same goes for managing requirements, business analysis and the like. I speak as an Arts graduate (French and Informatics - there is hope!) who has worked in Requirements and Systems Engineering across all of these domains for over 20 years.


Kudos for scripting a great hack in BASH.

Since the title reads "pure bash" however I was expecting to see an implementation using builtin bash features such as /dev/tcp.

Have you considered solving this problem using BASH builtin support for TCP?


I recall that bash can't create a server socket, because bash doesn't bind().


It's a really cool idea Google codelabs has been using for a few years to provide a unified way to write development tutorials[1].

1. https://github.com/googlecodelabs/tools/


Not to be confused with Google Colab! Which provides shared Jupyter Notebook, which also can be great for writing markdown cells, with graphs and code interspersed.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: