Hacker Newsnew | past | comments | ask | show | jobs | submit | theteapot's commentslogin

Need to combine this with LVM or BTRFS or similar to be a true snapshot. Rsnapshot supports LVM snapshot pretty good.

Once you have btrfs you don't really need rsync anymore, its snapshot + send/receive functionality are all you need for convenient and efficient backups, using a tool like btrbk.

I feel like apparmor is getting there, very, very slowly. Just need every package to come with a declarative profile or fallback to a strict default profile.


And most CS grads forget all that after a few years because it's not relevant to what they're actually doing.


I'm noticing more of these race baiting comments on YC too lately. AI?


No, that’s a common cope.

Not AI. Not bots. Not Indians or Pakistanis. Not Kremlin or Hasbara agents. All the above might comprise a small percentage of it, but the vast majority of the rage bait and rage bait support we’ve seen over the past year+ on the Internet (including here) is just westerners being (allowed and encouraged by each other to be) racist toward non-whites in various ways.


How's your day been?


> I can’t overstate how much I hate GitHub Actions. I don’t even remember hating any other piece of technology I used.

Ansible. Same reasons but 100x worse.


AFAIK Wifi Direct has quite wide hardware support -- https://en.wikipedia.org/wiki/Wi-Fi_Direct. But few people know about it?


Might not be how it appears. The CVE number can be reserved by the org and then "published" with only minimal info, then later update with full details. Looking at the meta data that's probably what happened here (not entirely sure what the update was though):

    {
    "cveId": "CVE-2025-14847",
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "state": "PUBLISHED",
    "assignerShortName": "mongodb",
    "dateReserved": "2025-12-17T18:56:21.301Z",
    "datePublished": "2025-12-19T11:00:22.465Z",
    "dateUpdated": "2025-12-29T23:20:23.813Z"
    }


Cool, I get to call my Youtube, TikTok addiction my "intellectual crack" now. Only fair.


If you're using your YouTube and TikTok addictions to build things that other people can use, go nuts


Actually I think that's roughly how threat analysis works though.


For threat analysis, you need to know how hard you are to break in, what the incentives are, and who your potential adversaries are.

For each potential adversary, you list the risk strategy; that's threat analysis 101.

E.g. you have a locked door, some valuables, and your opponent is the state-level. Risk strategy: ignore, no door you can afford will be able to stop a state-level actor.


I concur the question, "Who would have an incentive to spend resources on DDoS'ing Codeberg?" is a bit convoluted in mixing incentive and resources. But it's still, exactly, threat analysis, just not very useful threat analysis.


Wouldn't an AI scraper working for a huge firm have more incentive to scrape your code, than a competitor?


> It would be cool to have something like this ..

Aren't LLMs something like this?


An LLM probabilistically produces tokens over its model which is why it can hallucinate whilst an actual graph model would not have that issue


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: