Hacker Newsnew | past | comments | ask | show | jobs | submit | eecc's commentslogin

Looks like how GitLab does it.

As far as I’m concerned, the only sane way is to dump credentials in a well-known path and let the environment decide what to bind them with at runtime (which is how Kubernetes does it, at least the EKS version I’ve had to work with).

IOW, JEE variable binding (JNDI) did it right 20 years or so ago.

It might be worth for architecture designers to look back at that engineering monument (in all its possible meanings, it felt complicated at times) and study its solutions before coming up with a different solution to a problem it solved


Well well well, that was nice read thanks!

And if it’s LLM the prompt or the rework were very good because I really liked the flow and clarity. That, or you’re a really good writer ;)


hmm, my money is on some actively used 0-day exploit that Apple is sealing shut before the CVE gets announced.

By the looks of the app list, they seem to be apps and games that used to be popular and have fallen in disrepair and apps that are starved of maintenance attention.

On the one hand it could be an exceptionally good example of "stewardship"; on the other hand, if this is true, what if authorities could later compel Apple to manipulate applications in some malign manner?


If you are worried about apple being compelled to do something, then they can do that at the OS level rather than something obvious in the

I think this is simply updating some api call which no longer works properly, coupled with the terrible "changelogs" that are the norm on the app store. Someone down thread mentioned certificate rollover.

A sensible changelog would be "update expired certificate", or "fix integration with ios 26.2", or "patch security issue"

An actual changelog would be "we're bringing you ever more great new improvements"

Here's the latest Audible one:

> At Audible, we're always making updates and improvements to make your listening experience better.

> If you're experiencing issues, please reach out to customer services. For feedback or suggestions contact us at audible.co.uk/help

This is the same every time, because these changelogs are meaningless.


> my money is on some actively used 0-day exploit that Apple is sealing shut

Why not an introduction of a new exploit ? This could be handy in those uncertain times.


Pardon my simplistic question, but when you mean rotation you’re essentially talking about diagonalization aren’t you?

So storing the diagonal as a matrix and the new bases is more compact?


In this context, the rotation is for spreading energy and ensuring predictable coordinate distributions rather than diagonalization; it makes coordinate-wise quantization much more computationally efficient, though it throws away learnable structure.


ah ok, so intuitively it's like minimizing the error when replacing the values with a well-known distribution. So all you need to carry along is the rotation and the assumption that there is some amount of loss.


There are papers that try to quantize angles associated with weights because angles have a more uniform distribution. I haven't read this specific paper, but it looks like it uses a similar trick at a glance.


I’d wager the US is self sufficient also in terms of renewable energies.


I guess the point is: delegate to kernel, then “oh, people with root can bypass with modules? Secure Boot!”


And then only trusted devices with an “acceptable” posture and valid manufacturer attestation can participate! Hellscape.


This is exactly what will happen.


This is the answer


Asked for an export but still haven’t received the mail with the download link


Took exactly 24 hours for me, on the minute..


Me too, why do they do that?


It is relevant. Anthropic would have argued the US military could not use its tools to process data gathered by foreign agencies when it applied to US citizens or soil.

So there you have it


And that’s where the authoritarian in you is shining through.

You see, Obama droned more combatants than anyone else before or after him but always followed a legal paper trail and following the book (except perhaps in some cases, search for Anwar al-Awlaki).

One can argue whether the rules and laws (secret courts, proceedings, asymmetries in court processes that severely compress civil liberties… to the point they might violate other constitutional rights) are legitimate, but he operated within the limits of the law.

You folks just blurt “me ne frego” like a random Mussolini and think you’re being patriotic.

SMH


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: