Hacker Newsnew | past | comments | ask | show | jobs | submit | waterproof's commentslogin

About the ethics of residential proxies: Brightdata, which sells a residential proxy, blocks their own proxy when you point it to brightdata.com.

The fact that they don't allow you to use their service to scrape their own domain, tells you something about their ethics...


I often run my projects on Supabase and then the Supabase UI becomes a backstop where I can teach my admin users to do things if they really have to.

That, or just use Airtable as a backend, if you can get away with it.

Mostly I agree with you though, I got swept up with lots of "recent tools & frameworks" projects and I really miss the Django admin. Django+HTMX has always seemed like a tempting option.


Since the printer takes flexible roll sizes and cuts its own pages, probably it would work out of the box with letter right?

I do get your point though, it would be nice if this was not an NC license


Ah yes, looking at the actual specs, it looks like it does support 11 inch rolls as well.


On top of security concerns, you're now shipping potentially buggy code with every dataset. And you're relying on adherence to semver to match local binary unpacker implementations to particular wasm unpackers.

I see why you're doing it, but it also opens up a whole avenue of new types of bugs. Now the dataset itself could have consistency issues if, say, the unpacker produces different data based on the order it's called, and there will be a concept of bugfixes to the unpackers - how will we roll those out?

Fascinating.


Sounds like they're trying to start a chess match with their rival researchers, inside of a sequence of papers. #1 pe4 would indicate a classic king's pawn opening (pawn to e4) [1]

Clever.

[1](https://chesspathways.com/chess-openings/kings-pawn-opening/)


Interesting. This is the first time I'm seeing this inside a paper. I would love to see the entire sequence if it has been done before, in other papers.


I see a $400 price tag on a five week course. If it takes 5 weeks to learn how to use your product, I am skeptical that it has legs.

Side note: supposedly this is the first cohort of this course, so how do you already have testimonials?


As the post mentions, a year ago we did a trial of it, and have been working with that group of 1000 users since then.

The course is about a methodology, not a product. It's the ideas Eric Ries and I have been working on for decades. 5 weeks is a crash course that can only touch on the ideas. And it covers learning data structures and algorithms, foundations of web programming, system administration, startup creating, and much more.

It's really a rapid "how do to <x> the solveit way" for a variety of x. Each of those x is likely to become a full course in the future.


You obviously see a ton of value here, but a bunch of industry professionals still aren’t getting it. This is a communication problem. Y’all probably should consider investing in a (different?) marketing or communications consultant.


+1

and a product manager


It's not a course on how to learn how to use the product. It's a course on how to think and solve problems, which makes you more effective in using the platform.


I guess I was lucky. I'm old enough that this was taught to me in school for free. That was way back in the day before it was outlawed.


Those guided tours are so good though! You can learn so many cool stories and details and it's a different experience every time, so it's always fun to go back.


The next No Kings Day is October 18.


If you want to be privacy focused, include a way to reverse a shortened URL without visiting it


Isn't there a situation where the agentic browser, acting correctly on behalf of the user, needs to send Bitcoin or buy plane tickets? Isn't that flexibility kind of the whole point of the system? If so, I don't see what you get by distinguishing between agentic and no agentic browsing.

Bad actors will now be working to scam users' LLMs rather than the users themselves. You can use more LLMs to monitor the LLMs and try and protect them, but it's turtles all the way down.

The difference: when someone loses their $$$, they're not a fool for falling for some Nigerian Prince wire scam themselves, they're just a fool for using your browser.

Or am I missing something?


You're right that if the user logs into a sensitive website, the "isolated browsing" mitigation stops helping. We don't want the user to accidentally end up in that state though. Separately, I can also imagine use-cases for agentic browsing where the user doesn't have to be logged into sensitive websites. Summarizing Hacker News front page, for one.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: