Hacker Newsnew | past | comments | ask | show | jobs | submit | pphysch's commentslogin

Yeah, we didn't want Iran to have nukes, so we rugpulled the JCPOA and murdered the guy who declared a fatwa against nukes.

We wanted to save the Iranian people from the regime that murdered 100,000 peaceful protestors (don't ask for evidence) so we butchered 170 school girls and didn't apologize.

We wanted to stabilize the region, so we greenlit Israel's rampage in Lebanon and directly induced Iran to close the Strait.

Yeah. Articulated.


> We wanted to save the Iranian people from the regime that murdered 100,000 peaceful protestors (don't ask for evidence)

At least 20,000 according to Amnesty International, other independent sources claim 40,000.

https://www.amnesty.org/en/latest/campaigns/2026/01/what-hap...


That says Iran clams 3,000, UN claim 5,000 and other sources claim higher.

I don't Amnesty putting their name behind any of those numbers but even the 20,000 is very hand wavey.

I don't see 40,000 claimed anywhere.


Can we agree on "thousands"?

> We wanted to stabilize the region, so we greenlit Israel's rampage in Lebanon

Consider this hypothetical situation. Iran funds a terrorist group operating in Tijuana to fire rockets across the border into San Diego. Assume the Mexican government is not organized enough to stop the terrorists from firing rockets.

What do you think the response of the US Government would be? Please recall what we did after 9/11 before answering.

Israel isn’t invading Egypt and Jordan, I wonder if it’s because there’s no Iran-funded terrorist groups firing rockets from those countries or if there’s some other reason.

Israel definitely has blood on their hands, but how do you suggest they deal with terrorist groups funded by Iran operating in lawless areas of neighboring countries that are firing rockets at civilians in Israel?

Israel has been invaded by all of its neighbors simultaneously more than once, it’s a pretty complex situation that spans over a hundred years. Europeans and Arab nations (aside from the Ottomans) treated Jews like shit for centuries, pogroms and holocausts and expulsions and forced migrations. No wonder they want to keep the nation of Israel around, everyone else has tried exterminating them. Just try not to be so reductionist and polarizing about it, it’s a complex historical situation with many shades of gray.

I know my opinion is probably unpopular around here, but it’s how I see it. Israel has done some horrible shit, but they aren’t just rampaging against any non Jew in sight, there were Hezbollah operatives constantly firing rockets into northern Israel for years. What’s happening in Lebanon (and Syria and may other places) sucks, and that massive pier explosion certainly didn’t help.


> Israel definitely has blood on their hands, but how do you suggest they deal with terrorist groups funded by Iran operating in lawless areas of neighboring countries that are firing rockets at civilians in Israel?

What they do is stop raping and murdering people, settling on their land and then acting shocked that the country they are taking over is reacting in a violent way in response.


Israel are the terrorists who invaded Palestine and have committed crimes against humanity all across the Middle East. Your hypothetical situation is nothing at all like what's going on in reality. Iran is our ally against Zionist occupation of our own government.

Yes, an aggressive regime that develops nuclear weapons (otherwise why all this enrichment?), stockpiles missiles and drones that, funds terrorists like hezbolla, hoothis and hamas, should be stopped.

Yes, when you apply military force, civilians die. Nobody is happy about it, at least in US.

Yes, Iran closed the strait, because Trump taco'ed again and can't use force against it.

Yes, Israel bombs hezbolla, because what else should they do to people that shoot rockets at Israel? Send them fresh water and electricity? They tried it with Gaza, didn't help.

What was your point?


> Send them fresh water and electricity? They tried it with Gaza, didn't help.

yes, one cannot imagine why keeping millions of people in an open air concentration camp doesn't work out well


> open air concentration camp

Nitpick: the analogy is an open-air prison. Because prisons usually have ceilings. Open-air concentration camp is just a concentration camp, which doesn't really appropriately describe a siege.


> Over time, cannabis has also allowed me to analyse and think on the past

There is danger in attributing something broad like this directly to drug use. Can you only reflect while high?

It may be that the initial psychedelic sessions helped break through some mental/emotional patterns you were suffering from (positive impact), but that continued regular use has an overall negative impact on mental health. That's been my experience with psychedelics and how I've seen them work on those around me, at least.


I have a very different experience with psychedelics so its very hard to make generalized statements here. Not saying your experience is not valid but these diagnoses should be done by someone who knows the person _very_ well.

> Can you only reflect while high?

Personally, yes; at least effectively.

> It may be that the initial psychedelic sessions

I had a few experiences with mushrooms in my youth, so I know what you mean - but cannabis isn't psychedelic.


The terms here get kinda vague and smushy. I wouldn't necessarily call cannabis psychedelic, but i would call it a hallucinogenic. And very high doses of weed, especially edibles will give you closed eye visuals and auditory hallucinations. It's certainly not the same as LSD, but it's not entirely separate either.

Unless perhaps you've got other problems, cannabis certainly is not hallucinogenic at any sensible dose, even for edibles (which I use daily in combination with flower).

I've been discussing therapeutic use of cannabis here, not huge "recreational" doses.


Cannabis is psychedelic to the extent that the term means anything. It's not a "classic" psychedelic like acid or shrooms, but there is no obvious category difference between microdosing shrooms vs. smoking a joint vs. having a proper trip vs. greening out, and so on. It's all spectrums of psychedelic experience caused directly by something you ingested.

The opposition to the term likely has more to do with proponents and lobbyists wanting to distance weed from the "harder" psychedelics that are known to fry people.


> The opposition to the term likely has more to do with proponents and lobbyists wanting to distance weed from the "harder" psychedelics that are known to fry people.

I don't know about any of that - my own opposition is because I've tried psychedelic substances a few times during my youth, and cannabis isn't remotely like that.


Ironically this is perhaps the main motivation why a lot of companies force accessibility requirements internally. "We don't want an ADA lawsuit"

Now if only there were an ADA for website performance...


Security-by-obfuscation is ridiculed but I'm a firm believer that preventing yourself from getting owned when someone is able to type 3 letters `env` is a worthy layer of defense. Even if those same secrets are unencrypted somewhere else on the same system, at least make them spend a bunch of time crawling through files and such.

It's ridiculed because its no protection on its own when an attacker is motivated. Its fine to add as an additional layer though if you want to make your space mildly custom to protect against broader attacks.

I don't see how its necessarily relevant to this attack though. These guys were storing creds in clear and assuming actors within their network were "safe", weren't they?


TFA cites "env var enumeration", likely implying someone got somewhere they shouldn't and typed 3 characters, as the critical attack that led to customers getting compromised.

My point is sensitive secrets should literally never be exported into the process environment, they should be pulled directly into application memory from a file or secrets manager.

It would still be a bad compromise either way, but you have a fighting chance of limiting the blast radius if you aren't serving secrets to attackers on an env platter, which could be the first three characters they type once establishing access.


The following is based on my interpretation of information that's been made public:

A Vercel user had their Google Workspace compromised.

The attacker used the compromised workspace to connect to Vercel, via Vercel's Google sign-on option.

The attacker, properly logged into the Vercel console as an employee of that company, looked at the company's projects' settings and peeked at the environment variables section, which lists a series of key:value pairs.

The user's company had not marked the relevant environment variables as "sensitive", which would have hidden their values from the logged-in attacker. Instead of

  DATABASE_PASSWORD: abcd_1234 [click here to update]
it would have shown:

  DATABASE_PASSWORD: ****** [click here to update]
with no way to reveal the previously stored value.

And that's how the attacker enumerated the env vars. They didn't have to compromise a running instance or anything. They used their improperly acquired but valid credentials to log in as a user and look at settings that user had access to.


Astonishing that high damage actions were authorized by authentication delegated to Google and furthermore not subject to hard token 2FA.

I don't think that's what the attacker did here. Vercel is a PaaS product where other developers run apps. The enumerated environment variables were the env vars of Vercel's customers, which Vercel likely stores in a long-term data store. Rather than running `env` on a Linux box somewhere, the attacker may have just accessed that data store.

Yeah, isn't the entire point of SF startup culture (for the last decade++) to build personal wealth through a successful exit rather than build a sustainable business that benefits society? It's a big speculative con game... Opposite of sincere.

Of course we can warp the semantics and argue that these people are "sincere" in their desire to defraud retail investors or something, but that doesn't seem to be the author's argument.


A successful exit means you've built something so useful that someone else will pay lots of money for it. Sure that gets twisted sometimes when borderline frauds (and actual frauds) sell companies through misrepresentation ... but there is similar fraud whenever and wherever money is involved!

Fundamentally, the vast vast majority of founders who exit successfully made society better somehow.

But ... it's also true that founders who exit successfully are like 0.001% of the Bay Area's population, but we talk about them like they're 10% ... so we should all stop talking about them so much ;)


> you've built something so useful that someone else will pay lots of money for it

"Useful" is quite the euphemism.

> Fundamentally, the vast vast majority of founders who exit successfully made society better somehow.

This is an extraordinary claim.


I think this is a form of selection bias. We hear about -- and rage about -- the people you describe here because it's news, and it's outrageous.

But there are lots of people with a sincere mission who we don't hear about, because they're quietly working toward their goals.

That doesn't say that their goals are worthwhile or that what they're doing is actually good for the world, but they can still sincerely believe it is.

Most of them fail, and we hear about precious few of them. That doesn't make them any less sincere either.


Sure, this isn't a rigorous study. But it's clear that American society is in decay (specifically: education, science, healthcare, democracy) and meanwhile SV has been busily innovating in adtech/surveillance, miltech, fintech, porn, gambling, recreational drugs, addictive media, disruptive automation... Not that all those are the same type of vice but it's clear where SV priorities lie.

I promise you that the main reason HPC is behind on virtualization is not because of the little bit of overhead. There are a dozen other inefficiencies in the average HPC workload that are more significant.

Most centers don't even have good real-time observability systems to diagnose systemic inefficiencies, leaving application/workload profiling purely up to user-space.

The HP in HPC has really been watered down over the last couple decades, and "IT for computational research" would be a more accurate name. You can do genuinely high-performance computing there, but you'll be an outlier.


It's a mixture of legacy and reality.

For one, the assumption has been that you had dedicated use of all the nodes and communication network. It would kill your performance if your local node CPU scheduler was interfering with having your actual HPC program active when the messages were coming in from its peer tasks on the other nodes, since parallel jobs are limited in the end by the critical path latency of the cross-node communications.

It's only on the most "embarrassingly parallel" end of the spectrum where you can tolerate a bunch of virtualization and non-determinism, because the tasks communicate so infrequently or via such asynchronous mechanisms that they don't really impact the throughput of the whole job if they are asleep at random times.

But HPC systems also were very "unique". It wasn't just all Linux but a dozen different vendors' Unix variants with very different personalities. And for the bleeding-edge systems, each deployment was practically its own dialect of that vendor OS. Running a job was like cross-compiling to a one of a kind target. There was no generic platform where you could expect to build an app once and ship it around to whichever supercomputer was available.


Agreed on all points and this captures the history well.

Maybe there are literally 17 models in an initial MoE pass. Seems excessive though.

The market here is extraordinarily vibes-based and burning billions of dollars for a ephemeral PR boost, which might only last another couple weeks until people find a reason to hate Codex, does not reflect well on OAI's long term viability.

Aimlabs has been significantly gamified, though the core is maybe more of a "toy"

Both games have gameplay loops that were ahead of their time. Relatively free exploration + combat + RNG "loot" constrained by needing to return to town to heal/restock.

Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: