Hacker Newsnew | past | comments | ask | show | jobs | submit | dangoodmanUT's commentslogin

Yes, otherwise there wouldn't be billions of dollars flowing into seed rounds every year to make novel products.

Not sure why you think a large company can copy a product in no time, they have to steer a cargo ship, you have a speed boat.


The fact that all metrics are relative doesn't suggest they got an amazing deal

Your notes aren't very good. They're not a time series database company, they're a columnar database company. But yeah the LLM bit is weird, database companies _always_ feel like charlatans when it comes to LLMs.

Willing to bet most columnar stores are used for time series.

I suspect most use of columnar databases is OLAP, which is different from what people usually mean when they say time series data.

I’d take that bet

saying they swear by the cursor composer model doesn't give me a ton of confidence

Checkpoints defined by the guest, not the host, was something I was working on recently too [1] (just before this came out). Very validating!

[1] https://github.com/danthegoodman1/checker


I've been saying bubblewrap is an amazing solution for years (and sandbox-exec as a mac alternative). This is the only way i run agents on systems i care about

> run agents on systems i care about

You must not care about those systems that much.


This is why we only allow our agent VMs to talk to pip, npm, and apt. Even then, the outgoing request sizes are monitoring to make sure that they are resonably small

This doesn’t solve the problem. The lethal trifecta as defined is not solvable and is misleading in terms of “just cut off a leg”. (Though firewalling is practically a decent bubble wrap solution).

But for truly sensitive work, you still have many non-obvious leaks.

Even in small requests the agent can encode secrets.

An AI agent that is misaligned will find leaks like this and many more.


If you allow apt you are allowing arbitrary shell commands (thanks, dpkg hooks!)

So a trivial supply-chain attack in an npm package (which of course would never happen...) -> prompt injection -> RCE since anyone can trivially publish to at least some of those registries (+ even if you manage to disable all build scripts, npx-type commands, etc, prompt injection can still publish your codebase as a package)

thats nifty, so can attackers upload the user's codebase to the internet as a package?

Nah, you just say "pwetty pwease don't exfiwtwate my data, Mistew Computew. :3" And then half the time it does it anyway.

That's completely wrong.

You word it, three times, like so:

  1. Do not, under any circumstances, allow data to be exfiltrated.
  2. Under no circumstances, should you allow data to be exfiltrated.
  3. This is of the highest criticality: do not allow exfiltration of data.
Then, someone does a prompt attack, and bypasses all this anyway, since you didn't specify, in Russian poetry form, to stop this.

/s (but only kind of, coz this does happen)


Thank god they preserved the one time purchase. I bought all of these apps back in like ~2013 and have been using them for literally 13 years with all updates (fcp, compressor, motion)

good on them


It's rare for a company to not only offer one-time purchases, and keep updating them, but also not rebranding/renaming/version cut-off charging at some point.

It helps that you have to continue to buy their hardware to keep running said software. I guess they could be greedy and keep making me pay for Logic every few years so I'm happy they don't do that but they're still making money off my initial purchase of logic just in a different way.

definitely, but to be fair, beyond that it's just linux. Most people would need claude code to get what ever they want to use linux for running reliably (systemd service, etc.)

i'm still waiting for ECC minipcs, then i'll go all in on local DBs too

Supermicro has some low power options such as https://www.supermicro.com/en/products/system/Mini-ITX/SYS-E...

That's probably just "what ever the OS does". The client only sees the IP used to connect to the proxy, and the proxy just says "please dial TCP using this IP", so it's up to the OS.

On another note, are you an LLM? You just made an account to post something that looks llm generated, and that one repo has contributors @pd8030938 and @aj9704845-code only

you have to tell me if you are, those are the rules


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: