Hacker Newsnew | past | comments | ask | show | jobs | submit | mckirk's commentslogin

I think what that research found is that _auto-generated_ agent instructions made results slightly worse, but human-written ones made them slightly better, presumably because anything the model could auto-generate, it could also find out in-context.

But especially for conventions that would be difficult to pick up on in-context, these instruction files absolutely make sense. (Though it might be worth it to split them into multiple sub-files the model only reads when it needs that specific workflow.)


This is the first time I've heard the term 'apecode', and I will make sure to use it at every opportunity.

It is not mine unfortunately, it comes from a very funny write-up by rsaksida: https://rsaksida.com/blog/ape-coding/

This is only done at the DNS level, so using a different DNS (such as Quad9) solves that issue. For background info, I can recommend [1, 2].

[1]: https://www.youtube.com/watch?v=Uxmu25mUZgg [2]: https://cuiiliste.de/


I never understood why Quad9, which is based in Switzerland, can get away with not applying the Swiss censorship to their DNS servers.


how can this be done at the dns level? shouldn't ssl certificates prevent third party content from being shown in the browser?


Well, you get the warning, but as long as HSTS is not active, you can still click on "Accept the risk and continue" …

[EDIT:] Just checked a bit closer, they are using an LetsEncrypt cert for "cuii.telefonica.de", which is obviously the wrong domain, but as I said above, as long as HSTS is not active for "annas-archive.li", you can still bypass via the button.


My ISP currently makes them not resolve (with scary sounding domains):

  ; <<>> DiG 9.10.6 <<>> @192.168.1.254 annas-archive.li
  ; (1 server found)
  ;; global options: +cmd
  ;; Got answer:
  ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18716
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

  ;; OPT PSEUDOSECTION:
  ; EDNS: version: 0, flags:; udp: 4096
  ;; QUESTION SECTION:
  ;annas-archive.li.  IN A

  ;; ANSWER SECTION:
  annas-archive.li. 845 IN CNAME www.ukispcourtorders.co.uk.
  www.ukispcourtorders.co.uk. 511 IN CNAME ukispblk.vo.llnwd.net.
  ukispblk.vo.llnwd.net. 845 IN CNAME ukispblk.vo.llnwd.net.edgesuite.net.

  ;; Query time: 3 msec
  ;; SERVER: 192.168.1.254#53(192.168.1.254)
  ;; WHEN: Wed Feb 18 12:06:25 GMT 2026
  ;; MSG SIZE  rcvd: 169


It does. The browser won't load the content because it detects your connection was tampered with.


They redirect to a different url.


If the censoring is at the DNS level, can the admin please replace the domain name in the url with the ip address to which it should resolve? Thank you.


Your country's broken internet is your problem. If you are having DNS queries censored then change your DNS resolver on your client side. If you still get intercepted look into DoH.


That's the 'built by the lowest bidder' feature. Probably pretty realistic in a lot of places.


Huh, I wonder if they trained it by feeding it architectural renders and "what actually got built" photos...


It's probably just prompt based. Actual fine-tuning for these kind of use cases is getting less common than it used to be.


Likely. You can go into Nano Banana or ChatGPT right now, upload a pretty architectural rendering, and tell it to make it look old, weathered, winter, etc and it will come out looking very similar. Give it an example to really dial it in.


Note that this is the Flash variant, which is only 31B parameters in total.

And yet, in terms of coding performance (at least as measured by SWE-Bench Verified), it seems to be roughly on par with o3/GPT-5 mini, which would be pretty impressive if it translated to real-world usage, for something you can realistically run at home.


For me, these books are in the rare category of 'wait I didn't know it was allowed to come up with a story _this good_'. I envy all those that have yet to read it for the first time.


I'm not sure whether that was intended, but 'operating at scale' actually made me laugh out loud :D


I have to admit an unintended chuckle, too.


"Do you or a loved one suffer from an abundance of brain cells? Speak to your doctor today about whether The Jersey Shore might be right for you!"


"A cable!"

"How do you know?"

"I'm holding it!"


Unfortunately proving anything about a concrete imperative implementation is orders of magnitude more complex than working with an abstraction, because you have to deal with pesky 'reality' and truly take care of every possible edge-case, so it only makes sense for the most critical applications. And sometimes there just isn't a framework to do even that, depending on your use case, and you'd have to sit down a PhD student for a while to build it. And even then you're still working with an abstraction of some kind, since you have to assume some kind of CPU architecture etc.

It really is more difficult to work with 'concrete implementations' to a degree that's fairly unintuitive if you haven't seen it first-hand.


I can't fathom how crazy it gets to model once you try to consider compilers, architectures, timings, temperatures, bit-flips & ECCs, cache misses, pseudo and "truly" random devices, threads, other processes, system load, I/O errors, networking.

To me it seems mandatory to work with some abstraction underneath that allows factoring a lot of different cases into a smaller set of possibilities that needs to be analysed.

It's also how we manage to think in a world where tiny little details do give you a likely insignificantly different world-state to think about.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: