Hacker Newsnew | past | comments | ask | show | jobs | submit | adamnemecek's commentslogin

I feel like it's harder to hide malicious stuff in Rust build scripts.

Why?

Autodiff is preventing any meaningful discussion about safety, systems trained with autodiff cannot be made safe.


This is exactly how the open sourcing of Swift went so I imagine it will be the same.

+1 for Typst being amazing.

I can actually like write my own functions when I need to. I don't think I have ever written a LaTeX macro without having to look up a lot of stuff.


That's like saying that Ted Kaczynski was innocent, because he didn't force anyone to open the packages.

The government wants these packages sent out to support its domestic surveillance initiative. It helps when 99% are unaware they exist.

They are back because modern languages (Rust, Go) have made it pretty straight forward to build them. Ratatui and such allow you to write a TUI really quickly without needing to deal with VT100 arcana.

I think that you send the entire conversation with every request.


As long as you stay under the 1-hour caching TTL for your open threads, I guess your marginal cost is linear.

This is me on a weekday flicking between Ghostty tabs to enter “stand by” every ~45 mins.


Anthropic changed the cache TTL to five minutes, back in March.


Thanks, didn’t realise the API and Claude Code had different TTL.


It really doesn't, Rust is a better language.


It makes complete sense to polish that usecase.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: