Hacker Newsnew | past | comments | ask | show | jobs | submit | atemerev's commentslogin

At this point I agree. A bubble starts when everyone stops calling it a bubble.

I am absolutely sure that WW3 is inevitable, for these exact reasons. Later, the survivors will be free to reorganize the society.

Nature likes to do occasional resets. Probably explains the Fermi paradox as well.

All our human history is a tiny speck on astronomical timescales. The timescale of life itself, on the other hand, is quite significant. Just from this we can somewhat deduce that life might be common in the universe, but sentience might be rare.

  ¡Viva Posadas!

Well, the process cannot be stopped or paused, whether we like it or not, for a few relatively obvious reasons.

And relying on your government do do the right thing as of 2026 is, frankly, not a great idea.

We need to think hard ourselves how to adapt. Perhaps "jobs" will be the thing of the past, and governments will probably not manage to rule over it. What will be the new power structures? How do we gain a place there? What will replace the governments as the organizing force?

I am thinking about this every day.


Of course the process can be stopped. That's just a lack of imagination.

By whom?

Well may be together with the full societal collapse, but as long as there are nation-states and competition, AI will be developed.


I always wondered whether they have a much more capable internal version. And I wonder the same thing for AI labs (they have to do a lot of lobotomy for their models to be ready for public use... but internally, they can just skip this perhaps?)

Very likely people who actually work on RE at the NSA also have access to IDA Pro licenses. I don't work in this space, so take it with a pinch of salt, but my understanding is this is a fairly long term strategic initiative to _eventually_ be the best tool.

It’s better in some dimensions and not others, and it’s built on a fundamentally different architecture, so of course they use both.

Ghidra excels because it is extremely abstract, so new processors can be added at will and automatically have a decompiler, control flow tracing, mostly working assembler, and emulation.

IDA excels because it has been developed for a gazillion years against patterns found in common binaries and has an extremely fast, ergonomic UI and an awesome debugger.

For UI driven reversing against anything that runs on an OS I generally prefer IDA, for anything below that I’m 50/50 on Ghidra, and for anything where IDA doesn’t have a decompiler, Ghidra wins by default.

For plugin development or automated reversing (even pre LLMs, stuff like pattern matching scripts or little evaluators) Ghidra offers a ton of power since you can basically execute the underlying program using PCode, but the APIs are clunky and until recently you really needed to be using Java.


Ghidra has a slightly different focus than IDA, so they're definitely not just using Ghidra :-)

I have only a very basic understanding of the two tools. Can you give me just some highlights regarding their differences?

Well, Ghidra's strength is batch processing at scale (which is why P-Code is less accurate than IDA's but still good enough) while allowing a massive amount of modules to execute. That allows huge distributed fleets of Ghidra. IDA has idalib now, and hcli will soon allow batch fleets, but IDA's focus is very much highly accurate analysis (for now), which makes it a lot less scalable performance wise (for now).

I doubt it. Ghidra is extremely extensible with their plugin/tool architecture. Public Ghidra includes the extremely helpful decompiler tool, and a few others, but I'm willing to bet that NSA uses regular Ghidra + some way more capable plugins instead of having another Ghidra.

Powerful, "capable" plugins are obvious; NSA cannot stop people from writing them, and they have little reason to restrict their use.

I think what NSA is likely to keep confidential are in-house plugins that are so specialized and/or underengineered that their publication would give away confidential information: stolen and illegitimate secrets (e.g. cryptographic private keys from a game console SDK), or exploits that they intend to deny knowledge of and continue milking, or general strategies and methods (e.g. a tool to "customize" UEFI images, with the implication that they have means to install them on a victim's computer).


Too many people in the know about this stuff I think to keep it hidden for that long. At the same time, we keep finding stuff that that should have held for and it didn't, so maybe you're right.

The gains come from pairing Ghidra with a coding agent. It works amazing well.

I'll second this. I used opencode + opus 4.6 + ghidra to reverse engineer a seedkey generation algorithm[1] from v850 assembly. I gave it the binary, the known address for the generation function, and a set of known inputs/outputs, and it was able to crack it.

[1] https://github.com/Mattwmaster58/ic204


would you have a tutorial on that?

Sorry, I don't. Giving the agent high level context has worked well for me.

I had to write a systemd script to reset my Firefox state on each reboot. It was really good at recovering sessions, and no config option could disable it.

So do humans, so what

I have really severe ADHD. Agents are lifesaving to me. Literally.


Can you explain how? You apparently didn’t die all the way to the few months ago that “agents” became a thing.


If something saves you an hour or two a day, that sounds life "saving" to me. Not just that you were going to die without it.


Had to write my own agent which is better with token economy: https://lethe.gg


I like your website design, but hate llms. Good luck.


Хронологија is "chronology" in Serbian


And I believe "entferne" is "cancel" in German. These seem both common words that appear in menus and UIs. Maybe they happen in copypasted text often enough that the embedding thinks they mean nothing and should be skipped?


It‘s "remove". A common word, but many words are common and not on the list. Lesswrong also lists "prüf" (check), another common word.


The most important HTTP header (though clacks is a packet routing system, not an application-level streaming protocol)


Well, there's no reason we couldn't have clacks-over-HTTP(-over-DNS)?(-over-avian-carrier)?, is there?


Of course, the good old CLOACA protocol (CLacks Over Avian CArrier), with the HTTP and DNS tunneling being OPTIONAL.


True, perhaps it should be added as an IP option field or TCP option...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: