Hacker Newsnew | past | comments | ask | show | jobs | submit | varun_ch's commentslogin

I used Niri on a Framework laptop a few months ago, and it was Okay. I don’t think it clicked with me/I’m not sure if I was using it right, but it was giving me a headache to mentally deal with spatially mapping all of my windows (I came from MacOS where I just knew which windows I had open and cmd+tab into the right one when needed)..

I think I would’ve adjusted best if I could somehow just watch someone do their daily work on Niri, to learn how to use it right. Curious if people who like Niri came from tiling WMs or standard DEs.


on MacOS I used to use Yabai but moved away from it to using a hammerspoon setup to manipulate window positions. This was mostly because bsp just doesn't scale well with larger displays, in my opinion.

For me, the spatial mapping of windows comes naturally, though. For MacOS, I have 9 spaces. This can be as many or as little as you want, but for me, I have keybindings to switch between them, starting with ctrl + shift and then I map it to:

  u i o
  j k l
  m , . 
So in this array, top left is 'u', bottom right is '.' Then you are arbitrarily assigning that area for a certain kind of task or work. so maybe for communications (Teams, Discord, iMessage, etc.) may be designated as being in the 'j' space, or west. My primary work space where I web browsing or coding might be the 'k' area. My email could be 'u' and calendar 'i'. If you've ever worked with two windows side by side, then you already reasoning about it spatially. On the left is my terminal. On the right is my web browser. This just extends that concept slightly. I use 9 spaces in a square shape because it just translates to an extra large desktop.

With that being said, things I'm frequently using (browser, terminal, mail, music, discord, etc) have their own global keys set to launch or switch to them and that is actually what I use most. I think if you can think about how you'd like to organize your system, just practicing that will help you reason about it that way.

I've been trying Niri on my thinkpad and I really like it, though I think I agree that it can be trickier to spatially map where things are in it. Its spaces are vertical and then you are scrolling the horizontal plane. They aren't always the same dimensions because it depends on how many windows are open. Getting back to say, the top right space, requires more work, at least out of the box. But on a smallish laptop screen I think it is well thought out way to make it easier to swap between different views.


so they’d need to change their QR codes every time the menu changes?

This makes me wonder: Cellebrite makes tools for law enforcement to break into iPhones, likely exploiting weaknesses/vulnerabilities. Does Apple buy Cellebrite’s tools and reverse engineer them? Or would they not have a way of acquiring them legally?

Cellebrite sells their lower-level devices to Apple directly for things like data transfer at Apple Stores. The ones above that are unlikely to be sold to Apple.

> Cellebrite sells their lower-level devices to Apple directly for things like data transfer at Apple Stores.

Please substantiate that claim. Why would Apple need mystical third party devices to transfer data? They've designed both the user devices and the software, and they're both capable of exchanging data, and I'm sure Apple can do even more once they put the devices in diagnostic mode. What am I missing? What is Cellebrite providing here?


Because it’s a pain in the arse to design, manufacture and build a specialist device just for use in your stores.

I’m sure Apple could do everything that box does and more. But why bother designing, building and manufacturing your own specialist device when someone else already sells a perfectly good tool that does the job.

Don’t forget this is for use in a retail store by people who will have been given 5mins training on how to use the device. You want something that just requires a person to plug two phones in and hit a big “go” button. And it needs to work 99% of the time with zero messing around.


They built specialized tools to update iOS through the cardboard box without opening it before it goes on sale. I’m sure they can build something with a big “go” button if it’s important.

Nobody is arguing whether or not Apple could build the box. Apple could do almost anything that another company does. "Why doesn't Apple build their own planes to ship iPhones". Well, obviously because it's way cheaper, faster, and rational to use the perfectly good existing planes/boxes/you-name-it.

> Nobody is arguing whether or not Apple could build the box.

People aren’t debating whether or not Apple could theoretically find a way to transfer data between the devices they make and sell. The question here is if there is any evidence for the assertion that Apple buys Cellebrite devices in lieu of making their own solution for transferring data between the devices that they make and sell.


That’s true, but it seems unlikely to me that they would partner with the company that helped the FBI unlock iPhones and is in general an adversary to Apple.

They did?


That is absolutely fascinating. I'm gonna have to pay attention the next time I open an iPhone box. I'd bet they're sitting on their faces in the box.

I really wonder how the wireless data transfer works.


Apple was not always a 4 trillion dollar company.

Do you have a link that talks about this in more detail?


That is an article from 2010, the same year that “The US military buys PS3s for compute” was a true statement.

https://phys.org/news/2010-12-air-playstation-3s-supercomput...

It’s like saying “Single Ladies” by Beyoncé is topping the charts.

Do you have a link that talks about Apple buying cellebrite devices presently?


No, I don't think they are using Cellebrite devices currently.

I can’t imagine a scenario where Apple couldn’t legally buy them on the grey market. I can imagine it being illegal to sell them, like contractual restrictions blocking purchasers from reselling them. But short of the tools being a munition or controlled substance, you can buy whatever you want.

I bet Apple has access to Mythos now.

Not saying they should use it to reverse engineer hacking tools.

Just saying they have access to Mythos now.


You bet that the company that was prominently mentioned as a parter in the announcement for a thing, has access to that thing?

Wow, such a risky bet, I'm not sure it'll pay off.


I have a MacBook Air M2. I bought a framework 13 last year right before the RAM shortage. I really wanted to love it but ended up returning it due to really bad battery life performance (NixOS). Still on the MacBook today, but heavily considering the new framework

I'm on the same Mac as you. Have you tried Asahi Linux? I am running Asahi Remix with Gnome and couldn't be happier.

Context.ai seems like it was the SPOF. By definition it has a lot of your data, and they didn’t secure it properly.

Clearly, Vercel should not have been compromised by this. I don't know who Context.ai is but I do know Vercel and I expected better from them. I also think we can expect to see a lot more stories like this.

I wonder how long/far someone can truly go without actually knowing stuff today. I don’t know about game dev but the web is certainly built on abstraction: In university I’ve met people whose portfolio sites are made in NextJS but don’t know what React, the DOM or even HTML is. I think this is bad. At the same time (with the help of AI) they are certainly shipping things and working real jobs.

At least on the web, with frameworks and stuff abstracted into magic services or libraries, you can go really far without knowing what you’re doing. At what point does not knowing the lower level stuff start becoming a hard ceiling?


I think this would sit best at the browser level. I’m not sure there’s a nice way for multiple websites to share a cache like that.

with hackernews I wouldn't be surprised if this still worked

This is an interesting story and the part about using LLMs to re-build the site today is cool, but the LinkedIn-esque AI writing is really disrespectful.

That's fair criticism. I did use AI to help draft and clearly didn't scrub it thoroughly enough. The story is real and the research is mine, but the presentation could be more authentic. I'll take the lesson for the next one


in github's defense. This is a bit more nuanced, less objectively wrong domain posture issue. It will only matter if one security mechanism (subdomain control) fails.

The quoted microsoft examples are way worse. I see this with outbound email systems a lot, which is especially dangerous because email is a major surface of attack.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: