Hacker Newsnew | past | comments | ask | show | jobs | submit | more eterps's commentslogin

It would be incredibly interesting to see how LLM code generation would hook into this.


This is a paper about Chat LLMs in Hazel: https://arxiv.org/abs/2409.00921


llm hole filling ala the paper is actually live in the dev version right now (if you enter an openrouter API key in the second sidebar tab). it's slow and buggy at the moment though, it's only been running at all for the last few days


> TL;DR: FOKS is like Keybase, but fully open-source and federated

What features from a user perspective does it currently have in common with Keybase?

F.e. I remember Keybase mostly for secure messaging using public identities (HN, Reddit etc.), and sharing data/files.


E2E-encrypted git. Keybase has KBFS, and FOKS has a poor man's equivalent, which is E2E-encrypted Key-value store.


Thanks! Sorry for being lazy, but I was wondering how you share something using the E2E-encrypted KV store (it wasn't obvious in the website)? In kbfs, I remember it was as easy as putting it in a comma separated usernames path.


It's not as seamless. You need to first make a team, then invite (or add) that user into the team, and then use `foks kv put --team <your-team>`. One key difference is that in Keybase, all user's profiles were essentially world-readable. FOKS aims for more privacy by default, so in order to add Bob to your team, Bob has to first allow you view his sigchain, so you can learn his public keys.

The add vs invite distinction referred to above is because servers can choose different visibility policies. You can set up a server at foks.yourdomain.cc, and set it to "open-viewership", which means that any user can see any other user by default. If you and Bob are both on that host, you can add him to your team without his permission. But other hosts, like foks.app, do not work this way, and Bob has to authorize you to view him.


> What is the not-open source software used in OpenDesk?

The Calendar is closed source?

And probably also the e-mail client and contacts list?



I'm curious to learn more about this.


Crystal could have been big if it worked really well in combination with Ruby out of the box (f.i. as an extension language).


Shout out to the crystalruby[1] project. I’ve not used crystal much myself but I love how easy it is to switch between the two.

1. https://github.com/wouterken/crystalruby


My thoughts exactly.


> The New York Times observes that Kash Patel has now deleted his tweet (for unknown reasons) and adds that the charging documents are still not available.

https://bsky.app/profile/sethabramson.bsky.social/post/3lnnj...


Kash Patel tweeting in real-time indicates that he aware of it and at some-level involved with the arrest. It also shows that he sees this as a totally reasonable action and response - and wants the public to know about it.


> Colanode consists of a Node.js server API and an Electron desktop client

Is the Electron app a necessity or is using a browser possible as well?


Hi! For now, Colanode is available only as a desktop app (Electron). The primary reason is that we wanted to implement some local-first features, which are currently more complex to achieve in the browser.


Curious which features? I'm starting a local-first project and would love to make a PWA, but I just don't think the platform is ready yet.


Mainly using SQLite and having access to native file system for reading and writing files. We wanted to provide a full offline functionality. While it's possible to achieve that in browser as well it seemed quite complicated for now (we might consider it in the future).


It’s actually fairly straightforward using the OPFS API; I used it to build an upload queue a while ago, so the user can drag arbitrary files on the browser, they get copied into the OPFS as regular files, and then I can upload them at my own leisure, even after browser restarts. The SQLite WASM build even has support for it AFAIR.

Can recommend, it’s a fun challenge :)


Nice!

Would be interesting to target the RISC CPU of https://www.projectoberon.net with it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: