Kevin Hillinger
175 posts

Kevin Hillinger
@kevinhillinger
entrepreneur, engineer, renaissance man. not saving anything for the swim back

@UziCryptoo You’re mixing up total price ratio with percentage increase. I’ll fix it for you: Ratio: 6.19 / 1.89 ≈ 3.275 The price is 327.5% of the original, NOT a 327% increase. Actual increase: (3.275 - 1) * 100 ≈ 227.5% Annualized inflation: (3.275)^{1/25} - 1 ≈ ~4.9%





Dr. Daniel Amen dropped some eye-opening brain science on Chris Williamson: “Women have 52% less serotonin than men on average.” That’s one reason women are roughly twice as likely to suffer from depression and tend to ruminate more when upset — their brain gets “stuck” on negative thoughts. On the flip side, women show significantly better frontal lobe function, which helps explain why they go to jail about 14 times less than men. Testosterone and higher male risk-taking play a big role too. Fascinating how biology shapes these patterns. How much do you think these kinds of innate brain differences actually influence behavior and mental health between men and women?

How a car differential works, 1937




Este video explica a la perfección porque la equidad en los recursos, no garantiza la igualdad en las condiciones








Harvard circa 1700s: "No student shall be admitted unless they can translate Greek and Latin authors such as Tully, Virgil, The New-Testament, & Xenophon." Harvard circa 2026: "We can't assign whole novels anymore."


Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.





