<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Boulth6</title><link>https://news.ycombinator.com/user?id=Boulth6</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 04:54:28 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Boulth6" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Boulth6 in "The history of Google messaging apps"]]></title><description><![CDATA[
<p>Agreed on both points. XMPP is nowadays so much different than decades ago. I've migrated my family to Conversations and they're super happy with it.<p>Google's constant messanger churn tires regular users that just want to communicate instead of taking part in Google's internal political/promotion experiments.</p>
]]></description><pubDate>Thu, 26 Aug 2021 07:12:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=28311583</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=28311583</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28311583</guid></item><item><title><![CDATA[New comment by Boulth6 in "EU withheld a study that shows piracy doesn't hurt sales (2017)"]]></title><description><![CDATA[
<p>> The Internet never delivered on its promise.<p>The commercial internet never did. Don't forget about Torrents and lib gen rus. They're part of the internet too.<p>> The fact that e.g. Netflix offers different movies for every country is something that honestly does not make any sense yet everyone accepts it.<p>People "accept" it because it's convenient and they are not aware that there are other options. How would you suggest people reject it?</p>
]]></description><pubDate>Sun, 11 Jul 2021 09:19:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=27799489</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=27799489</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27799489</guid></item><item><title><![CDATA[New comment by Boulth6 in "How I Learned Symmetric-Key Cryptanalysis"]]></title><description><![CDATA[
<p>> Where is symmetric key cryptography used for nowadays in normal applications programming?<p>Practically every time you use asymmetric keys what they really encrypt with them is a symmetric key that encrypts the underlying data. Thus symmetric key cryptography is everywhere, just not directly exposed.</p>
]]></description><pubDate>Sat, 05 Jun 2021 18:21:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=27407386</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=27407386</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27407386</guid></item><item><title><![CDATA[New comment by Boulth6 in "Welcome to Libera Chat"]]></title><description><![CDATA[
<p>I don't know why but comparing Matrix.org Foundation with standardization organizations such as IETF seems just not right. Maybe it would be more correct to compare Matrix.org with XMPP Software Foundation?</p>
]]></description><pubDate>Wed, 19 May 2021 14:39:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=27209285</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=27209285</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27209285</guid></item><item><title><![CDATA[New comment by Boulth6 in "Rust for Windows 0.9"]]></title><description><![CDATA[
<p>This is mostly for legal reasons and the "for X" where X is a trademark is a common theme. (just look at Google Play store "for Twitter" or "for Reddit").<p>Looks and sounds weird though!</p>
]]></description><pubDate>Sat, 08 May 2021 10:06:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=27085620</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=27085620</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27085620</guid></item><item><title><![CDATA[New comment by Boulth6 in "OpenSearch: AWS fork of Elasticsearch and Kibana"]]></title><description><![CDATA[
<p>Thanks for the confirmation!</p>
]]></description><pubDate>Tue, 13 Apr 2021 20:38:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=26798941</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26798941</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26798941</guid></item><item><title><![CDATA[New comment by Boulth6 in "OpenSearch: AWS fork of Elasticsearch and Kibana"]]></title><description><![CDATA[
<p>Indeed that is likely but I wonder why didn't they at least require a Developer's Cerificate of Origin [0] that kernel.org uses. This is really lightweight (just append one line to git commit message) and supposedly provides a minimum legal base for the change. IANAL.<p>[0]: <a href="https://blog.chef.io/introducing-developer-certificate-of-origin" rel="nofollow">https://blog.chef.io/introducing-developer-certificate-of-or...</a></p>
]]></description><pubDate>Mon, 12 Apr 2021 19:09:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=26783726</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26783726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26783726</guid></item><item><title><![CDATA[New comment by Boulth6 in "Polish blogger sued after revealing security issue in UseCrypt messenger"]]></title><description><![CDATA[
<p>> they have been receiving legal letters from S440 SA demanding the removal of any negative articles and user comments from their websites about the UseCrypt Messenger app<p>I guess S440 never heard about the Streisand effect....</p>
]]></description><pubDate>Thu, 08 Apr 2021 18:05:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=26741851</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26741851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26741851</guid></item><item><title><![CDATA[New comment by Boulth6 in "Actually, DMARC works fine with mailing lists (2018)"]]></title><description><![CDATA[
<p>I was under the impression that DMARC always requires DIIM.<p>One unanswered question: should the mailing list software rewrite Return-Path? (to detect bounces) wouldn't that trip DKIM alignment?</p>
]]></description><pubDate>Fri, 19 Mar 2021 19:54:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=26517566</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26517566</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26517566</guid></item><item><title><![CDATA[New comment by Boulth6 in "Enable hibernation when Lockdown is enabled"]]></title><description><![CDATA[
<p>> To defend against an attacker sideloading a different OS, I rely on secure boot to only load my kernel and hence my userspace.<p>You could additionally seal the TPM key to specific PCR values so that only booting your kernel would allow using that TPM key.<p>> kernel, but potentially not root, could be able to change the tpm keys on an x86 system?<p>Depends on what do you mean by "change". They can't extract private bits but they can remove and add new ones. But if the data is encrypted using the old key it would become bit recoverable.</p>
]]></description><pubDate>Mon, 22 Feb 2021 20:07:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=26229843</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26229843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26229843</guid></item><item><title><![CDATA[New comment by Boulth6 in "WhatsApp to move ahead with privacy update despite backlash"]]></title><description><![CDATA[
<p>You may want to check out Dino.im. For easy XMPP there is also Quicksy.im that's a fork of Conversations (from the author of Conversations) but using contact book for people discovery.</p>
]]></description><pubDate>Fri, 19 Feb 2021 15:54:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=26194414</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26194414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26194414</guid></item><item><title><![CDATA[New comment by Boulth6 in "Locating Humans with DNS"]]></title><description><![CDATA[
<p>I'd rather advise to use Web Key Directory that is trivial to setup (have https and put a key file in one special location). WKD is also widely supported by OpenPGP software (including ProtonMail, GnuPG, OpenKeychain).<p>See: <a href="https://datatracker.ietf.org/doc/draft-koch-openpgp-webkey-service/" rel="nofollow">https://datatracker.ietf.org/doc/draft-koch-openpgp-webkey-s...</a></p>
]]></description><pubDate>Sat, 06 Feb 2021 10:01:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=26045513</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=26045513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26045513</guid></item><item><title><![CDATA[New comment by Boulth6 in "Sequoia PGP 1.0 Released: The Seedling Is a Sapling"]]></title><description><![CDATA[
<p>> Hopefully they'll also build something like Keybase's proof integration <a href="https://book.keybase.io/guides/proof-integration-guide" rel="nofollow">https://book.keybase.io/guides/proof-integration-guide</a> as well.<p>As far as I've seen the proof integration is used only for Mastodon insurances and Keyoxide supports all of them by default: no need to ask for permission, no weird conditions to enter like, instance has to be bigger than N people.<p>I see this as a way to control who gets into Keybase. A perfect example of centralized control. The idea of programmable proofs looks good though.<p>> If you have any suggestions as to which E2E (group) messaging+fileshare+git platform I could use as a replacement for Keybase I'm all ears.<p>Sadly I won't help you with that. There are a number of services that want to eat Keybase's cake now but neither of them hits all points on my scale. So I'm using mostly several different services to get a semblance of the Keybase experience.</p>
]]></description><pubDate>Thu, 17 Dec 2020 19:34:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=25459394</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=25459394</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25459394</guid></item><item><title><![CDATA[New comment by Boulth6 in "Sequoia PGP 1.0 Released: The Seedling Is a Sapling"]]></title><description><![CDATA[
<p>> There's things like <a href="https://keybase.io" rel="nofollow">https://keybase.io</a> that did try to solve this to a reasonable extent, PGP but more modern. It looked hopeful, but Zoom seems to only keep it on life support. Maybe someone will continue<p>It seems there's already Keybase like solution using OpenPGP only (no centralized infrastructure needed): <a href="https://keyoxide.org/" rel="nofollow">https://keyoxide.org/</a></p>
]]></description><pubDate>Thu, 17 Dec 2020 07:28:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=25453454</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=25453454</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25453454</guid></item><item><title><![CDATA[New comment by Boulth6 in "Rust 1.48"]]></title><description><![CDATA[
<p>I've seen that with Delphi. The unique factor was that the examples were not a basic call of the function but an actual real world practical sample that usually solved the problem one was looking for.</p>
]]></description><pubDate>Thu, 19 Nov 2020 18:52:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=25152958</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=25152958</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25152958</guid></item><item><title><![CDATA[New comment by Boulth6 in "Getting a biometric security key right"]]></title><description><![CDATA[
<p>The press release mentions only FIDO2. Where did you get the OpenPGP smart card bit?</p>
]]></description><pubDate>Wed, 11 Nov 2020 08:49:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=25056674</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=25056674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25056674</guid></item><item><title><![CDATA[New comment by Boulth6 in "Mailing lists are resistant to censorship"]]></title><description><![CDATA[
<p>> When I want to reply to someone, do I email the list or the person?<p>Reply to person, CC the list.<p>> How do I make sure the emails are threaded properly?<p>Using In-Reply-To header that references parent Message-ID. Git asks for it when sending a patch.</p>
]]></description><pubDate>Thu, 29 Oct 2020 22:21:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=24936803</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=24936803</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24936803</guid></item><item><title><![CDATA[New comment by Boulth6 in "Fighting Rust's Expressive Type System"]]></title><description><![CDATA[
<p>> This is one of the books which I will gladly buy once more when it is updated.<p>Agreed, Programming Rust is really nice and I read a dozen of Rust books already. I'll be buying 2nd edition as soon as it's available.</p>
]]></description><pubDate>Sun, 25 Oct 2020 09:39:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=24885023</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=24885023</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24885023</guid></item><item><title><![CDATA[New comment by Boulth6 in "GitTorrent: A Decentralized GitHub (2015)"]]></title><description><![CDATA[
<p>This is a solution to a non-problem. Hosting taken down git repos is easy an due to gits design all developers already have the source code.<p>The real problem is hosting issues and PRs in such a way. Github has an API and it's possible to script the backup but source code gets backup automatically so when the takedown strikes it's not a big problem.</p>
]]></description><pubDate>Sat, 24 Oct 2020 06:42:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=24877418</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=24877418</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24877418</guid></item><item><title><![CDATA[New comment by Boulth6 in "What’s New in Thunderbird 78"]]></title><description><![CDATA[
<p>> The other thing I'm wondering about is how this will integrate with OpenGPG, more specifically if it will allow the use with smartcards. And it looks like it planned ![1]<p>Actually smartcards were already supported when I tested alpha some time ago. Thunderbird used GpgME to talk to GnuPG and GnuPG talked to the smartcard.</p>
]]></description><pubDate>Fri, 17 Jul 2020 06:39:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=23867792</link><dc:creator>Boulth6</dc:creator><comments>https://news.ycombinator.com/item?id=23867792</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23867792</guid></item></channel></rss>