<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: CiPHPerCoder</title><link>https://news.ycombinator.com/user?id=CiPHPerCoder</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 23:55:07 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=CiPHPerCoder" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Post-Quantum Cryptography for the PHP Community]]></title><description><![CDATA[
<p>Article URL: <a href="https://paragonie.com/blog/2026/04/post-quantum-cryptography-for-php-community">https://paragonie.com/blog/2026/04/post-quantum-cryptography-for-php-community</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47692097">https://news.ycombinator.com/item?id=47692097</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 08 Apr 2026 16:05:34 +0000</pubDate><link>https://paragonie.com/blog/2026/04/post-quantum-cryptography-for-php-community</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=47692097</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47692097</guid></item><item><title><![CDATA[Building Cryptographic Agility into Sigstore]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.trailofbits.com/2026/01/29/building-cryptographic-agility-into-sigstore/">https://blog.trailofbits.com/2026/01/29/building-cryptographic-agility-into-sigstore/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46813090">https://news.ycombinator.com/item?id=46813090</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 29 Jan 2026 17:12:16 +0000</pubDate><link>https://blog.trailofbits.com/2026/01/29/building-cryptographic-agility-into-sigstore/</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=46813090</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46813090</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "A Vulnerability in Libsodium"]]></title><description><![CDATA[
<p>> However, donating money to an open collective is prohibitively hard for most big companies.<p>You are absolutely correct. However, that's the mechanism that Frank has made available, and that's what the comment I was replying to was asking, so I was just connecting the dots between the question and answer.</p>
]]></description><pubDate>Wed, 31 Dec 2025 14:43:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46444480</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=46444480</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46444480</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "A Vulnerability in Libsodium"]]></title><description><![CDATA[
<p>> Did you also check all of the libraries that implement the check differently to libsodium?<p>Yes, but it was a breadth-first search sourced from the ianix webpage, so I certainly missed some details somewhere. I'll continue to search over the coming weeks in my spare time (if I can get any).</p>
]]></description><pubDate>Wed, 31 Dec 2025 14:41:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46444456</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=46444456</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46444456</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "A Vulnerability in Libsodium"]]></title><description><![CDATA[
<p>I found several libraries that simply didn't implement the check, but none that implemented in incorrectly in the same way as the vulnerability discussed above.<p>If you didn't receive an email from me, either your implementation isn't listed on <a href="https://ianix.com/pub/ed25519-deployment.html" rel="nofollow">https://ianix.com/pub/ed25519-deployment.html</a>, I somehow missed it, or you're safe.</p>
]]></description><pubDate>Tue, 30 Dec 2025 21:56:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46438491</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=46438491</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46438491</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "A Vulnerability in Libsodium"]]></title><description><![CDATA[
<p>From the article:<p><pre><code>  If libsodium is useful to you, please keep in mind that it is maintained by one person, for free, in time I could spend with my family or on other projects. The best way to help the project would be to consider sponsoring it, which helps me dedicate more time to improving it and making it great for everyone, for many more years to come.
</code></pre>
The "sponsoring it" links to <a href="https://opencollective.com/libsodium/contribute" rel="nofollow">https://opencollective.com/libsodium/contribute</a><p>Hope that helps.</p>
]]></description><pubDate>Tue, 30 Dec 2025 21:47:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46438415</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=46438415</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46438415</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "A Vulnerability in Libsodium"]]></title><description><![CDATA[
<p>This also affected the PHP library, sodium_compat. <a href="https://github.com/FriendsOfPHP/security-advisories/pull/756" rel="nofollow">https://github.com/FriendsOfPHP/security-advisories/pull/756</a><p>I'm planning to spend my evening checking every other Ed25519 implementation I can find to see if this check is missing any where else in the open source ecosystem.</p>
]]></description><pubDate>Tue, 30 Dec 2025 19:15:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46436836</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=46436836</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46436836</guid></item><item><title><![CDATA[How we avoided side-channels in our new post-quantum Go cryptography libraries]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.trailofbits.com/2025/11/14/how-we-avoided-side-channels-in-our-new-post-quantum-go-cryptography-libraries/">https://blog.trailofbits.com/2025/11/14/how-we-avoided-side-channels-in-our-new-post-quantum-go-cryptography-libraries/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45927664">https://news.ycombinator.com/item?id=45927664</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 14 Nov 2025 15:23:35 +0000</pubDate><link>https://blog.trailofbits.com/2025/11/14/how-we-avoided-side-channels-in-our-new-post-quantum-go-cryptography-libraries/</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=45927664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45927664</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)"]]></title><description><![CDATA[
<p>Most people don't make their spam public, but I did when I ran this bounty program:<p><a href="https://hackerone.com/paragonie/hacktivity?type=team" rel="nofollow">https://hackerone.com/paragonie/hacktivity?type=team</a><p>The policy was immediate full disclosure, until people decided to flood us with racist memes. Those didn't get published.<p>Some notable stinkers:<p><a href="https://hackerone.com/reports/149369" rel="nofollow">https://hackerone.com/reports/149369</a><p><a href="https://hackerone.com/reports/244836" rel="nofollow">https://hackerone.com/reports/244836</a><p><a href="https://hackerone.com/reports/115271" rel="nofollow">https://hackerone.com/reports/115271</a><p><a href="https://hackerone.com/reports/180074" rel="nofollow">https://hackerone.com/reports/180074</a></p>
]]></description><pubDate>Wed, 22 Oct 2025 15:24:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=45670567</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=45670567</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45670567</guid></item><item><title><![CDATA[A WordPress Hard Fork Could Be Made Painless for Plugin/Theme Developers]]></title><description><![CDATA[
<p>Article URL: <a href="https://scottarc.blog/2024/10/14/a-wordpress-hard-fork-could-be-made-painless-for-plugin-theme-developers/">https://scottarc.blog/2024/10/14/a-wordpress-hard-fork-could-be-made-painless-for-plugin-theme-developers/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41843672">https://news.ycombinator.com/item?id=41843672</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 15 Oct 2024 00:21:56 +0000</pubDate><link>https://scottarc.blog/2024/10/14/a-wordpress-hard-fork-could-be-made-painless-for-plugin-theme-developers/</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=41843672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41843672</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "ACF has been hijacked"]]></title><description><![CDATA[
<p>It's just an Ed25519 signature of a file. The closest thing we have to runtime code-signing are Phar signatures. <a href="https://www.php.net/manual/en/phar.fileformat.signature.php" rel="nofollow">https://www.php.net/manual/en/phar.fileformat.signature.php</a></p>
]]></description><pubDate>Mon, 14 Oct 2024 07:19:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=41835054</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=41835054</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41835054</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "ACF has been hijacked"]]></title><description><![CDATA[
<p>While I appreciate the sentiment, I don't know that a hard fork is necessarily the right answer.<p><a href="https://scottarc.blog/2024/10/14/trust-rules-everything-around-me/" rel="nofollow">https://scottarc.blog/2024/10/14/trust-rules-everything-arou...</a></p>
]]></description><pubDate>Mon, 14 Oct 2024 07:19:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=41835053</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=41835053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41835053</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "ACF has been hijacked"]]></title><description><![CDATA[
<p>I'd been staying out of this conflict, partly because I'm not really <i>in the know</i> on WP Engine's behavior behind-the-scenes and, as weird as Mullenweg's plays have been, I don't like to comment on things I'm not fully read into.<p>But, this touches on a particular hobby horse of mine. It involves some old conflicts too, but I don't want to ruminate on them.<p>From about 2016 to 2019, I was heavily involved with trying to remedy what I considered an existential threat to the Internet: WordPress's auto-updater.<p><a href="https://core.trac.wordpress.org/ticket/25052" rel="nofollow">https://core.trac.wordpress.org/ticket/25052</a> + <a href="https://core.trac.wordpress.org/ticket/39309" rel="nofollow">https://core.trac.wordpress.org/ticket/39309</a><p>If that sounds alarming, consider the enormity of WordPress's market share. Millions of websites. W3Techs estimates it powers about 43% of websites whose server-side stack is detectable. At the time, it was a mere 33%.<p><a href="https://w3techs.com/technologies/overview/content_management" rel="nofollow">https://w3techs.com/technologies/overview/content_management</a><p>For the longest time, the auto-updater would pull an update file from WordPress.org, and then install it. There was no code-signing of any form until I got involved. So if you pop one server, you get access to potentially <i>millions</i>.<p>Now imagine all of those webservers conscripted into a DDoS botnet.<p>Thus, existential threat to the Internet.<p>Eventually, we solved the immediate risk and then got into discussing the long tail of getting theme and plugin updates signed too.<p><a href="https://paragonie.com/blog/2019/05/wordpress-5-2-mitigating-supply-chain-attacks-against-33-internet" rel="nofollow">https://paragonie.com/blog/2019/05/wordpress-5-2-mitigating-...</a><p><a href="https://core.trac.wordpress.org/ticket/49200" rel="nofollow">https://core.trac.wordpress.org/ticket/49200</a><p>You can read my ideas to solve this problem for WordPress (and the PHP ecosystem at large) here: <a href="https://gossamer.tools" rel="nofollow">https://gossamer.tools</a><p>Here's the part that delves into old drama: Mullenweg was so uncooperative that I wrote a critical piece called #StopMullware (a pun on "malware") due to his resistance to even commit to <i>solving the damn problem</i>. On my end, I reimplemented all of libsodium in pure PHP (and supported all the way back to 5.2.4 just to cater to WordPress's obsession with backwards compatibility to the lowest common denominator), and just needed them to be willing to review and accept patches. Even though I was shouldering as much of the work as I logically could, that wasn't enough for Matt. After he responded to my criticism, I took it down, since he committed in writing to actually solving the problem. (You can read his response at <a href="https://medium.com/@photomatt/wordpress-and-update-signing-51501213e1#.q1pfo5u7k" rel="nofollow">https://medium.com/@photomatt/wordpress-and-update-signing-5...</a> if you care to.)<p>The reason I'm bringing this old conflict up isn't to reopen old wounds. It's that this specific tactic that Mullenweg employed would have been <i>mitigated</i> by solving the supply chain risk that I was so incandescent about in 2016.<p>(If you read my proposals from that era, you'll notice that I cared <i>a lot</i> about the developers controlling their keys, not WordPress.)<p>I don't keep up-to-date on Internet drama, so maybe someone already raised this point elsewhere. I just find it remarkable that the unappreciated work for WordPress/PHP I did over the years is relevant to Mullenweg's current clusterfuck. Incredible.<p>Since my knowledge on the background noise that preceded this public conflict is pretty much nil, I have no reason to believe WP Engine hold any sort of moral high ground. And I don't really care either way.<p>Rather, I'd like to extend an open invitation: If anyone is serious about leading the community to fork off WordPress, as I've heard in recent weeks, I'm happy to talk at length about my ideas for security enhancements and technical debt collection. If nothing else comes of this, I'd like to minimize the amount of pain experienced by the community built around WordPress, even if its leadership is frustrating and selfish.</p>
]]></description><pubDate>Sun, 13 Oct 2024 06:32:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=41825692</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=41825692</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41825692</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "Quantum is unimportant to post-quantum"]]></title><description><![CDATA[
<p>> There is not any reason to NOT run hybrid cryptography schemes right now, when the use case allows for it.<p>This is reasonable, but runs contrary to the stance taken by CNSA 2.0.</p>
]]></description><pubDate>Tue, 02 Jul 2024 14:53:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=40857275</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40857275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40857275</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "Quantum is unimportant to post-quantum"]]></title><description><![CDATA[
<p>> All the criticism of cryptographic agility that I have seen has involved an attacker negotiating a downgrade to a broken protocol.<p>Consider this an additional data point, then: <a href="https://paragonie.com/blog/2019/10/against-agility-in-cryptography-protocols" rel="nofollow">https://paragonie.com/blog/2019/10/against-agility-in-crypto...</a><p>In the years since I wrote that, several people have pointed out that "versioned protocols" are just a <i>safe</i> form of "crypto agility". However, when people say "crypto agility', they usually mean something like what JWT does.<p>What JWT does is stupid, and has caused a lot of issues: <a href="https://www.howmanydayssinceajwtalgnonevuln.com/" rel="nofollow">https://www.howmanydayssinceajwtalgnonevuln.com/</a><p>If you want to use JWT securely, you have to go out of your way to do so: <a href="https://scottarc.blog/2023/09/06/how-to-write-a-secure-jwt-library-if-you-absolutely-must/" rel="nofollow">https://scottarc.blog/2023/09/06/how-to-write-a-secure-jwt-l...</a><p>> But if the protocol is not yet broken, then being agile isn't a concern, and if/when the protocol does become broken, then you can remove support for the broken protocol, which is what you'd be forced to do anyway, so a flexible approach just seems like a more gradual way to achieve that future transition.<p>This makes sense in situations where you have versioned protocols :)<p>This doesn't work if you're required to support RSA with PKCS1v1.5 padding until the heat death of the universe.</p>
]]></description><pubDate>Mon, 01 Jul 2024 17:23:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=40848004</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40848004</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40848004</guid></item><item><title><![CDATA[Attacking NIST SP 800-108 (Loss of Key Control Security)]]></title><description><![CDATA[
<p>Article URL: <a href="https://scottarc.blog/2024/06/04/attacking-nist-sp-800-108/">https://scottarc.blog/2024/06/04/attacking-nist-sp-800-108/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40601356">https://news.ycombinator.com/item?id=40601356</a></p>
<p>Points: 42</p>
<p># Comments: 3</p>
]]></description><pubDate>Thu, 06 Jun 2024 19:25:24 +0000</pubDate><link>https://scottarc.blog/2024/06/04/attacking-nist-sp-800-108/</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40601356</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40601356</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "Encryption at Rest: Whose Threat Model Is It Anyway?"]]></title><description><![CDATA[
<p>Thanks for the feedback. I'll add a note after that section to make sure it's referenced appropriately.<p>And especially thanks for taking the time to share your experiences and observations with me. That's how I improve as a writer.</p>
]]></description><pubDate>Wed, 05 Jun 2024 14:52:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=40585557</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40585557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40585557</guid></item><item><title><![CDATA[Attacking NIST SP 800-108 (Loss of Key Control Security)]]></title><description><![CDATA[
<p>Article URL: <a href="https://scottarc.blog/2024/06/04/attacking-nist-sp-800-108/">https://scottarc.blog/2024/06/04/attacking-nist-sp-800-108/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40583793">https://news.ycombinator.com/item?id=40583793</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 05 Jun 2024 11:50:46 +0000</pubDate><link>https://scottarc.blog/2024/06/04/attacking-nist-sp-800-108/</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40583793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40583793</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "Encryption at Rest: Whose Threat Model Is It Anyway?"]]></title><description><![CDATA[
<p>>  A lot of posters here are fixating too much on the "stolen hard disk" picture which I think the article addressed by declaring it out of scope. So the real points aren't getting through.<p>This <i>is</i> a crypto nerd blog post though. The whole point is to talk about cryptographic library design!</p>
]]></description><pubDate>Wed, 05 Jun 2024 08:17:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=40582585</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40582585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40582585</guid></item><item><title><![CDATA[New comment by CiPHPerCoder in "Encryption at Rest: Whose Threat Model Is It Anyway?"]]></title><description><![CDATA[
<p>Sure, that's why I addressed the government in the immediate statement that followed the thing you quoted.</p>
]]></description><pubDate>Wed, 05 Jun 2024 08:15:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=40582574</link><dc:creator>CiPHPerCoder</dc:creator><comments>https://news.ycombinator.com/item?id=40582574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40582574</guid></item></channel></rss>