<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: DanielDent</title><link>https://news.ycombinator.com/user?id=DanielDent</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 20:09:20 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=DanielDent" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by DanielDent in "Highly Vaccinated Israel Is Seeing a Dramatic Surge in New Covid Cases"]]></title><description><![CDATA[
<p>Here's a very quick summary of what I linked above: In Israel it would be easy to look at the data and conclude that vaccines are providing ~67% efficacy against severe disease/death.<p>But, once the data is broken down into buckets that help address confounding variables (i.e. different vaccination rates among different age groups), things look very different. All of a sudden efficacy numbers are looking better than 90% for a lot of people.<p>This will similarly matter a great deal as people try to figure out how long vaccines provide protection. The groups that got vaccinated the earliest in many places were older people and health care workers -- groups which start out at higher risk, and also have a higher probability of less effective immune response to vaccines (older people).<p>As a result of that, it will be easy for analysts that don't consider that issue to under-estimate the effective time period of vaccines.<p>The archive.is link you provided isn't working for me at the moment, but to address your statement in the context of the above framework:<p>The group of people most likely to have been infected with the virus are <i>not</i> the same as the group of people most likely to have antibodies as a result of immunization. In many places, there are a lot more younger people who have gotten infected with the disease than older people. There are other socioeconomic and behavioural differences too.<p>Given that young people tend to have a more effective immune responses to begin with, and given that they have been shown to have better outcomes after being infected with this virus, it's easy to see a way to incorrectly conclude that stronger immunity results from infection-acquired antibodies, even if the opposite may be true.<p>In short: Apparent differences may be better explained by the fact that it's a different group of people who have been infected vs those who have not been infected.</p>
]]></description><pubDate>Sat, 21 Aug 2021 23:25:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=28261491</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=28261491</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28261491</guid></item><item><title><![CDATA[New comment by DanielDent in "Highly Vaccinated Israel Is Seeing a Dramatic Surge in New Covid Cases"]]></title><description><![CDATA[
<p>Things that matter a lot these days:<p><a href="https://en.wikipedia.org/wiki/Base_rate_fallacy" rel="nofollow">https://en.wikipedia.org/wiki/Base_rate_fallacy</a><p><a href="https://en.wikipedia.org/wiki/Simpson%27s_paradox" rel="nofollow">https://en.wikipedia.org/wiki/Simpson%27s_paradox</a><p>Someone that's done some analysis using the above mental models: <a href="https://www.covid-datascience.com/post/israeli-data-how-can-efficacy-vs-severe-disease-be-strong-when-60-of-hospitalized-are-vaccinated" rel="nofollow">https://www.covid-datascience.com/post/israeli-data-how-can-...</a></p>
]]></description><pubDate>Sat, 21 Aug 2021 23:08:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=28261374</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=28261374</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28261374</guid></item><item><title><![CDATA[New comment by DanielDent in "Goodbye Freenode"]]></title><description><![CDATA[
<p>For a little bit of ancient history: I was one of the admins who worked to create OFTC. We all knew each other from Open Projects Network (which rebranded as Freenode).<p>I was barely in high school when I came up with the name OFTC and I registered OFTC.net. Very early on in the process of creating OFTC, I agreed with all of the people I was creating OFTC with that I would behave as caretaker rather than owner of OFTC.net while we figured out our governance.<p>Ultimately we came up with a governance model, and we also managed to convince Software in the Public Interest to take custody of the domain name and have it managed in accordance with the governance model we designed.<p>We started with a pretty great group of both capable and well-intended people, and one of the things we figured out was that if OFTC was going to be a sustainable project, it needed more sustainable governance than the project we were leaving.<p>One of the key people behind the very early push for OFTC to have a stable governance model later became a Member of Parliament here in Canada.</p>
]]></description><pubDate>Sun, 13 Jun 2021 17:36:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=27494471</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=27494471</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27494471</guid></item><item><title><![CDATA[New comment by DanielDent in "Tales of Favicons and Caches: Persistent Tracking in Modern Browsers [pdf]"]]></title><description><![CDATA[
<p>This paper references <a href="https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04B-4_Klein_paper.pdf" rel="nofollow">https://www.ndss-symposium.org/wp-content/uploads/2019/02/nd...</a><p>They in turn reference my 2015 take on this: <a href="http://dnscookie.com/" rel="nofollow">http://dnscookie.com/</a><p>With homage Moxie's Cryptographic Doom Principle, I propose the Cache Doom Principle: If a system's behaviour can be influenced by a cache, eventually someone will figure out a way to use that cache to leak data.</p>
]]></description><pubDate>Fri, 22 Jan 2021 20:35:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=25876033</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=25876033</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25876033</guid></item><item><title><![CDATA[Prepare Android Apps for ISRG Let’s Encrypt Expiry of IdenTrust Cross-Signature]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.danieldent.com/blog/android-apps-lets-encrypt-dst-root-expiry/">https://www.danieldent.com/blog/android-apps-lets-encrypt-dst-root-expiry/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=25108956">https://news.ycombinator.com/item?id=25108956</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 16 Nov 2020 07:05:15 +0000</pubDate><link>https://www.danieldent.com/blog/android-apps-lets-encrypt-dst-root-expiry/</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=25108956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25108956</guid></item><item><title><![CDATA[New comment by DanielDent in "Standing on our own two feet"]]></title><description><![CDATA[
<p>I think a fairly manageable path forward is underway which makes this a smaller issue than it first seems:<p>(1) Firefox already uses its own root store<p>(2) App developers can include additional roots in addition to the system root store: <a href="https://developer.android.com/training/articles/security-config" rel="nofollow">https://developer.android.com/training/articles/security-con...</a><p>(3) Chrome is migrating to using it's own store: "Historically, Chrome has integrated with the Root Store provided by the platform on which it is running. Chrome is in the process of transitioning certificate verification to use a common implementation on all platforms where it's under application control, namely Android, Chrome OS, Linux, Windows, and macOS. Apple policies prevent the Chrome Root Store and verifier from being used on Chrome for iOS."<p><a href="https://www.chromium.org/Home/chromium-security/root-ca-policy" rel="nofollow">https://www.chromium.org/Home/chromium-security/root-ca-poli...</a></p>
]]></description><pubDate>Fri, 06 Nov 2020 19:57:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=25010586</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=25010586</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25010586</guid></item><item><title><![CDATA[New comment by DanielDent in "DigitalOcean Container Registry Now GA"]]></title><description><![CDATA[
<p>There's a really big gap between the $0.01/gb you are talking about being charged on droplets and the $0.10/gb that DigitalOcean is using on newer offerings like this and "App Platform".<p><a href="https://www.digitalocean.com/docs/container-registry/" rel="nofollow">https://www.digitalocean.com/docs/container-registry/</a> - "In the future, each plan will have a bandwidth allowance and additional outbound data transfer (from the registry to the internet) will be $0.10/GiB."<p>The fact that somebody could put a caching proxy in front of the container registry -- on a droplet also hosted at DigitalOcean -- and have their bandwidth costs fall 10x for doing that does indeed provide further illustration of the absurdity of DigitalOcean's new approach to bandwidth pricing.</p>
]]></description><pubDate>Wed, 04 Nov 2020 06:11:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=24986726</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=24986726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24986726</guid></item><item><title><![CDATA[New comment by DanielDent in "DigitalOcean Container Registry Now GA"]]></title><description><![CDATA[
<p>There are many CDNs that make money charging < $0.01/gb.<p>Indeed DigitalOcean themselves built their place in the market by charging $0.01/gb for bandwidth. How do we reasonably get to $0.10 as is the case here?<p>If it were really that expensive for them they could outsource it to a CDN for well under $0.01/gb at their scale, which would leave them the ability to get margin. But all of this pricing is in fact completely detached from the underlying physical realities -- they are charging these prices because they think they can get away with it, not because they need to do so to cover costs and have some margin.<p>Bandwidth prices shouldn't be going up, indeed they should be going down. 100 gigabit interconnects are a thing now.</p>
]]></description><pubDate>Tue, 03 Nov 2020 22:09:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=24984586</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=24984586</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24984586</guid></item><item><title><![CDATA[New comment by DanielDent in "DigitalOcean Container Registry Now GA"]]></title><description><![CDATA[
<p><i>sigh</i>. DigitalOcean continues their march towards irrelevance.<p>First it was the app platform and now this. Gouging us at $0.10/gigabyte bandwidth charges makes us: (1) think less of you, and (2) adds a bunch of cognitive complexity & work to developers' lives.<p>If this is how it's going to be we may as well just use AWS or move on to one of your competitors that isn't trying to pretend that bandwidth is expensive. It isn't, and there isn't any reason we should have to design applications around artificially absurdly inflated costs.<p>Even Oracle pretends to understand this. _ORACLE_ are the ones trying to make the case that they aren't only about having hostages/locked in customers.<p>When Oracle is beating you on this metric you've <i>really</i> jumped the shark.</p>
]]></description><pubDate>Tue, 03 Nov 2020 19:31:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=24983078</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=24983078</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24983078</guid></item><item><title><![CDATA[Amazon S3 Path Deprecation Plan (Sept 30, 2020 bucket creation deadline) (2019)]]></title><description><![CDATA[
<p>Article URL: <a href="https://aws.amazon.com/blogs/aws/amazon-s3-path-deprecation-plan-the-rest-of-the-story/">https://aws.amazon.com/blogs/aws/amazon-s3-path-deprecation-plan-the-rest-of-the-story/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=24454987">https://news.ycombinator.com/item?id=24454987</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 12 Sep 2020 19:44:32 +0000</pubDate><link>https://aws.amazon.com/blogs/aws/amazon-s3-path-deprecation-plan-the-rest-of-the-story/</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=24454987</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24454987</guid></item><item><title><![CDATA[New comment by DanielDent in "AWS Controllers for Kubernetes"]]></title><description><![CDATA[
<p>What this describes is a mechanism for k8s to delete underlying resources prior to removing them from k8s.<p>E.g. before completely removing the CRD representing an S3 bucket, this provides a mechanism for that S3 bucket to be deleted from AWS systems.<p>Which I think is the opposite of what you were hoping.</p>
]]></description><pubDate>Tue, 25 Aug 2020 21:09:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=24276140</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=24276140</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24276140</guid></item><item><title><![CDATA[New comment by DanielDent in "The Passport Payment (2000)"]]></title><description><![CDATA[
<p>The .com zone file is updated every few minutes. Caching behaviours will vary significantly. Frequently a significant fraction of traffic can be using new nameservers within minutes, with a long tail of traffic with older information.<p>Each TLD does their own thing. For example, last time I checked, .ca only seemed to be serving a new zone file every few hours. How long new nameservers take will depend on your luck in terms of where you are in their refresh cycle.</p>
]]></description><pubDate>Sun, 19 Jul 2020 19:53:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=23891980</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=23891980</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23891980</guid></item><item><title><![CDATA[New comment by DanielDent in "The Passport Payment (2000)"]]></title><description><![CDATA[
<p>It used to be that nameserver changes with TLDs were measured in days, not minutes. Even today some TLDs continue to operate this way.</p>
]]></description><pubDate>Sun, 19 Jul 2020 10:24:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=23888365</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=23888365</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23888365</guid></item><item><title><![CDATA[New comment by DanielDent in "DNS Cookies – Identify Related Network Flows"]]></title><description><![CDATA[
<p>I appreciate the compliment, but sadly I haven't yet made the time to write much on the subject. There's a lot I'd like to see implemented.</p>
]]></description><pubDate>Wed, 19 Jun 2019 09:36:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221991</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221991</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221991</guid></item><item><title><![CDATA[New comment by DanielDent in "DNS Cookies – Identify Related Network Flows"]]></title><description><![CDATA[
<p>It would be difficult to differentiate between responses that vary due to load balancing and responses that vary due to active fingerprinting.<p>Even when a site only has a single physical location, load balancing might be done in part by having DNS randomly return one of many valid IP addresses. E.g. this is a behaviour supported by Amazon's Route53.<p>Larger sites frequently use a combination of anycast and DNS based routing to get packets to the closest POP. This introduces both (1) difficulty identifying when fingerprinting is occurring, and (2) still more opportunities for fingerprinting.<p>Most users will find it impossible to control which POP their packets get routed towards. For someone doing fingerprinting, it could be a very useful signal.</p>
]]></description><pubDate>Wed, 19 Jun 2019 09:02:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221841</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221841</guid></item><item><title><![CDATA[New comment by DanielDent in "DNS Cookies – Identify Related Network Flows"]]></title><description><![CDATA[
<p>This would make it harder to build a fingerprint, especially if responses were sampled from a number of independent sources.<p>The next logical step in the arms race would likely involve fingerprinting systems using more bits than strictly necessary, and using error correcting codes - i.e. treat the sampling as "noise" to be overcome.<p>It seems both more straightforward and more effective to build recursion paths that you can trust aren't doing any intentional or unintentional caching.<p>This of course means the performance benefits of caching go away. This has been a theme in computing lately (i.e. CPU speculative execution leaks such as meltdown).<p>A recursor could be built which only uses each query response once, with prefetching used to reduce the performance impact.<p>However, the mere fact prefetched responses exist would also leak data.</p>
]]></description><pubDate>Wed, 19 Jun 2019 08:38:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221732</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221732</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221732</guid></item><item><title><![CDATA[New comment by DanielDent in "DNS Cookies – Identify Related Network Flows"]]></title><description><![CDATA[
<p>Third party DNS servers are helpful in one sense - you can share your state with other users.<p>Turning off EDNS with your own recursor won't really make much difference. Limiting the maximum cache length will help, but will also eliminate much of the benefit of having a local recursor.<p>The other issue with running your own recursor is nasty networks will transparently proxy DNS and you can end up using a cache you don't even know exists.<p>DNSCurve, DNSCrypt, and DNS-over-HTTPS solve one set of problems while introducing different ones.</p>
]]></description><pubDate>Wed, 19 Jun 2019 08:30:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221703</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221703</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221703</guid></item><item><title><![CDATA[New comment by DanielDent in "Clojerl – Clojure for the Erlang VM"]]></title><description><![CDATA[
<p>I doubt this is quite what you are looking for, but <a href="https://github.com/fazibear/export" rel="nofollow">https://github.com/fazibear/export</a> provides simple Elixir/Python interop.</p>
]]></description><pubDate>Wed, 19 Jun 2019 06:44:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221303</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221303</guid></item><item><title><![CDATA[New comment by DanielDent in "DNS Cookies – Identify Related Network Flows"]]></title><description><![CDATA[
<p>- Never allow any part of the computing systems you use to cache anything.<p>- Insist that everything in your life exist in a state of being functionally pure & stateless.<p>- Eliminate access to all sources of timing data.<p>- Make sure that all tasks are completed in a pre-determined fixed amount of time regardless of resource contention.<p>There are so many different side channel attacks, and the computing primitives & API choices we have been making for years make it challenging to build secure systems.<p>Caches are very deeply embedded in the culture of how computing is done. Making tasks take longer than strictly necessary to avoid leaking information goes against our instincts to optimize system performance.<p>It's going to take a lot of work and cost a lot of money to get software to a point where we aren't playing whack-a-mole with side channels.<p>More pragmatically, the current implementation of this technique can be dealt with by being very conscious of how much data your DNS resolver(s) are leaking & being conscious of how large the anonymity set is of the userbase of your DNS resolver(s).<p>If you limit DNS cache times and use blinding computation techniques to limit the identity information your DNS resolver has or retains about you, then DNS cookies can be largely mitigated. If you have faith that 1.1.1.1 is operated in the manner that Cloudflare claims, the measures they have taken go a long way to making DNS cookies unusable.<p>I also pointed out some additional specific mitigations when I reported this issue to the Chromium team in October 2015:<p><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=546733" rel="nofollow">https://bugs.chromium.org/p/chromium/issues/detail?id=546733</a></p>
]]></description><pubDate>Wed, 19 Jun 2019 06:01:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221152</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221152</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221152</guid></item><item><title><![CDATA[New comment by DanielDent in "DNS Cookies – Identify Related Network Flows"]]></title><description><![CDATA[
<p>It's fun when you check the front page of HN and see your work :).</p>
]]></description><pubDate>Wed, 19 Jun 2019 05:27:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=20221019</link><dc:creator>DanielDent</dc:creator><comments>https://news.ycombinator.com/item?id=20221019</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20221019</guid></item></channel></rss>