<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ENOTTY</title><link>https://news.ycombinator.com/user?id=ENOTTY</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 02:09:26 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ENOTTY" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ENOTTY in "Intel, TSMC tentatively agree to form chipmaking joint venture"]]></title><description><![CDATA[
<p>This kind of government-encouraged or mandated joint venture is barely different from what China does. To be quite honest, for stuff like silicon manufacturing, it's probably a good idea.</p>
]]></description><pubDate>Fri, 04 Apr 2025 04:52:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=43578450</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=43578450</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43578450</guid></item><item><title><![CDATA[New comment by ENOTTY in "French scientist denied entry into the U.S., French government says"]]></title><description><![CDATA[
<p>Why would you absolve POTUS when it's clear his administration's policies created the environment that enables CBP officers to take this liberty?<p>Additionally, the CBP spokesperson[1] defended the action, and despite reporters asking questions, the administration has done nothing to walk back the action or apologize. All signs point to the administration being very okay with stuff like this happening.<p>[1]: This might not be widely known, but one of the first actions that happens on inauguration day is the replacement of US government agency spokespersons with new political appointees. One of the powers of the executive branch is the bully pulpit and smart administrations seek to use it from day one.</p>
]]></description><pubDate>Thu, 20 Mar 2025 18:20:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=43426936</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=43426936</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43426936</guid></item><item><title><![CDATA[New comment by ENOTTY in "Teen on Musk's DOGE team graduated from 'The Com'"]]></title><description><![CDATA[
<p>I don't think you're going to find any on-he-record first person testimony. It's going to be unnamed government officials, or front-line government employees who are talking to reporters and providing information without direct attribution</p>
]]></description><pubDate>Mon, 10 Feb 2025 15:04:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=43001117</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=43001117</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43001117</guid></item><item><title><![CDATA[New comment by ENOTTY in "Portspoof: Emulate a valid service on all 65535 TCP ports"]]></title><description><![CDATA[
<p>To speed up a comprehensive port probe with service discovery, one could use a few different systems on different IPs and divide the work.</p>
]]></description><pubDate>Thu, 26 Dec 2024 03:42:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=42512971</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=42512971</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42512971</guid></item><item><title><![CDATA[New comment by ENOTTY in "Where have all the sacked tech workers gone?"]]></title><description><![CDATA[
<p>Still on severance and chilling out maybe?</p>
]]></description><pubDate>Tue, 28 Mar 2023 17:18:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=35344518</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=35344518</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35344518</guid></item><item><title><![CDATA[New comment by ENOTTY in "How to make sense of intelligence leaks"]]></title><description><![CDATA[
<p>Per the article:<p>> In 1964 Sherman Kent, a cia analyst, coined the phrase “words of estimative probability”.<p>So that must have been even before Carter</p>
]]></description><pubDate>Sat, 11 Mar 2023 20:59:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=35112637</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=35112637</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35112637</guid></item><item><title><![CDATA[New comment by ENOTTY in "How to make sense of intelligence leaks"]]></title><description><![CDATA[
<p>This is a very useful article if you want to understand the technical language used by the UK and US intelligence communities, which is often parroted by the media reporting on topics using sources that leak intelligence from those communities. This language has been standardized within their respective communities so that all parties involved (from the President to the lowliest analyst) should be  on the same page with respect to the intelligence.<p>According to the article there are two measures:<p>- a probabilistic measurement and associated language, which speaks to the assessed likelihood of an event occurring<p>- a confidence measurement and associated language, which speaks to the assessed quality of the source(s) of the intelligence</p>
]]></description><pubDate>Fri, 10 Mar 2023 09:45:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=35092449</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=35092449</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35092449</guid></item><item><title><![CDATA[New comment by ENOTTY in "China has a lead over the US in 37 out of 44 critical technologies"]]></title><description><![CDATA[
<p>This list seems weird. Advanced aircraft engines? The latest homegrown Chinese airliner (Comac C919) uses western LEAP engines.</p>
]]></description><pubDate>Fri, 03 Mar 2023 12:43:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=35008805</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=35008805</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35008805</guid></item><item><title><![CDATA[New comment by ENOTTY in "Amazon packages burn in India, final stop in broken recycling system"]]></title><description><![CDATA[
<p>> Laurie Smyla, a 73-year-old retiree from Sloatsburg, New York [...] Smyla has a degree in environmental science and even served as coordinator for the local recycling program in the late 1980s, as she explains when reached by phone. She was able to quickly identify the envelope as polyethylene, the most common type of plastic.<p>I gotta wonder, how many people did the reporters have to contact before finding the perfect subject to put a human angle on this part of the story. Kudos to them for doing the legwork</p>
]]></description><pubDate>Tue, 27 Dec 2022 20:51:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=34153624</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=34153624</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34153624</guid></item><item><title><![CDATA[New comment by ENOTTY in "Signal Introduces Stories"]]></title><description><![CDATA[
<p>The phone contact list becoming the root of trust for defining personal trust relationships is rather unwelcome. Then software taking that data and wordlessly interpreting it as a binary trust/do-not-trust decision is also unwelcome.<p>If I am networking at a conference, I frequently exchange contact info by entering info into each others' contact app or sending each other a text. I'm sure I'm not the only one to do this.<p>It's one thing to tell two users that both parties are using Signal and in each other's contact list (contact discovery). It's another thing to encourage users to broadcast messages to all of them (via Stories, and the default share setting is all contacts)<p>In summary, while I'm neutral on the Stories feature, I think the implementation/rollout has been clumsy.</p>
]]></description><pubDate>Mon, 07 Nov 2022 21:50:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=33513045</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=33513045</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33513045</guid></item><item><title><![CDATA[New comment by ENOTTY in "Gmail 2FA causes the homeless to permanently lose access 3 times a year"]]></title><description><![CDATA[
<p>This might not be a problem that matters to the Google bean counters, but it would be a problem that a responsible, moral, and just company would solve.</p>
]]></description><pubDate>Fri, 07 Oct 2022 15:14:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=33122461</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=33122461</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33122461</guid></item><item><title><![CDATA[New comment by ENOTTY in "Feds seized $311M in Bitcoin, then hacker stole it back"]]></title><description><![CDATA[
<p>Imagine getting done in by your own Google Glass.</p>
]]></description><pubDate>Tue, 04 Oct 2022 23:41:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=33088759</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=33088759</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33088759</guid></item><item><title><![CDATA[New comment by ENOTTY in "SQLite: QEMU All over Again?"]]></title><description><![CDATA[
<p>Frankly, as someone more interested in emulation than virtualization, I have been occasionally unhappy that most of the energy behind QEMU goes to virtualization. Some of the things QEMU has done to better adapt to virtualization do not translate well to the emulation use case.</p>
]]></description><pubDate>Tue, 04 Oct 2022 21:02:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=33086819</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=33086819</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33086819</guid></item><item><title><![CDATA[New comment by ENOTTY in "Chess Investigation Finds U.S. Grandmaster ‘Likely Cheated’ More Than 100 Times"]]></title><description><![CDATA[
<p>In case you’re looking for whether this says anything about the butt plug allegations, this report does not. It only concerns cheating on an online platform, not in person cheating</p>
]]></description><pubDate>Tue, 04 Oct 2022 20:44:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=33086541</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=33086541</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33086541</guid></item><item><title><![CDATA[New comment by ENOTTY in "Patagonia founder gives away the company"]]></title><description><![CDATA[
<p>I'm curious about the ownership, profits, and dividends to ownership for a private company. Obviously, details on this are not easy to come by. It seems like Patagonia is self-sustaining from a cash flow perspective.<p>So Patagonia is 50 years old and did an estimated $1.5 billion in revenues in 2022 (according to Wikipedia). From the article, it seems like Yvon, his wife, and his two children held both ownership and control. It might even have been 100% within the family, given that NYT explicitly writes that, "the family irrevocably transferred all the company’s voting stock, equivalent to 2 percent of the overall shares" and "The Chouinards then donated the other 98 percent of Patagonia"<p>I wonder how much of the company's profits over the years were reinvested back into the company and how much went to Yvon and the other Chouinards. Seems like most or all of his wealth derives from Patagonia and he lives modestly but comfortably.<p>EDIT: Even at a 1% profit margin, at $1.5 billion, that's still $15 million.</p>
]]></description><pubDate>Wed, 14 Sep 2022 21:16:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=32843454</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=32843454</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32843454</guid></item><item><title><![CDATA[New comment by ENOTTY in "OnlyFans bribed Meta to put porn stars on terror watchlist: lawsuits"]]></title><description><![CDATA[
<p>I suppose this is the dual to the OnlyFans creator who slept with Meta employees to get unbanned <a href="https://news.ycombinator.com/item?id=31447396" rel="nofollow">https://news.ycombinator.com/item?id=31447396</a><p>I think the takeaway from both of these stories is that Meta employees are easily bribed and perhaps some more internal controls are needed to prevent abuse of these platform features.</p>
]]></description><pubDate>Wed, 10 Aug 2022 23:36:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=32419817</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=32419817</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32419817</guid></item><item><title><![CDATA[New comment by ENOTTY in "Cellular recovery after prolonged warm ischaemia of the whole body"]]></title><description><![CDATA[
<p>Here's an article written for more of a layperson's audience. <a href="https://www.nature.com/articles/d41586-022-02112-0" rel="nofollow">https://www.nature.com/articles/d41586-022-02112-0</a></p>
]]></description><pubDate>Mon, 08 Aug 2022 02:58:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=32382045</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=32382045</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32382045</guid></item><item><title><![CDATA[New comment by ENOTTY in "NIST announces first PQC algoritms to be standardized"]]></title><description><![CDATA[
<p>What's up with this?<p>> In addition, NIST has engaged with third parties that own various patents directed to cryptography, and NIST acknowledges cooperation of ISARA, Philippe Gaborit, Carlos Aguilar Melchor, the laboratory XLIM, the French National Center for Scientific Research (CNRS), the University of Limoges, and Dr. Jintai Ding. NIST and these third parties are finalizing agreements such that the patents owned by the third parties will not be asserted against implementers (or end-users) of a standard for the selected cryptographic algorithm<p>and<p>> NIST expects to execute the various agreements prior to publishing the standard. If the agreements are not executed by the end of 2022, NIST may consider selecting NTRU instead of KYBER. NTRU was proposed in 1996, and U.S. patents were dedicated to the public in 2007.</p>
]]></description><pubDate>Tue, 05 Jul 2022 17:45:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=31991354</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=31991354</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31991354</guid></item><item><title><![CDATA[New comment by ENOTTY in "MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips"]]></title><description><![CDATA[
<p>Hahaha thank you. I am humbled by your praise</p>
]]></description><pubDate>Sat, 11 Jun 2022 02:33:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=31701453</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=31701453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31701453</guid></item><item><title><![CDATA[New comment by ENOTTY in "MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips"]]></title><description><![CDATA[
<p>Having grokked the abstract, I feel like can speculate a bit as to what is going on. Take this with a grain of salt; I have no clue what has actually been discovered.<p>I believe that the researchers have found a way to remove PAC as a barrier to exploitation by disclosing PAC verification results via speculative execution. This is only useful to attackers going after a target that uses PAC, and those attackers will need to have another vulnerability that enables them to hijack control-flow through modifying pointers to code that are located in memory.<p>The attackers can use this new Pacman vulnerability as a crash-free oracle that says whether their forged pointer worked, and once they find a working one, they can use that to hijack control flow.<p>PAC (or Pointer Authentication) is a security feature found in recent iPhones, the Apple Silicon Macs, and the Graviton3. It is intended as a defense against control-flow hijacks. It works by signing pointers found in memory with one of five keys that are known only to the processor. Before the pointer is used, the processor should be instructed to "authenticate" the pointer by checking the pointer's signature using its private keys. To prevent simple reuse of one authenticated pointer used in one place to a pointer used in another place in the program, code can provide a "context" value to be used during the authentication.<p>A great resource for learning about PAC and its usage in the Apple platforms is at [1] (it links to other resources) and if you want to play with a PAC enabled binary, check out [2]<p>[1]: <a href="https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html?m=1" rel="nofollow">https://googleprojectzero.blogspot.com/2019/02/examining-poi...</a><p>[2]: <a href="https://blog.ret2.io/2021/06/16/intro-to-pac-arm64/" rel="nofollow">https://blog.ret2.io/2021/06/16/intro-to-pac-arm64/</a><p>EDIT: The attack works by:<p>1) Place your guess such that it is used as the pointer input to an authentication instruction<p>2) Causing a branch misprediction. On the not-taken side of the branch, code needs to perform a pointer authentication and usage of the pointer. On the taken side of the branch, code should not crash.<p>3) CPU speculatively executes down the not-taken side of the branch (misprediction) and speculatively executes the authentication instruction.<p>4) If your guess is correct, the authentication instruction will return a valid pointer. If your guess is incorrect, the authentication instruction returns a pointer that, if dereferenced, will cause an exception.<p>5) CPU speculatively executes a load (in the case of a data pointer) or an instruction fetch (in the case of a code pointer) on the pointer value.<p>6) If the pointer is valid, the address translation for that pointer will appear in the TLB. If the pointer is not valid, it will not (because of the exception).<p>7) All of the effects from this mispredicted branch get squashed when the CPU realizes that the branch is not taken. No exception is actually thrown!<p>8) Measure the TLB entries to determine whether the speculative address translation made it in. If it is present, you know that the guess is correct.<p>9) Repeat, up to 2^16 times.</p>
]]></description><pubDate>Fri, 10 Jun 2022 14:47:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=31694974</link><dc:creator>ENOTTY</dc:creator><comments>https://news.ycombinator.com/item?id=31694974</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31694974</guid></item></channel></rss>