<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: MattJ100</title><link>https://news.ycombinator.com/user?id=MattJ100</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 10:12:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=MattJ100" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by MattJ100 in "The West forgot how to make things, now it’s forgetting how to code"]]></title><description><![CDATA[
<p>We see this in our open-source community. We've had a community channel for over two decades, where community members help newcomers and each other solve problems and answer questions.<p>Increasingly we have people join who tell us they've been struggling with a problem "for days". Per routine, we ask for their configuration, and it turns out they've been asking ChatGPT, Claude or some other LLM for assistance and their configuration is a total mess.<p>Something about this feels really broken, when a channel full of domain experts are willing to lend a hand (within reason) for free. But instead, people increasingly turn to the machines which are well-known to hallucinate. They just don't think it will hallucinate for them.<p>In fact I see this pattern a lot. People use LLMs for stuff within their domain of expertise, or just ask them questions about washing cars, and they laugh at how incompetent and illogical they are. Then, hours later, they will happily query ChatGPT for mortgage advice, or whatever. If they don't have the knowledge to verify it themselves then they seem more willing to believe it is accurate, where in fact they should be even more careful.</p>
]]></description><pubDate>Sun, 26 Apr 2026 10:07:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47909007</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47909007</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47909007</guid></item><item><title><![CDATA[New comment by MattJ100 in "It is incorrect to "normalize" // in HTTP URL paths"]]></title><description><![CDATA[
<p>URL parsing/normalisation/escaping/unescaping is a minefield. There are many edge cases where every implementation does things differently. This is a perfect example.<p>It gets worse if you are mapping URLs to a filesystem (e.g. for serving files). Even though they look similar, URL paths have different capabilities and rules than filesystems, and different filesystems also vary. This is also an example of that (I don't think most filesystems support empty directory names).</p>
]]></description><pubDate>Sat, 18 Apr 2026 07:59:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47814083</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47814083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47814083</guid></item><item><title><![CDATA[New comment by MattJ100 in "ChatGPT won't let you type until Cloudflare reads your React state"]]></title><description><![CDATA[
<p>Yes, it is. The worst offenders hammer us (and others) with thousands upon thousands of requests, and each request uses unique IP addresses making all per-IP limits useless.<p>We implemented an anti-bot challenge and it helped for a while. Then our server collapsed again recently. The perf command showed that the actual TLS handshakes inside nginx were using over 50% of our server's CPU, starving other stuff on the machine.<p>It's a DDoS.</p>
]]></description><pubDate>Mon, 30 Mar 2026 06:57:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47571250</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47571250</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47571250</guid></item><item><title><![CDATA[New comment by MattJ100 in "Running My Own XMPP Server"]]></title><description><![CDATA[
<p>Yes, definitely. To me, the idea of a chat server that doesn't federate is as absurd as setting up an email server that doesn't federate. I understand that <i>today</i> people know more contacts with email addresses than XMPP addresses, but if we ever want to free ourselves from the current walled gardens, we need to stop treating chat as something that only happens in walled gardens.<p>Some people get worried about the idea of "federation", thinking that it somehow means their server is less private, and their data is being spread across a mesh of servers, and stuff like that. That's true in some decentralized/distributed chat protocols, but not in XMPP. Connections between servers only happen on-demand, similar how when you send email between different email providers, they will connect to each other to deliver the messages.<p>However we do have a feature which allows disabling federation access for specific accounts, for example to prevent kids from communicating with anyone outside their own Snikket server. This is a feature I want to expand on, so that you can permit communication with a limited number of approved contacts on other servers.</p>
]]></description><pubDate>Tue, 17 Feb 2026 12:21:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47046728</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47046728</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47046728</guid></item><item><title><![CDATA[New comment by MattJ100 in "Running My Own XMPP Server"]]></title><description><![CDATA[
<p>You're welcome!<p>I'm still experimenting with the messaging on the Snikket website. However my general approach with the site was to pitch Snikket to people who don't know what XMPP is, which is, frankly, the majority of people. Instead, I wanted to focus on explaining features it enables rather than protocol details. But I'm aware it has caused a lot of head-scratching among people who already know Snikket uses XMPP :)<p>I see Snikket as kind of a gateway into the XMPP ecosystem for people who are unfamiliar with it. After all, if you're already familiar with XMPP then the chances are you'll probably be happier with Prosody or ejabberd, and you'll already have opinions about which clients you want to use (e.g. the upstreams of Snikket).</p>
]]></description><pubDate>Mon, 16 Feb 2026 20:01:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47039555</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47039555</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47039555</guid></item><item><title><![CDATA[New comment by MattJ100 in "Running My Own XMPP Server"]]></title><description><![CDATA[
<p>Yeah, iOS is definitely a weaker spot and we're aware of it. Monal is currently working on an overhaul of their UI (they have a grant allocated for it: <a href="https://nlnet.nl/project/Monal-IM-UI/" rel="nofollow">https://nlnet.nl/project/Monal-IM-UI/</a> ).<p>There is also a new app in the works between Cheogram and Snikket. There is a beta available, but it's still young (and we won't apply any Snikket branding until E2EE is complete).<p>Thanks for sharing your experience!</p>
]]></description><pubDate>Mon, 16 Feb 2026 17:07:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47037491</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47037491</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47037491</guid></item><item><title><![CDATA[New comment by MattJ100 in "Running My Own XMPP Server"]]></title><description><![CDATA[
<p>Be aware that this post has known issues that the author is not interested in fixing. In their own words (in response to clarifications by one of the OMEMO folk):<p>"I'll make an edit later about the protocol version thing, but I'm not interested in having questions answered. My entire horse in this race is for evangelists to f** off and leave me alone. That's it. That's all I want." [censorship of profanity mine]<p>You won't find this quote in the article with Ctrl+F, it's in the screenshot, where they omitted the original constructive comment by one of the OMEMO contributors that they chose to moderate, which you can find here: <a href="https://www.moparisthebest.com/tim-henkes-omemo-response.txt" rel="nofollow">https://www.moparisthebest.com/tim-henkes-omemo-response.txt</a><p>So, by all means, read the blog post. But just be aware that its ultimate goal was not to be an unbiased accurate technical article.</p>
]]></description><pubDate>Mon, 16 Feb 2026 17:02:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47037422</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47037422</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47037422</guid></item><item><title><![CDATA[New comment by MattJ100 in "Running My Own XMPP Server"]]></title><description><![CDATA[
<p>I'm the founder of both the Prosody and Snikket projects. Sorry about triggering alarms :) I can try to explain...<p>Prosody is a popular choice of XMPP server software. It's used for all kinds of stuff, from self-hosted chat servers to powering Jitsi Meet, to Internet-of-Things applications.<p>Prosody is extremely flexible, and has a bunch of configuration options that allow you to adapt it and extend it however you want. For some people, this is ideal. Those people should continue using Prosody.<p>Snikket has a different scope. It is <i>specifically</i> an answer to a question like "How can I easily make a self-hosted WhatsApp/Signal for my family/friends using open-source software?"<p>- Snikket contains Prosody, for the core chat part. But it's Prosody with a very specific configuration, and the configuration is part of the project, it's not intended to be modified by the person deploying Snikket. They only need to provide the domain name.<p>- Snikket also includes additional components that a modern chat service needs. For example, it includes a STUN/TURN server to ensure that audio/video calls work reliably (again, preconfigured).<p>- Snikket provides its own apps, which are tested and developed in sync with each other and with the server. This avoids the common problem of incompatibilities that occur when you have an open ecosystem such as XMPP, where different open-source project developers may develop features at different paces, leaving users to figure out which ones support which feature. It also solves the discoverability and decision fatigue for users (searching "Snikket" on an app store will get you an app that you know is compatible with your Snikket server, you don't have to go through a list of XMPP clients and figure out which one is suitable).<p>- Snikket servers are not designed to be open public servers (these are an administrative nightmare). Instead, your server is closed and private by default. As the admin, you choose who signs up to your server by sending invitation links. The invitations also serve to simplify the account setup process - no need to prompt users to "choose a server", etc. They just need to provide a username.<p>Projects such as Conversations differ by running a single public server (conversations.im) and guiding people to sign up on that server, or choose one of a long list of free public XMPP providers. In some cases that's all what you want. But onboarding a group of people that way is not fun (for example, they all have to share their addresses with the group add each other to their contact lists one-by-one - Snikket makes discovery of contacts within the same server automatic).<p>Beyond these things, Snikket is all open-source and XMPP. But there is a focus on making a good polished and secure "product", if you like, rather than supporting the entire diverse XMPP ecosystem which includes a range of software of varying quality (weekend projects and more recently, 100% vibe-coded clients). For example, Snikket servers require certain security and authentication features which some older codebases that have fallen far behind modern XMPP standards (think Pidgin, etc.) simply don't support today.<p>> it’s actually all based on prosody and conversations?<p>As mentioned, I develop Prosody. I also collaborate with the Conversations developer and other XMPP projects. There's nothing shady here. The goal is just to make a best-in-class XMPP project that solves one particular use case (and it was primarily my own use case to begin with of course - I wanted to move my family off WhatsApp).</p>
]]></description><pubDate>Mon, 16 Feb 2026 16:47:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47037214</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=47037214</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47037214</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>As the founder of both projects, explaining the difference between the two projects is roughly 20% of my working day (okay, not quite 20% but sometimes it feels that way).<p>Your description is great :)</p>
]]></description><pubDate>Tue, 10 Feb 2026 23:21:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46968469</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46968469</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46968469</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>You're not wrong. PKI has better protections against MITM, dialback has better protections against certificate leaks/misissuance.<p>I think the ideal approach would be combining both (as mentioned, there have been some experiments with that), except when e.g. DANE can be used ( <a href="https://prosody.im/doc/modules/mod_s2s_auth_dane_in" rel="nofollow">https://prosody.im/doc/modules/mod_s2s_auth_dane_in</a> ). But if DANE can be used, the whole CA thing is irrelevant anyway :)</p>
]]></description><pubDate>Tue, 10 Feb 2026 18:22:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46964376</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46964376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46964376</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>There is a lot of confusion caused by overlapping terminology in this issue.<p>By "client certificates" I mean (and generally take most others in this thread to mean) certificates which have been issues with the clientAuth key purpose defined in RFC 5280. This is the key purpose that Let's Encrypt will no longer be including in their certificates, and what this whole change is about.<p>However when one server connects to another server, all of TCP, TLS and the application code see the initiating party as a "client", which is distinct from say, an "XMPP client" which is an end-user application running on e.g. some laptop or phone.<p>The comment I was responding to clearly specified " I don't see how TLS-with-client-EKU [...]" which was more specific, however I used the more vague term "client certificates" to refer to the same thing in my response for brevity (thinking it would be clear from the context). Hope that clarifies things!</p>
]]></description><pubDate>Tue, 10 Feb 2026 17:16:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46963202</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46963202</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46963202</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Yeah, the resistance is outside the XMPP community. However we have a long history of working with internet standards, and it's disappointing to now be in an era where "the internet" has become just a synonym for "the web", and so many interesting protocols and ideas get pushed aside because of the focus on browsers, the web and HTTPS.</p>
]]></description><pubDate>Tue, 10 Feb 2026 09:26:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46957254</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46957254</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46957254</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>They weren't "HTTPS certificates" originally, just certificates. They may be "HTTPS certificates" today if you listen to some people. However there was never a line drawn where one day they weren't "HTTPS certificates" and the next day they were. The ecosystem was just gradually pushed in that direction because of the dominance of the browser vendors and the popularity of the web.<p>I put "HTTPS certificates" in quotes in this comment because it is not a technical term defined anywhere, just a concept that "these certificates should only be used for HTTPS". The core specifications talk about "TLS servers" and "TLS clients".</p>
]]></description><pubDate>Tue, 10 Feb 2026 08:27:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46956814</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46956814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46956814</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Firstly, nobody is actually calling for authentication using client certificates. We use "normal" server certificates and validate the usual way, the only difference is that such a certificate may be presented on the "client" side of a connection when the connection is between two servers.<p>The statement that dialback is generally more susceptible to MITM is based on the premise that it is easier to MITM a single victim XMPP server (e.g. hijack its DNS queries or install an intercepting proxy somewhere on the path between the two servers) than it is to do the same attack to Let's Encrypt, which has various additional protections such as performing verification from multiple vantage points, always using DNSSEC, etc.</p>
]]></description><pubDate>Tue, 10 Feb 2026 07:54:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46956619</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46956619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46956619</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Of these, (1) and (2) are already implemented in XMPP.<p>(1) just isn't that widely deployed due to low DNSSEC adoption and setup complexity, but there is a push to get server operators to use it if they can.<p>(2) is defined in RFC 7711: <a href="https://www.rfc-editor.org/rfc/rfc7711" rel="nofollow">https://www.rfc-editor.org/rfc/rfc7711</a> however it has more latency and complexity compared to just using a valid certificate directly in the XMPP connection's TLS handshake. Its main use is for XMPP hosting providers that don't have access to a domain's HTTPS.</p>
]]></description><pubDate>Tue, 10 Feb 2026 07:26:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46956439</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46956439</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46956439</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Yes, definitely. Prosody supports DANE, but DNSSEC deployment continues to be an issue when talking about the public XMPP network at large. Ironically the .im TLD our own site is on still doesn't support it at all.</p>
]]></description><pubDate>Tue, 10 Feb 2026 00:24:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=46953642</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46953642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46953642</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Sorry, it's late here and I guess I didn't word it well. Dialback (these days) always runs over a TLS-encrypted connection, as all servers enforce TLS.<p>The next question is how to authenticate the peer, and that can be done a few ways, usually either via the certificate PKI, via dialback, or something else (e.g. DNSSEC/DANE).<p>My comment about "combining dialback with TLS" was to say that we can use information from the TLS channel to help make the dialback authentication more secure (by adding extra constraints to the basic "present this magic string" that raw dialback authentication is based on).</p>
]]></description><pubDate>Tue, 10 Feb 2026 00:20:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46953609</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46953609</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46953609</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>> Is there a reason why dialback isn't the answer?<p>There are some advantages to using TLS for authentication as well as encryption, which is already a standard across the internet.<p>For example, unlike an XMPP server, CAs typically perform checks from multiple vantage points ( <a href="https://letsencrypt.org/2020/02/19/multi-perspective-validation.html" rel="nofollow">https://letsencrypt.org/2020/02/19/multi-perspective-validat...</a> ). There is also a lot of tooling around TLS, ACME, CT logs, and such, which we stand to gain from.<p>In comparison, dialback is a 20-year-old homegrown auth mechanism, which is more vulnerable to MITM.<p>Nevertheless, there are some experiments to combine dialback with TLS. For example, checking that you get the same cert (or at least public key) when connecting back. But this is not really standardized, and can pose problems for multi-server deployments.<p>> It has never been secure to accept the clientAuth EKU when using the Mozilla root store.<p>Good job we haven't been doing this for a very long time by now :)</p>
]]></description><pubDate>Mon, 09 Feb 2026 23:55:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46953369</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46953369</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46953369</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>There might be some confusion here, as there is no refusal at all.<p>As stated in the blog post, we (Prosody) have been accepting (only) serverAuth certificates for a long time. However this is technically in violation of the relevant RFCs, and not the default behaviour of TLS libraries, so it's far from natural for software to be implementing this.<p>There was only one implementation discovered so far which was not accepting certificates unless they included the clientAuth purpose, and that was already updated 6+ months ago.<p>This blog post is intended to alert our users, and the broader XMPP community, about the issue that many were unaware of, and particularly to nudge server operators to upgrade their software if necessary, to avoid any federation issues on the network.</p>
]]></description><pubDate>Mon, 09 Feb 2026 23:41:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46953237</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46953237</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46953237</guid></item><item><title><![CDATA[New comment by MattJ100 in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Thanks! I didn't intentionally write this for a broader audience (I didn't expect to see it while casually opening HN!). Our user base is quite diverse, so I try to find the balance between being too technical and over-explanatory. Glad it was helpful!</p>
]]></description><pubDate>Mon, 09 Feb 2026 23:33:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=46953159</link><dc:creator>MattJ100</dc:creator><comments>https://news.ycombinator.com/item?id=46953159</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46953159</guid></item></channel></rss>