<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Msurrow</title><link>https://news.ycombinator.com/user?id=Msurrow</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 03:32:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Msurrow" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Msurrow in "Tell HN: MitID, Denmark's digital ID, was down"]]></title><description><![CDATA[
<p>> They would NEVER admit any failure in their society, no matter the hard evidence in front of their eyes.<p>That must be the swedes. Danes complain constantly, about everything.<p>Edit: if you need examples.. DSB trains are slow/never on time/bad service/..; Post Nord takes WEEKS to get a letter out/too expensive. Well we switched to another provider now, Dao, so we’ll complain they are even worse! And complain why they are not doing it like in the good old days (see Post Nord); taxes are too high; public service is too bad/slow/low quality; too many cars in the city; never any parking space when I take MY car; the paid first child sick day is not enough we need at least a week (just for child sick days mind you, we need the 5 weeks paid vaca for relaxing on a Beach in Spain); btw our weather sucks; unacceptable that garbage collection service is not functioning during show storms;    .. i can keep going all day</p>
]]></description><pubDate>Fri, 27 Feb 2026 15:55:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47181985</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=47181985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47181985</guid></item><item><title><![CDATA[New comment by Msurrow in "What does " 2>&1 " mean?"]]></title><description><![CDATA[
<p>I think he meant that at that time all users were programmers. Yes, _all_ .</p>
]]></description><pubDate>Thu, 26 Feb 2026 23:12:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47173525</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=47173525</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47173525</guid></item><item><title><![CDATA[New comment by Msurrow in "Man accidentally gains control of 7k robot vacuums"]]></title><description><![CDATA[
<p>I agree that yes most just want PnP and basically don’t care about security. But it seemed on the posts above that there was an engineering complexity,
and a robot vaccum needs local WiFi, so there will be a setup flow. Whats preventing a password selection 
 just be part of that?</p>
]]></description><pubDate>Sun, 22 Feb 2026 19:52:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47114038</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=47114038</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47114038</guid></item><item><title><![CDATA[New comment by Msurrow in "Man accidentally gains control of 7k robot vacuums"]]></title><description><![CDATA[
<p>I have not knowledge of this kind of software dev/hw production, so can you please explain why the units cant just be born with a default pass and then have the setup process (which is always there) Force the owner to set a new password?<p>Knowledge or not, this..<p>> It's not impossible, it's just extra work that usually goes unrewarded.<p>.. is just not an acceptable way for business to think and operate i  2026, especially not when it comes to internet connected video enabled devices</p>
]]></description><pubDate>Sun, 22 Feb 2026 17:46:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47112992</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=47112992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47112992</guid></item><item><title><![CDATA[New comment by Msurrow in "I verified my LinkedIn identity. Here's what I handed over"]]></title><description><![CDATA[
<p>Yeah was thinking the same thing. I wonder if the author didnt known that passpory chip == fingerprint.<p>And FP is a much worse modality to have registered because, as opposed to Face image, fingerprint is not affected by age. So that will match you 99.999999% for ever. Faces change.</p>
]]></description><pubDate>Sat, 21 Feb 2026 13:04:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47100462</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=47100462</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47100462</guid></item><item><title><![CDATA[New comment by Msurrow in "Mark Zuckerberg to testify in landmark social media trial"]]></title><description><![CDATA[
<p>That that is exactly why [more] regulation is necessary!<p>Regulation is not done with the purpose of preventing companies from profits. It is done because companies cannot be expected to act in society’s best interest, so society has to make demands of companies, ie regulation.</p>
]]></description><pubDate>Thu, 19 Feb 2026 09:36:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47071863</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=47071863</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47071863</guid></item><item><title><![CDATA[New comment by Msurrow in "Ask HN: Is Connecting via SSH Risky?"]]></title><description><![CDATA[
<p>No, they are not. Doesn’t matter how many LoC; it only take 1 LoC to introduce a vulnerability.<p>Wireguard is a protocol. So what implementation is “very intentional about its choice of …”? Are you talking about my own WG client implementation? Or the one made by this other Chinese vendor?<p>I don’t care what software we are talking about, or who made it. All software has a risk of undiscovered/-disclosed vulnerabilities already existing, or when new ones introduced with an update.<p>If you really want to make this argument we can talk about the implementing organisations SDLC, including SW supply chain, and compare those.<p>But back to the OP/point above: its false to state that one piece of software has a “principle risk” of vulnerabilities that another piece does not. At least, not when both are internet exposed and accepting incoming data.<p>Lasty remember that I never disagreed with you point that a VPN solution is often a better solution, but that was never what I was arguing about. Simply that all code always has a risk of vulnerabilities. No piece of software is excempt from that.</p>
]]></description><pubDate>Sun, 08 Feb 2026 07:32:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=46932155</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46932155</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46932155</guid></item><item><title><![CDATA[New comment by Msurrow in "Ask HN: Is Connecting via SSH Risky?"]]></title><description><![CDATA[
<p>You are still implying that wireguard are somehow different from ssh in its suceptibilty to vulnerabilities existing or being introduced into its codebase. And it simply is not.<p>Edit: codebase of ssh/wireguard implementations, just to be clear</p>
]]></description><pubDate>Fri, 06 Feb 2026 13:02:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46912323</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46912323</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46912323</guid></item><item><title><![CDATA[New comment by Msurrow in "Ask HN: Is Connecting via SSH Risky?"]]></title><description><![CDATA[
<p>I’m calling it consultant speak because your response to an argument is to bring up something else, instead of actually responding.<p>The same with this last reply; you can keep throwing out new points all you want, but thats not going to make you correct in the original question.<p>Saying or implying that one software has a “principle” risk of vulnerabilities that another software doesn’t is plain and simply wrong.<p>And that has nothing to do with all the other stuff about layered defence, vpns, enterprise security, chatty protocols or whatever you want to pile on the discusion.</p>
]]></description><pubDate>Fri, 06 Feb 2026 10:43:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46911275</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46911275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46911275</guid></item><item><title><![CDATA[New comment by Msurrow in "Ask HN: Is Connecting via SSH Risky?"]]></title><description><![CDATA[
<p>Sure, no one said it wasnt layered.<p>But saying ssh is a risk “on principle” due to possible vulnerabilities, and then implying that if wireguard is used then that risk isnt there is wrong. Wireguard, and any other software, has the same vuln risk “on principle”.<p>> For vulnerabilities, complexity usually equals surface area. WireGuard was created with simplicity in mind.<p>That is such consultant distraction-speak. Simple software can have plenty vulns, and complex software can be well tested. Wireguard being “created with simplicity in mind” doesn’t not make it a better alternative to ssh, since it doesn’t mean ssh wasnt created with simplicity in mind.<p>I don’t disagree that adding a vpn layer is an extra layer of security which can be good. But that does not make ssh bad and vpn good. Further, they serve two different purposes so its comparing Apples to oranges in the first place.</p>
]]></description><pubDate>Thu, 05 Feb 2026 13:56:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46899674</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46899674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46899674</guid></item><item><title><![CDATA[New comment by Msurrow in "Ask HN: Is Connecting via SSH Risky?"]]></title><description><![CDATA[
<p>But doesn’t your argument that the principal risk [with ssh] is vulnerabilities also apply to the alternatives you say is best practice? Firewalling off ssh (but not http(s)) has the risk of vulns in the FW software. Tailscale, wireguard etc also has the risk of vulns in that software?<p>So what’s the difference in risk of ssh software vulns and other software vulns?<p>Also, another point of view is that vulnerabilities are not very high on the risk ladder. Weak passwords, password reuse etc are far greater risks. So, the alternatives to ssh you suggest are all reliant on passwords but ssh, in the case, is based on secure keys and no passwords. Should “best practices” not include this perpective?</p>
]]></description><pubDate>Thu, 05 Feb 2026 07:43:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46896866</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46896866</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46896866</guid></item><item><title><![CDATA[New comment by Msurrow in "OpenAI is reportedly asking contractors to upload real work from past jobs"]]></title><description><![CDATA[
<p>You cant.</p>
]]></description><pubDate>Sun, 11 Jan 2026 20:56:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46579976</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46579976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46579976</guid></item><item><title><![CDATA[New comment by Msurrow in "Show HN: Witr – Explain why a process is running on your Linux system"]]></title><description><![CDATA[
<p>Depends on environment variable P=NP</p>
]]></description><pubDate>Sun, 28 Dec 2025 21:23:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414664</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46414664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414664</guid></item><item><title><![CDATA[New comment by Msurrow in "I didn't realize my LG TV was spying on me until I turned off Live Plus"]]></title><description><![CDATA[
<p>> *If you don't want your LG TV quietly snooping on what you watch and using it to serve you ads, here's how to turn Live Plus off.<p>If LG makes money from snooping on you, what makes you think the “off” button actually turns it off? People have no way of verifying this.<p>To me this is the worst part of TVs (and cars, and fridges, and so on) are even allowed to have these features[1]: non-techinical customers have no understanding that “smart” hardware is capable of doing whatever it wants - and hide it from customers. You have no way of knowing what your “smart” thing is doing behind the scenes.<p>[1]: any feature thats sending data back to company servers, meaning you loose control of your data. Features that are 100% on-device is not what I’m talking about.</p>
]]></description><pubDate>Wed, 24 Dec 2025 09:16:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46373921</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46373921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46373921</guid></item><item><title><![CDATA[New comment by Msurrow in "US blocks all offshore wind construction, says reason is classified"]]></title><description><![CDATA[
<p>Yes, it does.<p>First of all: occam's razor. Political theatrics seems simpler than the US defence/intelligence forces sudenly realizing that drones can be launched from ships. Esp. with the timing involved.<p>Second: Established/traditional radar systems cannot spot drones. Take it from someone living in a country that recently had its airspace violated by (assumingly) Russian drones, affecting national infrastructure. It was considered an attack at the time. I don’t think thats the word we use any more, for political reasons.<p>Third: Trump already shut down one of these windmill farms once this year. Until the danish company building the park sued and got the courts word that the shutdown was illegal, and resumed construction. The current shutdown has much larger impact for many multi-national companies. Usually there is a political process expected between allied countries before such a drastisc move. We havnt seen that ie no attempt to solve a concrete (security) issue before punching the red button ie probably because there was no motivation for a solution ie the security issue was probably not an actual issue)<p>Fourth: Earlier this week the danish intelligence services released a new security assesment of USA (that takes Trumps behaviour on the international scene into account). That probably hurt the little mans ego, and now we see a retaliation. This provides yet another motivation for Trumps action, besides factual, real security concerns.<p>Looking at this purely from the security aspect is naive, and fails to consider the context of the real world.</p>
]]></description><pubDate>Mon, 22 Dec 2025 23:17:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46360401</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46360401</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46360401</guid></item><item><title><![CDATA[New comment by Msurrow in "US blocks all offshore wind construction, says reason is classified"]]></title><description><![CDATA[
<p>The construction on some of these windmill farms started years ago. Before that permits & legal has been in the works for a long time. This surely included security clearances.<p>The orange shrimp pulling the  “national security” card now, on the same day as he also creates a new Greenland debacle, is very clearly simply an attempt to strong arm the danish govt into Greenland concessions (in turn simply to please his fractile lille ego)</p>
]]></description><pubDate>Mon, 22 Dec 2025 21:09:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46359117</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46359117</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46359117</guid></item><item><title><![CDATA[New comment by Msurrow in "Online Textbook for Braid groups and knots and tangles"]]></title><description><![CDATA[
<p>Man, I got my rope out for this..</p>
]]></description><pubDate>Thu, 18 Dec 2025 16:05:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46314437</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46314437</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46314437</guid></item><item><title><![CDATA[New comment by Msurrow in "Stop Breaking TLS"]]></title><description><![CDATA[
<p>If the employer says so and I do so anyway then that’s a employment issue. I still have to follow company rules. But the point is that the company needs to delete the collected data as soon as possible. They are still not allowed to store it.</p>
]]></description><pubDate>Wed, 10 Dec 2025 11:37:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46216618</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46216618</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46216618</guid></item><item><title><![CDATA[New comment by Msurrow in "Stop Breaking TLS"]]></title><description><![CDATA[
<p>Yes.
GDPR covers all handling of PII that a company does. And its sort of default deny, meaning that a company is not allowed to handle (process and/or store) your data UNLESS it has a reason that makes it legal. This is where it becomes more blurry: figuring out if the company has a valid reason. Some are simple, eg. if required by law => valid reason.<p>GDPR does not care how the data got “in the hands of” the company; the same rules apply.
Another important thing is the pricipals of GDPR. They sort of unline everything. One principal to consider here is that of data minimization. This basically means that IF you have a valid reason to handle an individuals PII, you must limit the data points you handle to exactly what you need and not more.<p>So - company proxy breaking TLS and logging everything? Well, the company has valid reason to handle some employee data obviously. But if I use my work laptop to access privat health records, then that is very much outside the scope of what my company is allowed handle. And logging (storing) my health data without valid reason is not GDPR compliant.<p>Could the company fire me for doing private stuff on a work laptop? Yes probably. Does it matter in terms of GDPR? Nope.<p>Edit: Also, “automatic” or “implicit” consent is not valid. So the company cannot say something like “if you access private info on you work pc the you automatically content to $company handling your data”. All consent must be specific, explicit and retractable</p>
]]></description><pubDate>Wed, 10 Dec 2025 11:00:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46216380</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=46216380</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46216380</guid></item><item><title><![CDATA[New comment by Msurrow in "FFmpeg to Google: Fund us or stop sending bugs"]]></title><description><![CDATA[
<p>If that’s the case why give the OSS project any time to fix at all before public disclosure? They should just publish immediately, no? Warn other users asap.</p>
]]></description><pubDate>Tue, 11 Nov 2025 19:25:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45891667</link><dc:creator>Msurrow</dc:creator><comments>https://news.ycombinator.com/item?id=45891667</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45891667</guid></item></channel></rss>