<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Natanael_L</title><link>https://news.ycombinator.com/user?id=Natanael_L</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 22:51:13 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Natanael_L" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>What's your usecase here? Internal or external messaging?</p>
]]></description><pubDate>Sun, 28 Dec 2025 21:15:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414597</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414597</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414597</guid></item><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>There's no clear segmentation. There's symmetric and asymmetric primitives (and stuff that doesn't fit into these like ZKP), algorithms, protocols, research in many different types of attacks against each of these, research in design and defenses, and plenty of people will cover completely different subsets.<p>"don't" roll your own cover everything from "don't design your own primitive" to "don't make your own encryption algorithm/mode" to "don't make your own encryption protocol", to "don't reimplement an existing version of any of the above and just use an encryption library"<p>(and it's mostly "don't deploy your own", if you want to experiment that's fine)</p>
]]></description><pubDate>Sun, 28 Dec 2025 21:05:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414500</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414500</guid></item><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>The fact that every email encryption integration exports secure context messages into insecure contexts when decrypting (which is how encrypted messages end up cited in plaintext) means email can't be secured.<p>This is true both for GPG and S/MIME<p>Email encryption self-compromises itself in a way Signal doesn't</p>
]]></description><pubDate>Sun, 28 Dec 2025 20:51:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414374</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414374</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414374</guid></item><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>You need a private PKI, not keyring. They're subtly different - a PKI can handle key rotation, etc.<p>Yes there aren't a lot of good options for that. If you're using something like a Microsoft software stack with active directory or similar identity/account management then there's usually some PKI support in there to anchor to.<p>Across organisations, there's really very very few good solutions. GPG specifically is much too insecure when you need to receive messages from untrusted senders. There's basically S/MIME which have comparable security issues, then we have AD federation or Matrix.org with a server per org.<p>> You could say, we do not need gpg, because we control the mailserver, but what if a mailserver is compromised and the mails are still in mailboxes?<p>How are you handling the keys? This is only true if user's protect their own keypairs with strong passwords / yubikey applet, etc.</p>
]]></description><pubDate>Sun, 28 Dec 2025 20:45:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414321</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414321</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414321</guid></item><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>What you described IS WHY age is the better option.<p>GPG's keyring handling has also been a source of exploits. It's much safer to directly specify recipient rather than rely on things like short key IDs which can be bruteforced.<p>Automatic discovery simply isn't secure if you don't have an associated trust anchor. You need something similar to keybase or another form of PKI to do that. GPG's key servers are dangerous.<p>You technically can sign with age, but otherwise there's minisign and the SSH spec signing function</p>
]]></description><pubDate>Sun, 28 Dec 2025 20:32:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414207</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414207</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414207</guid></item><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>Then your next best bet is Matrix.org. Not to the same security standard as Signal, but if you don't have a specific threat against you then it's fine.</p>
]]></description><pubDate>Sun, 28 Dec 2025 20:23:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414141</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414141</guid></item><item><title><![CDATA[New comment by Natanael_L in "Gpg.fail"]]></title><description><![CDATA[
<p>Asking for an equivalent to GPG is like asking for an equivalent of a Swiss knife with unshielded chainsaws and laser cutters.<p>Stop asking for it, for your own good, please. If you don't understand the entire spec you can't use it safely.<p>You want special purpose tools. Signal for communication, Age for safer file encryption, etc.<p>What exact problems did you have with age? You're not explaining how it broke anything. Are you compiling yourself? 
Age has yubikey support and can do all you described.<p>> if your fancy tool has less than 5 years of proven maintenance record, it won't do. Encryption is for the long term. I want to be able to read my stuff in 15-30 years.<p>This applies to algorithms, it does not apply to cryptographic software in the same way. The state of art changes fast, and while algorithms tend to stand for a long time these days there are significant changes in protocol designs and attack methods.<p>Downgrade protection, malleability protection, sidechannel protection, disambiguation, context binding, etc...<p>You want software to be implemented by experts using known best practices with good algorithms and audited by other experts.</p>
]]></description><pubDate>Sun, 28 Dec 2025 20:05:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46414000</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=46414000</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46414000</guid></item><item><title><![CDATA[New comment by Natanael_L in "Roc Camera"]]></title><description><![CDATA[
<p>C2PA has the problem that it has a ton of optional metadata support and no well-defined strict validation procedure, so it's trivial to make fake photos appear valid using currently available C2PA enabled software.<p>They absolutely must define a much stricter mode that actually means something, and distinguish it from what they have now (which is essentially prototype level in terms of security model)</p>
]]></description><pubDate>Sun, 02 Nov 2025 14:00:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=45790421</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=45790421</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45790421</guid></item><item><title><![CDATA[New comment by Natanael_L in "Roc Camera"]]></title><description><![CDATA[
<p>Also, the RPi is the wrong kind of hardware for attestation, at least use something like USB Armory which provides a user programmable ARM TrustZone environment.<p>Since USB Armory supports pinning multiple keys for secure boot (and IIRC protected storage), you could even deliver it set up with a manufacturer attestation key and allow the user to load and pin their own attestation key (useful for an organization like a news company) as well as allowing "dual boot" between the attested firmware signed by the pinned manufacturer key and the user's own firmware. I've wanted that kind of behavior in consumer hardware for a long time, where you have full freedom between using the locked down OEM environment or your own and switching between them freely.<p>(I assume the USB Armory might also not be ideal in terms of ability to sleep and boot speed, etc, but if you have a quicker smaller controller that's the main board then it could wake the one that supplies attestation and make that functionality available after it's done booting)</p>
]]></description><pubDate>Sun, 02 Nov 2025 13:50:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=45790358</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=45790358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45790358</guid></item><item><title><![CDATA[New comment by Natanael_L in "New questions on Stack Overflow are down 77% compared to 2022"]]></title><description><![CDATA[
<p>... At which point the only new data that chatgpt can reliably scrape is its own answers...</p>
]]></description><pubDate>Wed, 08 Jan 2025 19:41:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=42637692</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=42637692</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42637692</guid></item><item><title><![CDATA[New comment by Natanael_L in "Bluesky Is Not Decentralized"]]></title><description><![CDATA[
<p>Everything is open source so yes you can, it's mostly a question of practicality.<p>There's already third party clients, account hosting servers, etc, as well as different apps building on the same system (and which can use the same accounts and data store!) like blogs and more. Most devs are trying to coordinate their custom extensions so it doesn't cause conflict.<p>If it weren't coordinated we'd easily end up in the same place as Mastodon with their spurious server blocks where large parts of conversations are broken for most users.</p>
]]></description><pubDate>Mon, 28 Oct 2024 15:40:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=41972242</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=41972242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41972242</guid></item><item><title><![CDATA[New comment by Natanael_L in "Bluesky Is Not Decentralized"]]></title><description><![CDATA[
<p>Before Musk, Twitter used to fight those requests.<p>The platform can not be called better, with more bugs and errors than ever.<p>Why don't they apply those rules to Republicans? Why can they specifically post stuff like private info about Hunter?</p>
]]></description><pubDate>Mon, 28 Oct 2024 15:35:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=41972177</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=41972177</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41972177</guid></item><item><title><![CDATA[New comment by Natanael_L in "Bluesky Is Not Decentralized"]]></title><description><![CDATA[
<p>Musk is reposting actual neonazi accounts</p>
]]></description><pubDate>Sun, 27 Oct 2024 00:21:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=41958829</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=41958829</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41958829</guid></item><item><title><![CDATA[New comment by Natanael_L in "Bluesky Is Not Decentralized"]]></title><description><![CDATA[
<p>Most of that doesn't deserve to be called an improvement. That message encryption is one of the worst designs I've ever seen. The algorithm isn't open enough that anybody can see if what it's doing matches the code.<p>And instead of censoring "secretly" in partnership with the US government they do so in partnership with the Indian government as well as individual Republican politicians.</p>
]]></description><pubDate>Sun, 27 Oct 2024 00:20:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41958823</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=41958823</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41958823</guid></item><item><title><![CDATA[New comment by Natanael_L in "Bluesky Is Not Decentralized"]]></title><description><![CDATA[
<p>It's used in a not particularly advanced way - bluesky uses repositories per each user for all their public social activity (posts, likes, etc) and it creates a Merkle tree as an index for them and signs that index (this enables stuff like authenticated content addressing and efficient verification).<p>SQLite simply stores those posts and that signed Merkle tree. The PDS account host server also has another SQLite DB with a list of its accounts.<p>They have fancier stuff in their appview server and relay server</p>
]]></description><pubDate>Sun, 27 Oct 2024 00:15:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=41958798</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=41958798</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41958798</guid></item><item><title><![CDATA[New comment by Natanael_L in "Bluesky Is Not Decentralized"]]></title><description><![CDATA[
<p>It's currently built into the applications, not configurable by default. It's preferable if everybody in a thread / space / community uses the same one because otherwise differences can cause validation failures and conflict and thus break threads, resulting in that people can't follow many discussions, thus applications don't really expose it.<p>It's the kind of thing where it's preferable that either everybody switch at once, or that new applications with different "lexicon" (post types / social media format) picks a new default from the start.</p>
]]></description><pubDate>Sat, 26 Oct 2024 23:28:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41958496</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=41958496</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41958496</guid></item><item><title><![CDATA[New comment by Natanael_L in "Snowden leak: Cavium networking hardware may contain NSA backdoor"]]></title><description><![CDATA[
<p>Signal relies on the client program to not be compromised to keep conversations secret</p>
]]></description><pubDate>Tue, 19 Sep 2023 18:47:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=37574409</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=37574409</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37574409</guid></item><item><title><![CDATA[New comment by Natanael_L in "Reddit Threatens to Remove Moderators from Subreddits Continuing Blackouts"]]></title><description><![CDATA[
<p>There's a few self hosting forums, and there's Lemmy / Kbin for federated ones</p>
]]></description><pubDate>Fri, 16 Jun 2023 07:43:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=36352918</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=36352918</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36352918</guid></item><item><title><![CDATA[New comment by Natanael_L in "Asus Ally Emulates PS3, Nintendo Switch, Xbox 360 with Ease"]]></title><description><![CDATA[
<p>Since you own the console you dump the keys from, nope</p>
]]></description><pubDate>Sun, 28 May 2023 03:08:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=36100798</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=36100798</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36100798</guid></item><item><title><![CDATA[New comment by Natanael_L in "Google’s copying of the Java SE API was fair use [pdf]"]]></title><description><![CDATA[
<p>Re forms: I did primarily mean rather simple ones (like say attendance forms), but there's a bigger argument here;<p>This type of API copyright would post likely not just mean the paper form is under copyright protection, but that the software to OCR scan it and parse it would also likewise be protected - as it is an ordered series of keywords with types, etc. It would then be a license infringement to parse forms without a license.<p>Independent creation is legal defense, not a cause for dismissal of a suit. You need to prove it - which becomes harder if they can argue you saw their work first and imitated theirs.<p>There's precedence where people have created their own works from scratch and held to be infringing because they mimicked an existing work too closely (like one case of a photo of a red London bus), and in civil copyright lawsuits the other copyright holder only needs to show its likely, which may reduce to showing you knew their work existed.</p>
]]></description><pubDate>Wed, 07 Apr 2021 06:31:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=26721164</link><dc:creator>Natanael_L</dc:creator><comments>https://news.ycombinator.com/item?id=26721164</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26721164</guid></item></channel></rss>