<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ThomasRinsma</title><link>https://news.ycombinator.com/user?id=ThomasRinsma</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 16 Apr 2026 07:51:31 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ThomasRinsma" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Spoofing OpenPGP.js signature verification]]></title><description><![CDATA[
<p>Article URL: <a href="https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/">https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44236891">https://news.ycombinator.com/item?id=44236891</a></p>
<p>Points: 97</p>
<p># Comments: 30</p>
]]></description><pubDate>Tue, 10 Jun 2025 13:58:30 +0000</pubDate><link>https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=44236891</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44236891</guid></item><item><title><![CDATA[New comment by ThomasRinsma in "Show HN: Doom (1993) in a PDF"]]></title><description><![CDATA[
<p>Author of "PDF Tetris" here.<p>Great work! We had the same idea at the same time, here's my version of PDF Doom:<p>Source: <a href="https://github.com/thomasRinsma/pdfdoom">https://github.com/thomasRinsma/pdfdoom</a><p>Playable here: <a href="https://th0mas.nl/downloads/doom.pdf" rel="nofollow">https://th0mas.nl/downloads/doom.pdf</a><p>Yours is neater in many ways though!</p>
]]></description><pubDate>Mon, 13 Jan 2025 06:57:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=42680801</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=42680801</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42680801</guid></item><item><title><![CDATA[New comment by ThomasRinsma in "Show HN: Tetris in a PDF"]]></title><description><![CDATA[
<p>Oops, yeah :)</p>
]]></description><pubDate>Thu, 09 Jan 2025 18:35:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=42648535</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=42648535</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42648535</guid></item><item><title><![CDATA[New comment by ThomasRinsma in "Show HN: Tetris in a PDF"]]></title><description><![CDATA[
<p>I barely looked at Adobe Reader so not sure about that one, it definitely does not work with this PDF though, likely because it's not compliant in several ways. Besides that I wouldn't be surprised if it supports all the required JS APIs and more, just possibly behind some permission prompts.<p>It might work in Foxit as I believe it supports some scripting. Most of the other native PDF renderers are more static, as far as I know. In either case, I was most interested in the browser-native engines, as I always thought of them as more "static"/limited.<p>As for documentation on specific features: to be honest, I just looked at the implementations of PDF.js and PDFium. Both only support a subset of the "standard" API, likely for security reasons. But PDF.js for example allows changing a field's background color (colored pixels!), and PDFium allows modifying their position/bounding box (I tried a high res color display by moving a row vertically as if it's a scanline, but things become quite laggy).</p>
]]></description><pubDate>Thu, 09 Jan 2025 16:31:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=42647251</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=42647251</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42647251</guid></item><item><title><![CDATA[Show HN: Tetris in a PDF]]></title><description><![CDATA[
<p>I realized that the PDF engines of modern desktop browsers (PDFium and PDF.js) support JavaScript with enough I/O primitives to make a basic game like Tetris.<p>It was a bit tricky to find a union of features that work in both engines, but in the end it turns out that showing/hiding annotation "fields" works well to make monochrome pixels, and keyboard input can be achieved by typing in a text input box.<p>All in all it's quite janky but a nice reminder of how general purpose PDF scripting can be. The linked PDF is all ASCII so you can just open it in a text editor, or have a look at the source code here: <a href="https://github.com/ThomasRinsma/pdftris/blob/main/gengrid.py">https://github.com/ThomasRinsma/pdftris/blob/main/gengrid.py</a></p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42645218">https://news.ycombinator.com/item?id=42645218</a></p>
<p>Points: 1289</p>
<p># Comments: 223</p>
]]></description><pubDate>Thu, 09 Jan 2025 13:31:33 +0000</pubDate><link>https://th0mas.nl/downloads/pdftris.pdf</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=42645218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42645218</guid></item><item><title><![CDATA[CVE-2024-29510 – Exploiting Ghostscript using format strings]]></title><description><![CDATA[
<p>Article URL: <a href="https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/">https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40857073">https://news.ycombinator.com/item?id=40857073</a></p>
<p>Points: 41</p>
<p># Comments: 9</p>
]]></description><pubDate>Tue, 02 Jul 2024 14:31:49 +0000</pubDate><link>https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=40857073</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40857073</guid></item><item><title><![CDATA[New comment by ThomasRinsma in "CVE-2024-4367 – Arbitrary JavaScript execution in PDF.js"]]></title><description><![CDATA[
<p>Original author here. This is indeed a bit confusing.<p>You are right for the case where Firefox's PDF.js is used (local or remote file in a tab or iframe). The XSS problem however is with web-applications that themselves use PDF.js. In that case, it does not run in a separate or special origin; that is a Firefox thing.<p>You are also right that the PDF format supports JavaScript, but that is something unrelated to this, and indeed highly sandboxed in all cases.</p>
]]></description><pubDate>Mon, 20 May 2024 15:53:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=40416846</link><dc:creator>ThomasRinsma</dc:creator><comments>https://news.ycombinator.com/item?id=40416846</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40416846</guid></item></channel></rss>