<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Vogtinator</title><link>https://news.ycombinator.com/user?id=Vogtinator</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 23 May 2026 02:36:16 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Vogtinator" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Vogtinator in "Binary obfuscation used in AAA Games"]]></title><description><![CDATA[
<p>> If, for example, a company wants to issue fleet computers to workers or school to students, you want to have secure boot on those devices to prevent tampering. Secure boot makes it so that physical access is not the end all of security.<p>Measured boot is actually better for that: You can still boot whatever you want however you want, but hashes are different which can be used for e.g. remote attestation. Secure boot has to prevent that "unauthorized" code (whatever that means for each setup) can ever run. If it does, game over. That means less freedom and flexibility.</p>
]]></description><pubDate>Wed, 08 Apr 2026 08:33:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47687117</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=47687117</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47687117</guid></item><item><title><![CDATA[New comment by Vogtinator in "A nearly perfect USB cable tester"]]></title><description><![CDATA[
<p>AFAIK that's just when plugging in a USB 3 device into a USB 2 port or using a USB 2 cable.</p>
]]></description><pubDate>Sun, 29 Mar 2026 09:50:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47561732</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=47561732</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47561732</guid></item><item><title><![CDATA[New comment by Vogtinator in "CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root"]]></title><description><![CDATA[
<p>With <a href="https://github.com/thkukuk/account-utils" rel="nofollow">https://github.com/thkukuk/account-utils</a> (not the default yet), it's meanwhile possible to run openSUSE Tumbleweed (package based) with NoNewPrivileges= as usual.</p>
]]></description><pubDate>Fri, 20 Mar 2026 12:11:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47453458</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=47453458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47453458</guid></item><item><title><![CDATA[New comment by Vogtinator in "KDE launches its own distribution"]]></title><description><![CDATA[
<p>> For example, Aeon (of openSUSE MicroOS vintage) looks like all KDE Linux is aiming for, just with Gnome as DE.<p>And Kalpa is that just with Plasma as DE.</p>
]]></description><pubDate>Thu, 11 Sep 2025 08:04:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=45209084</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=45209084</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45209084</guid></item><item><title><![CDATA[New comment by Vogtinator in "A deep dive into Debian 13 /tmp: What's new, and what to do if you don't like it"]]></title><description><![CDATA[
<p>swapfile on linux must be directly mapped, bypassing any filesystem level checksums (see <a href="https://btrfs.readthedocs.io/en/latest/Swapfile.html" rel="nofollow">https://btrfs.readthedocs.io/en/latest/Swapfile.html</a>)</p>
]]></description><pubDate>Fri, 29 Aug 2025 11:58:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=45062874</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=45062874</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45062874</guid></item><item><title><![CDATA[New comment by Vogtinator in "Fixing Ctrl+C in Rust terminal apps: Child process management"]]></title><description><![CDATA[
<p>ctrl-c sends SIGINT.</p>
]]></description><pubDate>Thu, 31 Jul 2025 10:33:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=44744215</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=44744215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44744215</guid></item><item><title><![CDATA[New comment by Vogtinator in "What is going on in Unix with errno's limited nature"]]></title><description><![CDATA[
<p>errno is in thread-local storage (TLS)</p>
]]></description><pubDate>Fri, 04 Jul 2025 09:12:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=44462731</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=44462731</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44462731</guid></item><item><title><![CDATA[New comment by Vogtinator in "Android phone will run Debian Linux soon (like some Pixels can)"]]></title><description><![CDATA[
<p>> Apps on Android have no access, or ability, to directly call kernel functions.<p>That is nonsense.</p>
]]></description><pubDate>Tue, 11 Mar 2025 19:58:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=43336418</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=43336418</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43336418</guid></item><item><title><![CDATA[Microsoft/WSL pull requests taken over by malicious GH action]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/microsoft/WSL/issues/12542">https://github.com/microsoft/WSL/issues/12542</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42918300">https://news.ycombinator.com/item?id=42918300</a></p>
<p>Points: 8</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 03 Feb 2025 14:02:33 +0000</pubDate><link>https://github.com/microsoft/WSL/issues/12542</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42918300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42918300</guid></item><item><title><![CDATA[New comment by Vogtinator in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>That's the design with sdbootutil in openSUSE (<a href="https://en.opensuse.org/Systemd-fde" rel="nofollow">https://en.opensuse.org/Systemd-fde</a>, <a href="https://github.com/openSUSE/sdbootutil">https://github.com/openSUSE/sdbootutil</a>).</p>
]]></description><pubDate>Fri, 17 Jan 2025 08:36:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=42735307</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42735307</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42735307</guid></item><item><title><![CDATA[New comment by Vogtinator in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>> You can mitigate this by including PCRs that sign the kernel and initrd.<p>No, that's not an effective mitigation. The signed kernel+initrd would still boot into the impersonated root.<p>> however it means whenever you update you need to unlock manually. On Redhat-based distros this can be done with PCRs 8 and 9, though IIRC this may change on other distros.
> Also AFAIK there is no standard way to guess the new PCRs on reboot so you can't pre-update them before rebooting. So you either need to unlock manually or use a network decryption like dracut-sshd.<p>With some logic to update the values on kernel updates and re-seal the secret this can be handled transparently. That's the design with sdbootutil in openSUSE (<a href="https://en.opensuse.org/Systemd-fde" rel="nofollow">https://en.opensuse.org/Systemd-fde</a>, <a href="https://github.com/openSUSE/sdbootutil">https://github.com/openSUSE/sdbootutil</a>).</p>
]]></description><pubDate>Fri, 17 Jan 2025 08:35:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=42735303</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42735303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42735303</guid></item><item><title><![CDATA[New comment by Vogtinator in "/bin/sh: the biggest Unix security loophole (1984) [pdf]"]]></title><description><![CDATA[
<p>For multiple users on the same server it was IMO well designed. Everyone had their ~ and could place whatever libraries/binaries/etc. in there and do whatever they wanted.<p>Package managers are way more modern than that and their design does by itself not require root (see pip). You can in fact run most package managers without root, you just won't be able to modify system files. You can use them to install a chroot as regular user, e.g. `zypper --installroot ~/tw install bash`.<p>FUSE doesn't really relate to single vs. multi-user AFAICT.<p>Users are perfectly sandboxed if you configure the system that way. Depending on the distribution that's even the default.</p>
]]></description><pubDate>Sat, 11 Jan 2025 20:23:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=42668650</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42668650</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42668650</guid></item><item><title><![CDATA[New comment by Vogtinator in "Execution units are often pipelined"]]></title><description><![CDATA[
<p>For x86 cores this is visible in Agner Fog's instruction performance tables: <a href="https://agner.org/optimize/#manuals" rel="nofollow">https://agner.org/optimize/#manuals</a><p>The latency shows after how many cycles the result of an instruction can be consumed by another, while the throughput shows how many such instructions can be pipelined per cycle, i.e. in parallel.</p>
]]></description><pubDate>Mon, 30 Dec 2024 15:36:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=42550193</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42550193</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42550193</guid></item><item><title><![CDATA[New comment by Vogtinator in "MiceWine – run Windows applications and games on Android smartphones"]]></title><description><![CDATA[
<p>Can wine do ARM64X resp. ARM64EC to mix native aarch64 code with emulated x86(-64) code in the same process for better efficiency?</p>
]]></description><pubDate>Mon, 30 Dec 2024 15:30:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=42550129</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42550129</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42550129</guid></item><item><title><![CDATA[New comment by Vogtinator in "Lua Is So Underrated"]]></title><description><![CDATA[
<p><a href="https://duktape.org" rel="nofollow">https://duktape.org</a> is in a similar ballpark.</p>
]]></description><pubDate>Fri, 27 Dec 2024 00:01:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=42518854</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42518854</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42518854</guid></item><item><title><![CDATA[New comment by Vogtinator in "Malware can turn off webcam LED and record video, demonstrated on ThinkPad X230"]]></title><description><![CDATA[
<p>My envy x360 has that button as well and it even puts a physical shutter in front of the webcam in addition to disconnecting USB.</p>
]]></description><pubDate>Thu, 28 Nov 2024 19:15:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=42267848</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=42267848</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42267848</guid></item><item><title><![CDATA[New comment by Vogtinator in "OpenVMM – A New VMM for Windows and Linux, Written in Rust"]]></title><description><![CDATA[
<p>Cargo.lock has 8750 lines. Is that normal for something like this?<p>For comparison, QEMU basically just needs glibc, glib and zlib for basic functionality.</p>
]]></description><pubDate>Thu, 17 Oct 2024 13:26:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=41869463</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=41869463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41869463</guid></item><item><title><![CDATA[New comment by Vogtinator in "Cosmic: A New Desktop Environment"]]></title><description><![CDATA[
<p>> you do you, but watch your market share always be niche.<p>As long as I can use the OS I like and how I like, I don't care about metrics like market share.</p>
]]></description><pubDate>Thu, 08 Aug 2024 16:21:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41193212</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=41193212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41193212</guid></item><item><title><![CDATA[New comment by Vogtinator in "A cryptographically secure bootloader for RISC-V in Rust"]]></title><description><![CDATA[
<p>> That said, it does require more care when you do OS updates or UEFI updates to remember to update the TPM sealed secret with the new measurements. Windows and Linux both have the former automated so it should generally be fine.<p>Yep, this can be a pain also in regards to firmware bugs (broken TCG event log anyone?). In the worst case you need to enter the recovery key or if you know in advance, exclude some component from measurement temporarily while supervising the next boot. If something goes wrong with the trust chain like a key got revoked but the bootloader didn't update correctly, you end up with an unbootable device and can't even go back easily.<p>> UEFI updates can also be a problem if they wipe the TPM as part of the update and thus destroy the sealed secret entirely (as my PC mobo does).<p>Ouch, that's bad design. The firmware is measured into the TPM on boot so there's no reason to do that..</p>
]]></description><pubDate>Mon, 05 Aug 2024 18:52:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=41164187</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=41164187</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41164187</guid></item><item><title><![CDATA[New comment by Vogtinator in "A cryptographically secure bootloader for RISC-V in Rust"]]></title><description><![CDATA[
<p>> 1. This is interesting. So in a measured boot scenario, you wouldn't be able to boot the main OS, but it would give you access to sort of a minimal initramfs environment for debugging? It's a good idea for personal computers, like a tamper-proofing approach.<p>Depends on how it's set up. Currently most setups that use measured boot (systemd-pcrlock, partially BitLocker) ask for a recovery key if unsealing fails due to measurement mismatches and offer other options.<p>> I assume the TPM in this case would only have a partial decryption key?<p>That's also possible, but so far I haven't seen that. The sealed secret is sent to the TPM which then uses its hidden internal seed to derive the master key for volume decryption and sends it back. (In the case of bitlocker with TPM < 2 that could trivially be sniffed on the LPC bus...)<p>> I think something similar could be accomplished with SSS, no?<p>If you mean Shamir's secret sharing, possibly. Question is what to do with the shares.<p>2. Yeah, for your local machine this is a working approach, if you make sure that really only your own key works. Another reason against PKI is also that the trusted authority can't retroactively sign a backdoored executable to gain access to devices, as the measurements are independent from authority and ideally device specific.<p>3. Signature verification isn't just needed at the start of boot, it's ideally from start of booting until user authentication, which is the part that can be tampered with. I'd argue that the software side for measured boot is simpler, while the hardware side may be more complex.<p>> For example, iphones or google-pixel devices encourage the user to use a low-entropy password like a 4-digit PIN.<p>Using TPM+PIN is actually not that bad: Only if measurements match it's possible to unlock with a PIN and the TPM uses a counter in nonvolatile memory to prevent brute force attacks. It's not unfathomable that some manufacturer screws that up, but it's IMO stronger than relying on multiple parties (CPU, BIOS, OEMs, OS) developing an actually secure trust chain.</p>
]]></description><pubDate>Mon, 05 Aug 2024 18:48:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=41164138</link><dc:creator>Vogtinator</dc:creator><comments>https://news.ycombinator.com/item?id=41164138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41164138</guid></item></channel></rss>