<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: _kbh_</title><link>https://news.ycombinator.com/user?id=_kbh_</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 17:07:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=_kbh_" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by _kbh_ in "Ukraine open sourced it's star government services app"]]></title><description><![CDATA[
<p>> "Now is not the right time for elections" - Zelenskyy the stalwart defender of Democracy™<p>Its literally part of there constitution that they don't have elections whilst they are at war, and from a practical standpoint how would it even work for territories on the front line or under occupation?.</p>
]]></description><pubDate>Thu, 14 Mar 2024 13:01:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=39703385</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39703385</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39703385</guid></item><item><title><![CDATA[New comment by _kbh_ in "Cracking Meta's Messenger Certificate Pinning on macOS"]]></title><description><![CDATA[
<p>You have to resign the binary when you modify anyway which achieves the same thing.<p>On non-jailbroken platforms you generally do this with a developer certificate.</p>
]]></description><pubDate>Wed, 06 Mar 2024 01:17:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=39611157</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39611157</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39611157</guid></item><item><title><![CDATA[New comment by _kbh_ in "WhatsApp forces Pegasus spyware maker to share its secret code"]]></title><description><![CDATA[
<p>At least some of exploits that were used to install Pegasus have been patched.<p>You can find details here<p>><a href="https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/" rel="nofollow">https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zer...</a><p>Vulnerabilities in third party apps that are used to install Pegasus Apple has less control over.</p>
]]></description><pubDate>Mon, 04 Mar 2024 00:01:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=39585687</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39585687</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39585687</guid></item><item><title><![CDATA[New comment by _kbh_ in "Apple Watch Ultra 2 Hacked"]]></title><description><![CDATA[
<p>No one is burning a baseband 0day to write "we are in control" on a screen.</p>
]]></description><pubDate>Sun, 18 Feb 2024 08:17:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=39417194</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39417194</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39417194</guid></item><item><title><![CDATA[New comment by _kbh_ in "RustPython"]]></title><description><![CDATA[
<p>Ghidra uses Jython not sure if that counts as serious.</p>
]]></description><pubDate>Wed, 07 Feb 2024 11:11:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=39287109</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39287109</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39287109</guid></item><item><title><![CDATA[New comment by _kbh_ in "A brief history of the U.S. trying to add backdoors into encrypted data (2016)"]]></title><description><![CDATA[
<p>> I wrote blog entry on this subject with a very similar name [0] which covers the CryptoAG story in more detail. It doesn't have the 2020 news.
[0]: A Brief History of NSA Backdoors (2013), <a href="https://www.ethanheilman.com/x/12/index.html" rel="nofollow">https://www.ethanheilman.com/x/12/index.html</a><p>Wow this is super interesting I noticed this paragraph in the text.<p>> 2013, Enabling for Encryption Chips: In the NSA's budget request documents released by Edward Snowden, one of the goals of the NSA's SIGINT project is to fully backdoor or "enable" certain encryption chips by the end of 201311. It is not publicly known to which encryption chips they are referring.<p>From what I know Cavium is one of these "SIGINT enabled" chip manufactures.<p>> <a href="https://www.electrospaces.net/2023/09/some-new-snippets-from-snowden-documents.html" rel="nofollow">https://www.electrospaces.net/2023/09/some-new-snippets-from...</a><p>>> "While working on documents in the Snowden archive the thesis author learned that an American fabless semiconductor CPU vendor named Cavium is listed as a successful SIGINT "enabled" CPU vendor. By chance this was the same CPU present in the thesis author's Internet router (UniFi USG3). The entire Snowden archive should be open for academic researchers to better understand more of the history of such behavior." (page 71, note 21)<p>> <a href="https://www.computerweekly.com/news/366552520/New-revelations-from-the-Snowden-archive-surface" rel="nofollow">https://www.computerweekly.com/news/366552520/New-revelation...</a><p>Unfortunately the relevant text for the second is pretty long so I dont wanna quote it.</p>
]]></description><pubDate>Sun, 04 Feb 2024 07:14:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=39248306</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39248306</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39248306</guid></item><item><title><![CDATA[New comment by _kbh_ in "A brief history of the U.S. trying to add backdoors into encrypted data (2016)"]]></title><description><![CDATA[
<p>> It is likely that the backdoor consisted in some cache memory test registers used during production, but it is absolutely incomprehensible how it has been possible for many years that those test registers were not disabled at the end of the manufacturing process but they remained accessible for the attackers who knew Apple's secrets.<p>I think we are nearly certain that the bug is because of a MMIO accessible register that allows you to write into the CPU's cache (its nearly certain this is related to the GPU's coherent L2 cache).<p>But I don't think it's 'incomprehensible' that such a bug could exist unintentionally. Modern computers and even more so high end mobile devices are a huge basket of complexity that has so many interactions and coprocessors all over the place I think it's very likely that a similar bug exists undiscovered unmitigated.<p>> For instance any iPhone could be completely controlled remotely after sending to it an invisible iMessage message.<p>I don't think the iMessage was invisible I think it deleted itself once the exploit had run, its also worth noting just how complicated the attack chain was and that the attacker _needed_ a hardware bug just to patch the kernel whilst having kernel code execution.</p>
]]></description><pubDate>Sun, 04 Feb 2024 00:42:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=39246302</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39246302</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39246302</guid></item><item><title><![CDATA[New comment by _kbh_ in "A brief history of the U.S. trying to add backdoors into encrypted data (2016)"]]></title><description><![CDATA[
<p>To add another dimension to this, personally i think that the Crypto AG relationship is what is referred to as "HISTORY" in this leaked NSA ECI codenames list.<p><a href="https://robert.sesek.com/2014/10/nsa_s_eci_compartments.html" rel="nofollow">https://robert.sesek.com/2014/10/nsa_s_eci_compartments.html</a><p>> HISTORY HST NCSC (TS//SI//NF) Protects NSA and certain commercial cryptologic equipment manufacturer relationships.</p>
]]></description><pubDate>Sun, 04 Feb 2024 00:24:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=39246184</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39246184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39246184</guid></item><item><title><![CDATA[New comment by _kbh_ in "A mistakenly published password exposed Mercedes-Benz source code"]]></title><description><![CDATA[
<p>> Indeed, especially when Googling "Mercedes report security issue" the page litterally populates the results with the address to email so it wasn't like it's hard to find.<p>Reporting via a third party isn't super unusual if you think that a organisation may be a bit legal threat happy from your report.</p>
]]></description><pubDate>Tue, 30 Jan 2024 10:05:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=39188269</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=39188269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39188269</guid></item><item><title><![CDATA[New comment by _kbh_ in "Inside the Steam Deck's APU"]]></title><description><![CDATA[
<p>You could always do it with instructions itd just be slow no?.</p>
]]></description><pubDate>Mon, 15 Jan 2024 03:16:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=38997089</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38997089</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38997089</guid></item><item><title><![CDATA[New comment by _kbh_ in "Inside the Steam Deck's APU"]]></title><description><![CDATA[
<p>> AMD holds an arm license and uses them as part of the software tpu in the pro series processors as I understand.<p>AMD uses ARM for its PSP as well which is more than just a TPM.<p>But afaik it also matters what type of license AMD has.<p>AMD would be need an ARM architecture license (like Apple has). This license allows you to do whatever you want with the chip (such as adding a x86 style memory model).<p>The downside to the architecture license is you have clean room design the chip entirely.</p>
]]></description><pubDate>Mon, 15 Jan 2024 03:11:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=38997053</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38997053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38997053</guid></item><item><title><![CDATA[New comment by _kbh_ in "Operation Triangulation: What you get when attack iPhones of researchers"]]></title><description><![CDATA[
<p>> Why? Apple isnt exactly a small family business and this is quite the drastic "feature" to be left enabled by accident.<p>Mistakes happen, maybe it's used in the manufacturing or fab phase to test something. Maybe it's used by the GPU firmware itself to perform some operations.<p>Maybe it was used by some older SoCs to do something and was just never removed.<p>Apple may not be a small family business but silly mistakes still happen all over the place in nearly every large system.<p>To quote another post by macran cause I feel like it's super relevant when trying to analyse how this kind of stuff comes about.<p><i>@nicolas17 @nil Correct. The question is, how many more of these fun bypasses are left undiscovered? The GPU is a huge amount of hardware and firmware.</i><p>Computers are so incredibly complicated now days that these kinds of hardware bugs are likely sitting around elsewhere as well, they don't come around that often because the amount of effort required to find them is likely a lot, which is likely only viable for a nation state actor.</p>
]]></description><pubDate>Thu, 28 Dec 2023 10:28:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=38792025</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38792025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38792025</guid></item><item><title><![CDATA[New comment by _kbh_ in "Operation Triangulation: What you get when attack iPhones of researchers"]]></title><description><![CDATA[
<p>> Decade old Backdoors no<p>I really doubt it's a backdoor after reading the blog post and this thread chain from a prolific M1 MacBook hacker (macran) I think it was just an unused or very rarely used feature that was left enabled by accident.<p><a href="https://social.treehouse.systems/@marcan/111655847458820583" rel="nofollow">https://social.treehouse.systems/@marcan/111655847458820583</a><p>Some choice quotes.<p><i>First, yeah, the dbgwrap stuff makes perfect sense. I knew about it for the main CPUs, makes perfect sense it'd exist for the ASCs too. Someone had a lightbulb moment. We might even be able to use some of those tricks for debugging stuff ourselves :)</i><p><i>Second, that "hash" is almost certainly not a hash. It's an ECC code*. I bet this is a cache RAM debug register, and it's writing directly to the raw cache memory array, including the ECC bits, so it has to manually calculate them (yes, caches in Apple SoCs have ECC, I know at least AMCC does and there's no reason to think GPU/ASC caches wouldn't too). The "sbox" is just the order of the input bits to the ECC generator, and the algorithm is a textbook ECC code. I don't know why it's somewhat interestingly shuffled like that, but I bet there's a hardware reason (I think for some of these things they'll even let the hardware synthesis shuffle the bits to whatever happens to be physically optimal, and that's why you won't find the same table anywhere else).</i></p>
]]></description><pubDate>Thu, 28 Dec 2023 06:19:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=38790633</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38790633</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38790633</guid></item><item><title><![CDATA[New comment by _kbh_ in "Latvia to start conscripting men for mandatory military service, starting 2024"]]></title><description><![CDATA[
<p>> Especially since NATO tries to expand to Ukraine despite saying it would not for decades.<p>The irony here being that no one promised anything to Russia regarding in any actionable way.<p>But Russia has multiple treaties where they say they will respect the borders and sovereignty of Ukraine.<p>If those treaties don’t matter to Russia why should any made up promises regarding NATO matter to anyone else.</p>
]]></description><pubDate>Mon, 30 Oct 2023 02:33:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=38065087</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38065087</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38065087</guid></item><item><title><![CDATA[New comment by _kbh_ in "Israel Helped to Spawn Hamas (2009)"]]></title><description><![CDATA[
<p>> Read this<p>><a href="https://www.nytimes.com/2023/10/24/world/middleeast/gaza-hospital-israel-hamas-video.html" rel="nofollow noreferrer">https://www.nytimes.com/2023/10/24/world/middleeast/gaza-hos...</a><p>I did and this doesn’t sound very “conclusive” at all<p>>> The Times’s finding does not answer what actually did cause the Al-Ahli Arab Hospital blast, or who is responsible.<p>><a href="https://twitter.com/QudsNen/status/1718547315764441095" rel="nofollow noreferrer">https://twitter.com/QudsNen/status/1718547315764441095</a><p>This tweets main source appears to the GreyZone which is a pro Russian propaganda rag that mostly peddles in misinformation I wouldn’t find it credible.</p>
]]></description><pubDate>Mon, 30 Oct 2023 02:06:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=38064934</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38064934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38064934</guid></item><item><title><![CDATA[New comment by _kbh_ in "Trabant"]]></title><description><![CDATA[
<p>The German Spy Museum in Berlin has a very cool modified Trabant door in their collection that has an embedded IR camera used by the Stasi in East Germany.<p><a href="https://www.berlin.de/en/museums/3977291-3104050-spy-museum-berlin.en.html" rel="nofollow noreferrer">https://www.berlin.de/en/museums/3977291-3104050-spy-museum-...</a></p>
]]></description><pubDate>Sun, 29 Oct 2023 05:55:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=38056120</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38056120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38056120</guid></item><item><title><![CDATA[New comment by _kbh_ in "Israel Helped to Spawn Hamas (2009)"]]></title><description><![CDATA[
<p>> [1] several sources, and most recently the NYT have shown that the rocket that the zinoist media said it caused the blast in the hospital actually came from israel.<p>I haven't seen anything that showed any conclusive proof that the rocket came from Israel, the blast pattern doesn't match any armaments that Israel has airburst or not.<p>I'm happy to change my mind with a link that provides concrete evidence though, can you provide one.</p>
]]></description><pubDate>Sun, 29 Oct 2023 03:36:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=38055654</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38055654</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38055654</guid></item><item><title><![CDATA[New comment by _kbh_ in "Quadcopters can now visually track targets more effectively"]]></title><description><![CDATA[
<p>> Ukraine was just foolish enough to sign up for the role of “US’s cannon fodder” in the never ending US-Russia war.<p>I think you will find its Russia who invaded, and Russia alone is the one who decided this.<p>No one else did, everyone else wanted peace, Russia alone wants war.</p>
]]></description><pubDate>Sun, 29 Oct 2023 02:47:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=38055457</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38055457</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38055457</guid></item><item><title><![CDATA[New comment by _kbh_ in "The destruction of Gaza's internet is complete"]]></title><description><![CDATA[
<p>> This is a completely made up fake story that's oft repeated by the Netanyahu administration. No basis in reality<p>We have pictures of dead babies from the October raid by Hamas, this is based in reality and is not made up.</p>
]]></description><pubDate>Sat, 28 Oct 2023 05:51:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=38047497</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38047497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38047497</guid></item><item><title><![CDATA[New comment by _kbh_ in "SpaceX Starship Super Heavy Project at the Boca Chica Launch Site"]]></title><description><![CDATA[
<p>> to me it's clear, if a private business sells a technology service that is being used in a war, the adversary is going to see that action as hostile and use powers within their means to neutralize the threat. I'm not sure you're using the word "conspiracy theory" correctly.<p>But Ukraine is literally using services from a SAR satellite right now, which is run by a private business.<p><a href="https://www.universetoday.com/157208/ukraine-crowdfunded-a-17m-reconnaissance-sar-satellite/" rel="nofollow noreferrer">https://www.universetoday.com/157208/ukraine-crowdfunded-a-1...</a><p>And yet theres 0 noise or even evidence anyones even thinking of blowing it out of the sky.</p>
]]></description><pubDate>Fri, 27 Oct 2023 06:46:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=38035437</link><dc:creator>_kbh_</dc:creator><comments>https://news.ycombinator.com/item?id=38035437</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38035437</guid></item></channel></rss>