<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: aj3</title><link>https://news.ycombinator.com/user?id=aj3</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 19 Apr 2026 12:40:53 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=aj3" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by aj3 in "Crypto brothers front-ran the front-runners"]]></title><description><![CDATA[
<p>The strategy that MEV bots use is not a law. It is not even defined or endorsed by Ethereum standards, and arguably is not an intended feature of the network.<p>You could alternatively claim that the guys defined their own protocol which addressed market inefficiency (which MEV is). Imo it's insane to claim that a trading technique you invented should have zero risk, and any losses you take are an indication of theft.</p>
]]></description><pubDate>Thu, 16 May 2024 23:12:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=40384454</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=40384454</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40384454</guid></item><item><title><![CDATA[New comment by aj3 in "Crypto brothers front-ran the front-runners"]]></title><description><![CDATA[
<p>> Tokens are property.<p>What law says this? Technically, tokens are smart contracts, basically OOP classes with both data and behavior. They also by design have public methods which are meant to be triggered by anyone on the chain. It's not at all obvious that triggering these methods in an unexpected order or with unexpected data is breaking any laws whatsoever. It's bytecode anyway, so there's no human readable EULA's or explanations on what you're allowed to do with the token.</p>
]]></description><pubDate>Thu, 16 May 2024 23:05:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=40384392</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=40384392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40384392</guid></item><item><title><![CDATA[New comment by aj3 in "Crypto brothers front-ran the front-runners"]]></title><description><![CDATA[
<p>I bet this indictment will be used as a case study to justify the need for government oversight and taxation.</p>
]]></description><pubDate>Thu, 16 May 2024 22:52:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=40384296</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=40384296</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40384296</guid></item><item><title><![CDATA[New comment by aj3 in "Crypto brothers front-ran the front-runners"]]></title><description><![CDATA[
<p>But you're not signing EULA's in order to participate in the network. Moreover, there are no real "laws / regulations" within the network either, specifying what you are or are not allowed to do. Ethereum standards merely determine how the software is supposed to work, but even then I'm sure Ethereum devs would oppose treating their docs as an agreement (because they don't offer any warranty, licensing or attestation). Moreover, there is an express goal to have a diverse set of software clients, so even developing your own software to be interoperable with existing standards can't be constructed as "an attack".<p>All this to say, I just fail to say how this can be constructed as "changing the terms of the transaction". There was no legal agreement between parties and no existing precedent to treat this as a malicious attack at all.<p>All I see is a Wall Street establishment pulling strings in order to protect their investment, by asking for a sudden government oversight in the system that was built with the express goal of not requiring any government oversight.</p>
]]></description><pubDate>Thu, 16 May 2024 22:50:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=40384276</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=40384276</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40384276</guid></item><item><title><![CDATA[New comment by aj3 in "Ask HN: Help, any US-based companies that allow you to work from Europe?"]]></title><description><![CDATA[
<p>It's weird to consider paying taxes as a tradeoff. "Digital nomad" isn't a code for tax avoidance, is it?</p>
]]></description><pubDate>Tue, 20 Feb 2024 17:12:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=39443847</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=39443847</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39443847</guid></item><item><title><![CDATA[Thinking Obliquely: Robert T. Jones, the Oblique Wing, NASA's Ad-1 Demonstrator]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.nasa.gov/aeronautics/thinking-obliquely-robert-t-jones-the-oblique-wing-nasas-ad-1-demonstrator-and-its-legacy/">https://www.nasa.gov/aeronautics/thinking-obliquely-robert-t-jones-the-oblique-wing-nasas-ad-1-demonstrator-and-its-legacy/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39012504">https://news.ycombinator.com/item?id=39012504</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 16 Jan 2024 12:22:24 +0000</pubDate><link>https://www.nasa.gov/aeronautics/thinking-obliquely-robert-t-jones-the-oblique-wing-nasas-ad-1-demonstrator-and-its-legacy/</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=39012504</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39012504</guid></item><item><title><![CDATA[Web Highlights]]></title><description><![CDATA[
<p>Article URL: <a href="https://web-highlights.com/">https://web-highlights.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=35235072">https://news.ycombinator.com/item?id=35235072</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 20 Mar 2023 17:21:42 +0000</pubDate><link>https://web-highlights.com/</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=35235072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35235072</guid></item><item><title><![CDATA[New comment by aj3 in "My Pinephone Setup"]]></title><description><![CDATA[
<p>Android has different security guarantees compared to desktop/server Linux. E.g. people should expect that none of the installed software can hijack the phone completely and that most damage from malware should be mitigateable by uninstalling malicious app.</p>
]]></description><pubDate>Mon, 14 Mar 2022 09:34:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=30670254</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=30670254</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30670254</guid></item><item><title><![CDATA[Network Infrastructure Security Guidance (NSA) [pdf]]]></title><description><![CDATA[
<p>Article URL: <a href="https://media.defense.gov/2022/Mar/01/2002947139/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_20220301.PDF">https://media.defense.gov/2022/Mar/01/2002947139/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_20220301.PDF</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=30555553">https://news.ycombinator.com/item?id=30555553</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 04 Mar 2022 14:49:15 +0000</pubDate><link>https://media.defense.gov/2022/Mar/01/2002947139/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_20220301.PDF</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=30555553</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30555553</guid></item><item><title><![CDATA[New comment by aj3 in "PSA: uBlock/AdBlocks on Chrome to lose function thanks to Manifestv3"]]></title><description><![CDATA[
<p>There were over a dozen of 0day exploits this year alone. Some used in water hole style attacks, so not even that targeted. And these are state of the art incidents which would have pwned even users with all the updates installed.<p>After the patch has been pushed out, exploits become progressively cheaper so letting users to postpone security updates is a crime.</p>
]]></description><pubDate>Sat, 11 Dec 2021 18:59:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=29523306</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29523306</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29523306</guid></item><item><title><![CDATA[New comment by aj3 in "Tell HN: Lost then regained access to Google account, with correct credentials"]]></title><description><![CDATA[
<p>Right. Session is stored either in cookies or in Local Storage. Both get cleared when you "clean cookies". If there is no device session, next time you're trying to log in, service will ask to show the second factor (so that hacker can't steal your account through finding the password on some other website).<p>Firefox didn't work, because person deleted session and didn't have second factor (nor backup auth methods). Chromium worked, because it still had device session.<p>I'm traveling and using TOR and VPNs just like everybody else and haven't faced any issues. There most definitely is a problem with communicating security/accessibility tradeoffs to the public though, so I'm not putting blame on the op here.</p>
]]></description><pubDate>Fri, 03 Dec 2021 14:47:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=29430580</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29430580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29430580</guid></item><item><title><![CDATA[New comment by aj3 in "Tell HN: Lost then regained access to Google account, with correct credentials"]]></title><description><![CDATA[
<p>It's not user agent, it's session (cookies, localStorage) that they didn't have in Firefox, but still had in Chromium. And this isn't Google specific at all.</p>
]]></description><pubDate>Fri, 03 Dec 2021 13:43:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=29429900</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29429900</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29429900</guid></item><item><title><![CDATA[New comment by aj3 in "Tell HN: Lost then regained access to Google account, with correct credentials"]]></title><description><![CDATA[
<p>Most probably they've added MFA and lost it. Devices that have been authenticated already can be used with the bare login & password, but new sessions will ask for the MFA they can't access.</p>
]]></description><pubDate>Fri, 03 Dec 2021 13:37:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=29429834</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29429834</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29429834</guid></item><item><title><![CDATA[New comment by aj3 in "Tell HN: Lost then regained access to Google account, with correct credentials"]]></title><description><![CDATA[
<p>Well yeah. If the recovery process is weaker than regular authentication, that's what bad guys will use for account takeover. You don't want to lose Gmail because someone bruteforced your backup code?</p>
]]></description><pubDate>Fri, 03 Dec 2021 13:36:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=29429820</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29429820</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29429820</guid></item><item><title><![CDATA[New comment by aj3 in "Price increase on .io domains on January 1, 2022 (Renewal: $55.00)"]]></title><description><![CDATA[
<p>AFAIK, there are exactly two ways to avoid getting phished. One is using physical security keys (not implemented everywhere and we can't expect everyone in the world to buy one). The second one is checking the domain you're in.<p>Please, do elaborate on what other ways of phishing preventions you have in minds.</p>
]]></description><pubDate>Thu, 02 Dec 2021 10:13:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=29414406</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29414406</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29414406</guid></item><item><title><![CDATA[New comment by aj3 in "Price increase on .io domains on January 1, 2022 (Renewal: $55.00)"]]></title><description><![CDATA[
<p>That's awesome for phishing.</p>
]]></description><pubDate>Wed, 01 Dec 2021 17:51:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=29406823</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29406823</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29406823</guid></item><item><title><![CDATA[New comment by aj3 in "Pixel sent to Google for replacement. They used it to post wife's nudes online"]]></title><description><![CDATA[
<p>The official repair shops that Apple Repair will guide you to should never ask for the pin, afaik. There is that mode for diagnostics which you need to approve, but you don't need to provide the pin - just unlock the phone and press approve button yourself.</p>
]]></description><pubDate>Wed, 01 Dec 2021 17:19:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=29406375</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29406375</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29406375</guid></item><item><title><![CDATA[New comment by aj3 in "Pixel sent to Google for replacement. They used it to post wife's nudes online"]]></title><description><![CDATA[
<p>Android has exactly this feature, two in fact: "Safe Folder" for regular files and "Locked Folder" for photos specifically.</p>
]]></description><pubDate>Wed, 01 Dec 2021 17:14:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=29406303</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29406303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29406303</guid></item><item><title><![CDATA[New comment by aj3 in "FBI's ability to legally access secure messaging app content and metadata [pdf]"]]></title><description><![CDATA[
<p>Employer might have been defense contractor. Most jobs without clearance don't even have "threat assessment coordinaror".</p>
]]></description><pubDate>Wed, 01 Dec 2021 05:55:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=29401121</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29401121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29401121</guid></item><item><title><![CDATA[New comment by aj3 in "American spy hacked Booking.com, company stayed silent"]]></title><description><![CDATA[
<p>Counter example where companies didn't stay silent: <a href="https://en.wikipedia.org/wiki/Operation_Aurora" rel="nofollow">https://en.wikipedia.org/wiki/Operation_Aurora</a></p>
]]></description><pubDate>Thu, 11 Nov 2021 19:34:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=29192118</link><dc:creator>aj3</dc:creator><comments>https://news.ycombinator.com/item?id=29192118</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29192118</guid></item></channel></rss>