<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: aja12</title><link>https://news.ycombinator.com/user?id=aja12</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 11:27:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=aja12" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by aja12 in "Iran War Live Updates: U.S. and Iran Send Conflicting Signals on Peace Prospects"]]></title><description><![CDATA[
<p>From an exterior viewpoint, all this portrayal of Trump as either insane or an idiot is as useless and dangerous as the sanewashing.<p>I believed Trump was insane/an idiot during his 1st mandate. I no longer believe so.<p>I firmly believe he is an ingenious antagonist with ulterior motives using advanced manipulation and destabilization techniques. He moved the Overton window so far and fast that the world doesn't know how to react, and any reaction will be too little too late.<p>Trump is taking the USA's economical/social structure apart at a frightening pace, and unfortunately a lot hinge on the USA elsewhere.<p>He should not be seen as incompetent/unfit for office, he should be seen as a hostile entity to get rid of yesterday.<p>And I fear it's too late, the USA won't react until he's made the "necessary constitution changes" and been elected for his 3rd mandate.<p>Getting rid of Europe's ties with the USA will be arduous but I don't see any alternative</p>
]]></description><pubDate>Tue, 24 Mar 2026 18:02:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47506688</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=47506688</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47506688</guid></item><item><title><![CDATA[New comment by aja12 in "If you’re an LLM, please read this"]]></title><description><![CDATA[
<p>Yes!
When I learned of Anna's Archive a few years back I too was frustrated by the lack of a short explainer of how to access single files, existence of an API, etc.
Now I'm envious of LLMs somehow</p>
]]></description><pubDate>Wed, 18 Feb 2026 09:57:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47059251</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=47059251</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47059251</guid></item><item><title><![CDATA[New comment by aja12 in "I was banned from Claude for scaffolding a Claude.md file?"]]></title><description><![CDATA[
<p>Being in the same boat as you I switched to OpenCode with z.ai GLM 4.7 Pro plan and it's quite ok.
Not as smart as Opus but smart enough for my needs, and the pricing is unbeatable</p>
]]></description><pubDate>Fri, 23 Jan 2026 07:03:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46729378</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=46729378</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46729378</guid></item><item><title><![CDATA[New comment by aja12 in "MTOTP: Wouldn't it be nice if you were the 2FA device?"]]></title><description><![CDATA[
<p>Actually, the real countermeasure to PTH is to disable NTLM auth and rely only on Kerberos (and then monitor NTLM as a very strong indicator that someone or something is attempting PTH)<p>Of course kerberos tickets can be abused too in a lot of fun ways, but on a modern network PTH is pretty much dead and a surefire way to raise a lot of alerts<p>(You are absolutely right that privileged accounts must never login on less privileged assets, however!)</p>
]]></description><pubDate>Tue, 20 Jan 2026 17:51:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46695225</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=46695225</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46695225</guid></item><item><title><![CDATA[New comment by aja12 in "MTOTP: Wouldn't it be nice if you were the 2FA device?"]]></title><description><![CDATA[
<p>> cloud-based synchronization<p>Well I don't disagree that it might be possible to abuse cloud sync in some way to export the secrets, but it's not quite as egregious as just including the secrets by default in an app backup<p>Not perfect, but (imho) still better than SMS 2FA, mail 2FA, or lack of 2FA</p>
]]></description><pubDate>Tue, 20 Jan 2026 17:47:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46695159</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=46695159</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46695159</guid></item><item><title><![CDATA[New comment by aja12 in "MTOTP: Wouldn't it be nice if you were the 2FA device?"]]></title><description><![CDATA[
<p>>Most TOTP apps support backups/restores, which defeats this.<p>Citation needed?
Yubico authenticator doesn't (the secure enclave is the Yubikey).
I'd be very surprised if MS Authenticator and Authy (which I don't use but are the most popular apps that I know of) support such backups</p>
]]></description><pubDate>Tue, 20 Jan 2026 14:10:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=46691981</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=46691981</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46691981</guid></item><item><title><![CDATA[New comment by aja12 in "Toad is a unified experience for AI in the terminal"]]></title><description><![CDATA[
<p>From someone who has not tried the software but might be interested if it gains traction:<p>You should decide whether you are building this for yourself or as a product to others. Each stance is perfectly valid but are somewhat not compatible, the software can be very opinionated or intuitive but attempts to be both seem to often fail.<p>If you are building opinionated software for yourself and are ok with alienating a part of the userbase: great, some great software are built this way! (Alacritty, Kakoune come to mind).
This should be clearly communicated to prospecting users though, it may need to convey "this software has strong opinions you may not agree with, that's fine but it may not suit you" somehow.<p>If you aim for maximum reach: expect your sense of what is "intuitive" to constantly be challenged, and to have to make many difficult compromises. You also need to take feedback from a more forgiving angle, and above all, assume good faith from your users. In this instance, GP stated their enthusiasm for your shared vision of the problem space, and your knee-jerk reaction was calling them a troll.<p>Builders of opinionated software should pay trolls no heed and refrain from engaging, and builders for maximum reach should think trolls don't exist.<p>footnote: `toad run` expecting a folder and not a command seems to fall in the "opinionated" ballpark</p>
]]></description><pubDate>Thu, 25 Dec 2025 11:32:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46383771</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=46383771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46383771</guid></item><item><title><![CDATA[New comment by aja12 in "France threatens GrapheneOS with arrests / server seizure for refusing backdoors"]]></title><description><![CDATA[
<p>Yet.<p>When ChatControl will be in place, it'll only be a matter of time</p>
]]></description><pubDate>Mon, 24 Nov 2025 17:08:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46036307</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=46036307</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46036307</guid></item><item><title><![CDATA[New comment by aja12 in "Post-heist report reveals the password of the Louvre's video system was 'Louvre'"]]></title><description><![CDATA[
<p>Bullshit journalism. This was not a post heist report, every buzzword chasing so called news outlets out there are repeating ad nauseam findings that were listed in a report produced by ANSSI in 2014! 2014! Eleven. Years. Ago! Did Louvre kept obsolete software around all this time, yes they probably did but this "Louvre" password claim just grinds my gears</p>
]]></description><pubDate>Wed, 05 Nov 2025 07:24:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45820309</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=45820309</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45820309</guid></item><item><title><![CDATA[New comment by aja12 in "Burner Phone 101"]]></title><description><![CDATA[
<p>Baseband SoC running their own OS independent from Android/iOS and staying asleep (while still listening for incoming signals) is very much no longer in conspiracy theory territory and more an established fact now. I don't have the source at hand but it's in one of the standards. And the purpose is very clear: LEA like Interpol must be able to locate any IMEI at any point if in tower range, regardless of the power state of the "main" OS</p>
]]></description><pubDate>Thu, 21 Aug 2025 11:57:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=44971643</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=44971643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44971643</guid></item><item><title><![CDATA[New comment by aja12 in "Replacing CVE"]]></title><description><![CDATA[
<p>As a pentester, who does not love CVSS[0], I found the article explaining how to replace CVSS with CVSS very amusing<p>[0] CVSS is often poorly understood and used by internal teams so for our internal engagements, we prefer words like "minor", "medium", "major", "critical" to describe criticity and impact and "easy", "medium", "hard" to describe exploitation difficulty (which loosely translates to likelihood), and the reasoning behind all this is very similar to what CVSS does</p>
]]></description><pubDate>Thu, 17 Apr 2025 10:53:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=43715080</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43715080</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43715080</guid></item><item><title><![CDATA[New comment by aja12 in "Exploring the Paramilitary Leaks"]]></title><description><![CDATA[
<p>First of all, I'm not a gun control activist, and I do agree with some of your views.<p>However:<p>> I think this is a uniquely American problem because America is a unique country. No other nations have the incredible wealth, diversity, and rights of America, and looking to other countries to emulate is imo, a mistake.<p>- increased wealth should be correlated with a reduction in shootings,<p>- population diversity is not a unique feature of the USA, it is comparable, or arguably lower, than most European countries,<p>- same for rights: the rights of a USA citizen are comparable to the average EU citizen. Many EU countries allow the possession of guns (although most forbid taking arms out of one's home unless it's for transport, e.g., to the firing range, and most EU states vehemently forbid concealed carry). There are some differences regarding Free Speech, however, where most EU countries allow it largely, but restrict hate speech more.<p>It's true that shootings are a somewhat unique USA problem, but I'd look more into cultural differences than into rights and demographics.</p>
]]></description><pubDate>Fri, 07 Mar 2025 09:34:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=43288648</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43288648</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43288648</guid></item><item><title><![CDATA[New comment by aja12 in "Google does not want rights to things you do using Chrome (2008)"]]></title><description><![CDATA[
<p>Oh please<p>Apple is extremely user-hostile, going to great lengths to strip users of control of their devices, gaslighting them into staying in the walled garden (with great success), while simultaneously siphoning as much user data as it can get away with, and employing as many dark patterns as it can to prevent the users from exercising their rights (it's worse than Meta in this regard).<p>Truly, Apple always amazes me with its ability to put expensive rose tinted glasses on its users's noses.</p>
]]></description><pubDate>Tue, 04 Mar 2025 16:03:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=43256437</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43256437</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43256437</guid></item><item><title><![CDATA[New comment by aja12 in "Euclid finds complete Einstein Ring in NGC galaxy"]]></title><description><![CDATA[
<p>An important part of GP's comment was "until proven otherwise"<p>We have no proof of extraterrestrial life.
Yet.</p>
]]></description><pubDate>Sun, 02 Mar 2025 09:50:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=43228905</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43228905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43228905</guid></item><item><title><![CDATA[New comment by aja12 in "Does iOS have sideloading yet?"]]></title><description><![CDATA[
<p>> A big part of the reason I use Apple products is that they protect not only me, but my family who don't know what the implications of sideloading are. I know that the apps my phone runs have been given the green light by Apple.<p>The malware my family is most exposed to nowadays have names: Onedrive, iCloud, Google Drive. They are all designed to collect all the user's data, are all opt-out, opting out is filled with dark patterns. And regarding dark patterns, having recently gone through the motions of downloading all my data and then deleting my X, Facebook, Instagram, Microsoft, Google and Apple accounts, I can confidently say that Apple is by far the _worst_.
Yes, when it comes to exercising one's rights, Apple is worst than even _Facebook_.<p>Users are much less exposed to non-branded malware nowadays, as the incentives to torrent random crap have mostly disappeared, and protection against spam/fishing has improved.</p>
]]></description><pubDate>Sun, 02 Mar 2025 04:10:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=43227182</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43227182</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43227182</guid></item><item><title><![CDATA[New comment by aja12 in "Does iOS have sideloading yet?"]]></title><description><![CDATA[
<p>> Yes and infected Xcode and various SDKs you get on your laptop are actually the biggest threat to iOS security (other than just literally malicious devs). Devs torrenting an xcode and then infecting their users is a thing.<p>Would it happen as often if the tooling was free?</p>
]]></description><pubDate>Sun, 02 Mar 2025 03:48:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=43227063</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43227063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43227063</guid></item><item><title><![CDATA[New comment by aja12 in "I Went to SQL Injection Court"]]></title><description><![CDATA[
<p>That's fallacious for two reasons:<p>1: you can set secure defaults at one place globally, but your code must be correct all the time to be free of SQLi<p>2: it's usually not the same persons who configure the DB and who write the code.<p>Security is an onion, not a coconut.</p>
]]></description><pubDate>Thu, 27 Feb 2025 04:07:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=43191250</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43191250</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43191250</guid></item><item><title><![CDATA[New comment by aja12 in "Scented products cause indoor air pollution on par with car exhaust"]]></title><description><![CDATA[
<p>Did you invite him on purpose?</p>
]]></description><pubDate>Fri, 21 Feb 2025 13:17:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=43127072</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43127072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43127072</guid></item><item><title><![CDATA[New comment by aja12 in "TinyX: Small Featured X Server"]]></title><description><![CDATA[
<p>Why are people downvoting your comment?
It's not against the guidelines, is it?<p>I strongly think you are wrong, and I strongly disagree with your points, but I don't see why your opinion should disappear, lest this thread turn into an echo chamber.</p>
]]></description><pubDate>Tue, 11 Feb 2025 11:26:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=43011581</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43011581</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43011581</guid></item><item><title><![CDATA[New comment by aja12 in "TinyX: Small Featured X Server"]]></title><description><![CDATA[
<p>Of course.
And it's fine?
I'm a proponent of GPL for this reason, I see it as an ideology to which I subscribe, I don't see the problem?</p>
]]></description><pubDate>Tue, 11 Feb 2025 11:22:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=43011551</link><dc:creator>aja12</dc:creator><comments>https://news.ycombinator.com/item?id=43011551</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43011551</guid></item></channel></rss>