<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: aleksejs</title><link>https://news.ycombinator.com/user?id=aleksejs</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 21:24:30 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=aleksejs" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by aleksejs in "Hardware Attestation as Monopoly Enabler"]]></title><description><![CDATA[
<p>> It doesn't provide a useful security feature, but it does lock out competition very well.<p>This seems to presuppose that service providers using reCAPTCHA are either clueless idiots or actively expending resources and lowering their conversion rates to support the supposed Google/Apple duopoly. That does not strike me as a plausible claim.</p>
]]></description><pubDate>Sun, 10 May 2026 20:25:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=48087580</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=48087580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48087580</guid></item><item><title><![CDATA[New comment by aleksejs in "Hardware Attestation as Monopoly Enabler"]]></title><description><![CDATA[
<p>TFA is authored by the developers of an alternative operating system that can be freely installed on every Google phone since Pixel 6.</p>
]]></description><pubDate>Sun, 10 May 2026 20:23:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=48087551</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=48087551</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48087551</guid></item><item><title><![CDATA[New comment by aleksejs in "Taxpayers May Be Eligible for Significant Tax Refunds – If They Act by July 10"]]></title><description><![CDATA[
<p>It argues no such thing. Of the 20 instances of the word "interest", 19 are obviously referring to the interest that the IRS will charge you on your balance if you don't pay your taxes by the due date. The one remaining one is this:<p>> Overpayment interest for the 2020–2023 disaster period.<p>and refers to the interest that the IRS will pay you if they owe you money (a refund) that they don't manage to return to you in a timely manner.<p>(All of this is explained on the main IRS website: <a href="https://www.irs.gov/payments/interest" rel="nofollow">https://www.irs.gov/payments/interest</a>)</p>
]]></description><pubDate>Sun, 10 May 2026 20:18:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=48087499</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=48087499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48087499</guid></item><item><title><![CDATA[New comment by aleksejs in "XHTML Club"]]></title><description><![CDATA[
<p>It's a cultural difference thing: <a href="https://russian.stackexchange.com/questions/13142/what-do-or-multiple-mean-in-an-internet-conversation" rel="nofollow">https://russian.stackexchange.com/questions/13142/what-do-or...</a></p>
]]></description><pubDate>Sat, 24 Jan 2026 18:45:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46746295</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46746295</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46746295</guid></item><item><title><![CDATA[New comment by aleksejs in "Extracting verified C++ from the Rocq theorem prover at Bloomberg"]]></title><description><![CDATA[
<p>How do you even begin to define what correctness means for the transformations if you have no formalized model of the thing you're transforming into?</p>
]]></description><pubDate>Sat, 24 Jan 2026 18:34:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46746179</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46746179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46746179</guid></item><item><title><![CDATA[New comment by aleksejs in "Extracting verified C++ from the Rocq theorem prover at Bloomberg"]]></title><description><![CDATA[
<p>The linked website and repository do not refer to the outputs as "verified C++". The use of that term in the submission title here seems misleading, and the Design Principles [1] document clarifies it is only the source (Rocq) programs that are formally verified. It seems far from obvious that the complex and ad-hoc syntactic transformations involved in translating them to C++ preserve the validity of the source proofs.<p>[1] <a href="https://github.com/bloomberg/crane/wiki/Design-Principles" rel="nofollow">https://github.com/bloomberg/crane/wiki/Design-Principles</a></p>
]]></description><pubDate>Sat, 24 Jan 2026 17:31:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46745575</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46745575</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46745575</guid></item><item><title><![CDATA[RCE in ImunifyAV, a common malware scanner for shared web hosting]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.popovs.lv/imunifyav-code-execution/">https://blog.popovs.lv/imunifyav-code-execution/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46734516">https://news.ycombinator.com/item?id=46734516</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 23 Jan 2026 16:36:24 +0000</pubDate><link>https://blog.popovs.lv/imunifyav-code-execution/</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46734516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46734516</guid></item><item><title><![CDATA[Exploiting deobfuscation in ImunifyAV for code execution (CVE-2025-65530)]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.popovs.lv/imunifyav-code-execution/">https://blog.popovs.lv/imunifyav-code-execution/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46542446">https://news.ycombinator.com/item?id=46542446</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 08 Jan 2026 15:54:00 +0000</pubDate><link>https://blog.popovs.lv/imunifyav-code-execution/</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46542446</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46542446</guid></item><item><title><![CDATA[New comment by aleksejs in "Security issues with electronic invoices"]]></title><description><![CDATA[
<p>I'm not sure why you take me for a JSON/JWT fan (I'm happy to agree they've had their own share of implementation bugs), or what that has to do with signature wrapping bugs in XML-DSig, which is what I've been talking about this entire time.</p>
]]></description><pubDate>Sat, 13 Dec 2025 20:00:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46257455</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46257455</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46257455</guid></item><item><title><![CDATA[New comment by aleksejs in "Security issues with electronic invoices"]]></title><description><![CDATA[
<p>I am comfortable saying that, when designing a signature scheme, people should not want features that are known to consistently lead to catastrophic vulnerabilities.</p>
]]></description><pubDate>Sat, 13 Dec 2025 18:22:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46256667</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46256667</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46256667</guid></item><item><title><![CDATA[New comment by aleksejs in "Security issues with electronic invoices"]]></title><description><![CDATA[
<p>That is not, in fact, the question. The whole point of storing signatures separately from the serialized bytes they sign is not having to rely on any properties of the serialization scheme. It does not matter whether your serialization is canonical or not if you don't need to parse the document before you've verified the signature on it. XML-DSig, to the contrary, requires that you parse the document, apply complex transformations to it, and then reserialize it before you can verify anything, which is what makes bugs like "oops the canonicalization method errored and now my library will accept a signature over the empty string as valid for any document" (<a href="https://portswigger.net/research/the-fragile-lock#void-canonicalization-technique" rel="nofollow">https://portswigger.net/research/the-fragile-lock#void-canon...</a>) possible.</p>
]]></description><pubDate>Sat, 13 Dec 2025 17:47:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46256372</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46256372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46256372</guid></item><item><title><![CDATA[New comment by aleksejs in "Security issues with electronic invoices"]]></title><description><![CDATA[
<p>Most of these attack vectors have been known for 10 years, and yet researchers keep finding bugs in major implementations to this day. Here's one from last week: <a href="https://portswigger.net/research/the-fragile-lock" rel="nofollow">https://portswigger.net/research/the-fragile-lock</a><p>> How would you digitally sign a Json document and embed the signature in the document?<p>You would not, because that's exactly how you get these bugs. Fortunately serialization mechanisms, whether JSON or Protobuf or XML or anything else, turn structured data into strings of bytes, and signature schemes operate on strings of bytes, so you'll have a great time signing data _after_ serializing it.</p>
]]></description><pubDate>Sat, 13 Dec 2025 02:59:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46251591</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46251591</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46251591</guid></item><item><title><![CDATA[New comment by aleksejs in "The healthcare market is taxing reproduction out of existence"]]></title><description><![CDATA[
<p>> God forbid you have an accident and you end up at the wrong hospital when the one down the road is in-network but the one they took you to is out-of-network and you wake up owing thousands of dollars.<p>If you examine the statement of benefits for your plan, you will find that it says something similar to this:<p>> Emergency Services are covered at the in-network cost-sharing level as required by applicable state or federal law if services are received from a non participating (out-of-network) provider.<p>> The member is responsible for applicable in-network cost-sharing amounts (any deductible, copay or coinsurance). The member is not responsible for any charges that may be made in excess of the allowable amount.</p>
]]></description><pubDate>Tue, 02 Dec 2025 17:31:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46123842</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=46123842</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46123842</guid></item><item><title><![CDATA[New comment by aleksejs in "Galaxy XR, the first Android XR headset"]]></title><description><![CDATA[
<p>> The focus on maps and gemini is hilarious. The first is literally the anti-use case,<p>It reminded me of the Wii U Street View app and the interview with its developers (at <a href="https://iwataasks.nintendo.com/interviews/wiiu/wii-street-u/0/2/" rel="nofollow">https://iwataasks.nintendo.com/interviews/wiiu/wii-street-u/...</a>). They were going for the same sort of a vibe, though it's unclear to me how many people actually ended up having that much fun with it.</p>
]]></description><pubDate>Sun, 26 Oct 2025 22:56:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=45715826</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=45715826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45715826</guid></item><item><title><![CDATA[New comment by aleksejs in "Google debuts device-bound session credentials against session hijacking"]]></title><description><![CDATA[
<p>I'm not sure I follow your point: how would a web service provider use a user's TPM in a pre-DBSC world? "Use hardware based attestation to tie the session token/cookie to the device" is pretty much exactly what DBSC does.<p>DBSC is intended to be deployed opportunistically alongside regular cookies, so users on devices without TPMs just won't benefit from the additional protections that DBSC provides.</p>
]]></description><pubDate>Thu, 28 Aug 2025 14:58:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45053031</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=45053031</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45053031</guid></item><item><title><![CDATA[New comment by aleksejs in "SAML Shield: Drop-in protection that works for any stack"]]></title><description><![CDATA[
<p>This is neat! We're building something similar at work, but instead of hand-rolling specific checks (like "first signature must be direct child of Response" in samlshield) we're fingerprinting the structure of the SAML response and checking if it matches what we've previously seen from that IdP. We figured that would be more likely to catch any exploitation attempts we didn't anticipate while giving us some flexibility to not have to hardcode specific IdP behaviors. Having specific hard checks seems really valuable too, though, especially for applications that might not have many SAML responses to backtest on. And kudos for sharing a great corpus of test cases!<p>One thing that would worry me when deploying this in the Proxy mode is that you'll likely end up with two different XML parsers in play: xmldom in samlshield and then whatever the actual application is using. As we saw with CVE-2025-25292, it may be possible to exploit different parser behavior to construct a document that will be interpreted differently between the two applications, potentially bypassing the checks in samlshield.</p>
]]></description><pubDate>Tue, 05 Aug 2025 20:32:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=44803880</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=44803880</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44803880</guid></item><item><title><![CDATA[New comment by aleksejs in "6 digit OTP for Two Factor Auth (2FA) is brute-forceable in 3 days"]]></title><description><![CDATA[
<p>> For a high value account, a motivated attacker can and will continue at this point. (And if you don't consider your accounts high value, why are you bothering with 2FA?).<p>Because credential stuffing is highly lucrative, even when no individual account is particularly high value, and is the most common way accounts are compromised on most services. There are other things a _user_ might do to prevent credential stuffing, like using unique passwords, but 2FA has the benefit of actually being visible/verifiable for you as a service provider.</p>
]]></description><pubDate>Mon, 20 Dec 2021 01:29:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=29620610</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=29620610</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29620610</guid></item><item><title><![CDATA[New comment by aleksejs in "Ask HN: Who is hiring? (December 2021)"]]></title><description><![CDATA[
<p>Duolingo | Pittsburgh, PA, USA | ONSITE, VISA | Security Engineer<p>Duolingo is the most popular language-learning application in the world, with over 500 million users and over half a billion exercises completed daily. Beyond our core learning product, we have also entered into literacy with Duolingo ABC and English proficiency testing with the Duolingo English Test. Our mission at Duolingo is to develop the best education in the world and make it universally available.<p>Our security team is growing and we are looking for engineers with experience in AppSec and CloudSec. We are running a microservice architecture on AWS and GCP, managed with Terraform, which supports our multiple web applications, mobile apps on Android and iOS, and a desktop Electron app.<p>Apply here: <a href="https://boards.greenhouse.io/duolingo/jobs/5392230002" rel="nofollow">https://boards.greenhouse.io/duolingo/jobs/5392230002</a></p>
]]></description><pubDate>Wed, 01 Dec 2021 19:32:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=29408107</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=29408107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29408107</guid></item><item><title><![CDATA[New comment by aleksejs in "Ask HN: Who is hiring? (November 2021)"]]></title><description><![CDATA[
<p>Duolingo | Pittsburgh, PA, USA | ONSITE, VISA | Security Engineer<p>Duolingo is the most popular language-learning application in the world, with over 500 million users and over half a billion exercises completed daily. Beyond our core learning product, we have also entered into literacy with Duolingo ABC and English proficiency testing with the Duolingo English Test. Our mission at Duolingo is to develop the best education in the world and make it universally available.<p>Our security team is growing and we are looking for engineers with experience in AppSec and CloudSec. We are running a microservice architecture on AWS and GCP, managed with Terraform, which supports our multiple web applications, mobile apps on Android and iOS, and a desktop Electron app.<p>Apply here: <a href="https://boards.greenhouse.io/duolingo/jobs/5392230002" rel="nofollow">https://boards.greenhouse.io/duolingo/jobs/5392230002</a></p>
]]></description><pubDate>Mon, 01 Nov 2021 15:07:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=29067611</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=29067611</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29067611</guid></item><item><title><![CDATA[New comment by aleksejs in "Ask HN: Who is hiring? (September 2021)"]]></title><description><![CDATA[
<p>Duolingo | Pittsburgh, PA, USA | ONSITE, VISA | Security Engineer<p>Duolingo is the most popular language-learning application in the world, with over 500 million users and over half a billion exercises completed daily. Beyond our core learning product, we have also entered into literacy with Duolingo ABC and English proficiency testing with the Duolingo English Test. 
Our mission at Duolingo is to develop the best education in the world and make it universally available.<p>Our security team is growing and we are looking for engineers with experience in AppSec and CloudSec. We are running a microservice architecture on AWS and GCP, managed with Terraform, which supports our multiple web applications, mobile apps on Android and iOS, and a desktop Electron app.<p>Apply here: <a href="https://boards.greenhouse.io/duolingo/jobs/5392230002" rel="nofollow">https://boards.greenhouse.io/duolingo/jobs/5392230002</a></p>
]]></description><pubDate>Wed, 01 Sep 2021 18:36:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=28383888</link><dc:creator>aleksejs</dc:creator><comments>https://news.ycombinator.com/item?id=28383888</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28383888</guid></item></channel></rss>