<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: alufers</title><link>https://news.ycombinator.com/user?id=alufers</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 05:08:58 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=alufers" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by alufers in "NYC wants you to stop taking traffic cam selfies, but here's how to do it anyway"]]></title><description><![CDATA[
<p>A bit tangential, but in Poland we also had such traffic cameras with public access (it wasn't a live feed, but a snapshot updated every minute or so). It was provided by a company which won a lot of tenders for IT infrastructure around roads (<a href="https://www.traxelektronik.pl/pogoda/kamery/" rel="nofollow">https://www.traxelektronik.pl/pogoda/kamery/</a>).<p>What is interesting to me is that the public access to the cameras has been blocked a few months after the war in Ukraine started. For a few months I could watch the large convoys of equipment going towards Ukraine, and my personal theory is that so did the MoD of Russia. I haven't seen any reports about that, just my personal observation.</p>
]]></description><pubDate>Sun, 15 Dec 2024 12:05:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=42422999</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=42422999</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42422999</guid></item><item><title><![CDATA[New comment by alufers in "OpenWRT One Released: First Router Designed Specifically for OpenWrt"]]></title><description><![CDATA[
<p>Wouldn't a switch with ONIE [1] and Sonic NOS support [2] do the trick?<p>(I don't know the prices of such switches or whether they are available to prosumers, which would explain why almost nobody has them in a homelab)<p>[1] <a href="https://opencomputeproject.github.io/onie/" rel="nofollow">https://opencomputeproject.github.io/onie/</a>
[2] <a href="https://sonicfoundation.dev/" rel="nofollow">https://sonicfoundation.dev/</a></p>
]]></description><pubDate>Sun, 01 Dec 2024 13:56:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=42288472</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=42288472</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42288472</guid></item><item><title><![CDATA[New comment by alufers in "Is Telegram really an encrypted messaging app?"]]></title><description><![CDATA[
<p>I don't know how much you have used Telegram, but it's ridden with absolutely vile  stuff.<p>You open the "Telegram nearby" feature anywhere and it's full of people selling drugs and scams. When I mistyped something in the search bar I ended up in some ISIS propaganda channel (which was straight up calling for violence/terrorism). All of this on unencrypted public groups/channels ofc (I'm pretty sure it's the same with CP, although I'm afraid to check for obvious reasons).<p>I think there is a line between "protecting free speech" and being complicit in crime. This line has been crossed by Telegram.</p>
]]></description><pubDate>Mon, 26 Aug 2024 08:37:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=41355137</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=41355137</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41355137</guid></item><item><title><![CDATA[New comment by alufers in "Show HN: I am building an open-source Confluence and Notion alternative"]]></title><description><![CDATA[
<p>Not OP, but have to use the cloud version of Jira and Confluence. My biggest complaint is that they put the "Yes! Send me news and offers from Atlassian about products, events, and more." checkbox in the place where I would expect the "Remember me" checkbox.<p>Absolutely psychopatic behaviour.</p>
]]></description><pubDate>Sun, 30 Jun 2024 09:36:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=40836097</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=40836097</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40836097</guid></item><item><title><![CDATA[New comment by alufers in "What the damaged Svalbard cable looked like"]]></title><description><![CDATA[
<p>Some gun calibers are measured with inches, so maybe they have some imperial markers on hand to measure bullet casings?</p>
]]></description><pubDate>Sun, 26 May 2024 22:57:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=40486162</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=40486162</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40486162</guid></item><item><title><![CDATA[New comment by alufers in "T-Mobile employees across the country receive cash offers to illegally swap SIMs"]]></title><description><![CDATA[
<p>Probably one time use recovery codes you are supposed to print and keep in a safe place. In case of a bank this could also mean a trip to the nearest branch for ID verification.<p>The same issue you mentioned applies to other 2FA methods. Your TOTP codes and passkeys also live on your phone, Yubikeys can be stolen too.</p>
]]></description><pubDate>Mon, 15 Apr 2024 22:22:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=40046376</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=40046376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40046376</guid></item><item><title><![CDATA[New comment by alufers in "T-Mobile employees across the country receive cash offers to illegally swap SIMs"]]></title><description><![CDATA[
<p>I know everybody says how bad SMS 2FA is, and how we should replace it with the next cool thing $BIGCORP invented (thus requiring you to have an account with them, which only defers the problem).<p>But couldn't we pressure the telecoms to improve it?<p>I have an idea that would make SIM swaps way harder to execute. Namely a website that wants to authenticate you should be able query the telecom for some kind of SIM card ID. This would happen before sending a 2FA code.<p>With such a feature it would be easy to store the SIM card ID in a database when enrolling the phone number. Later when the user tries to authenticate and the ID does not match what saved before, the account is locked out. For enterprise accounts you would need to explain yourself to IT and for personal accounts a fallback 2FA would have to be used. Alternatively the authentication would be delayed for a few days to give the legitimate owner of the SIM card time to react.<p>Another thing that could be added on top of this is to send a SMS to the old "inactive" SIM, alerting the original owner of the attack.<p>EDIT: To add to this, here are some advantages of SMS 2FA over  time based OTP or passkeys:<p>1. My grandma can use it with her dumb phone and poor digital skills.
2. Your SIM card will most likely survive if your phone is destroyed due to water or physical damage. (Sadly not true for eSIM)
3. You can dictate an SMS/OTP code over the phone, or forward it to somebody you trust.
4. Banks can append a short description of what you are currently authorizing. It can tip you off in case your computer is infected with malware, or you are victim to one of those TeamViewer scams.</p>
]]></description><pubDate>Mon, 15 Apr 2024 21:57:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=40046156</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=40046156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40046156</guid></item><item><title><![CDATA[New comment by alufers in "Backdoor in upstream xz/liblzma leading to SSH server compromise"]]></title><description><![CDATA[
<p>Is that true? Large companies producing software usually have bespoke infra, which barely anyone monitors. See: the Solarwinds hack. Similarly to the xz compromise they added the a Trojan to the binary artifacts by hijacking the build infrastructure. According to Wikipedia "around 18,000 government and private users downloaded compromised versions", it took almost a year for somebody to detect the trojan.<p>Thanks to the tiered updates of Linux distros, the backdoor was caught in testing releases, and not in stable versions. So only a very low percentage of people were impacted. Also the whole situation happened because distros used the  tarball with a "closed source" generated script, instead of generating it themselves from the git repo. Again proving that it's easier to hide stuff in closed source software that nobody inspects.<p>Same with getting hired. Don't companies hire cheap contractors from Asia? There it would be easy to sneak in some crooked or even fake person to do some dirty work. Personally I was even emailed by a guy from China who asked me if I was willing to "borrow" him my identity so he could work in western companies, and he would share the money with me. Of course I didn't agree, but I'm not sure if everybody whose email he found on Github did.<p><a href="https://en.wikipedia.org/wiki/2020_United_States_federal_government_data_breach" rel="nofollow">https://en.wikipedia.org/wiki/2020_United_States_federal_gov...</a></p>
]]></description><pubDate>Sat, 30 Mar 2024 10:07:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=39873413</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=39873413</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39873413</guid></item><item><title><![CDATA[New comment by alufers in "Ask HN: Why does it seem hard to buy an ONT for fiber?"]]></title><description><![CDATA[
<p>I'm not sure where you live (probably the US), but here in Europe you can easily get GPON ONTs from different manufacturers. There even are whole communities dedicated to replacing your ISP's ONT+modem combo: <a href="https://hack-gpon.org/quick-start" rel="nofollow">https://hack-gpon.org/quick-start</a><p>In some countries (Germany) it's super easy, because there are laws forcing the ISPs to allow customer provided equipment, while in other countries you need to do some hackery with spoofing serial numbers and such of the original modem. People even make utilities to scrape that information via the administrative interface, and make the process semi-automated: <a href="https://github.com/StephanGR/GO-BOX">https://github.com/StephanGR/GO-BOX</a><p>The biggest problem for me about the ISP routers is their sheer size, they probably make them big so that they seem "powerful" to the average person and he chooses that ISP believing that their router provides superior Wi-Fi. New apartments built here (in Poland) even have nice boxes with the incoming fiber and an electrical socket where you are supposed to hide your Router, but the shoebox-sized devices don't fit there and you have to put them on the floor, or somewhere else. I myself have bought a SFP+ GPON (LEOX LXT-010S-H) transceiver, which is the smallest form-factor you can get. It goes inside my Banana-Pi R3 router, together with an LTE modem for backup connectivity. And this setup is still smaller than the box provided by my ISP, which only served as a bridge between GPON and my router.</p>
]]></description><pubDate>Sat, 09 Mar 2024 14:08:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=39651632</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=39651632</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39651632</guid></item><item><title><![CDATA[New comment by alufers in "Gitlab's ActivityPub architecture blueprint"]]></title><description><![CDATA[
<p>For me as a person who learned programming in the times of Github/lab/whatever, the idea of sending patches via email is fucking ridiculous.<p>The typical interface for handling merge/pull requests adds so many useful things over just sending a patch - if the project has CI I can immediately see if it even successfully builds before even going into the details of the PR.<p>Same for reviewing, each comment can be replied to separately or resolved, which serves as a nice TODO list for the original author.<p>I know there are some things people don't like (I think Linus was pretty vocal about it), but it seems to be they could be easily fixed by modifying the available open-source forges. This proposal here for example fixes the concern about centralisation, so I guess it's a good step forward.<p>Or maybe I'm just young and like shiny things and will eventually have a spiritual awakening and learn about the virtues of sending in patches via email.</p>
]]></description><pubDate>Wed, 31 Jan 2024 09:56:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=39201937</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=39201937</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39201937</guid></item><item><title><![CDATA[New comment by alufers in "Dynamouse: Mouse driver for Mac studios"]]></title><description><![CDATA[
<p>Does it work for touchscreens too? When I plug in a portable monitor with a touchscreen into my macOS laptop the touch input gets sent into the screen where the cursor is (ie. I touch the touchscreen but it clicks something on the internal display, because this is where I left the cursor), instead of always inputting on the physical monitor associated with this touchscreen.</p>
]]></description><pubDate>Wed, 31 Jan 2024 07:26:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=39201037</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=39201037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39201037</guid></item><item><title><![CDATA[New comment by alufers in "Tour of new custom M1 macOS runners racks with Christina Warren [video]"]]></title><description><![CDATA[
<p>I wonder how bulletproof Apple's macOS license is. Perhaps one could find a country where the "you can't run it on non-Apple hardware" clause is not valid, and get some good lawyers. Then just run a standard data center with normal multi-socket virtualization servers, and for each one buy a dead mac to have the rights to the software. Perhaps one could hot glue a powered off Apple motherboard inside of this server and claim that it is Apple hardware now.<p>Maybe it's risky, but you could easily compete on the per hour price with these shops, that have to buy actual macs, disassemble them and run all this custom infrastructure to support this.</p>
]]></description><pubDate>Sat, 20 Jan 2024 12:31:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=39067011</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=39067011</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39067011</guid></item><item><title><![CDATA[New comment by alufers in "Valetudo – Cloud replacement for vacuum robots enabling local-only operation"]]></title><description><![CDATA[
<p>You can just use the browser.</p>
]]></description><pubDate>Thu, 28 Dec 2023 10:41:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=38792083</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=38792083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38792083</guid></item><item><title><![CDATA[New comment by alufers in "GM says it's dropping Apple CarPlay and Android Auto because they're unsafe"]]></title><description><![CDATA[
<p>I still have a drawer full of phone holders and bluetooth receivers that I used in my previous car with a "dumb" radio. All of the holders were annoyingly rattling when driving over potholes and finicky to insert or remove the phone. From all the bluetooth receivers I tried (3 of them), none of them had a decent microphone, which meant making phone calls a no go, and the first 2 of them had poor power filtering resulting in a high-pitched hum (I suppose it was from the alternator).<p>Now I have a car with wireless Android Auto and when I start the car I immediately get a google maps view without having to search for the app, including two recommended destinations (usually places I go to frequently, or the last searched place on Gmaps). The whole interface is easier to use while driving, because of the limited feature-set and larger screen than on the phone itself. Same story with calling, it just works - I can answer calls from the buttons on the steering wheel and the mic is decent and in the right place.<p>Can we stop pretending that every innovation since 2010 is evil? I get it that it locks in you in Google's/Apple's ecosystems, but their solution is simply working well. For me the alternatives don't cut it, and I believe that their shoddy practices (data collection, monopoly etc.) should be fought with legislation and not by refusing to use their stuff on principle.</p>
]]></description><pubDate>Wed, 13 Dec 2023 14:45:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=38628070</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=38628070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38628070</guid></item><item><title><![CDATA[New comment by alufers in "Hardening cellular basebands in Android"]]></title><description><![CDATA[
<p>I used to live in an old apartment block with thick concrete walls, and away from a cellular base station. VoWifi was really helpful if I wanted to make calls from my home. I guess I could use WhatsApp/Facetime/Signal, but the insurance agent won't call me on WhatsApp from her landline phone :)<p>And it is not handled by an app on your phone, because of legacy reasons. I believe that, before LTE was introduced, 2G and 3G had a distinction between IP and voice traffic, so the baseband handled the voice transmission. Then they thought that LTE should be IP only and voice should be sent as VOIP over it, but  it still had to be handled by the baseband for backwards compatibility with 2G and 3G. And then they came up with the idea that the VOIP traffic could also be piped over Wi-Fi (through the main processor of the phone), and so VoWi-Fi was created.</p>
]]></description><pubDate>Wed, 13 Dec 2023 00:29:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=38620970</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=38620970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38620970</guid></item><item><title><![CDATA[New comment by alufers in "All design and engineering of the original Tesla Roadster is now open source"]]></title><description><![CDATA[
<p>Huh, their diagnostic software is a Puppy Linux ISO that you are supposed to run in VMWare. That's one way of software distribution :O<p><a href="https://github.com/teslamotors/roadster/blob/main/Diagnostic%20Software/Roadster%20Firmware%20Updater%20Quick%20Guide_v1.pdf">https://github.com/teslamotors/roadster/blob/main/Diagnostic...</a></p>
]]></description><pubDate>Wed, 22 Nov 2023 20:57:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=38384994</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=38384994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38384994</guid></item><item><title><![CDATA[New comment by alufers in "Linux and TPMs with systemd measured boot [video]"]]></title><description><![CDATA[
<p>If you take some basic precautions - disable interrupting the boot process, serial console, etc. then bypassing that requires significant effort. As an attacker you need to know the versions of the software working on the server, know some exploit and then have the experise to use it.<p>For example I know that the police in my country use off the shelf disk cloning devices and then some basic forensics software for analyzing the disk image. This can be done by an average computer technician, and such a TPM scheme would totally prevent them from extracting data. Of course for bigger cases they can invest some more effort, but they would have to be sure that there is some important data there to justify the cost.</p>
]]></description><pubDate>Sun, 05 Nov 2023 15:08:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=38151752</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=38151752</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38151752</guid></item><item><title><![CDATA[New comment by alufers in "Linux and TPMs with systemd measured boot [video]"]]></title><description><![CDATA[
<p>Convenience, faster boot. Or if you have a headless server with disk encryption, but you want it to come back online without intervention after a reboot or power failure.<p>It's all trade-offs.</p>
]]></description><pubDate>Sun, 05 Nov 2023 12:38:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=38150621</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=38150621</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38150621</guid></item><item><title><![CDATA[New comment by alufers in "OpenIPC: Alternative open firmware for your IP camera"]]></title><description><![CDATA[
<p>Yup, also the userspace application that does the actual streaming is closed-source as well: <a href="https://github.com/OpenIPC/majestic">https://github.com/OpenIPC/majestic</a><p>(The git repo is for bug reports only, no source-code there)</p>
]]></description><pubDate>Sun, 08 Oct 2023 18:27:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=37813104</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=37813104</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37813104</guid></item><item><title><![CDATA[New comment by alufers in "The Philips Hue ecosystem is collapsing"]]></title><description><![CDATA[
<p>Why is the proposed solution HomeKit? It requires an Apple device to control it and an iCloud Account.<p>Are account requirements from some companies better than other?</p>
]]></description><pubDate>Wed, 27 Sep 2023 00:31:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=37668011</link><dc:creator>alufers</dc:creator><comments>https://news.ycombinator.com/item?id=37668011</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37668011</guid></item></channel></rss>