<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: arcfour</title><link>https://news.ycombinator.com/user?id=arcfour</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 11:04:39 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=arcfour" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by arcfour in "OpenSSL 4.0.0"]]></title><description><![CDATA[
<p>CloudFlare has supported it since 2023: <a href="https://blog.cloudflare.com/announcing-encrypted-client-hello/and" rel="nofollow">https://blog.cloudflare.com/announcing-encrypted-client-hell...</a> Firefox has had it enabled by default since version 119: <a href="https://support.mozilla.org/en-US/kb/faq-encrypted-client-hello#w_how-do-i-enable-ech-in-firefox" rel="nofollow">https://support.mozilla.org/en-US/kb/faq-encrypted-client-he...</a> so you can use it today.</p>
]]></description><pubDate>Tue, 14 Apr 2026 19:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47769990</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47769990</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47769990</guid></item><item><title><![CDATA[New comment by arcfour in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>A building collapse and a poorly built website UI are completely different in terms of actual risk.</p>
]]></description><pubDate>Tue, 14 Apr 2026 15:34:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47767027</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47767027</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47767027</guid></item><item><title><![CDATA[New comment by arcfour in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>Sure, I should have said geolocation element, since the original API still exists and is used: <a href="https://developer.mozilla.org/en-US/docs/Web/HTML/Reference/Elements/geolocation" rel="nofollow">https://developer.mozilla.org/en-US/docs/Web/HTML/Reference/...</a></p>
]]></description><pubDate>Tue, 14 Apr 2026 15:32:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47766998</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47766998</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47766998</guid></item><item><title><![CDATA[New comment by arcfour in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>Opt in features are a great way to increase user frustration and confusion. See the whole new geolocation API they had to make for browsers since people would perma-deny it reflexively and then complain that geolocation features weren't working.</p>
]]></description><pubDate>Tue, 14 Apr 2026 08:00:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47762674</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47762674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47762674</guid></item><item><title><![CDATA[New comment by arcfour in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>As a user, I really don't care about the supposed purity or correctness of a website's tech stack. When I click "back" I want to go back to what I think the previous page was.</p>
]]></description><pubDate>Tue, 14 Apr 2026 07:59:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47762660</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47762660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47762660</guid></item><item><title><![CDATA[New comment by arcfour in "Sam Altman's home targeted in second attack"]]></title><description><![CDATA[
<p>Well, I guess you'll always live in a land of division and spite, always angry yourself, and the "others" always angry back at you, squabbling forever while things slowly get worse. I hope you enjoy the bed you've made for yourself.</p>
]]></description><pubDate>Mon, 13 Apr 2026 15:17:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47753253</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47753253</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47753253</guid></item><item><title><![CDATA[New comment by arcfour in "Sam Altman's home targeted in second attack"]]></title><description><![CDATA[
<p>Does it really matter who is more violent? The fact of the matter is both sides <i>do</i> have a nonzero amount of crazy/violent people and both sides could treat the other with more respect instead of furthering division.<p>You will notice I never said that both sides have the same amount of violence (since I don't think that that's actually relevant), so you are responding to a point I never made to begin with.</p>
]]></description><pubDate>Mon, 13 Apr 2026 00:44:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47746173</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47746173</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47746173</guid></item><item><title><![CDATA[New comment by arcfour in "Sam Altman's home targeted in second attack"]]></title><description><![CDATA[
<p>"The other side are where all of the bad guys and crazy violent lunatics are. The side I align with is the only sensible one; we would never do anything like that."<p>This sort of thinking <i>causes</i> extremism and division. It only perpetuates more of the thing you don't want!<p>It's also empirically not true: there are crazy people on both sides, but most people are pretty reasonable. If you treat them as if they are, despite your differences, they won't feel so alienated and perhaps you can both have a productive conversation. Both sides views are then likely to soften, and you can maybe even start working together.</p>
]]></description><pubDate>Sun, 12 Apr 2026 23:49:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47745783</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47745783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47745783</guid></item><item><title><![CDATA[New comment by arcfour in "Anthropic downgraded cache TTL on March 6th"]]></title><description><![CDATA[
<p>Begone, AI spambot.</p>
]]></description><pubDate>Sun, 12 Apr 2026 18:48:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47743024</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47743024</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47743024</guid></item><item><title><![CDATA[New comment by arcfour in "The Vercel plugin on Claude Code wants to read your prompts"]]></title><description><![CDATA[
<p>And yet many people assume malice by default and are unhappy as a result in this day and age. It's unfortunate.</p>
]]></description><pubDate>Fri, 10 Apr 2026 01:29:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47712476</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47712476</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47712476</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>You can also use SB with your own keys (or even just hashes)...just because Microsoft is the default included with most commercially sold PCs—since most people use Windows on their PCs—doesn't mean SB is controlled by them. You can remove their signing cert entirely if you want. I have done this and used my own.<p>Plus they signed the shim loader for Linux anyways so they almost immediately gave up any "control" they might have had through SB.</p>
]]></description><pubDate>Wed, 08 Apr 2026 23:48:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47697638</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47697638</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47697638</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>Citation for what? The existence of bootkits?<p>Petya/NotPetya, Alureon, Carberp/Rovnix, Gapz, LoJax (firmware rootkit!).<p>All of these attacks would be thwarted by SB (and in Petya's case, simply having UEFI enabled at all, since that was only for BIOS machines)</p>
]]></description><pubDate>Wed, 08 Apr 2026 23:44:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47697613</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47697613</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47697613</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>I (the commenter you responded to) am a security engineer by trade and I'm arguing that SB is useful. I'm not sure if the parent commenter is or isn't a security person but my interactions with other people in the security field have given me the impression that most of them think it's good, too.<p>So I'm a little confused about the "can't threat model for shit part," I think these sorts of attacks are definitely within most security folks threat models, haha</p>
]]></description><pubDate>Wed, 08 Apr 2026 23:24:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47697478</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47697478</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47697478</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>So everyday users should be vulnerable to bootkits and kernel-mode malware...why, exactly? That is useful security. The fact that people do not pursue this type of malware very frequently is an effect of SB proliferation. If it were not the default then these attacks would be more popular.</p>
]]></description><pubDate>Wed, 08 Apr 2026 21:29:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47696525</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47696525</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47696525</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>The attacker does this when the drive is already unlocked & the OS is running.<p>Backdooring your kernel is much, much more difficult to recover from than a typical user-mode malware infection.</p>
]]></description><pubDate>Wed, 08 Apr 2026 21:26:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47696499</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47696499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47696499</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>I run Linux with Secure Boot and I don't feel locked out of any media, applications, or websites.<p>My mom uses Secure Boot with Windows and doesn't know or care that it's enabled at all.</p>
]]></description><pubDate>Wed, 08 Apr 2026 19:19:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694955</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47694955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694955</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>> anyone that cared enough about that specific vector just put their bootloader on a removable media. FDE wasn't somehow enabled by secure boot.<p>Sure, but an attacker could still overwrite your kernel which your untouched bootloader would then happily run. With SB at least in theory you have a way to validate the entire boot chain.<p>> why weren't they more common before?<p>Because security of the rest of the system was not at the point where they made sense. CIH could wipe system firmware and physically brick your PC - why write a bootkit then? Malware then was also less financially motivated.<p>When malware moved from notoriety-driven to financially-driven in the 2000s, bootkits did become more common with things like Mebroot & TDL/Alureon. More recently, still before Secure Boot was widespread, we had things like the Classic Shell/Audacity trojan which overwrote your MBR: <a href="https://www.youtube.com/watch?v=DD9CvHVU7B4" rel="nofollow">https://www.youtube.com/watch?v=DD9CvHVU7B4</a> and Petya ransomware. With SB this is an  attack vector that has been largely rendered useless.<p>It's also a lot more difficult to write a malicious bootloader than it is to write a usermode app that runs itself at startup and pings a C2 or whatever.</p>
]]></description><pubDate>Wed, 08 Apr 2026 19:15:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694904</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47694904</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694904</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>But...it doesn't restrict user freedom. If the user wishes to do so, they can disable SB.</p>
]]></description><pubDate>Wed, 08 Apr 2026 19:03:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694735</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47694735</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694735</guid></item><item><title><![CDATA[New comment by arcfour in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>I strongly disagree on the Secure Boot front. It's necessary for FDE to have any sort of practical security, it reduces malicious/vulnerable driver abuse (making it nontrivial), bootkits are a security nightmare and would otherwise be much more common in malware typical users encounter, and ultimately the user can control their secure boot setup and enroll their own keys if they wish.<p>Does that mean that Microsoft doesn't also use it as a form of control? Of course not. But conflating "Secure Boot can be used for platform control" with "Secure Boot provides no security" is a non-sequitur.</p>
]]></description><pubDate>Wed, 08 Apr 2026 18:47:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694518</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47694518</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694518</guid></item><item><title><![CDATA[New comment by arcfour in "Sonnet 4.6 Elevated Rate of Errors"]]></title><description><![CDATA[
<p>Their rationale provided for that is safety-based, not infrastructure-based.</p>
]]></description><pubDate>Wed, 08 Apr 2026 18:41:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694434</link><dc:creator>arcfour</dc:creator><comments>https://news.ycombinator.com/item?id=47694434</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694434</guid></item></channel></rss>