<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: arminiusreturns</title><link>https://news.ycombinator.com/user?id=arminiusreturns</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 08:42:39 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=arminiusreturns" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by arminiusreturns in "Guix for Development"]]></title><description><![CDATA[
<p>Now if we could just get people to combine Guix and other guile scheme packages that are awesome like mcron into their stacks, and then backfeed more fixes into the ecosystem, we have a real chance at helping GNUland!</p>
]]></description><pubDate>Mon, 26 Jan 2026 04:09:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46761781</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46761781</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46761781</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Ask HN: What are you working on? (January 2026)"]]></title><description><![CDATA[
<p>This is the year I take my open source MMO to public alpha!</p>
]]></description><pubDate>Mon, 12 Jan 2026 02:12:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46583078</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46583078</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46583078</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Statement from Jerome Powell"]]></title><description><![CDATA[
<p>If you are a complete normie, turn back now, it's gonna get conspiratorial. Otherwise, read on for some insights.<p>First, one must understand that the Federal Reserve was the main trojan horse vehicle for the European banking families into America. Read any number of good books, starting with the latest edition of G. Edward Griffins "The Creature from Jekyll Island".<p>But all that is mostly known already to those who have payed attention and done the reading... so whats next?<p>My conclusion is that America is being setup, in multiple ways (fall guy for global empire, etc), but one major setup that is going on right now is a twofer: 1) Jack up the US economy at any time by raising rates and unraveling the ponzi scheme and 2) If you do 1), you have the perfect excuse to try to implement some CBDC-esque new system, but this time with much more surveillance tech, for example unified ledgers that merge digital identity with financial identity, with ESG and social credit style added on. Read Whitney Webb for more on the structures being put in place for this.<p>So what is happening is that Trump knows the people that control the Fed, for whom the Fed chair is a mere mouthpiece, really want to suddenly and unexpectedly hike rates and soon, but Trump doesn't want it to happen under his last term, so he has been doing major backroom maneuvering to influence the Fed every time a rate-change date is coming up. Essentially he wants to kick the can to the next POTUS, but since the Fed is technically independent, it really can do whatever it wants, all he can do is fire after the fact. My guess is they will drop it on him late term, a perfect excuse to usher in the political pendulum swing of the hegelian game they play with us.<p>To me, that this backroom maneuvering is becoming more public tells me they really want to do the sudden rate hike.<p>Want a decent intro to the real fed? Try this video from the great James Corbett: <a href="https://www.youtube.com/watch?v=5IJeemTQ7Vk" rel="nofollow">https://www.youtube.com/watch?v=5IJeemTQ7Vk</a></p>
]]></description><pubDate>Mon, 12 Jan 2026 02:03:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46582993</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46582993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46582993</guid></item><item><title><![CDATA[New comment by arminiusreturns in "What an unprocessed photo looks like"]]></title><description><![CDATA[
<p>Now how do I apply this to get the most realistic looking shaders in 3d?</p>
]]></description><pubDate>Mon, 29 Dec 2025 11:44:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46419729</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46419729</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46419729</guid></item><item><title><![CDATA[New comment by arminiusreturns in "The dawn of a world simulator"]]></title><description><![CDATA[
<p>I'm doing a metasim in full 3D with physics, I just keep seeing the limitations of the video format too much, but it is amazing when done right. The other biggest concern is licensing of output.</p>
]]></description><pubDate>Thu, 25 Dec 2025 02:11:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46381453</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46381453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46381453</guid></item><item><title><![CDATA[New comment by arminiusreturns in "I got hacked: My Hetzner server started mining Monero"]]></title><description><![CDATA[
<p>edit* Apparently because I haven't used firewall-cmd in a long time, I was wrong on this: firewall-cmd does indeed use nftables by default.</p>
]]></description><pubDate>Tue, 23 Dec 2025 00:33:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46361002</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46361002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46361002</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Ask HN: Why isn't there competition to LinkedIn yet?"]]></title><description><![CDATA[
<p>Social gates, not tech ones. Linkedin exploits the network effects of gui-ninjas under stockholm syndrome to an anti-user service.<p>The same reason you get wierd looks when you say you don't facebook sometimes.<p>It's like existing outside the control or influence of some $manyuser $app/$website is unthinkable to those who exist within the prison ecosystems. I am a greybeard linux admin moonlighting in windows world, and the state of infra in ms land is baaaaadddd. When I tell engineers though, I get a thousand justifications about why its ok that its this bad (because it was worse before, etc), because the tooling is so bad it gets in the way of accomplishing your goals.<p>Same mentality... I personally don't really understand it. Either you control your compute or you don't.<p>Thats who linkedin draws. I used to exclude linkedin resumes when interviewing heavier linux engineering/ops candidates for this reason.</p>
]]></description><pubDate>Tue, 23 Dec 2025 00:29:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46360974</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46360974</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46360974</guid></item><item><title><![CDATA[New comment by arminiusreturns in "I got hacked: My Hetzner server started mining Monero"]]></title><description><![CDATA[
<p>UFW and Firewall-CMD both just use iptables in that context though. The real upgrade is in switching to nftables. I know I'm going to need to learn eBpf as the next step too, but for now nftables is readable and easy to grok especially after you rip out the iptables stuff, but technically nftables is still using netfilter.<p>And ufw supports nftables btw. I think the real lesson is write your own firewalls and make them non-permissive - then just template that shit with CaC.</p>
]]></description><pubDate>Thu, 18 Dec 2025 12:57:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=46312087</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46312087</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46312087</guid></item><item><title><![CDATA[New comment by arminiusreturns in "GitHub postponing the announced billing change for self-hosted GitHub Actions"]]></title><description><![CDATA[
<p>Just as cloud agnosticism means you should be able to bootstrap your infra in different clouds, that also includes your ci/cd. As a greybeard sysadmin, my advice is to start separating your ci/cd from the platforms you run on.<p><a href="https://www.slingacademy.com/article/git-post-receive-hook-a-practical-guide-with-examples/" rel="nofollow">https://www.slingacademy.com/article/git-post-receive-hook-a...</a><p>Another of my tricks is to tie in your containerization there too, system-nspawn is what I'm using at the moment, but it can apply to others.</p>
]]></description><pubDate>Thu, 18 Dec 2025 12:41:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46311940</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46311940</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46311940</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Ensuring a National Policy Framework for Artificial Intelligence"]]></title><description><![CDATA[
<p>Where this is really going: AI is the boogie man they are going to try to use to infiltrate and take over computing, it's 90s cryptowars 3.0<p>The pivot will be when they starting talking about AGI and it's dangers and how it must be regulated! (/clutches pearls)... right now they are at the "look at AI we need it it's awesome" stage.</p>
]]></description><pubDate>Sat, 13 Dec 2025 13:04:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46254252</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46254252</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46254252</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Going Through Snowden Documents, Part 1"]]></title><description><![CDATA[
<p>Where are the rest of them? Glen Greenwald has never answered that question well enough for me.</p>
]]></description><pubDate>Fri, 12 Dec 2025 00:53:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46239595</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46239595</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46239595</guid></item><item><title><![CDATA[New comment by arminiusreturns in "UK House of Lords attempting to ban use of VPNs by anyone under 16"]]></title><description><![CDATA[
<p>UK House of Lords are a buncha of Jimmy Savile pal types, if you get my drift. The same blackmail and bribery networks that exist in the US largely were learned from the Brits, who of course gave Palestine to the zionists on behalf of dragging America into a war they mostly engineered via Edward the 7ths diplomatic intrigues and the pre-war formation of the entangling alliances.<p>So for a long time, I traced most roads in the US back to London... (for example Star Chamber origins)...<p>After a while though, as I dug into the real history of banking, I realized when William of Orange was installed it was shortly after that the Bank of England was established to take them over the same way they later influenced us (Jekyll Island) to establish the Fed, the main trojan horse for a country being monetary countrol.<p>So I now understand just like the masons, or  intel dudes, etc, many of them are just so compartmentalized they don't know what they are a part of. I now view the UK the same way.<p>So lets keep following the strings up the chain...<p>"You win battles by knowing the enemy's timing, and using a timing which the enemy does not expect." - Miyamoto Musashi</p>
]]></description><pubDate>Fri, 12 Dec 2025 00:46:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46239516</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46239516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46239516</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Israel used Palantir technologies in pager attack in Lebanon"]]></title><description><![CDATA[
<p>Can expound on what software did this on its own?</p>
]]></description><pubDate>Wed, 10 Dec 2025 18:55:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46221867</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=46221867</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46221867</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Immutable Software Deploys Using ZFS Jails on FreeBSD"]]></title><description><![CDATA[
<p>I second systemd-nspawn being a hidden gem for this usecase. I use git post-recieve hooks that target it for much of my ci/cd pipelines.<p>I also find myself using nspawn just to isolate apps like firefox, etc.</p>
]]></description><pubDate>Sat, 08 Nov 2025 06:12:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45854555</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45854555</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45854555</guid></item><item><title><![CDATA[New comment by arminiusreturns in "FSF announces Librephone project"]]></title><description><![CDATA[
<p>Yep, with DMA sometimes. I've heard this same thing on the Pinephone forums iirc during the early years.</p>
]]></description><pubDate>Wed, 15 Oct 2025 01:27:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45587064</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45587064</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45587064</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Modern Linux tools"]]></title><description><![CDATA[
<p>I think many of us linux admins have such a list. Mine in particular is carefully crafted around GPL-izing my stack as much as possible. I really like the format of this ikrima.dev one though! The other stuff is great too, worth a peruse.</p>
]]></description><pubDate>Mon, 13 Oct 2025 13:18:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=45568017</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45568017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45568017</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Modern Linux tools"]]></title><description><![CDATA[
<p>Another reason emacs as an OS (not fully, but you know) is such a great way to get used to things you have on systems. Hence the quote: "GNU is my operating system, linux is just the current kernel".<p>As a greybeard linux admin, I agree with you though. This is why when someone tells me they are learning linux the first thing I tell them is to just type "info" into the terminal and read the whole thing, and that will put them ahead of 90% of admins. What I don't say is why: Because knowing what tooling is available as a built-in you can modularly script around that already has good docs is basically the linux philosophy in practice.<p>Of course, we remember the days where systems only had vi and not even nano was a default, but since these days we do idempotent ci/cd configs, adding a tui-editor of choice should be trivial.</p>
]]></description><pubDate>Mon, 13 Oct 2025 13:12:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=45567958</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45567958</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45567958</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Hosting a website on a disposable vape"]]></title><description><![CDATA[
<p>Even in the US, selling to kids is illegal in most states, so the same  issue applies: kid can't buy vape at store, kid goes to adult who is likely to be criminal to get them to buy for them, now kid is vulnerable to exploitation.</p>
]]></description><pubDate>Mon, 15 Sep 2025 22:56:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=45255992</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45255992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45255992</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Wanted to spy on my dog, ended up spying on TP-Link"]]></title><description><![CDATA[
<p>The soulutions is iptables.<p>The solution is nftables.<p>The solution is bpf.<p>The solution is emacs-m-x-butterfly-bpf.</p>
]]></description><pubDate>Mon, 15 Sep 2025 22:50:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45255936</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45255936</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45255936</guid></item><item><title><![CDATA[New comment by arminiusreturns in "Pass: Unix Password Manager"]]></title><description><![CDATA[
<p>I recently did a deep dive on cli password management in an attempt to harden my bash scripts. (yes, I love bash, despite HN always loving to talk crap about it)<p>Pass is just a shell wrapper around gnupg, when you run pass some/secret/path, what actually happens is pass constructs and executes a gpg command (e.g., gpg --decrypt ~/.password-store/some/secret/path.gpg) and the output of gpg (the plaintext secret) is piped to pass's stdout.<p>Most people know this though. What I learned I didn't know before though was this:<p>Memory Zeroing: after it's used (e.g., copied to a pipe or stdout), GPG's internal memory management aims to zero out those memory regions used as soon as they are no longer needed<p>Memory Locking: GnuPG also uses mlock() (or equivalent OS-specific calls) to lock sensitive memory pages into RAM. This prevents the plaintext keys and decrypted data from being swapped out to disk, protecting against swap-file forensics or cold boot attacks.<p>I had been banging my head against bash trying to do those things manually, and ended up with the conclusion it was best to use pass/gpg with the following addendums (from my notes in my skeleton secure bash template):<p>1. Minimize secret lifetime: Use subshells, functions with local variables, and unset, disable bash history<p>2. Pipe secrets directly: Pass secrets via stdin or process substitution directly to the consuming program without intermediate variables if possible.<p>3. Rely on the tools: Use pass, gpg, or KMS CLIs that are themselves implemented in lower-level languages and can (and should) implement these memory protection techniques internally.<p>ps: keepassxc is the other favorite to use</p>
]]></description><pubDate>Sun, 14 Sep 2025 18:21:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=45242062</link><dc:creator>arminiusreturns</dc:creator><comments>https://news.ycombinator.com/item?id=45242062</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45242062</guid></item></channel></rss>