<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: avaloneon</title><link>https://news.ycombinator.com/user?id=avaloneon</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 28 Apr 2026 17:48:07 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=avaloneon" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by avaloneon in "Reddit Doubles Down"]]></title><description><![CDATA[
<p>This is something I've been investigating. If one had a gateway that spoke Reddit's API, the apps wouldn't even really have to pivot, just change the API base URL.<p>And in theory not even that. As long as the traffic can be redirected to a different server it should still work. In practice, however, at least Apollo has some server-side components so it wouldn't be totally plug-and-play without developer support.<p>Sadly, I'm not sure how to get in touch with the developers/users who may be interested.<p>(I've also heard that someone's working on a Reddit/Lemmy gateway, but I don't know who they are or how far they've gotten.)</p>
]]></description><pubDate>Wed, 14 Jun 2023 03:54:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=36321235</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=36321235</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36321235</guid></item><item><title><![CDATA[New comment by avaloneon in "Apple's game porting toolkit is fantastic. Cyberpunk 2077 at Ultra on an M1 MBP"]]></title><description><![CDATA[
<p>I feel like they're targeting VR.<p>Some background: Currently PCVR is basically 100% Windows. It's possible to stream VR games from a PC to a standalone headset (ie: with the Quest AirLink) but it depends on network conditions. For example, if both computer and headset are connected via WiFi, and neither has line of sight to the router, performance is likely to be questionable, at best. In theory a computer could use it's own WiFi chipset to make a direct connection, but there's also a WiFi 6 dongle that allows for a direct link between computer and headset.<p>With that said: Apple already has devices that talk to each other, laptops with high-speed WiFi chips, and now they're making a VR headset. So they have all the parts for a really slick PCVR (er, MacVR?) experience, except the games.<p>So I 100% don't think the timing is coincidental. They're almost certainly targeting PCVR, although I don't know what they will do with motion controllers. That said, there's still nearly a year until launch, so maybe they haven't shown us everything (or maybe it's not ready).<p>Edit: should also add that this might be really important for VR gaming because we don't know how much compute is available for apps. However, the dual-chip design implies that a single M2 was not enough for visionOS, which does not bode well.</p>
]]></description><pubDate>Thu, 08 Jun 2023 00:55:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=36235771</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=36235771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36235771</guid></item><item><title><![CDATA[New comment by avaloneon in "Apple Vision Pro: Apple’s first spatial computer"]]></title><description><![CDATA[
<p>FWIW, the Quest Pro can do both eye and face tracking on avatars right now, although whatever app you're using needs to support it and it's not yet photorealistic. (Meta's been working on photorealistic avatars but my understanding is they're currently too computationally expensive)<p>I couldn't find a really good demo, but this should give a decent idea: <a href="https://www.youtube.com/watch?v=lt0O4_56_qE">https://www.youtube.com/watch?v=lt0O4_56_qE</a><p>Meta also announced plans to use face tracked avatars for video calling in What's App and Messenger, although I'm not sure the status of that.</p>
]]></description><pubDate>Tue, 06 Jun 2023 01:16:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=36206810</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=36206810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36206810</guid></item><item><title><![CDATA[New comment by avaloneon in "Yacd – Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required"]]></title><description><![CDATA[
<p>> I still don't understand what would "FairPlay applications" entail? Anyone care to explain further?<p>Apps on iOS are kept encrypted until runtime, presumably to deter piracy.<p>Obviously this makes reverse engineering/studying apps difficult, hence all the interest in a way to get unencrypted apps</p>
]]></description><pubDate>Sun, 06 Sep 2020 10:38:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=24390398</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=24390398</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24390398</guid></item><item><title><![CDATA[New comment by avaloneon in "Curl to shell isn't so bad"]]></title><description><![CDATA[
<p>Part of the confusion comes from the fact that there are several different points do be discussed, and they're easy to mix up. For instance: software trust in general, web server security vs repository security, reproducibility, etc.<p>In this case, even "curl is dangerous" has at least two variations. The first is not knowing what the server is sending, the second is that the server can change what it is sending. My complaint is with the latter.<p>For example, a file in a repository somewhere or uploaded to a compromised web server is static. Everyone who downloads the file gets the same thing.<p>A file served by `curl | bash`, however, isn't. The server could send different files at different times of day, or only send malicious payloads to certain IPs (like known TOR exit nodes), or certain geographic locations, etc. which is something no repository I know of is even capable of.<p>Archives, packages, and installers downloaded from a server (instead of a repository or FTP server or S3 bucket where the attacker controls the file but not the server) share this weakness, so that alone doesn't make curl uniquely dangerous.<p>Where `curl | bash` differs from installers, however, is that it's <i>interactive</i>, so the server can alter its behavior on the fly. This is dangerous because, with installers, the attacker must commit to sending either a clean or infected payload before the installer can tell them if it's being run or not. In this way, even archives serve as a kind of a poor zero-knowledge proof of what the software is, since the attacker needs to commit to a version before knowing what the user intends to do. There's normally also a file left on disk as well.<p>With `curl | bash`, however, the server has the unique opportunity to get a callback from the installer <i>before it has finished sending it</i>, which means the server doesn't have to commit to sending malicious code blindly and hoping it's not being saved by someone who intends to audit it. Also, `curl | bash`, by default, leaves no trace, further frustrating auditing/reverse-engineering attempts. (Adding insult to injury, there's no way to check the malicious payload <i>before</i> running it, since running it is what causes it to appear. Even if run inside a VM, this can also be abused by an attacker to try to cover their tracks in real time)<p>In this way, `curl | bash` allows for obfuscation/anti-debugging techniques that no other method I know of offers. Hence, my opinion that `curl | bash` is "uniquely" dangerous.<p>Edit: Thinking about this more, this generalizes to any installer that interacts with the network, since all the attacker needs is a way to detect execution and some way to avoid leaving artifacts. In this way, curl is indeed not quite "uniquely" dangerous, since it's tied with other network-based installers. However, since the other popular installation methods don't have the ability to obfuscate their initial payload like this, I think the point still stands. (Obviously feel free to correct me if I overlooked something)</p>
]]></description><pubDate>Sat, 09 Nov 2019 23:39:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=21495305</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=21495305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21495305</guid></item><item><title><![CDATA[New comment by avaloneon in "Curl to shell isn't so bad"]]></title><description><![CDATA[
<p>I'm surprised that no one has yet mentioned that piping curl to bash can be detected by the server (previous discussion at <a href="https://news.ycombinator.com/item?id=17636032" rel="nofollow">https://news.ycombinator.com/item?id=17636032</a>). This allows an attacker to send different code if it's being piped to bash instead of saved to disk.<p>IMHO, "curl to shell" is uniquely dangerous, since all the other installation vectors mentioned don't support the bait-and-switch.</p>
]]></description><pubDate>Sat, 09 Nov 2019 09:47:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=21490580</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=21490580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21490580</guid></item><item><title><![CDATA[New comment by avaloneon in "FBI director: Cover up your webcam"]]></title><description><![CDATA[
<p>You might be interested in something like ORWL[1], which is arguably the most secure consumer PC I've ever heard of. It has tamper-resistant features, full disk encryption, and a secure co-processor which does things like disable the USB data paths when the system locks.<p>Admittedly, though, it's not a laptop.<p>As far as laptops go, the librem 13[2], with Qubes OS and coreboot would be a pretty good bet.<p>If you haven't already, definitely take a look at Qubes OS[3]. It offers security by compartmentalizing different workspaces in different vm's managed by Xen so, in theory, even a kernel exploit isn't getting very far into the system.<p>[1] <a href="https://www.crowdsupply.com/design-shift/orwl" rel="nofollow">https://www.crowdsupply.com/design-shift/orwl</a>
[2] <a href="https://puri.sm/librem-13/" rel="nofollow">https://puri.sm/librem-13/</a>
[3] <a href="https://www.qubes-os.org" rel="nofollow">https://www.qubes-os.org</a></p>
]]></description><pubDate>Thu, 15 Sep 2016 16:46:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=12507660</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=12507660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12507660</guid></item><item><title><![CDATA[New comment by avaloneon in "Hyundai’s 2015 Genesis will automatically brake for speed cameras"]]></title><description><![CDATA[
<p>The buzzword is "risk compensation". There's a whole article on Wikipedia about it (and lots of studies) but, to make a long story short, "measures, designed to improve traffic safety, may bring along negative consequences in a way that individuals increase the riskiness of their driving behaviour because they feel safer (Dulisse, 1997)"</p>
]]></description><pubDate>Fri, 27 Jun 2014 04:58:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=7952786</link><dc:creator>avaloneon</dc:creator><comments>https://news.ycombinator.com/item?id=7952786</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7952786</guid></item></channel></rss>