<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: bauruine</title><link>https://news.ycombinator.com/user?id=bauruine</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 13:54:19 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=bauruine" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by bauruine in "4Chan mocks £520k fine for UK online safety breaches"]]></title><description><![CDATA[
<p>The Internet: Where the men are men, the women are men and the children are FBI agents.</p>
]]></description><pubDate>Thu, 19 Mar 2026 19:55:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47444976</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=47444976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47444976</guid></item><item><title><![CDATA[New comment by bauruine in "SSH has no Host header"]]></title><description><![CDATA[
<p>True but a server that wants to "deanonymize" you can just reject each key till he has all the default keys and the ones you added to your ssh agent.<p>You can try it yourself [0] returns all the keys you send and even shows you your github username if one of the keys is used there.<p>[0] ssh whoami.filippo.io</p>
]]></description><pubDate>Wed, 18 Mar 2026 07:50:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47422818</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=47422818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47422818</guid></item><item><title><![CDATA[New comment by bauruine in "SSH has no Host header"]]></title><description><![CDATA[
<p>ssh by default sends all your public keys to a server. Yes you can limit some keys to specific hosts but it's very easy to dox yourself.</p>
]]></description><pubDate>Wed, 18 Mar 2026 06:13:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47422107</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=47422107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47422107</guid></item><item><title><![CDATA[New comment by bauruine in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>The NSA surely has ordered a backdoor.<p>>In December 2013, a Reuters news article alleged that in 2004, before NIST standardized Dual_EC_DRBG, NSA paid RSA Security $10 million in a secret deal to use Dual_EC_DRBG as the default in the RSA BSAFE cryptography library
<a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" rel="nofollow">https://en.wikipedia.org/wiki/Dual_EC_DRBG</a></p>
]]></description><pubDate>Thu, 19 Feb 2026 10:06:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47072111</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=47072111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47072111</guid></item><item><title><![CDATA[Call for more Tor snowflake proxies]]></title><description><![CDATA[
<p>Article URL: <a href="https://forum.torproject.org/t/tor-relays-call-for-more-snowflake-proxies/21192">https://forum.torproject.org/t/tor-relays-call-for-more-snowflake-proxies/21192</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46902331">https://news.ycombinator.com/item?id=46902331</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 05 Feb 2026 17:46:43 +0000</pubDate><link>https://forum.torproject.org/t/tor-relays-call-for-more-snowflake-proxies/21192</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46902331</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46902331</guid></item><item><title><![CDATA[New comment by bauruine in "Reimplementing Tor from Scratch for a Single-Hop Proxy"]]></title><description><![CDATA[
<p>He uses the keys of his non-exit relay to directly connect from his workstation to an exit relay pretending to be the relay on his VPS. But yeah he could just use the VPS for wireguard which would be way easier.<p>I'm in Europe so I don't get less than 20Mbit/s on any circuit but I asume he could have got the same speed by just selecting a few local, fast nodes as bridge.</p>
]]></description><pubDate>Wed, 04 Feb 2026 07:32:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46882644</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46882644</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46882644</guid></item><item><title><![CDATA[New comment by bauruine in "Allowlisting some Bash commands is often the same as allowlisting all"]]></title><description><![CDATA[
<p>I had the same few years ago. When I pointed out that I can get full root with most of the whitelisted commands they answered "We know. It's not about security but to prevent lusers from accidentally rm -rf /* the server. Feel free to spawn a root shell. You obviously know what you do"</p>
]]></description><pubDate>Thu, 29 Jan 2026 05:04:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46806018</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46806018</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46806018</guid></item><item><title><![CDATA[New comment by bauruine in "Experts warn of growing parrot crisis in Canada [video]"]]></title><description><![CDATA[
<p>Releasing it is just murder by neglect so people don't feel bad about themself that they actually killed their pet just because "they can't care" for it anymore aka they don't want to deal with the minor inconvenience of caring for a pet anymore. Or worse they become a pest that wipes out whole local ecosystems.</p>
]]></description><pubDate>Sat, 17 Jan 2026 07:44:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46656106</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46656106</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46656106</guid></item><item><title><![CDATA[New comment by bauruine in "Experts warn of growing parrot crisis in Canada [video]"]]></title><description><![CDATA[
<p>You never release exotic pets to the wild. Isn't that common knowledge by now? If you can no longer care for an animal bring it to the vet to get it euthanized.</p>
]]></description><pubDate>Sat, 17 Jan 2026 07:13:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46655986</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46655986</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46655986</guid></item><item><title><![CDATA[New comment by bauruine in "A closer look at a BGP anomaly in Venezuela"]]></title><description><![CDATA[
<p>You don't have to be cloudflare for this kind of analysis you can do it yourself without even needing an ASN using RIPE RIS.<p><a href="https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris/" rel="nofollow">https://www.ripe.net/analyse/internet-measurements/routing-i...</a></p>
]]></description><pubDate>Thu, 08 Jan 2026 18:11:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46544367</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46544367</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46544367</guid></item><item><title><![CDATA[New comment by bauruine in "Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI"]]></title><description><![CDATA[
<p>I doubt it's that much but with the same logic you could also ban HN, SSH and basically any protocol thats not https "with no one noticing" because 99.9+% doesnt use it.</p>
]]></description><pubDate>Thu, 08 Jan 2026 16:13:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46542714</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46542714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46542714</guid></item><item><title><![CDATA[New comment by bauruine in "Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI"]]></title><description><![CDATA[
<p>Sure but from your link<p>>The PBL detects end-user IP address ranges which should not be attempting to directly deliver unauthenticated SMTP email to any Internet mail server. All the email originated by an IP listed in PBL is expected to be submitted - using authentication - to a SMTP server which delivers it to destination<p>Means in practice port 25 (unauthenticated) and port 587 (authenticated)</p>
]]></description><pubDate>Wed, 07 Jan 2026 16:26:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46528310</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46528310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46528310</guid></item><item><title><![CDATA[New comment by bauruine in "Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI"]]></title><description><![CDATA[
<p>Tor has a transport using exactly that.<p><a href="https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/" rel="nofollow">https://blog.torproject.org/introducing-webtunnel-evading-ce...</a></p>
]]></description><pubDate>Wed, 07 Jan 2026 06:08:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46523146</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46523146</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46523146</guid></item><item><title><![CDATA[New comment by bauruine in "Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI"]]></title><description><![CDATA[
<p>SMTP isn't filtered it's port 25 that is. And from a short look at the readme it looks like it's using the transmission port 587 which shouldn't be filtered.</p>
]]></description><pubDate>Wed, 07 Jan 2026 06:05:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46523134</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46523134</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46523134</guid></item><item><title><![CDATA[New comment by bauruine in "Privacy doesn't mean anything anymore, anonymity does"]]></title><description><![CDATA[
<p>Blending in with the crowd doesn't work. If you use Chrome on Windows you're part of a very large group and "don't stick out". But it's also very easy to fingerprint so you're also part of the "theturtletalks" group with the size of one.</p>
]]></description><pubDate>Sat, 20 Dec 2025 08:46:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46334570</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46334570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46334570</guid></item><item><title><![CDATA[New comment by bauruine in "Helldivers 2 devs slash install size from 154GB to 23GB"]]></title><description><![CDATA[
<p>More details here <a href="https://as32590.net/steamcache/" rel="nofollow">https://as32590.net/steamcache/</a></p>
]]></description><pubDate>Wed, 03 Dec 2025 16:46:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46136684</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=46136684</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46136684</guid></item><item><title><![CDATA[New comment by bauruine in "Meta replaces WhatsApp for Windows with web wrapper"]]></title><description><![CDATA[
<p>You mean like Matrix or XMPP? They just aren't as ubiquitous as email unfortunately.</p>
]]></description><pubDate>Thu, 13 Nov 2025 06:05:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45911283</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=45911283</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45911283</guid></item><item><title><![CDATA[New comment by bauruine in "Spinning Up an Onion Mirror Is Stupid Easy"]]></title><description><![CDATA[
<p>Yes it does but you can use Tor with other browsers too so it can make sense if you want to support them.</p>
]]></description><pubDate>Thu, 30 Oct 2025 13:53:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=45760045</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=45760045</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45760045</guid></item><item><title><![CDATA[New comment by bauruine in "Spinning Up an Onion Mirror Is Stupid Easy"]]></title><description><![CDATA[
<p>It's only 185.220.100 [0] and 185.220.101 [1] that contain all those relays. Some of the bigger German families work together as "Stiftung Erneuerbare Freiheit" that's why you see a big cluster there. But Tor never uses relays in the same /16 for a circuit so it's not really an issue.<p>[0] <a href="https://metrics.torproject.org/rs.html#search/185.220.100" rel="nofollow">https://metrics.torproject.org/rs.html#search/185.220.100</a>
[1] <a href="https://metrics.torproject.org/rs.html#search/185.220.101" rel="nofollow">https://metrics.torproject.org/rs.html#search/185.220.101</a></p>
]]></description><pubDate>Thu, 30 Oct 2025 12:10:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=45759142</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=45759142</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45759142</guid></item><item><title><![CDATA[New comment by bauruine in "Spinning Up an Onion Mirror Is Stupid Easy"]]></title><description><![CDATA[
<p>Tor does this sort of although not like you think. It's used as a bridge transport.<p>><a href="https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/" rel="nofollow">https://blog.torproject.org/introducing-webtunnel-evading-ce...</a><p>>WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. So, for an onlooker without the knowledge of the hidden path, it just looks like a regular HTTP connection to a webpage server giving the impression that the user is simply browsing the web.</p>
]]></description><pubDate>Thu, 30 Oct 2025 11:48:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45758992</link><dc:creator>bauruine</dc:creator><comments>https://news.ycombinator.com/item?id=45758992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45758992</guid></item></channel></rss>