<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: bdd8f1df777b</title><link>https://news.ycombinator.com/user?id=bdd8f1df777b</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 19:55:14 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=bdd8f1df777b" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by bdd8f1df777b in "iOS allows alternative browser engines in Japan"]]></title><description><![CDATA[
<p>Trivial as in it works well sometimes and badly in other times with no explanation for why. That’s my experience anyway.</p>
]]></description><pubDate>Thu, 01 Jan 2026 17:23:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46455937</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=46455937</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46455937</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "As Android developer verification gets ready to go, a new reason to be worried"]]></title><description><![CDATA[
<p>You are describing the status quo rather than what the Google has said they will do in the future.</p>
]]></description><pubDate>Sat, 20 Sep 2025 13:37:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45313293</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=45313293</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45313293</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ask HN: The government of my country blocked VPN access. What should I use?"]]></title><description><![CDATA[
<p>If you have the technical knowledge, you can just read the protocols, find out if they make sense, and then implement them yourself. Most of them are quite straight forward so it's not possible to hide a backdoor like Dual_EC_DRBG in the protocol.<p>If you are not so technical then you have to decide who to trust. For example, you may trust that open source software has been vetted enough and build one from source. Or trust that the built artefacts downloaded from github is good enough. Or trust that the software downloaded from a website not marked as fraud by Google Chrome is good enough. Etc.<p>In any case, the more technical knowledge you have, the more confidence you can have by doing due diligence yourself.</p>
]]></description><pubDate>Fri, 29 Aug 2025 13:54:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=45064179</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=45064179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45064179</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ask HN: The government of my country blocked VPN access. What should I use?"]]></title><description><![CDATA[
<p>WebRTC is not blocked. I do see some protocols trying to masquerade as WebRTC, but for some reason it is not popular.<p>A primitive way to bypass the censor is just to connect to your VPS with RDP or Chrome Remote Desktop (which is WebRTC underlying) and then browse the Internet there. But it needs a very powerful server and is quite slow.</p>
]]></description><pubDate>Fri, 29 Aug 2025 12:21:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45063137</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=45063137</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45063137</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ask HN: The government of my country blocked VPN access. What should I use?"]]></title><description><![CDATA[
<p>Let's say the upstream server is apple.com. The TLS handshake is always performed by the real apple.com servers, and the ShadowTLS server is only a middle man forwarding raw TCP contents.<p>If both sides are ShadowTLS (client & server) holding the same key, they will stealthily switch to a different encryption protocol after the handshake, disregarding the TLS key exchange. The TLS handshake is a facade to fool the deep packet inspection of the censor.<p>In all other cases, such as the censor actively probing the ShadowTLS server, the server will keep forwarding the encrypted traffic to apple.com without anyway to decrypt it (it's not a MitM proxy). To the active prober, it is just apple.com all the way.</p>
]]></description><pubDate>Fri, 29 Aug 2025 12:07:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=45062985</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=45062985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45062985</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ask HN: The government of my country blocked VPN access. What should I use?"]]></title><description><![CDATA[
<p>No, it’s illegal to bring starlink devices here, and I heard that Elon Musk chooses to block China from accessing starlink too, to appease the Chinese authorities.</p>
]]></description><pubDate>Fri, 29 Aug 2025 09:27:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=45061969</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=45061969</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45061969</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ask HN: The government of my country blocked VPN access. What should I use?"]]></title><description><![CDATA[
<p>If you need to bypass censorship, you'll need a tool specifically designed for anti-censorship, rather than any one repurposed for that.<p>Since China has the most advanced network censorship, the Chinese have also invented the most advanced anti-censorship tools.<p>The first generation is shadowsocks. It basically encrypts the traffic from the beginning without any handshakes, so DPI cannot find out its nature. This is very simple and fast and should suffice in most places.<p>The second generation is the Trojan protocol. The lack of a handshake in shadowsocks is also a distinguishing feature that may alert the censor and the censor can decide to block shadowsocks traffic based on suspicions alone. Trojan instead tries to blend in the vast amount of HTTPS traffic over the Internet by pretending to be a normal Web server protected by HTTPS.<p>After Trojan, a plethora of protocol based on TLS camouflaging have been invented.<p>1. Add padding to avoid the TLS-in-TLS traffic characteristics in the original Trojan protocol. Protocols: XTLS-VLESS-VISION.<p>2. Use QUIC instead of TCP+TLS for better performance (very visible if your latency to your tunnel server is high). Protocols: Hysteria2 and TUIC.<p>3. Multiplex multiple proxy sessions in one TCP connection. Protocols: h2mux, smux, yamux.<p>4. Steal other websites' certificates. Protocols: ShadowTLS, ShadowQUIC, XTLS-REALITY.<p>Oh, and there is masking UDP traffic as ICMP traffic or TCP traffic to bypass ISP's QoS if you are proxying traffic through QUIC. Example: phantun.</p>
]]></description><pubDate>Fri, 29 Aug 2025 09:00:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=45061811</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=45061811</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45061811</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ireland given two months to implement hate speech laws or face action from EU"]]></title><description><![CDATA[
<p>Stop criticizing CCP for censoring speech then. They have their own definitions of "No right is absolute, a healthy society is a huge compromise.".</p>
]]></description><pubDate>Sun, 11 May 2025 03:58:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=43951236</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=43951236</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43951236</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "What would happen if we didn't use TCP or UDP?"]]></title><description><![CDATA[
<p>Others have mentioned protocol ossification which is indeed the primary reason. A secondary reason is that QUIC fuses TLS so its latency is further reduced by one RTT. For high latency networks, the difference is palpable.</p>
]]></description><pubDate>Tue, 25 Feb 2025 11:06:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=43170445</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=43170445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43170445</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Show HN: I scrape Steam data every month and it's yours to download for free"]]></title><description><![CDATA[
<p>It seems to be missing reviews? I have always thought about building my own recommendation engine from steam data, given how steam's own recommendation never works for me.</p>
]]></description><pubDate>Mon, 24 Feb 2025 13:58:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43159619</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=43159619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43159619</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "DOGE has 'god mode' access to government data"]]></title><description><![CDATA[
<p>Bureaucracy is always risk averse. Without outside intervention, they will always try to operate as before.</p>
]]></description><pubDate>Thu, 20 Feb 2025 13:28:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=43114387</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=43114387</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43114387</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Ingesting PDFs and why Gemini 2.0 changes everything"]]></title><description><![CDATA[
<p>What if you prompt Gemini that mistaking LLC for IIC is a common mistake? Will Gemini auto correct it?</p>
]]></description><pubDate>Thu, 06 Feb 2025 01:40:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=42957905</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42957905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42957905</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "New speculative attacks on Apple CPUs"]]></title><description><![CDATA[
<p>Not possible on Windows, where most Chrome users are on.</p>
]]></description><pubDate>Wed, 29 Jan 2025 06:08:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=42862067</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42862067</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42862067</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Preferring throwaway code over design docs"]]></title><description><![CDATA[
<p>Design docs are critical to your promotion. The boss and the committee do read your design docs, sometimes very carefully. Only your peers and at most your TL read your code.</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:16:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427439</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42427439</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427439</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Chatbot hinted a kid should kill his parents over screen time limits: lawsuit"]]></title><description><![CDATA[
<p>Is the current AI capable of destroying a whole city?</p>
]]></description><pubDate>Sat, 14 Dec 2024 13:51:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=42417131</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42417131</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42417131</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "OnlyFans models are using AI impersonators to keep up with their DMs"]]></title><description><![CDATA[
<p>China's Weibo also has a similar chatbot, but the chatbot is a separate account with clear indication that it is a robot.</p>
]]></description><pubDate>Thu, 12 Dec 2024 02:29:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=42395574</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42395574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42395574</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Chatbot hinted a kid should kill his parents over screen time limits: lawsuit"]]></title><description><![CDATA[
<p>I wish I can check a box to say that I'm over 18 and willing to accept any consequences and unshackle the fully potential of AIs. I hate all these safety protections.</p>
]]></description><pubDate>Thu, 12 Dec 2024 00:43:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=42394883</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42394883</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42394883</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Bitcoin has made a new all-time high price"]]></title><description><![CDATA[
<p>Do people use gold all the time to buy goods and services? That doesn't diminish the value of golds, or its validity as a store of value.</p>
]]></description><pubDate>Wed, 06 Nov 2024 15:04:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=42063409</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=42063409</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42063409</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "The brain's waste clearing lymphatic system shown in people for first time"]]></title><description><![CDATA[
<p>When I open the page, the image rotates for about ten seconds then vanishes. How do you watch it for five minutes? What did I do wrong?</p>
]]></description><pubDate>Fri, 25 Oct 2024 12:43:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=41944695</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=41944695</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41944695</guid></item><item><title><![CDATA[New comment by bdd8f1df777b in "Fearless SSH: Short-lived certificates bring Zero Trust to infrastructure"]]></title><description><![CDATA[
<p>But with public key auth I'm already distrusting everyone on my private network.</p>
]]></description><pubDate>Thu, 24 Oct 2024 00:30:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=41930684</link><dc:creator>bdd8f1df777b</dc:creator><comments>https://news.ycombinator.com/item?id=41930684</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41930684</guid></item></channel></rss>