<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: beala</title><link>https://news.ycombinator.com/user?id=beala</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 05 Apr 2026 20:33:10 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=beala" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by beala in "Reticulum, a secure and anonymous mesh networking stack"]]></title><description><![CDATA[
<p>No, numbers stations are not permitted on amateur frequencies in the US. There are some notable cases of foreign governments setting these up and interfering with amateur allocations [1], but there's not much the FCC can do about that.<p>[1] <a href="https://www.arrl.org/news/russian-buzzer-disappears-chinese-foghorn-returns" rel="nofollow">https://www.arrl.org/news/russian-buzzer-disappears-chinese-...</a></p>
]]></description><pubDate>Tue, 20 Jan 2026 21:35:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46698046</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46698046</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46698046</guid></item><item><title><![CDATA[New comment by beala in "Reticulum, a secure and anonymous mesh networking stack"]]></title><description><![CDATA[
<p>> Voice encryption/scramble on Amateur-Band's is not allowed, everything else is ok.<p>It seems like you're saying voice encryption is not permitted, but data encryption is? This is not true in the US. Any encoding used for the purpose of "obscuring meaning" is not permitted on amateur frequencies. Even using code phrases like "the eagle has landed" is arguably not allowed. There are some narrow exceptions for things like satellite control codes, but nothing that applies to hobby mesh nets.<p>Here is the relevant Part 97 rule: <a href="https://www.ecfr.gov/current/title-47/part-97#p-97.113(a)(4)" rel="nofollow">https://www.ecfr.gov/current/title-47/part-97#p-97.113(a)(4)</a><p>> No amateur station shall transmit: [...] messages encoded for the purpose of obscuring their meaning, except as otherwise provided herein; obscene or indecent words or language; or false or deceptive messages, signals or identification.</p>
]]></description><pubDate>Tue, 20 Jan 2026 19:32:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46696678</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46696678</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46696678</guid></item><item><title><![CDATA[Txtempus: Radio time station transmitter using the Raspberry Pi]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/hzeller/txtempus">https://github.com/hzeller/txtempus</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46359568">https://news.ycombinator.com/item?id=46359568</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 22 Dec 2025 21:50:52 +0000</pubDate><link>https://github.com/hzeller/txtempus</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46359568</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46359568</guid></item><item><title><![CDATA[New comment by beala in "NIST was 5 μs off UTC after last week's power cut"]]></title><description><![CDATA[
<p>It sounds like GPS, and thus a GPS-based stratum 1 server, uses these time servers, but they were successfully failed over:<p>> Jeff finished off the email mentioning the US GPS system failed over successfully to the WWV-Ft. Collins campus. So again, for almost everyone, there was zero issue, and the redundancy designed into the system worked like it's supposed to.<p>So failures in these systems are potentially correlated.<p>The author mentions another solution. Apparently he runs his own atomic clock. I didn’t know this was a thing an individual could do.<p>> But even with multiple time sources, some places need more. I have two Rubidium atomic clocks in my studio, including the one inside a fancy GPS Disciplined Oscillator (GPSDO). That's good for holdover. Even if someone were jamming my signal, or my GPS antenna broke, I could keep my time accurate to nanoseconds for a while, and milliseconds for months. That'd be good enough for me.</p>
]]></description><pubDate>Mon, 22 Dec 2025 20:58:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46358993</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46358993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46358993</guid></item><item><title><![CDATA[New comment by beala in "Apple has locked my Apple ID, and I have no recourse. A plea for help"]]></title><description><![CDATA[
<p>On my iPhone, I can see the size of my iCloud photo backups. Settings -> Apple Account -> iCloud -> Storage.<p>Weirdly, that number is different than Immich’s estimate of my photo library (95 GB vs 150 GB), but perhaps good enough to get you in the ballpark.</p>
]]></description><pubDate>Sat, 13 Dec 2025 06:52:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46252614</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46252614</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46252614</guid></item><item><title><![CDATA[New comment by beala in "Apple has locked my Apple ID, and I have no recourse. A plea for help"]]></title><description><![CDATA[
<p>I self host an Immich [1] instance to backup photos on my iPhone. It’s OSS and has a level of polish I’ve rarely seen in free software. Really, it’s shockingly good. The iOS app whisks my photo off to my home server several times per day.<p>What I’m not sure about is how to backup things like iMessages, Notes, and my Contacts. Every time I’ve looked, it appears the only options are random GitHub scripts that have reverse engineered the iMessage database.<p>1. <a href="https://immich.app/" rel="nofollow">https://immich.app/</a></p>
]]></description><pubDate>Sat, 13 Dec 2025 06:38:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46252566</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46252566</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46252566</guid></item><item><title><![CDATA[New comment by beala in "Netflix’s AV1 Journey: From Android to TVs and Beyond"]]></title><description><![CDATA[
<p>There’s an infamous case of xerox photocopiers substituting in incorrect characters due to a poorly tuned compression algorithm. No AI necessary.<p><a href="https://en.wikipedia.org/wiki/JBIG2#:~:text=Character%20substitution%20errors%20in%20scanned%20documents" rel="nofollow">https://en.wikipedia.org/wiki/JBIG2#:~:text=Character%20subs...</a></p>
]]></description><pubDate>Fri, 05 Dec 2025 14:20:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46161613</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46161613</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46161613</guid></item><item><title><![CDATA[New comment by beala in "HP and Dell disable HEVC support built into their laptops' CPUs"]]></title><description><![CDATA[
<p>I don't understand why people downvote questions like this rather than just answer the question. It's a perfectly reasonable question imo given that it's not clear how this feature is being disabled. It appears that most of this is based on reddit speculation and the OEMs don't provide a definitive answer.<p>Meta: recently it seems like the community has been way too loose with the downvote button, but I'm not sure if I'm just noticing it more because it's getting on my nerves, or if there has actually been a change in behavior.</p>
]]></description><pubDate>Fri, 21 Nov 2025 15:15:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46005331</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=46005331</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46005331</guid></item><item><title><![CDATA[New comment by beala in "Data-at-Rest Encryption in DuckDB"]]></title><description><![CDATA[
<p>From the article:<p>> This allows for some interesting new deployment models for DuckDB, for example, we could now put an encrypted DuckDB database file on a Content Delivery Network (CDN). A fleet of DuckDB instances could attach to this file read-only using the decryption key. This elegantly allows efficient distribution of private background data in a similar way like encrypted Parquet files, but of course with many more features like multi-table storage. When using DuckDB with encrypted storage, we can also simplify threat modeling when – for example – using DuckDB on cloud providers. While in the past access to DuckDB storage would have been enough to leak data, we can now relax paranoia regarding storage a little, especially since temporary files and WAL are also encrypted.</p>
]]></description><pubDate>Thu, 20 Nov 2025 21:16:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45997857</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45997857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45997857</guid></item><item><title><![CDATA[New comment by beala in "Maestro Technology Sells Used SSD Drives as New"]]></title><description><![CDATA[
<p>Seagate has a proprietary version of SMART called FARM. It’s supposed to be more tamper resistant than SMART, but it appears the fraudsters have figured out how to manipulate it too [1].<p>The best you can do is check FARM if available and perform a long burn-in with something like badblocks. Then compare the SMART data before and after the burn in. Checking the serial number against the manufacturers database if available is also a good precaution.<p>These are probably things you should be doing whether or not the drive is allegedly new.<p>[1] <a href="https://www.heise.de/en/news/Hard-disk-fraud-Larger-disks-with-false-FARM-values-have-emerged-10308297.html" rel="nofollow">https://www.heise.de/en/news/Hard-disk-fraud-Larger-disks-wi...</a></p>
]]></description><pubDate>Wed, 12 Nov 2025 20:49:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45906441</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45906441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45906441</guid></item><item><title><![CDATA[New comment by beala in "uBlock Origin Lite in Apple App Store"]]></title><description><![CDATA[
<p>I guess my head is still spinning.<p>I took a second look at ad blockers on the app store, and many report that they collect various bits of data. Are you saying that there's a special content blocker component to all of these that can't collect data because they're isolated by iOS? I'm not sure how anyone who isn't a iOS developer is supposed to navigate this. To uBlock's credit, their App Store page reports that they collect no data, but is this enforced by iOS? Or just a checkbox that the developer clicked?</p>
]]></description><pubDate>Wed, 29 Oct 2025 16:58:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=45749656</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45749656</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45749656</guid></item><item><title><![CDATA[New comment by beala in "uBlock Origin Lite in Apple App Store"]]></title><description><![CDATA[
<p>Scrolling through the comments reading about all the adblockers that folks recommend makes my head spin. Why exactly should I trust any of these to have full access to my browser? Looking through the app store I see so many that are clearly trying to impersonate the well known ones by using similar names. It sounds like uBlock Origin Lite is trusted by many, but watch out for Ublock and 1Block, which are also top App Store results. Going off memory, the the chrome store is even worse. The whole situation is extremely sketchy. This is not even to mention supply chain attacks which could hijack even honest projects.<p>Personally I’ve settled on blocking at the DNS level with unbound and a blocklist. It’s not perfect but it limits the blast radius.</p>
]]></description><pubDate>Wed, 29 Oct 2025 16:30:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=45749192</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45749192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45749192</guid></item><item><title><![CDATA[New comment by beala in "Do Users Verify SSH Keys? (2011) [pdf]"]]></title><description><![CDATA[
<p>Terminal.shop lets you order coffee over ssh, which is kind of novel and fun. I did it, and the coffee was good! This post reminded me that they've gotten enough questions about security that they've added this to their FAQ:<p>> is ordering via ssh secure?# you bet it is. arguably more secure than your browser. ssh incorporates encryption and authentication via a process called public key cryptography. if that doesn’t sound secure we don’t know what does. [1]<p>I think this is wrong though for exactly the reasons described in this post. TLS verifies that the URL matches the cert through the chain of trust, whereas SSH leaves this up to the user to do out-of-band, which of course no one does.<p>But then the author of this article goes on to say (emphasis mine):<p>> This result represents good news for both the SSL/TLS PKI camps and the SSH non-PKI camps, since <i>SSH advocates can rejoice over the fact that the expensive PKI-based approach is no better than the SSH one</i>, while PKI advocates can rest assured that their solution is no less secure than the SSH one.<p>Which feels like it comes out of left field. Certainly the chain of trust adds some security, even if it's imperfect. I know many people just click through the warning, but I certainly don't.<p>[1] <a href="https://www.terminal.shop/faq" rel="nofollow">https://www.terminal.shop/faq</a></p>
]]></description><pubDate>Tue, 28 Oct 2025 18:09:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=45736566</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45736566</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45736566</guid></item><item><title><![CDATA[New comment by beala in "Ubiquiti SFP Wizard"]]></title><description><![CDATA[
<p>I posted this in a sibling comment, but I can confirm Beelink's EQ14 [1] works well with OPNsense (FreeBSD based instead of OpenBSD). The dual NIC model uses the Intel KTI226-V chipset which has rock solid FreeBSD drivers.<p>[1] <a href="https://www.bee-link.com/products/beelink-eq14-n150?variant=47996790636786" rel="nofollow">https://www.bee-link.com/products/beelink-eq14-n150?variant=...</a></p>
]]></description><pubDate>Tue, 28 Oct 2025 17:46:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=45736198</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45736198</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45736198</guid></item><item><title><![CDATA[New comment by beala in "The AirPods Pro 3 flight problem"]]></title><description><![CDATA[
<p>I use them interchangeably. Webster appears to back me up here. However, I only say ear<i>bud</i> when referring to the type that's inserted into the ear.</p>
]]></description><pubDate>Tue, 28 Oct 2025 17:29:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=45735947</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45735947</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45735947</guid></item><item><title><![CDATA[New comment by beala in "Ubiquiti SFP Wizard"]]></title><description><![CDATA[
<p>I don't think I've run into any bugs, but there are also entire sections of the controller I haven't explored yet. I have a pretty typical homelab style setup with multiple wifi SSIDs for trusted devices and untrusted devices, and several VLANs to isolate them. I guess it's good to know rumors of Ubiquiti's death have been greatly exaggerated in case my Omada hardware starts acting up.</p>
]]></description><pubDate>Tue, 28 Oct 2025 16:58:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45735460</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45735460</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45735460</guid></item><item><title><![CDATA[New comment by beala in "Ubiquiti SFP Wizard"]]></title><description><![CDATA[
<p>I've only been using it for a couple months, but OPNsense (FreeBSD based) is such a solid piece of software. I installed it on a cheap Beelink mini PC with dual 2.5 gb NICs and an N150 processor (model EQ14), and it's been reliable and a pleasure to use as my router. I have a TP-Link Omada setup which I've been pleased with, but I feel no need to purchase one of their gateways.</p>
]]></description><pubDate>Tue, 28 Oct 2025 16:16:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45734823</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45734823</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45734823</guid></item><item><title><![CDATA[New comment by beala in "Ubiquiti SFP Wizard"]]></title><description><![CDATA[
<p>All the complaints about Ubiquiti in this thread from a few months ago dissuaded me from investing in their gear: <a href="https://news.ycombinator.com/item?id=44746603">https://news.ycombinator.com/item?id=44746603</a><p>I ended up going with TP-Link Omada and have been happy so far (a managed switch and wifi 6 WAPs). I am a bit concerned about their security track record given how bad their soho products are, so I ended up sticking with my opnsense router at the perimeter as the first line of defense.<p>I’m curious to hear what you think you’re missing out on with Omada.</p>
]]></description><pubDate>Tue, 28 Oct 2025 16:01:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45734631</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45734631</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45734631</guid></item><item><title><![CDATA[New comment by beala in "FocusTube: A Chrome extension that hides YouTube Shorts"]]></title><description><![CDATA[
<p>You can also block any arbitrary page element and that block will persist between page loads. I think it’s in right click menu. I used this to permanently block the YouTube chat feature.</p>
]]></description><pubDate>Fri, 24 Oct 2025 06:35:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=45691535</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45691535</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45691535</guid></item><item><title><![CDATA[New comment by beala in "Google flags Immich sites as dangerous"]]></title><description><![CDATA[
<p>It doesn’t seem like email scanning is necessary to explain this. It appears that simply having a “bad” subdomain can trigger this. Obviously this heuristic isn’t working well, but you can see the naive logic of it: anything with the subdomain “apple” might be trying to impersonate Apple, so let’s flag it. This has happened to me on internal domains on my home network that I've exposed to no one. This also has been reported at the jellyfin project: <a href="https://github.com/jellyfin/jellyfin-web/issues/4076" rel="nofollow">https://github.com/jellyfin/jellyfin-web/issues/4076</a></p>
]]></description><pubDate>Thu, 23 Oct 2025 00:52:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=45676999</link><dc:creator>beala</dc:creator><comments>https://news.ycombinator.com/item?id=45676999</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45676999</guid></item></channel></rss>