<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: bubblehack3r</title><link>https://news.ycombinator.com/user?id=bubblehack3r</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 21 Apr 2026 10:07:23 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=bubblehack3r" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[CometJacking attack tricks Comet browser into stealing emails]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.bleepingcomputer.com/news/security/commetjacking-attack-tricks-comet-browser-into-stealing-emails/">https://www.bleepingcomputer.com/news/security/commetjacking-attack-tricks-comet-browser-into-stealing-emails/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45467030">https://news.ycombinator.com/item?id=45467030</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 03 Oct 2025 19:47:43 +0000</pubDate><link>https://www.bleepingcomputer.com/news/security/commetjacking-attack-tricks-comet-browser-into-stealing-emails/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=45467030</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45467030</guid></item><item><title><![CDATA[CometJacking: One Click Can Turn Perplexity's Comet AI Browser Against You]]></title><description><![CDATA[
<p>Article URL: <a href="https://layerxsecurity.com/blog/cometjacking-how-one-click-can-turn-perplexitys-comet-ai-browser-against-you/">https://layerxsecurity.com/blog/cometjacking-how-one-click-can-turn-perplexitys-comet-ai-browser-against-you/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45466043">https://news.ycombinator.com/item?id=45466043</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 03 Oct 2025 18:21:12 +0000</pubDate><link>https://layerxsecurity.com/blog/cometjacking-how-one-click-can-turn-perplexitys-comet-ai-browser-against-you/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=45466043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45466043</guid></item><item><title><![CDATA[WebSecDojo – Free Web Security Challenges]]></title><description><![CDATA[
<p>Article URL: <a href="https://websecdojo.com/">https://websecdojo.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44626680">https://news.ycombinator.com/item?id=44626680</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 20 Jul 2025 16:23:14 +0000</pubDate><link>https://websecdojo.com/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=44626680</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44626680</guid></item><item><title><![CDATA[Base44 – build fully-functional apps in minutes with just your words]]></title><description><![CDATA[
<p>Article URL: <a href="https://base44.com/?via=b44d">https://base44.com/?via=b44d</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44614275">https://news.ycombinator.com/item?id=44614275</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 19 Jul 2025 10:35:56 +0000</pubDate><link>https://base44.com/?via=b44d</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=44614275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44614275</guid></item><item><title><![CDATA[A Guide to Bearer Tokens: JWT vs. Opaque Tokens]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.permit.io/blog/a-guide-to-bearer-tokens-jwt-vs-opaque-tokens">https://www.permit.io/blog/a-guide-to-bearer-tokens-jwt-vs-opaque-tokens</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43658234">https://news.ycombinator.com/item?id=43658234</a></p>
<p>Points: 19</p>
<p># Comments: 9</p>
]]></description><pubDate>Fri, 11 Apr 2025 20:35:02 +0000</pubDate><link>https://www.permit.io/blog/a-guide-to-bearer-tokens-jwt-vs-opaque-tokens</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=43658234</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43658234</guid></item><item><title><![CDATA[Secrets.tools – scan any login page for secrets]]></title><description><![CDATA[
<p>Article URL: <a href="https://secrets.tools/">https://secrets.tools/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43418665">https://news.ycombinator.com/item?id=43418665</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 20 Mar 2025 00:15:42 +0000</pubDate><link>https://secrets.tools/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=43418665</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43418665</guid></item><item><title><![CDATA[New disruption of Finland-Germany cable reported in Baltic Sea]]></title><description><![CDATA[
<p>Article URL: <a href="https://yle.fi/a/74-20145195">https://yle.fi/a/74-20145195</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43133798">https://news.ycombinator.com/item?id=43133798</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 21 Feb 2025 22:25:57 +0000</pubDate><link>https://yle.fi/a/74-20145195</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=43133798</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43133798</guid></item><item><title><![CDATA[Crypto exchange Bybit says it was hacked and lost around $1.4B]]></title><description><![CDATA[
<p>Article URL: <a href="https://techcrunch.com/2025/02/21/crypto-exchange-bybit-says-it-was-hacked-and-lost-around-1-4-billion/">https://techcrunch.com/2025/02/21/crypto-exchange-bybit-says-it-was-hacked-and-lost-around-1-4-billion/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43131620">https://news.ycombinator.com/item?id=43131620</a></p>
<p>Points: 6</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 21 Feb 2025 19:12:49 +0000</pubDate><link>https://techcrunch.com/2025/02/21/crypto-exchange-bybit-says-it-was-hacked-and-lost-around-1-4-billion/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=43131620</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43131620</guid></item><item><title><![CDATA[Using Chrome Extension to Spy on Visitors]]></title><description><![CDATA[
<p>Article URL: <a href="https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/">https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42963951">https://news.ycombinator.com/item?id=42963951</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 06 Feb 2025 16:26:55 +0000</pubDate><link>https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42963951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42963951</guid></item><item><title><![CDATA[Sending Bubbles Worldwide Since 2001]]></title><description><![CDATA[
<p>Article URL: <a href="https://andieandmike.org/thanks-for-viewing-the-bubblecam/">https://andieandmike.org/thanks-for-viewing-the-bubblecam/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42903422">https://news.ycombinator.com/item?id=42903422</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 01 Feb 2025 23:03:35 +0000</pubDate><link>https://andieandmike.org/thanks-for-viewing-the-bubblecam/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42903422</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42903422</guid></item><item><title><![CDATA[Profile Image Intel – OSINT tool analyzing profile pictures]]></title><description><![CDATA[
<p>Article URL: <a href="https://profileimageintel.com/">https://profileimageintel.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42708374">https://news.ycombinator.com/item?id=42708374</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 15 Jan 2025 07:39:22 +0000</pubDate><link>https://profileimageintel.com/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42708374</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42708374</guid></item><item><title><![CDATA[New comment by bubblehack3r in "Exploiting leaked timestamps from Google Chrome extensions"]]></title><description><![CDATA[
<p>The demo itself - <a href="https://blog-extension-cache-demo.vercel.app/" rel="nofollow">https://blog-extension-cache-demo.vercel.app/</a></p>
]]></description><pubDate>Mon, 04 Nov 2024 15:15:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=42042271</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42042271</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42042271</guid></item><item><title><![CDATA[Leaked Timestamps in Chrome Extensions Could Track Users]]></title><description><![CDATA[
<p>Article URL: <a href="https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/">https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42042120">https://news.ycombinator.com/item?id=42042120</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 04 Nov 2024 15:01:47 +0000</pubDate><link>https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42042120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42042120</guid></item><item><title><![CDATA[New comment by bubblehack3r in "Demo: Exploiting leaked timestamps from Google Chrome extensions"]]></title><description><![CDATA[
<p>The demo itself - <a href="https://blog-extension-cache-demo.vercel.app/" rel="nofollow">https://blog-extension-cache-demo.vercel.app/</a></p>
]]></description><pubDate>Thu, 31 Oct 2024 14:03:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=42007032</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42007032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42007032</guid></item><item><title><![CDATA[Exploiting leaked timestamps from Google Chrome extensions]]></title><description><![CDATA[
<p>Article URL: <a href="https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/">https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42006862">https://news.ycombinator.com/item?id=42006862</a></p>
<p>Points: 15</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 31 Oct 2024 13:46:40 +0000</pubDate><link>https://fingerprint.com/blog/exploiting-leaked-timestamps-google-chrome-extensions/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=42006862</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42006862</guid></item><item><title><![CDATA[Monolith First (2015)]]></title><description><![CDATA[
<p>Article URL: <a href="https://martinfowler.com/bliki/MonolithFirst.html">https://martinfowler.com/bliki/MonolithFirst.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41558668">https://news.ycombinator.com/item?id=41558668</a></p>
<p>Points: 40</p>
<p># Comments: 75</p>
]]></description><pubDate>Mon, 16 Sep 2024 17:54:24 +0000</pubDate><link>https://martinfowler.com/bliki/MonolithFirst.html</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=41558668</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41558668</guid></item><item><title><![CDATA[Friends don't let friends reuse nonces]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/">https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41558658">https://news.ycombinator.com/item?id=41558658</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 16 Sep 2024 17:53:11 +0000</pubDate><link>https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=41558658</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41558658</guid></item><item><title><![CDATA[You don't need to be a manager to have a successful career in engineering]]></title><description><![CDATA[
<p>Article URL: <a href="https://newsletter.eng-leadership.com/p/you-dont-need-to-be-a-manager-to">https://newsletter.eng-leadership.com/p/you-dont-need-to-be-a-manager-to</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41558635">https://news.ycombinator.com/item?id=41558635</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 16 Sep 2024 17:51:14 +0000</pubDate><link>https://newsletter.eng-leadership.com/p/you-dont-need-to-be-a-manager-to</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=41558635</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41558635</guid></item><item><title><![CDATA[The Potential Pitfalls of Pagination]]></title><description><![CDATA[
<p>Article URL: <a href="https://jade.ellis.link/blog/2024/07/14/the-potential-pitfalls-of-pagination">https://jade.ellis.link/blog/2024/07/14/the-potential-pitfalls-of-pagination</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41289502">https://news.ycombinator.com/item?id=41289502</a></p>
<p>Points: 17</p>
<p># Comments: 6</p>
]]></description><pubDate>Mon, 19 Aug 2024 09:55:41 +0000</pubDate><link>https://jade.ellis.link/blog/2024/07/14/the-potential-pitfalls-of-pagination</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=41289502</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41289502</guid></item><item><title><![CDATA[Writing a Playstation 1 game in 2024 (repo and blog post)]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/jbreckmckye/notris">https://github.com/jbreckmckye/notris</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41289499">https://news.ycombinator.com/item?id=41289499</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 19 Aug 2024 09:55:24 +0000</pubDate><link>https://github.com/jbreckmckye/notris</link><dc:creator>bubblehack3r</dc:creator><comments>https://news.ycombinator.com/item?id=41289499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41289499</guid></item></channel></rss>