<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: cpach</title><link>https://news.ycombinator.com/user?id=cpach</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 24 May 2026 21:58:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=cpach" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by cpach in "Ask HN: What's New in Crypto?"]]></title><description><![CDATA[
<p>Uhm… cryptography or cryptocurrency?</p>
]]></description><pubDate>Fri, 22 May 2026 18:26:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=48239532</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48239532</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48239532</guid></item><item><title><![CDATA[New comment by cpach in "Fragnesia Made Public as Latest Linux Local Privilege Escalation Vulnerability"]]></title><description><![CDATA[
<p>For those who can I would recommend upgrading to Wireguard.</p>
]]></description><pubDate>Fri, 15 May 2026 04:31:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=48144581</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48144581</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48144581</guid></item><item><title><![CDATA[New comment by cpach in "Claude Account Suspended Seconds After Purchase?"]]></title><description><![CDATA[
<p>If it was for personal use, surely there would be some kind of consumer organization or ombudsman one could contact for advice?<p>For B2B, I guess the local chamber of commerce might be able to advice.</p>
]]></description><pubDate>Thu, 14 May 2026 14:29:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=48135960</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48135960</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48135960</guid></item><item><title><![CDATA[New comment by cpach in "Obsidian plugin was abused to deploy a remote access trojan"]]></title><description><![CDATA[
<p>Same here, zero plugins for me.</p>
]]></description><pubDate>Mon, 11 May 2026 01:12:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=48089956</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48089956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48089956</guid></item><item><title><![CDATA[New comment by cpach in "Reflections on NetBSD 11"]]></title><description><![CDATA[
<p>Regarding su…<p><pre><code>  su -
</code></pre>
<i>might</i> yield better results.</p>
]]></description><pubDate>Sat, 09 May 2026 16:56:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=48076382</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48076382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48076382</guid></item><item><title><![CDATA[New comment by cpach in "Copy Fail 2: Electric Boogaloo"]]></title><description><![CDATA[
<p>Does anyone know how to mitigate this one? Is it sufficient to disable the esp4/esp6/rxrpc modules?</p>
]]></description><pubDate>Fri, 08 May 2026 09:53:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=48060897</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48060897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48060897</guid></item><item><title><![CDATA[New comment by cpach in "Copyfail2"]]></title><description><![CDATA[
<p>Main discussion here: <a href="https://news.ycombinator.com/item?id=48058393">https://news.ycombinator.com/item?id=48058393</a></p>
]]></description><pubDate>Fri, 08 May 2026 09:50:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=48060883</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48060883</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48060883</guid></item><item><title><![CDATA[New comment by cpach in "SQLite Is a Library of Congress Recommended Storage Format"]]></title><description><![CDATA[
<p>Welcome to Hacker News! Please write in English here. Thank you in advance from a long-time member :)</p>
]]></description><pubDate>Thu, 07 May 2026 07:24:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=48046459</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48046459</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48046459</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>No, I haven’t.<p>My concern is to try to understand the mechanisms of the exploit.<p>Copy Fail is not simply ”hey, kernel, give me root”. I would say it’s more general than that. It’s rather: ”Hey, kernel, when you present file /foo to a process, make the contents of that file appear according to my wishes”. Which can be used (in various ways) to advance the attacker’s position.<p>That’s why I think it’s interesting to ponder if that power allows the attacker to simply sneak past security policies such as <i>allowPrivilegeEscalation=false</i>.</p>
]]></description><pubDate>Wed, 06 May 2026 20:36:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=48041431</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48041431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48041431</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>Many? No, I don’t agree.</p>
]]></description><pubDate>Wed, 06 May 2026 04:56:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=48032349</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48032349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48032349</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>Sure. But it would probably still be a good thing if the kernel maintainers could tear out AF_ALG.</p>
]]></description><pubDate>Tue, 05 May 2026 20:34:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=48028124</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48028124</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48028124</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>That might make Copy Fail harder to exploit, but I still wouldn’t bet money on CF being impossible to use in that scenario.</p>
]]></description><pubDate>Tue, 05 May 2026 20:32:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=48028100</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48028100</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48028100</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>How does <i>allowPrivilegeEscalation=False</i> help?</p>
]]></description><pubDate>Tue, 05 May 2026 18:16:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=48026388</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48026388</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48026388</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>If so, I would look into applying a decent seccomp profile.<p>Other hardening solutions could be to run the workloads inside of a VM such as Firecracker, or gVisor. But that might be more work to implement compared to seccomp.</p>
]]></description><pubDate>Tue, 05 May 2026 17:30:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=48025711</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48025711</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48025711</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>How?</p>
]]></description><pubDate>Tue, 05 May 2026 15:34:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=48023970</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48023970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48023970</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>I would say any sanely written application would fall back to doing the requested operations in userspace if it cannot use the AF_ALG socket.<p>It <i>could</i> fail though. But I have not yet heard of anyone noticing big problems due to disabling the problematic modules. And I have not noticed any such issues on our systems at ${DAYJOB}.<p>IMHO, since these parts of the Linux kernel are so crappy I personally would say disabling them is a good default choice. YMMV. But if you encounter problems, then you can always re-enable the modules. (Preferably after upgrading your kernel, obviously.)</p>
]]></description><pubDate>Tue, 05 May 2026 15:34:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=48023965</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48023965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48023965</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>Good enough for what?<p>I could be wrong, but I’m not sure those settings are enough to mitigate Copy Fail.<p>If your distro offers a patched kernel, it’s best to upgrade to that one and reboot.<p>You can also disable the vulnerable module (how to do it depends on what distro you’re using). But if you stay on an old unpatched kernel you might be exposed to other vulnerabilites.</p>
]]></description><pubDate>Tue, 05 May 2026 15:17:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=48023709</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48023709</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48023709</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>Well at least if it’s crufty stuff like AF_ALG that barely no-one is using and is kind of a forgotten place of the kernel.<p>I don’t oppose reasonable crypto in the kernel, like WireGuard.</p>
]]></description><pubDate>Tue, 05 May 2026 14:59:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=48023443</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48023443</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48023443</guid></item><item><title><![CDATA[New comment by cpach in "CVE-2026-31431: Copy Fail vs. rootless containers"]]></title><description><![CDATA[
<p>What is the false premise in the article?</p>
]]></description><pubDate>Tue, 05 May 2026 09:47:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=48020179</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48020179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48020179</guid></item><item><title><![CDATA[New comment by cpach in "PyInfra 3.8.0 Is Out"]]></title><description><![CDATA[
<p>We had lectures on Frame Relay and stuff like that in uni, but I’ve never ever touched that stuff (:</p>
]]></description><pubDate>Mon, 04 May 2026 15:05:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=48009643</link><dc:creator>cpach</dc:creator><comments>https://news.ycombinator.com/item?id=48009643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48009643</guid></item></channel></rss>