<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: cws</title><link>https://news.ycombinator.com/user?id=cws</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 14:11:04 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=cws" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by cws in "Book review: There Is No Antimemetics Division"]]></title><description><![CDATA[
<p>This article says “Book Review:” but then doesn’t provide the title of a book. I’m confused.<p>:)</p>
]]></description><pubDate>Mon, 06 Apr 2026 16:17:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47662879</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=47662879</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47662879</guid></item><item><title><![CDATA[KVM Is The Weak Link – How a $30 Device can own your network]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/">https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47443697">https://news.ycombinator.com/item?id=47443697</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 19 Mar 2026 18:24:44 +0000</pubDate><link>https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=47443697</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47443697</guid></item><item><title><![CDATA[Metacognitive Incommensurability: The Dinner Table Wall]]></title><description><![CDATA[
<p>Article URL: <a href="https://interpoiesis.substack.com/p/metacognitive-incommensurability">https://interpoiesis.substack.com/p/metacognitive-incommensurability</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45388580">https://news.ycombinator.com/item?id=45388580</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 26 Sep 2025 16:52:51 +0000</pubDate><link>https://interpoiesis.substack.com/p/metacognitive-incommensurability</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=45388580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45388580</guid></item><item><title><![CDATA[Software Bill of Materials Requirements in DoD and Federal Guidance]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclypsium.com/blog/sbom-federal-requirements-guidelines/">https://eclypsium.com/blog/sbom-federal-requirements-guidelines/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45223894">https://news.ycombinator.com/item?id=45223894</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 12 Sep 2025 16:33:05 +0000</pubDate><link>https://eclypsium.com/blog/sbom-federal-requirements-guidelines/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=45223894</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45223894</guid></item><item><title><![CDATA[Open Source Tools to Detect CVE-2024-54085]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclypsium.com/blog/eclypsium-releases-tools-for-detecting-ami-megarac-bmc-vulnerabilities/">https://eclypsium.com/blog/eclypsium-releases-tools-for-detecting-ami-megarac-bmc-vulnerabilities/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44526491">https://news.ycombinator.com/item?id=44526491</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 10 Jul 2025 22:40:06 +0000</pubDate><link>https://eclypsium.com/blog/eclypsium-releases-tools-for-detecting-ami-megarac-bmc-vulnerabilities/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=44526491</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44526491</guid></item><item><title><![CDATA[CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/">https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44398982">https://news.ycombinator.com/item?id=44398982</a></p>
<p>Points: 8</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 27 Jun 2025 18:14:57 +0000</pubDate><link>https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=44398982</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44398982</guid></item><item><title><![CDATA[OpenBMC Security in Practice: Vulnerabilities, Variants, and AMI MegaRAC OneTree [pdf]]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclypsium.com/wp-content/uploads/OpenBMC-Security-in-Practice.pdf">https://eclypsium.com/wp-content/uploads/OpenBMC-Security-in-Practice.pdf</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44330734">https://news.ycombinator.com/item?id=44330734</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 20 Jun 2025 18:49:20 +0000</pubDate><link>https://eclypsium.com/wp-content/uploads/OpenBMC-Security-in-Practice.pdf</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=44330734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44330734</guid></item><item><title><![CDATA[Skittle Factory Dementia Monkey Titty Monetization]]></title><description><![CDATA[
<p>Article URL: <a href="https://parakeet.substack.com/p/skittle-factory-dementia-monkey-titty">https://parakeet.substack.com/p/skittle-factory-dementia-monkey-titty</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43517212">https://news.ycombinator.com/item?id=43517212</a></p>
<p>Points: 6</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 29 Mar 2025 17:46:54 +0000</pubDate><link>https://parakeet.substack.com/p/skittle-factory-dementia-monkey-titty</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=43517212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43517212</guid></item><item><title><![CDATA[BMC&C Part 3: New AMI MegaRAC Baseboard Management Controller Vulnerabilities]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/">https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43402273">https://news.ycombinator.com/item?id=43402273</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 18 Mar 2025 17:39:37 +0000</pubDate><link>https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=43402273</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43402273</guid></item><item><title><![CDATA[Text to CAD Public Alpha]]></title><description><![CDATA[
<p>Article URL: <a href="https://zoo.dev/text-to-cad">https://zoo.dev/text-to-cad</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40937610">https://news.ycombinator.com/item?id=40937610</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 11 Jul 2024 15:12:55 +0000</pubDate><link>https://zoo.dev/text-to-cad</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=40937610</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40937610</guid></item><item><title><![CDATA[We need to take satellite ground station security seriously]]></title><description><![CDATA[
<p>Article URL: <a href="https://spacenews.com/why-we-need-to-take-satellite-ground-station-security-seriously/">https://spacenews.com/why-we-need-to-take-satellite-ground-station-security-seriously/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40576531">https://news.ycombinator.com/item?id=40576531</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 04 Jun 2024 16:51:21 +0000</pubDate><link>https://spacenews.com/why-we-need-to-take-satellite-ground-station-security-seriously/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=40576531</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40576531</guid></item><item><title><![CDATA[Measuring the Persuasiveness of Language Models]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.anthropic.com/research/measuring-model-persuasiveness">https://www.anthropic.com/research/measuring-model-persuasiveness</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40247781">https://news.ycombinator.com/item?id=40247781</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 03 May 2024 14:03:28 +0000</pubDate><link>https://www.anthropic.com/research/measuring-model-persuasiveness</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=40247781</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40247781</guid></item><item><title><![CDATA[2024 Verizon Data Breach Investigation Report [pdf]]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.verizon.com/business/resources/T5be/reports/2024-dbir-data-breach-investigations-report.pdf">https://www.verizon.com/business/resources/T5be/reports/2024-dbir-data-breach-investigations-report.pdf</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40225228">https://news.ycombinator.com/item?id=40225228</a></p>
<p>Points: 122</p>
<p># Comments: 49</p>
]]></description><pubDate>Wed, 01 May 2024 16:08:43 +0000</pubDate><link>https://www.verizon.com/business/resources/T5be/reports/2024-dbir-data-breach-investigations-report.pdf</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=40225228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40225228</guid></item><item><title><![CDATA[New comment by cws in "Ask HN: Job Titles Solutions Architect vs. Architect"]]></title><description><![CDATA[
<p>This is my experience as well. A solutions architect is likely to be working directly with customers to achieve what they want with the product which can involve deployment work, integration work, etc. Sometimes this work is found to be repeatable across customers and may be engineered into the product. An architect (in a software or IT context) can have pretty widely varying responsibilities, usually more focused on building product or internal company environments. But solution architects have been fairly consistent in scope of responsibility across the companies I’ve been exposed to</p>
]]></description><pubDate>Wed, 24 Apr 2024 18:33:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=40147959</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=40147959</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40147959</guid></item><item><title><![CDATA[National Renewable Energy Lab Releases First Clean Energy Cybersecurity Report]]></title><description><![CDATA[
<p>Article URL: <a href="https://xage.com/blog/nrel-clean-energy-cybersecurity-report/">https://xage.com/blog/nrel-clean-energy-cybersecurity-report/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39037976">https://news.ycombinator.com/item?id=39037976</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 18 Jan 2024 04:47:13 +0000</pubDate><link>https://xage.com/blog/nrel-clean-energy-cybersecurity-report/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=39037976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39037976</guid></item><item><title><![CDATA[New comment by cws in "Which word begins with "y" and looks like an axe in this picture? (2017)"]]></title><description><![CDATA[
<p>I really thought it was going to be something about a “Y axis” or “Y Axes”</p>
]]></description><pubDate>Thu, 18 Jan 2024 04:41:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=39037934</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=39037934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39037934</guid></item><item><title><![CDATA[New comment by cws in "A Technical Analysis of How Spring4Shell (CVE-2022-22965) Works"]]></title><description><![CDATA[
<p>This is about CVE-2022-22965.  Maybe I’ll edit the title to reflect that.</p>
]]></description><pubDate>Thu, 31 Mar 2022 18:41:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=30870794</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=30870794</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30870794</guid></item><item><title><![CDATA[New comment by cws in "A Technical Analysis of How Spring4Shell (CVE-2022-22965) Works"]]></title><description><![CDATA[
<p>Depends a lot on how many Spring apps out there have the prereqs to be vulnerable. The widespread nature of Log4Shell is what made it “worse” than other RCE vulns. I don’t have a sense of how many vulnerable instances of this one might be out there but the number could be enormous.</p>
]]></description><pubDate>Thu, 31 Mar 2022 18:39:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=30870775</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=30870775</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30870775</guid></item><item><title><![CDATA[A Technical Analysis of How Spring4Shell (CVE-2022-22965) Works]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.extrahop.com/company/blog/2022/a-technical-analysis-of-how-spring4shell-works/">https://www.extrahop.com/company/blog/2022/a-technical-analysis-of-how-spring4shell-works/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=30870453">https://news.ycombinator.com/item?id=30870453</a></p>
<p>Points: 14</p>
<p># Comments: 7</p>
]]></description><pubDate>Thu, 31 Mar 2022 18:13:42 +0000</pubDate><link>https://www.extrahop.com/company/blog/2022/a-technical-analysis-of-how-spring4shell-works/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=30870453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30870453</guid></item><item><title><![CDATA[Analyzing SolarWinds Orion Sunburst DNS Traffic for Threat Intelligence]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.extrahop.com/company/blog/2020/analyzing-sunburst/">https://www.extrahop.com/company/blog/2020/analyzing-sunburst/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=25458310">https://news.ycombinator.com/item?id=25458310</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 17 Dec 2020 18:07:42 +0000</pubDate><link>https://www.extrahop.com/company/blog/2020/analyzing-sunburst/</link><dc:creator>cws</dc:creator><comments>https://news.ycombinator.com/item?id=25458310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25458310</guid></item></channel></rss>