<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: cyphar</title><link>https://news.ycombinator.com/user?id=cyphar</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 05:43:41 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=cyphar" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by cyphar in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>While anyone can run a Tor node and register it as available, the tags that Tor relays get assigned and the list of relays is controlled by 9 consensus servers[1] that are run by different members the Tor project (in different countries). They can thus easily block nodes.<p>[1]: <a href="https://consensus-health.torproject.org/" rel="nofollow">https://consensus-health.torproject.org/</a></p>
]]></description><pubDate>Sun, 22 Feb 2026 09:01:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109510</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=47109510</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109510</guid></item><item><title><![CDATA[New comment by cyphar in "Rise of the Triforce"]]></title><description><![CDATA[
<p>There is a separate carve-out for breaking DRM for the purposes of "interoperability"[1], which (as far as I understand) is generally believed to include emulators.<p>I also disagree more broadly with the initial moral indignation over a perceived violation of copyright law -- legality and morality are two different things, copyright law is meant to be a balanced trade-off between the public and creators but modern copyright laws are a travesty. What ever happened to the hacker ethos behind DeCSS and the anti-"illegal numbers" movement?<p>[1]: <a href="https://www.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/ca1968133/s116an.html" rel="nofollow">https://www.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/cons...</a></p>
]]></description><pubDate>Tue, 17 Feb 2026 11:48:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47046499</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=47046499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47046499</guid></item><item><title><![CDATA[New comment by cyphar in "Rise of the Triforce"]]></title><description><![CDATA[
<p>That depends on the country. In Australia, there is an explicit carve-out in the Copyright Act to allow for backups of computer programs[1], and there is also a widely held belief (at least, according to the government) that backups of this kind in general are also considered fair use[2]. Actually, it seems there is a somewhat similar carve-out in the US as well[3].<p>[1]: <a href="https://www.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/ca1968133/s47c.html" rel="nofollow">https://www.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/cons...</a>
[2]: <a href="https://www.alrc.gov.au/publication/copyright-and-the-digital-economy-alrc-report-122/17-computer-programs-and-back-ups/back-ups-and-fair-use/" rel="nofollow">https://www.alrc.gov.au/publication/copyright-and-the-digita...</a>
[3]: <a href="https://www.copyright.gov/title17/92chap1.html#117" rel="nofollow">https://www.copyright.gov/title17/92chap1.html#117</a></p>
]]></description><pubDate>Tue, 17 Feb 2026 06:57:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47044485</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=47044485</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47044485</guid></item><item><title><![CDATA[New comment by cyphar in "5,300-year-old 'bow drill' rewrites story of ancient Egyptian tools"]]></title><description><![CDATA[
<p>> Piltdown was rejected 70 years ago, so hardly a current example<p>Well of course it wasn't a current example -- to quote their original comment:<p>> Quite frustrating how archeology swings <i>over the years</i> from "we'll believe anything" to "we won't accept any claim without a preserved example".  While some of the excesses <i>of the past</i> were clearly excessive ... <i>[emphasis added]</i><p>In other words, they feel that <i>historical</i> examples of fanciful theories being mainstream has resulted in an over correction to <i>modern</i> archeology requiring unreasonably strict proof standards.<p>(There is a certain irony in a user called "AlotOfReading" not reading a fairly short comment carefully...)</p>
]]></description><pubDate>Sun, 15 Feb 2026 11:34:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47022933</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=47022933</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47022933</guid></item><item><title><![CDATA[New comment by cyphar in "Google Fulfilled ICE Subpoena Demanding Student Journalist Credit Card Number"]]></title><description><![CDATA[
<p><i>> So I don't think I actually have a problem with businesses handing over their customer data if there is a valid warrant or subpoena. That's the system working as intended.</i><p>I disagree -- the third party doctrine that allows for governments to avoid serving/addressing warrants to the people whose data is actually being subpoenaed directly leads to things like the FISA warrant-rubber-stamp courts in the US. If the data stored on third-party servers <i>on behalf</i> of someone is not considered "papers and effects" of that person then it is entirely justified to subpoena every email stored on mail.google.com because it's just morally equivalent to a subpoena for "all of Foomatic's business records between 2020-2025".<p>It seems bonkers to me that things that are essentially implementation details (such as the way that MTAs work and the lack of crypto-obfuscation in email) should allow for a legal interpretation of the 4th amendment that effectively neuters it. Letters sent via snail-mail are handled by several third parties in a very analogous way to emails but (mostly due to historical reasons, such as the fact that letters existed during the drafting of the bill of rights) we do not apply the third-party doctrine to letters.<p>Of course, the US government has spent decades chipping away at the privacy of snail mail, so eventually we may end up in a world where snail mail and email are treated the same way (just not in a good way).</p>
]]></description><pubDate>Wed, 11 Feb 2026 00:53:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46969351</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46969351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46969351</guid></item><item><title><![CDATA[New comment by cyphar in "Show HN: If you lose your memory, how to regain access to your computer?"]]></title><description><![CDATA[
<p>Actually, after my comment I took another look and it turns out that only a few months ago someone released a pure-Rust PDF renderer called hayro[1] that seems to fit exactly what I need, so I will work on finishing this bit of paperback as soon as I have some spare time. Pure image scanning (with a webcam, phone camera, or uploading a photo) will also work since QR code scanning libraries like rqrr support scanning all QR codes in an image.<p>[1]: <a href="https://docs.rs/hayro/latest/hayro/" rel="nofollow">https://docs.rs/hayro/latest/hayro/</a></p>
]]></description><pubDate>Tue, 10 Feb 2026 01:27:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46954138</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46954138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46954138</guid></item><item><title><![CDATA[New comment by cyphar in "Show HN: If you lose your memory, how to regain access to your computer?"]]></title><description><![CDATA[
<p>> Since you wrote it in Rust, I'd suggest compiling it to wasm and releasing a browser-based version<p>That was my eventual plan for having a single GUI for everything, the only problem is that there isn't a really obvious way to support scanning a PDF you upload -- basically you need a pure-Rust PDF renderer and there isn't one up to the task as far as I could tell. On mobile you could scan each QR code separately (though doing this from a webapp is probably going to be a fairly awful UX and most people would prefer to photograph the whole document and get everything scanned automatically).</p>
]]></description><pubDate>Sat, 07 Feb 2026 22:23:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46928793</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46928793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46928793</guid></item><item><title><![CDATA[New comment by cyphar in "OpenCiv3: Open-source, cross-platform reimagining of Civilization III"]]></title><description><![CDATA[
<p>Business class flights from Sydney to San Francisco cost A$6k, 6-10x as much as economy. Flights from Sydney to Europe are more like 3-4x (A$7k vs A$2k) but still ludicrously expensive. Good luck convincing your company to expense that for work trips, and most of us don't have SV salaries. Honestly, I still manage to get some work done on long flights, the more annoying thing is flights which don't have power outlets or WiFi.<p>If you are a point hacker you could spend the points on upgrades (which tend to give you better rates than buying base tickets) but then you're paying for a minor comfort improvement that you wouldn't pay for normally -- which is a textbook example of induced consumption and is playing into exactly how airlines want you to use points.</p>
]]></description><pubDate>Sat, 07 Feb 2026 09:14:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46922465</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46922465</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46922465</guid></item><item><title><![CDATA[New comment by cyphar in "Show HN: If you lose your memory, how to regain access to your computer?"]]></title><description><![CDATA[
<p>I wrote a project to do this a few years ago[1], it's mainly missing an automated mechanism to scan the PDFs and a GUI. Maybe you'll find it interesting.<p>[1]: <a href="https://github.com/cyphar/paperback" rel="nofollow">https://github.com/cyphar/paperback</a></p>
]]></description><pubDate>Sat, 07 Feb 2026 04:44:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46921378</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46921378</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46921378</guid></item><item><title><![CDATA[New comment by cyphar in "See how many words you have written in Hacker News comments"]]></title><description><![CDATA[
<p>I must admit it was a little surreal to check my own username out of curiosity, only to find that I'm in the top 500 commenters (0.06%) on HN by word count.<p>The really surprising thing is that I stopped commenting regularly a few years ago so god knows where I would've ranked back in 2020. Then again, I always had a feeling I was too verbose when writing comments, so I guess this is all the proof I needed!</p>
]]></description><pubDate>Sat, 07 Feb 2026 02:32:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46920755</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46920755</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46920755</guid></item><item><title><![CDATA[New comment by cyphar in "Show HN: If you lose your memory, how to regain access to your computer?"]]></title><description><![CDATA[
<p>There are much better systems for splitting data than just chunking it into N chunks, the most common is Shamir Secret Sharing[1] (the main benefit being that you can construct an M-of-N scheme easily <i>and</i> having N-1 shards provides you zero information about the secret). One word of caution -- a lot of software developers get enamored by the idea of information-theoretic security when they first run into it, but you eventually realise that useful applications of tools like SSS are actually quite rare.<p>Shameless plug: I wrote a project a few years ago to create PDF-based backups with sharded keys which would do exactly what I suspect you want[2], unfortunately I got stuck at the "make a nice UI for it" stage (everything works but it's just a CLI tool at the moment). I guess I should take a look at using an LLM for that these days... (I used this to store my password manager root password and necessary keys to pull and decrypt the encrypted backups of my server.)<p>[1]: <a href="https://en.wikipedia.org/wiki/Shamir%27s_secret_sharing" rel="nofollow">https://en.wikipedia.org/wiki/Shamir%27s_secret_sharing</a>
[2]: <a href="https://github.com/cyphar/paperback/" rel="nofollow">https://github.com/cyphar/paperback/</a></p>
]]></description><pubDate>Sat, 07 Feb 2026 02:27:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46920723</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46920723</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46920723</guid></item><item><title><![CDATA[New comment by cyphar in "OpenCiv3: Open-source, cross-platform reimagining of Civilization III"]]></title><description><![CDATA[
<p>I must admit that there is a certain sense of nostalgia I get from playing Civ 3 that I never got from any of the other Civ games, but that's probably just because it was the first Civ game I played and got really hooked on as a young kid.</p>
]]></description><pubDate>Sat, 07 Feb 2026 02:12:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=46920631</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46920631</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46920631</guid></item><item><title><![CDATA[New comment by cyphar in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>> trust us we're cool guys<p>I'm guessing you're referencing my comment, that isn't what I said.<p>> But the team is not even willing to make promises as big as yours.<p>Be honest, look at the comment threads for this announcement. Do you honestly think a promise alone would be sufficient to satisfy all of the clamouring voices?<p>No, people would (rightfully!) ask for more and more proof -- the best proof is going to be to continue building what we are building and then you can judge it on its merits. There are lots of justifiable concerns people have in this area but most either don't really apply what we are building or are much larger social problems that we really are not in a position to affect.<p>I would also prefer to be to judged based my actions not on wild speculation about what I might theoretically do in the future.</p>
]]></description><pubDate>Thu, 29 Jan 2026 16:27:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46812403</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46812403</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46812403</guid></item><item><title><![CDATA[New comment by cyphar in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>I am aware of that, my (personal) view is that DRM is a social issue caused by modes of behaviour and the existence or non-existence of technical measures cannot fix or avoid that problem.<p>A lot of the concerns in this thread center on TPMs, but TPMs are really more akin to very limited HSMs that are actually under the user's control (I gave a longer explanation in a sibling comment but TPMs fundamentally trust the data given to them when doing PCR extensions -- the way that consumer hardware is fundamentally built and the way TPMs are deployed is not useful for physical "attacks" by the device owner).<p>Yes, you can imagine DRM schemes that make use of them but you can also imagine equally bad DRM schemes that do not use them. DRM schemes have been deployed for decades (including "lovely" examples like the Sony rootkit from the 2000s[1], and all of the stuff going on even today with South Korean banks[2]). I think using TPMs (and other security measures) for something useful to users is a good thing -- the same goes for cryptography (which is also used for DRM but I posit most people wouldn't argue that we should eschew all cryptography because of the existence of DRM).<p>[1]: <a href="https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal" rel="nofollow">https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootk...</a>
[2]: <a href="https://palant.info/2023/01/02/south-koreas-online-security-dead-end/" rel="nofollow">https://palant.info/2023/01/02/south-koreas-online-security-...</a></p>
]]></description><pubDate>Thu, 29 Jan 2026 12:10:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46809118</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46809118</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46809118</guid></item><item><title><![CDATA[New comment by cyphar in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>I'm really not trying to be slick, but I think it's quite difficult to convince people about anything concrete (such as precisely how this model is fundamentally different to models such as the Secure Boot PKI scheme and thus will not provide a mechanism to allow a non-owner of a device to restrict what runs on your machine) without providing a concrete implementation and design documents to back up what I'm saying. People are rightfully skeptical about this stuff, so any kind of explanation needs to be very thorough.<p>As an aside, it is a bit amusing to me that an initial announcement about a new company working on Linux systems caused the vast majority of people to discuss the impact on personal computers (<i>and games!</i>) rather than servers. I guess we finally have arrived at the fabled "Year of the Linux Desktop" in 2026, though this isn't quite how I expected to find out.<p>> Attestation of what to whom for which purpose? Which freedom does it allow users to control their keys, how does it square with remote attestation and the wishes of enterprise users?<p>We do have answers for these questions, and a lot of the necessary components exist already (lots of FOSS people have been working on problems in this space for a while). The problem is that there is still the missing ~20% (not an actual estimate) we are building now, and the whole story doesn't make sense without it. I don't like it when people announce vapourware, so I'm really just trying to not contribute to that problem by describing a system that is not yet fully built, though I do understand that it comes off as being evasive. It will be much easier to discuss all of this once we start releasing things, and I think that very theoretical technical discussions can often be quite unproductive.<p>In general, I will say that there a lot of unfortunate misunderstandings about TPMs that lead people to assume their only use is as a mechanism for restricting users. This is really not the case, TPMs by themselves are actually more akin to very limited HSMs with a handful of features that can (cooperatively with firmware and operating systems) be used to attest to some aspects of the system state. They are also fundamentally under the users' control, completely unlike the PKI scheme used by Secure Boot and similar systems. In fact, TPMs are really not a useful mechanism for protecting against someone with physical access to the machine -- they have to trust that the hashes they are given to extend into PCRs are legitimate and on most systems the data is even provided over an insecure data line. This is why the security of locked down systems like Xbox One[1] don't really depend on them directly and don't use them at all in the way that they are used on consumer hardware. They are only really useful at protecting against third-party software-based attacks, which is something users actually want!<p>All of the comments about DRM obviously come from very legitimate concerns about user freedoms, but my views on this are a little too long to fit in a HN comment -- in short, I think that technological measures cannot fix a social problem and the history of DRM schemes shows that the absence of technological measures cannot prevent a social problem from forming either. It's also not as if TPMs haven't been around for decades at this point.<p>[1]: <a href="https://www.youtube.com/watch?v=U7VwtOrwceo" rel="nofollow">https://www.youtube.com/watch?v=U7VwtOrwceo</a></p>
]]></description><pubDate>Thu, 29 Jan 2026 11:57:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46809015</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46809015</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46809015</guid></item><item><title><![CDATA[New comment by cyphar in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>> but the way this will be used is by corporations to lock us out into approved Linux distributions. Linux will be effectively owned by RedHat and Microsoft, the signing authority.<p>This is basically true today with Secure Boot on modern hardware (at least in the default configuration -- Microsoft's soft-power policies for device manufacturers actually requires that you can change this on modern machines). This is <i>bad</i>, but it is bad because <i>platform vendors decide which default keys are trusted for secure boot by default</i> and <i>there is no clean automated mechanism to enroll your own keys programmatically</i> (at least, without depending on the Microsoft key -- shim does let you do this programmatically with the MOK).<p>The set of default keys ended up being only Microsoft (some argue this is because of direct pressure from Microsoft, but this would've happened for almost all hardware regardless and is a far more complicated story), but in order to permit people to run other operating systems on modern machines Microsoft signed up to being a CA for every EFI binary in the universe. Red Hat then controls which distro keys are trusted by the shim binary Microsoft signs[1].<p>This system ended up centralised because the platform vendor (not the device owner) fundamentally controls the default trusted key set and is what caused the whole nightmare of the Microsoft Secure Boot keys and rh-boot signing of shim. Getting into the business of being a CA for every binary in the world is a very bad idea, even if you are purely selfish and don't care about user freedoms (and it even makes Secure Boot less useful of a protection mechanism because it means that machines where users only want to trust Microsoft also necessarily trust Linux and every other EFI binary they sign -- there is no user-controlled segmentation of trust, which is the classic CA/PKI problem). I don't personally know how the Secure Boot / UEFI people at Microsoft feel about this, but I wouldn't be surprised if they also dislike the situation we are all in today.<p>Basically none of these issues actually apply to TPMs, which are more akin to limited HSMs where the keys and policies are all fundamentally user-controlled in a programmatic way. It also doesn't apply to what we are building either, but we need to finish building it before I can prove that to you.<p>[1]: <a href="https://github.com/rhboot/shim-review" rel="nofollow">https://github.com/rhboot/shim-review</a></p>
]]></description><pubDate>Thu, 29 Jan 2026 11:54:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46808990</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46808990</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46808990</guid></item><item><title><![CDATA[New comment by cyphar in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>I'm Aleksa, one of the founding engineers. We will share more about this in the coming months but this is not the direction nor intention of what we are working on. The models we have in mind for attestation are very much based on users having full control of their keys. This is not just a matter of user freedom, in practice being able to do this is far more preferable for enterprises with strict security controls.<p>I've been a FOSS guy my entire adult life, I wouldn't put my name to something that would enable the kinds of issues you describe.</p>
]]></description><pubDate>Tue, 27 Jan 2026 19:35:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46785226</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46785226</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46785226</guid></item><item><title><![CDATA[New comment by cyphar in "The Great Gatsby is the most misunderstood novel (2021)"]]></title><description><![CDATA[
<p>I was under the impression that the Mickey Mouse Protection Act 1998[1] extended the copyright protection for works retroactively (though already public domain works were excluded).<p>That being said, I guess the act had precautions to stop it from reducing the copyright protection for edge cases like these?<p>[1]: <a href="https://en.wikipedia.org/wiki/Copyright_Term_Extension_Act" rel="nofollow">https://en.wikipedia.org/wiki/Copyright_Term_Extension_Act</a></p>
]]></description><pubDate>Sun, 04 Jan 2026 04:32:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=46484946</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46484946</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46484946</guid></item><item><title><![CDATA[New comment by cyphar in "Kidnapped by Deutsche Bahn"]]></title><description><![CDATA[
<p>As someone who has caught DB a fair number of times over the years, I think DB is most hated by Germans (who love to complain) and German locals.<p>Maybe I've just been lucky so far, but as an Aussie it is hard to overstate the fact it is even possible to travel almost anywhere within the country and between several other countries by train for fairly cheap is already quite miraculous to me. Yeah, I've run into a fair few issues and it was annoying but that goes for every country I've been to (Japan had the least by far but trains still get delayed there more often than people think and I've also run into situations as in TFA where if I didn't speak Japanese things would've ended up worse).<p>I'm not sure I'd even put DB in my "bottom three" in terms of overall experience. Should it be much better? Of course. But if you listen to Germans it sounds like DB is the worst train network in the universe by a clear margin, and that's just obviously not true.</p>
]]></description><pubDate>Tue, 30 Dec 2025 02:45:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46428936</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46428936</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46428936</guid></item><item><title><![CDATA[New comment by cyphar in "Building an AI agent inside a 7-year-old Rails monolith"]]></title><description><![CDATA[
<p>I get your point, but can you point to a sales pitch which included "exploit security flaws in Android to improve tracking"? Probably not, but we know for a fact they did that.<p>Also, your own blog lists an leak from 2024 about a Facebook partner bragging about this ability[1]. You don't find the claim credible (and you might be right about that, I haven't looked into it), but I find it strange that you are asking for an example that your own website provides?<p>[1]: <a href="https://futurism.com/the-byte/facebook-partner-phones-listening-microphone" rel="nofollow">https://futurism.com/the-byte/facebook-partner-phones-listen...</a></p>
]]></description><pubDate>Sat, 27 Dec 2025 11:13:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46400977</link><dc:creator>cyphar</dc:creator><comments>https://news.ycombinator.com/item?id=46400977</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46400977</guid></item></channel></rss>