<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: cyrnel</title><link>https://news.ycombinator.com/user?id=cyrnel</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 15:02:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=cyrnel" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by cyrnel in "Ruby core team takes ownership of RubyGems and Bundler"]]></title><description><![CDATA[
<p>The response to that: <a href="https://andre.arko.net/2025/10/09/the-rubygems-security-incident/" rel="nofollow">https://andre.arko.net/2025/10/09/the-rubygems-security-inci...</a></p>
]]></description><pubDate>Fri, 17 Oct 2025 15:17:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45617769</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=45617769</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45617769</guid></item><item><title><![CDATA[New comment by cyrnel in "N8n added native persistent storage with DataTables"]]></title><description><![CDATA[
<p>Both are billion dollar companies, we as individuals have nothing in common with them. Enshittification happens due to market conditions that apply to small and large companies alike. Redis and elasticsearch aren't underdogs fighting for the little guy, they are just a smaller scale version of the same shit.<p>I'd rather have a software commons and have tech be owned by the workers and not soul-sucking corporations, no matter the size.</p>
]]></description><pubDate>Thu, 02 Oct 2025 20:36:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45455233</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=45455233</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45455233</guid></item><item><title><![CDATA[New comment by cyrnel in "N8n added native persistent storage with DataTables"]]></title><description><![CDATA[
<p>+1 for Node-RED. If we've learned anything from elasticsearch/redis/bitnami/and dozens of others, it should be "don't build important things on code that isn't enshittification-resistant"</p>
]]></description><pubDate>Thu, 02 Oct 2025 16:49:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=45452150</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=45452150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45452150</guid></item><item><title><![CDATA[New comment by cyrnel in "How to be a leader when the vibes are off"]]></title><description><![CDATA[
<p>I know, right? It's sycophancy.<p>If you are actually against the policy and suspect a lot of people are too, then don't silence your employees by keeping their feedback isolated to 1:1s which you admit are ineffective.<p>Executives need clear feedback to avoid making major mistakes.</p>
]]></description><pubDate>Wed, 24 Sep 2025 23:34:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=45367264</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=45367264</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45367264</guid></item><item><title><![CDATA[New comment by cyrnel in "Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised"]]></title><description><![CDATA[
<p>Code signing, 2FA, and reducing dependencies are all incomplete solutions. What we need is fine-grained sandboxing, down to the function and type level. You will always be vulnerable as long as you're relying on fallible humans (even yourself) to catch or prevent vulnerabilities.<p>Apparently they've tried to implement this in JavaScript but the language is generally too flexible to resist a malicious package running in the same process.<p>We need to be using different languages with runtimes that don't allow privileged operations by default.</p>
]]></description><pubDate>Wed, 17 Sep 2025 02:10:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=45270758</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=45270758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45270758</guid></item><item><title><![CDATA[New comment by cyrnel in "How does the US use water?"]]></title><description><![CDATA[
<p>It's true that we were all sold the lie of individual actions being the way to solve the climate crisis (recycling, turning off lights, etc.) But I think the conclusion is to try other strategies rather than giving up when the first strategy didn't work.</p>
]]></description><pubDate>Thu, 21 Aug 2025 21:39:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=44978407</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=44978407</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44978407</guid></item><item><title><![CDATA[New comment by cyrnel in "Anna's Archive: An Update from the Team"]]></title><description><![CDATA[
<p>The ideal situation would be building a society that believes everyone deserves to be fed, clothed, and housed regardless of their ability to make profitable things. Weird how politically unpopular that seems to be.<p>Both producers and consumers of media are in the same boat of barely surviving. Maybe we can work with each other instead of against each other? :)</p>
]]></description><pubDate>Mon, 18 Aug 2025 22:57:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=44946206</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=44946206</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44946206</guid></item><item><title><![CDATA[Et tu, Panera?]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.scottsmitelli.com/articles/et-tu-panera/">https://www.scottsmitelli.com/articles/et-tu-panera/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44001621">https://news.ycombinator.com/item?id=44001621</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 16 May 2025 03:36:43 +0000</pubDate><link>https://www.scottsmitelli.com/articles/et-tu-panera/</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=44001621</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44001621</guid></item><item><title><![CDATA[New comment by cyrnel in "Demonstrably Secure Software Supply Chains with Nix"]]></title><description><![CDATA[
<p>This seems to only address a few of the nine threats to the software supply chain, mainly "(D) External build parameters" and maybe the content-addressable storage addresses some of the distribution phase threats: <a href="https://slsa.dev/spec/v1.1/threats" rel="nofollow">https://slsa.dev/spec/v1.1/threats</a><p>There are still many other ways that a dependency can be exploited before or after the build phase.</p>
]]></description><pubDate>Mon, 12 May 2025 22:01:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=43967875</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43967875</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43967875</guid></item><item><title><![CDATA[New comment by cyrnel in "Burrito Now, Pay Later"]]></title><description><![CDATA[
<p>BNPL is only "good" if your definition of "good" is about GDP, market flexibility, high-performance index funds, and other things that have nothing to do with human happiness.<p>I'll believe that BNPL is good when all the companies become non-profits that use excess funds to cancel debts rather than lining the pockets of rich investors.</p>
]]></description><pubDate>Sun, 11 May 2025 21:25:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=43957294</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43957294</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43957294</guid></item><item><title><![CDATA[New comment by cyrnel in "How to harden GitHub Actions"]]></title><description><![CDATA[
<p>People have been running different levels of privileged code together on the same machine ever since the invention of virtual machines. We have lots of lightweight sandboxing technologies that could be used when invoking a particular action such as tj-actions/changed-files that only gives it the permissions it needs.<p>You may do a "docker build" in a pipeline which does need root access and network access, but when you publish a package on pypi, you certainly don't need root access and you also don't need access to the entire internet, just the pypi API endpoint(s) necessary for publishing.</p>
]]></description><pubDate>Thu, 08 May 2025 16:38:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=43927971</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43927971</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43927971</guid></item><item><title><![CDATA[New comment by cyrnel in "How to harden GitHub Actions"]]></title><description><![CDATA[
<p>Every action gets these permissions by default. The reason we know it had that permission is that the exploit code read from /proc/pid/mem to steal the secrets, which requires some permissions: <a href="https://blog.cloudflare.com/diving-into-proc-pid-mem/#access-checks" rel="nofollow">https://blog.cloudflare.com/diving-into-proc-pid-mem/#access...</a><p>Linux processes have tons of default permissions that they don't really need.</p>
]]></description><pubDate>Thu, 08 May 2025 16:30:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=43927848</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43927848</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43927848</guid></item><item><title><![CDATA[New comment by cyrnel in "How to harden GitHub Actions"]]></title><description><![CDATA[
<p>This has some good advice, but I can't help but notice that none of this solves a core problem with the tj-actions/changed-files issue: The workflow had the CAP_SYS_PTRACE capability when it didn't need it, and it used that permission to steal secrets from the runner process.<p>You don't need to audit every line of code in your dependencies and their subdependencies if your dependencies are restricted to only doing the thing they are designed to do and nothing more.<p>There's essentially nothing nefarious changed-files could do if it were limited to merely reading a git diff provided to it on stdin.<p>Github provides no mechanism to do this, probably because posts like this one never even call out the glaring omission of a sandboxing feature.</p>
]]></description><pubDate>Thu, 08 May 2025 13:31:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=43925947</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43925947</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43925947</guid></item><item><title><![CDATA[New comment by cyrnel in "Redis is open source again"]]></title><description><![CDATA[
<p>Amazon really encourages valkey in the elasticache dashboard. There's a banner advertising lower prices and it's listed first in the dropdown when you go to create one. Default settings do have power.</p>
]]></description><pubDate>Thu, 01 May 2025 16:52:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=43860256</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43860256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43860256</guid></item><item><title><![CDATA[New comment by cyrnel in "Deafening Silence from the Cybersecurity Industry"]]></title><description><![CDATA[
<p>I think this article describes the issue well:<p><a href="https://crankysec.com/blog/community/" rel="nofollow">https://crankysec.com/blog/community/</a><p>> All the cybersecurity companies saying "We don't have anything to say about this situation." is just them being true to their main in-group: for-profit companies that don't want to upset a big current or potential buyer. They are, first and foremost, part of that "community", and they happen to be involved in cybersecurity. Solidarity is happening there, just not to the people in cybersecurity.<p>This sucks and we should change it for sure. So many other industries have successfully become professionalized, unionized, and kicked the grifters to the curb. But it feels more and more like the cybersecurity grifters are the ones holding the reins.</p>
]]></description><pubDate>Fri, 18 Apr 2025 12:08:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=43727299</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43727299</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43727299</guid></item><item><title><![CDATA[New comment by cyrnel in "GitHub suffers a cascading supply chain attack compromising CI/CD secrets"]]></title><description><![CDATA[
<p>On its own, immutability isn't a complete solution to supply chain attacks. Software still needs to be updated and those updates could contain malware too.<p>You need immutability and something like sandboxing where actions cannot e.g. dump the memory of the runner process to steal secrets.<p>The alternative is vetting every single line of code in every dependency and every subdependency perfectly for every update, which is not realistic.</p>
]]></description><pubDate>Tue, 15 Apr 2025 13:06:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=43692108</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43692108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43692108</guid></item><item><title><![CDATA[New comment by cyrnel in "Fedora change aims for 99% package reproducibility"]]></title><description><![CDATA[
<p>I've seen this more formalized as a triangle, with "functionality" being the third point: <a href="https://blog.c3l-security.com/2019/06/balancing-functionality-usability-and.html?m=1" rel="nofollow">https://blog.c3l-security.com/2019/06/balancing-functionalit...</a><p>You can get secure and easy-to-use tools, but they typically have to be really simple things.</p>
]]></description><pubDate>Fri, 11 Apr 2025 20:24:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=43658135</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43658135</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43658135</guid></item><item><title><![CDATA[New comment by cyrnel in "The Burnout Machine"]]></title><description><![CDATA[
<p>The effort to replace US tech is not anything similar to the European tech industry.<p>US technology has a hegemony because we were first to the party, our economy is larger, and our laws are hostile to newcomers (lack of interoperability requirements, lack of enforcement of anti-trust laws, strong defense of DMCA laws, non-competes, and trade secret laws).<p>I've worked in the EU tech sector. They have tons of startups that operate just like US startups: VC funded, hockey-stick growth, and hiring like crazy. Their stricter labor laws don't get in the way of that.<p>The hyper-growth, VC-funded startup model is itself quite exploitative, but if it's still possible with stricter labor laws, then fears about them impacting growth are unfounded.</p>
]]></description><pubDate>Fri, 21 Mar 2025 11:59:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=43434592</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43434592</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43434592</guid></item><item><title><![CDATA[New comment by cyrnel in "The Burnout Machine"]]></title><description><![CDATA[
<p>> you're going to personally be better off changing companies<p>Job mobility for tech workers is a fluke of current economic conditions. If interest rates spike, or a recession happens, or a bubble bursts, this benefit would go away and you'd be stuck at that exploitative company or unemployed.<p>Unionization and labor laws can make workers less disposable without substantially affecting growth (see: European tech hubs).</p>
]]></description><pubDate>Thu, 20 Mar 2025 22:01:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=43429484</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43429484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43429484</guid></item><item><title><![CDATA[New comment by cyrnel in "The Burnout Machine"]]></title><description><![CDATA[
<p>There's no reason why tech unions can't have solidarity with other unionization efforts (and there are thousands of reason why we should have that solidarity).<p>Us tech workers could be leveraging the privilege we have to get better conditions for everyone.<p>A perfect example is non-compete clauses. Tech workers enjoy high job mobility, which is only hindered by non-competes. It's no accident that major tech hubs were some of the first states to ban them, helping all workers.</p>
]]></description><pubDate>Thu, 20 Mar 2025 21:26:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=43429165</link><dc:creator>cyrnel</dc:creator><comments>https://news.ycombinator.com/item?id=43429165</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43429165</guid></item></channel></rss>