<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: deeqkah</title><link>https://news.ycombinator.com/user?id=deeqkah</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 11 Apr 2026 07:52:19 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=deeqkah" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by deeqkah in "Cryptogams and the NSA (fiction)"]]></title><description><![CDATA[
<p>I honestly couldn't get through reading this in it's entirety as i was laughing too hard. I've saved the page so i could finish later.<p>Clever, utterly insane and timely.</p>
]]></description><pubDate>Sun, 16 Jun 2013 08:18:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=5887845</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5887845</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5887845</guid></item><item><title><![CDATA[New comment by deeqkah in "Yahoo Starts Scanning Emails"]]></title><description><![CDATA[
<p>Seems like a subtle advertisement for StartMail, honestly. Google has been doing this for years. I see the op has a previous submission for StartMail, too.<p>Any reason for that or is it just an attractive application/service to you? I mean, if it's something we should have a better look at, let us know.</p>
]]></description><pubDate>Sun, 02 Jun 2013 08:35:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=5807771</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5807771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5807771</guid></item><item><title><![CDATA[New comment by deeqkah in "Mac malware signed with Apple ID infects activist’s laptop"]]></title><description><![CDATA[
<p>There was a relevant update to iTunes last night (or earlier this week) for both OS X and Windows. It is usually these types of updates i keep an eye out for, as it is most importantly an update to certificate validation.<p>CVE-2013-1014 as it impacts iTunes for Mac OS X v10.6.8 or later, Windows 7, Vista, XP SP2 or later (<a href="http://support.apple.com/kb/HT5766" rel="nofollow">http://support.apple.com/kb/HT5766</a>) -<p>"Impact: An attacker in a privileged network position may manipulate HTTPS server certificates, leading to the disclosure of sensitive information<p>Description: A certificate validation issue existed in iTunes. In certain contexts, an active network attacker could present untrusted certificates to iTunes and they would be accepted without warning. This issue was resolved by improved certificate validation."<p>There were almost forty other CVEs for iTunes on Windows. And just a last bit - the discussion and quality of submissions here at Hacker News has taken a substantial fucking nose dive in the last year. I change my name every so often, but i can tell you that i've been here long enough to say that.</p>
]]></description><pubDate>Fri, 17 May 2013 22:12:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=5726942</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5726942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5726942</guid></item><item><title><![CDATA[Feedback Control & the Coming Machine Revolution, by Raffaello D'Andrea]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.youtube.com/watch?v=C4IJXAVXgIo">http://www.youtube.com/watch?v=C4IJXAVXgIo</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5461886">https://news.ycombinator.com/item?id=5461886</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 29 Mar 2013 17:38:09 +0000</pubDate><link>http://www.youtube.com/watch?v=C4IJXAVXgIo</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5461886</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5461886</guid></item><item><title><![CDATA[OpenBadges 1.0 (Recognize & Verify Online Learning)]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.openbadges.org/about/">http://www.openbadges.org/about/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5443425">https://news.ycombinator.com/item?id=5443425</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 26 Mar 2013 14:19:37 +0000</pubDate><link>http://www.openbadges.org/about/</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5443425</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5443425</guid></item><item><title><![CDATA[New comment by deeqkah in "The Ultimate Bookmarking Tool Is Finally Here"]]></title><description><![CDATA[
<p>What i found most interesting about this is the slimmed down nature of <i>what</i> you collect. In the video, when you showed the grid of things you've collected... it was really appealing.<p>I think the real strength of this would be in it's technical implementation; how not-annoying is it in my browser, is it resource heavy, how can i adjust it etc, and then the community around it.<p>Which is where i think there would have to be some real differences between Pinterest. If you give the user the option to share (or not!) what he/she has collected with other people (perhaps a dedicated page), and played with the idea of how users could interact with each other ("This is what Julie collected on Tuesday," - then i think this idea could have even more potential than it already does.<p>Good luck to you folks. As i said this is really interesting.</p>
]]></description><pubDate>Wed, 13 Mar 2013 15:00:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=5368899</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5368899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5368899</guid></item><item><title><![CDATA[Google Play: Potentially Unwanted]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.f-secure.com/weblog/archives/00002521.html">http://www.f-secure.com/weblog/archives/00002521.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5363507">https://news.ycombinator.com/item?id=5363507</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 12 Mar 2013 17:45:19 +0000</pubDate><link>http://www.f-secure.com/weblog/archives/00002521.html</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5363507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5363507</guid></item><item><title><![CDATA[New comment by deeqkah in "Hacker News Parody Thread"]]></title><description><![CDATA[
<p>The first thing i did when i opened your link knowing it was a parody was to check how many responses <i>to the article</i> there were. And there were too many. Way too many.<p>Comments on Hacker News more often than not go into the meta almost immediately, and constantly, so there's usually one comment with well over half of the op's responses nested under it. I use a userscript for HN for this exact reason.<p>It's upsetting, to be honest.</p>
]]></description><pubDate>Wed, 06 Mar 2013 00:44:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=5328555</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5328555</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5328555</guid></item><item><title><![CDATA[New comment by deeqkah in "Why was my email leaked?"]]></title><description><![CDATA[
<p>You know, it's funny because i got a very clever Pay Pal phishing e-mail this morning, linking to a PHP script hosted on renault-astrakhan.ru<p>What's worse is that i sent invitations to dropbox time ago to people that i have to now contact and say "Please be aware of this phishing e-mail disguised as a Pay Pal e-mail."<p>+1 for an alternative service, to be honest. Dropbox is very well done, but this is a good reason to stop using their service if they can't secure their clients' information.<p>It would greatly benefit them if they found the root of the problem, and reported if it were indeed an issue with them or one of the clients for dropbox.</p>
]]></description><pubDate>Thu, 28 Feb 2013 23:25:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=5301788</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5301788</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5301788</guid></item><item><title><![CDATA[New comment by deeqkah in "Stuxnet Missing Link Found, Resolves Some Mysteries Around the Cyberweapon"]]></title><description><![CDATA[
<p>In the David Sanger article published in the Times attributing Stuxnet to the US/Israel, this bit really struck me -<p>"One day, toward the end of Mr. Bush’s term, the rubble of a centrifuge was spread out on the conference table in the Situation Room, proof of the potential power of a cyberweapon. The worm was declared ready to test against the real target: Iran’s underground enrichment plant."<p>And i don't mean to stray off Stuxnet here, but just really quickly: The chosen-prefix collision attack used in signing the Windows Update malware (FLAME) also suspected of being from the US was a never before published variant.<p>The computing power alone was on the order of $200k, and makes you wonder what else the NSA or the national labs have up their sleeves.</p>
]]></description><pubDate>Tue, 26 Feb 2013 22:42:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=5289185</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5289185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5289185</guid></item><item><title><![CDATA[New comment by deeqkah in "The Department Of Homeland Security Is Now Bitching At Me On My Blog"]]></title><description><![CDATA[
<p>"And third, for fuck’s sake, you are the Department of Homeland Security. What happens to me the next time I got through TSA at the airport, or try to cross the border into Canada? Do you think I may perhaps be on a “list” and have some difficulties?"<p>Nice FUD, bro. With what DHS has to do on a day to day basis, your fucking boat isn't making any impressions outside of one office's circle of employees.<p>If that office failed to serve for whatever reason, and you called them out then congrats on being a good citizen. But suggesting something as big as what you just did is more than a little fear mongering.<p>But yeah, sorry to hear about your bad day.</p>
]]></description><pubDate>Sun, 24 Feb 2013 07:06:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=5273209</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5273209</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5273209</guid></item><item><title><![CDATA[An internet-wide port scan in one 7MB GIF, by HD Moore]]></title><description><![CDATA[
<p>Article URL: <a href="http://digitaloffense.net/ports.gif">http://digitaloffense.net/ports.gif</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5273143">https://news.ycombinator.com/item?id=5273143</a></p>
<p>Points: 29</p>
<p># Comments: 10</p>
]]></description><pubDate>Sun, 24 Feb 2013 06:34:24 +0000</pubDate><link>http://digitaloffense.net/ports.gif</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5273143</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5273143</guid></item><item><title><![CDATA[New comment by deeqkah in "A Chinese Hacker's Identity Unmasked"]]></title><description><![CDATA[
<p>How did this get posted? I Posted this last week.<p><a href="https://news.ycombinator.com/item?id=5221484" rel="nofollow">https://news.ycombinator.com/item?id=5221484</a></p>
]]></description><pubDate>Sun, 17 Feb 2013 16:46:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=5235698</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5235698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5235698</guid></item><item><title><![CDATA[A Chinese Hacker's Identity Unmasked]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.businessweek.com/articles/2013-02-14/a-chinese-hackers-identity-unmasked">http://www.businessweek.com/articles/2013-02-14/a-chinese-hackers-identity-unmasked</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5221484">https://news.ycombinator.com/item?id=5221484</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 14 Feb 2013 19:24:44 +0000</pubDate><link>http://www.businessweek.com/articles/2013-02-14/a-chinese-hackers-identity-unmasked</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5221484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5221484</guid></item><item><title><![CDATA[New comment by deeqkah in "Online Activists: Extremists Hurt Cause"]]></title><description><![CDATA[
<p>Just a heads up - Since submitting this at around 730am EST, Politico has changed the article's title (which the submission mirrored).</p>
]]></description><pubDate>Thu, 31 Jan 2013 15:04:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=5145252</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5145252</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5145252</guid></item><item><title><![CDATA[Online Activists: Extremists Hurt Cause]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.politico.com/story/2013/01/online-activists-extremists-hurt-cause-86963.html">http://www.politico.com/story/2013/01/online-activists-extremists-hurt-cause-86963.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5144563">https://news.ycombinator.com/item?id=5144563</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 31 Jan 2013 12:01:43 +0000</pubDate><link>http://www.politico.com/story/2013/01/online-activists-extremists-hurt-cause-86963.html</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5144563</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5144563</guid></item><item><title><![CDATA[New comment by deeqkah in "Man tracks down stolen iPhone using location app, resulting in fist fight"]]></title><description><![CDATA[
<p>Link to the video - <a href="https://www.youtube.com/watch?v=gOWGEArhKU8" rel="nofollow">https://www.youtube.com/watch?v=gOWGEArhKU8</a></p>
]]></description><pubDate>Wed, 09 Jan 2013 21:27:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=5033617</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=5033617</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5033617</guid></item><item><title><![CDATA[A Flash 0Day Was Reportedly Used In the CFR.org Attack]]></title><description><![CDATA[
<p>Article URL: <a href="http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html">http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=4981349">https://news.ycombinator.com/item?id=4981349</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 29 Dec 2012 06:39:48 +0000</pubDate><link>http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=4981349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=4981349</guid></item><item><title><![CDATA[New comment by deeqkah in "Chinese Hackers Suspected in Cyber Attack on Council on Foreign Relations"]]></title><description><![CDATA[
<p>That's a solid source they have -<p>"Investigators said the computer attackers that targeted CFR were able to set up a covert network capable of identifying, encrypting and sending stolen information found in targeted and infected computers back to a secret command and control computer."<p>And they even mentioned that Internet Explorer versions 8 and above were vulnerable. I <i>really</i> hope the AV companies or someone puts together a nice White Paper about this.<p>But before that, i hope that IE vulnerability isn't a 0day.</p>
]]></description><pubDate>Fri, 28 Dec 2012 20:23:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=4979310</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=4979310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=4979310</guid></item><item><title><![CDATA[New comment by deeqkah in "Anatomy of a botnet: Rapid7 researchers dissect Skynet"]]></title><description><![CDATA[
<p>"What the Skynet botnet creator realized, is that he could build a much stronger infrastructure at no cost just by utilizing Tor as the internal communication protocol, and by using the Hidden Services functionality that Tor provides."<p>This is not good, as this kills sinkholing the C&C. Add to that the ease by which this can be obfuscated from AV detection (it's already 15Megs of random data), and you'll have some storms brewing on the horizon.<p>Looking at the net as the weather, i have to say very recently it's been pretty stormy out. My mail server's been getting hit badly by spam that it hasn't in the past been hit by.<p>I wonder if the Tor developers could provide any insight on this. If i were them i'd be facepalming like "This is why we can't have nice things."</p>
]]></description><pubDate>Tue, 11 Dec 2012 04:26:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=4903010</link><dc:creator>deeqkah</dc:creator><comments>https://news.ycombinator.com/item?id=4903010</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=4903010</guid></item></channel></rss>