<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: drum55</title><link>https://news.ycombinator.com/user?id=drum55</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 22:41:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=drum55" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by drum55 in "Put your SSH keys in your TPM chip"]]></title><description><![CDATA[
<p>Seems a little pointless, your keys can't be stolen but they can be instantly used by malware to persist across anything you have access to. The keys don't have any value in their own right, the access they provide does.</p>
]]></description><pubDate>Thu, 16 Apr 2026 16:50:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47796155</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47796155</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47796155</guid></item><item><title><![CDATA[New comment by drum55 in "BlueHammer abuses Windows Defender's update process to gain SYSTEM access"]]></title><description><![CDATA[
<p>More or less, no desktop OS other than Qubes and MacOS (to a very limited extent) can handle the user being even vaguely compromised, much less a user with privilege. Keys to the kingdom are already in the user domain, SSH keys, all your emails and photos, contacts, access to other devices in your network. The user can backdoor themselves to get passwords by modifying their own environment, can escalate by modifying the DNS settings of the users browser to gain more access. Root access by and large is completely irrelevant.</p>
]]></description><pubDate>Sat, 11 Apr 2026 11:20:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47729605</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47729605</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47729605</guid></item><item><title><![CDATA[New comment by drum55 in "Phone-free bars and restaurants on the rise across the U.S."]]></title><description><![CDATA[
<p>Intentionally interfering with 911 would probably be a poor decision.</p>
]]></description><pubDate>Sun, 05 Apr 2026 18:55:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47652651</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47652651</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47652651</guid></item><item><title><![CDATA[New comment by drum55 in "Axios compromised on NPM – Malicious versions drop remote access trojan"]]></title><description><![CDATA[
<p>The ones you hear about are caught quickly, I’m more worried about the non obvious ones. So far none of these have been as simple as changing a true to a false and bypassing all auth for all products or something, and would that be caught by an automated scanner?</p>
]]></description><pubDate>Tue, 31 Mar 2026 05:15:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47583010</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47583010</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47583010</guid></item><item><title><![CDATA[New comment by drum55 in "The bot situation on the internet is worse than you could imagine"]]></title><description><![CDATA[
<p>The language matters, but your original guess was actually correct, you can do tricks with sha256 where you only end up calculating a fraction of the total double hash in order to get a pass or fail.<p>Modern bitcoin miners do a double sha256 hash and increment in just a little bit more than a single hash of work. The input is 80 bytes, which is two compression rounds of 64 bytes in sha256, only the data in the second round has changed (the appended nonce), so you don’t bother doing the first compression round again. With other quirks you can end up doing multiple hashes at once “asicboost” due to partial collisions within the input too.</p>
]]></description><pubDate>Sun, 29 Mar 2026 20:36:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47567027</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47567027</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47567027</guid></item><item><title><![CDATA[New comment by drum55 in "The bot situation on the internet is worse than you could imagine"]]></title><description><![CDATA[
<p>Yes, Anubis is just non standard and obscure, the proof of work bit is completely irrelevant (except for getting people on their phone to not visit your website).</p>
]]></description><pubDate>Sun, 29 Mar 2026 20:33:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47566997</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47566997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47566997</guid></item><item><title><![CDATA[New comment by drum55 in "The bot situation on the internet is worse than you could imagine"]]></title><description><![CDATA[
<p>Anybody can prompt Claude to implement this, which was my point, it doesn't stop bots because a bot can literally write the bypass! My prompt was the proof of work function from the repository, asked it to make an implementation in C that could solve it faster, and that was about it.</p>
]]></description><pubDate>Sun, 29 Mar 2026 17:37:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47565292</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47565292</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47565292</guid></item><item><title><![CDATA[New comment by drum55 in "The bot situation on the internet is worse than you could imagine"]]></title><description><![CDATA[
<p>It doesn't matter if your hottest loop is using string comparisons, as another poster pointed out in C you aren't even doing the majority of the second hash because you know the result (or enough of it) before finishing it. The JavaScript version just does whole hashes and turns them into a Uint8Array, then iterates through it.</p>
]]></description><pubDate>Sun, 29 Mar 2026 17:30:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47565232</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47565232</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47565232</guid></item><item><title><![CDATA[New comment by drum55 in "The bot situation on the internet is worse than you could imagine"]]></title><description><![CDATA[
<p>Bravo, you even implemented the midstate speedup from Bitcoin, that's way more impressive.</p>
]]></description><pubDate>Sun, 29 Mar 2026 17:26:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47565179</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47565179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47565179</guid></item><item><title><![CDATA[New comment by drum55 in "The bot situation on the internet is worse than you could imagine"]]></title><description><![CDATA[
<p>Ironically I used a LLM to write a bypass for this ridiculous tool, doing hashing in a browser makes no sense, Claude's very bad implementation of it in C does tens of megahash a second and passes all of the challenges nearly instantly. It took about 5 minutes for Claude to write that, and it's not even a particularly fast implementation, but it beats the pants off doing string comparisons for every loop in JavaScript which is what the Anubis tool does.<p><pre><code>    for (; ;) {
        const hashBuffer = await calculateSHA256(data + nonce);
        const hashArray = new Uint8Array(hashBuffer);

        let isValid = true;
        for (let i = 0; i < requiredZeroBytes; i++) {
          if (hashArray[i] !== 0) {
            isValid = false;
            break;
          }
        }
</code></pre>
It's less proof of work and just annoying to users, and feel good to whoever added it to their site, I can't wait for it to go away. As a bonus, it's based on a misunderstanding of hashcash, because it is only testing zero bytes comparison with a floating point target (as in Bitcoin for example), the difficulty isn't granular enough to make sense, only a couple of the lower ones are reasonably solvable in JavaScript and the gaps between "wait for 90 minutes" and "instantly solved" are 2 values apart.</p>
]]></description><pubDate>Sun, 29 Mar 2026 17:18:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47565098</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47565098</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47565098</guid></item><item><title><![CDATA[New comment by drum55 in "ICAO issued new power bank restriction on flight"]]></title><description><![CDATA[
<p>That's a bit surprising to me, wonder what the root cause of that was. It seems to be shared across multiple products at once so maybe they had a bad batch of cells?</p>
]]></description><pubDate>Sat, 28 Mar 2026 17:59:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47556876</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47556876</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47556876</guid></item><item><title><![CDATA[New comment by drum55 in "ICAO issued new power bank restriction on flight"]]></title><description><![CDATA[
<p>I've never had any issues with brand name, not dollar store power banks and I've been using them for more than a decade. I'd totally expect a $5 pink power bank from a alphabet amazon seller to be an issue, but anything modern and reasonable like Anker are very unlikely to cause you any issues. Balancing, protection are very much solved issues at this point for the cell chemistries we use.<p>If LiPo was the issue, using LiFePo4 or LTO cells for planes would be a totally reasonable alternative too. LTO cells are so safe the manufacturer of them has videos on youtube of them hammering nails into the cells, cutting them with a saw, and crushing them with a press and they don't really care.</p>
]]></description><pubDate>Sat, 28 Mar 2026 17:31:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47556655</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47556655</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47556655</guid></item><item><title><![CDATA[New comment by drum55 in "ICAO issued new power bank restriction on flight"]]></title><description><![CDATA[
<p>That's a kind of meaningless comparison. Peanuts are about 8kJ per gram supposedly, by your measure we should ban even small amounts of peanuts on planes because 100 grams of them contain more energy than a hand grenade. Without talking about the time frame over which the energy can be released you'd have to make sure that everybody went onto the plane completely naked lest their clothes ignited.</p>
]]></description><pubDate>Sat, 28 Mar 2026 17:23:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47556601</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47556601</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47556601</guid></item><item><title><![CDATA[New comment by drum55 in "ICAO issued new power bank restriction on flight"]]></title><description><![CDATA[
<p>There are fire extinguishers and smoke detectors in the holds of aircraft.</p>
]]></description><pubDate>Sat, 28 Mar 2026 17:21:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47556584</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47556584</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47556584</guid></item><item><title><![CDATA[New comment by drum55 in "We broke 92% of SHA-256 – you should start to migrate from it"]]></title><description><![CDATA[
<p>> it is possible that we'll find relations that carry across the entire double-SHA-256 pipeline<p>Bitcoin mining is a partial second preimage of 0x00 though, not a collision, that statement just seems to be so outside the realm of what they’re claiming to have done. Even MD5, the most widely known to be broken hash, would be secure when used in the same way bitcoin uses SHA256 (other than being too short now, bitcoin miners have done 80 bits of work at this point many times over).</p>
]]></description><pubDate>Fri, 27 Mar 2026 19:13:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546983</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47546983</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546983</guid></item><item><title><![CDATA[New comment by drum55 in "Cloudflare flags archive.today as "C&C/Botnet"; no longer resolves via 1.1.1.2"]]></title><description><![CDATA[
<p>Should providing a public service absolve all sins?</p>
]]></description><pubDate>Sun, 22 Mar 2026 08:14:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47475457</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47475457</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47475457</guid></item><item><title><![CDATA[New comment by drum55 in "Dumping Lego NXT firmware off of an existing brick (2025)"]]></title><description><![CDATA[
<p>My first ever programming was with the original brick, I made a scanner with the light sensor and a terrible python script that took the values from the serial port and turned them into a bitmap.</p>
]]></description><pubDate>Sat, 07 Mar 2026 23:04:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47292338</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47292338</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47292338</guid></item><item><title><![CDATA[New comment by drum55 in "ATAboy is a USB adapter for legacy CHS only style IDE (PATA) drives"]]></title><description><![CDATA[
<p>“ Some of this firmware code was written with AI assistance. It currently contains an IPC re-entry, and possibly other bugs that could cause the RP2350 to crash under certain circumtstances. ”<p>Seems like an admission they’ve not really read the code either.</p>
]]></description><pubDate>Tue, 24 Feb 2026 19:27:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47141520</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47141520</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47141520</guid></item><item><title><![CDATA[New comment by drum55 in "I think WebRTC is better than SSH-ing for connecting to Mac terminal from iPhone"]]></title><description><![CDATA[
<p>What portion of the security-critical code is written by a human? A shell is literally keys to the kingdom in every regard.</p>
]]></description><pubDate>Tue, 24 Feb 2026 19:20:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47141412</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47141412</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47141412</guid></item><item><title><![CDATA[New comment by drum55 in "Show HN: PIrateRF – Turn a $20 Raspberry Pi Zero into a 12-mode RF transmitter"]]></title><description><![CDATA[
<p><a href="https://raw.githubusercontent.com/psyb0t/piraterf/88c5fc416d9a39d31b0f842d16ab8cab9d387f2e/.gitignore" rel="nofollow">https://raw.githubusercontent.com/psyb0t/piraterf/88c5fc416d...</a><p>That's because it's in the .gitignore.<p>It's just very obviously made with claude, from the style, to the commits of tens of thousands of lines of code a day, to the parts where Claude commits something sensible and the author goes back to add in curse words. Nobody has ever developed software in the same way that claude tends to, where suddenly a whole readme appears in a commit fully formatted and filled with emojis.</p>
]]></description><pubDate>Sat, 21 Feb 2026 05:02:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47097668</link><dc:creator>drum55</dc:creator><comments>https://news.ycombinator.com/item?id=47097668</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47097668</guid></item></channel></rss>