<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ericselin</title><link>https://news.ycombinator.com/user?id=ericselin</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 20 May 2026 10:14:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ericselin" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ericselin in "Why FreeSewing with its users migrated to statichost.eu"]]></title><description><![CDATA[
<p>FreeSwewing is an awesome project by Joost De Cock! You should totally check it out if you're into sewing. And if you're into digital sovereignty tou should totally check out statichost.eu (disclaimer: I'm the founder :)<p>TL;DR takeaway for HN techies: when executing resource-intensive workloads on Node.js, pay attention to its max heap size. It can be increased with the `--max-old-space-size` option, e.g. via the env var `NODE_OPTIONS="--max-old-space-size=16384"`.</p>
]]></description><pubDate>Wed, 14 Jan 2026 15:14:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46616951</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=46616951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46616951</guid></item><item><title><![CDATA[Why FreeSewing with its users migrated to statichost.eu]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.statichost.eu/blog/freesewing-success-story/">https://www.statichost.eu/blog/freesewing-success-story/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46616950">https://news.ycombinator.com/item?id=46616950</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 14 Jan 2026 15:14:49 +0000</pubDate><link>https://www.statichost.eu/blog/freesewing-success-story/</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=46616950</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46616950</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Based on what I've seen, there's no way to get that project into the PSL. I would recommend you to have the content available at projectcontent.com if the main site is project.com, though. :)</p>
]]></description><pubDate>Fri, 10 Oct 2025 22:58:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45544783</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45544783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45544783</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>The thing is, for users, having a separate domain wouldn't have made any difference without the PSL. And you cannot get on there before you're big enough - which I'd say is roughly at the same time as you start grabbing the attention of scammers.</p>
]]></description><pubDate>Fri, 10 Oct 2025 22:27:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45544561</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45544561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45544561</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Sure, and sorry for being so unclear. The point of my post was meant to be a) Google has this enormous cannon, is this "right"? And b) they will use it to kill anything bigger than a mosquito.<p>But you're right, complaining about big tech surveillance didn't help with making that point at all.</p>
]]></description><pubDate>Fri, 10 Oct 2025 22:22:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=45544514</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45544514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45544514</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Ok, I see. You mean the possibility of users impersonating statichost.eu itself. That is actually a good point, and the exact reason why user subdomains are required to have a dash in them. Edit: Also, only ASCII is allowed. :)<p>I guess control-panel.statichost.eu is still possible, of course, but that already seems like a pretty long shot.</p>
]]></description><pubDate>Fri, 10 Oct 2025 22:15:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=45544463</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45544463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45544463</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Author here. What kind of security negligence are you referring to? What would be a specific attack vector that I left open?<p>Regarding the PSL - and I can't believe I'm writing this again: you cannot get on there before your service is big enough and "the request authentically merits such widespread inclusion"[1]. So it's kind of a chicken and egg situation.<p>Regarding the best practice of hosting user content on a separate domain: this has basically two implications:
1. Cookie scope of my own assets (e.g. dashboard), which one should limit in any case and which I'm of course doing. So this is not an issue. 
2. Blacklisting, which is what all of this has been about. I did pay the price here. This has nothing to do with security, though.<p>I'm sorry to be so frank, but you don't know anything about me or my security practices and your claim of negligence is extremely unfounded.<p>[1] <a href="https://github.com/publicsuffix/list/wiki/Guidelines#validation-and-non-acceptance-factors" rel="nofollow">https://github.com/publicsuffix/list/wiki/Guidelines#validat...</a></p>
]]></description><pubDate>Fri, 10 Oct 2025 22:09:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45544385</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45544385</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45544385</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Thank you for this hacker-minded and sharp comment! <3 Seriously, not all comments on here are as fun to read for me as the author and fellow hacker.<p>And for what it's worth, it feels great to actually pay for something Google provides!</p>
]]></description><pubDate>Fri, 10 Oct 2025 21:04:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45543772</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45543772</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45543772</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Many commenters are implying that there is a security issue here, and that I'm putting everyone in danger. That is quite frankly a pretty absurd claim to just casually make. I'm of course very curious to hear more details on what the security risk here actually would be?<p>Do you think I'm reading/writing sensitive data to/from subdomain-wide cookies?<p>Also, yes, the PSL is a great tool to mitigate (in practice eliminate) the problem of cross-domain cookies between mutually untrusting parties. But getting on that list is non-trivial and they (voluntary maintainers) even explicitly state that you can forget getting on there before your service is big enough.</p>
]]></description><pubDate>Fri, 10 Oct 2025 20:51:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=45543658</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45543658</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45543658</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Author here. I understand that my post and what I'm trying to say is unclear. And that there are too many different aspects to all this.<p>What I'm trying to say in the post specifically about Google is that I personally think that they have too much power. They can and will shut down a whole domain for four billion users. That is too much power no matter the intentions, in my opinion. I can agree that the intentions are good and that the net effect is positive on the whole, though.<p>On the "different aspects" side of things, I'm not sure I agree with the _works_ claim you make. I guess it depends on what your definition of works is, but having a blacklist as you tool to fight bad guys is not something that works very well in my opinion. Yes, specifically my own assets would not have been impacted, had I used a separate domain earlier. But the point still stands.<p>The fact that it took so long to move user content off the main domain is of course on me. I'm taking some heat here for saying this is more important than one (including me) might think. But nonetheless, let it be a lesson for those of you out there who think that moving that forum / upload functionality / wiki / CMS to its own domain (not subdomain) can be done tomorrow instead of today.</p>
]]></description><pubDate>Fri, 10 Oct 2025 19:43:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=45542960</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45542960</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45542960</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>So the problem here is that Alice on alice.statichost.page might set a cookie for the `.statichost.page` domain if she's careless (which is sometimes the case with Alice). This cookie can then be read by Mallory on mallory.statichost.eu. Or the other way around, if Mallory wants to try to trick Alice into reading his cookie. How this can be prevented without the PSL is something I'm very interested to hear more about.</p>
]]></description><pubDate>Fri, 10 Oct 2025 18:22:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=45542121</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45542121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45542121</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p><a href="https://github.com/publicsuffix/list/wiki/Guidelines#validation-and-non-acceptance-factors" rel="nofollow">https://github.com/publicsuffix/list/wiki/Guidelines#validat...</a><p>"Projects that are smaller in scale or are temporary or seasonal in nature will likely be declined. Examples of this might be private-use, sandbox, test, lab, beta, or other exploratory nature changes or requests. It should be expected that despite whatever site or service referred a requestor to seek addition of their domain(s) to the list, projects not serving more then thousands of users are quite likely to be declined."<p>Maybe the rules have changed, or maybe you were lucky? :)</p>
]]></description><pubDate>Fri, 10 Oct 2025 16:29:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=45540753</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45540753</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45540753</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Please note that this tool (PSL) is not available until you have a significant user base. Which probably means a significant amount of spam as well.</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:41:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=45540230</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45540230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45540230</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Fair enough! :)</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:37:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=45540178</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45540178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45540178</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Since there's a lot of discussion about the Public Suffix list, let me point out that it's not just a webform where you can add any domain. There's a whole approval process where one very important criterion is that the domain to be added has a large enough user base. When you have a large enough user base, you generally have scammers as well. That's what happened here.<p>It basically goes: growing user base -> growing amount of malicious content -> ability to submit domain to PSL. In that order, more or less.<p>In terms of security, for me, there's no issue with being on the same domain as my users. My cookies are scoped to my own subdomain, and HTTPS only. For me, being blocked was the only problem, one that I can honestly admit was way bigger than I thought.<p>Hence, the PSA. :)</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:26:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45540096</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45540096</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45540096</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>The thing is, you cannot just add any domain to the PSL. You need a significant amount of users before they will include your domain. Before recently, there really was no point in even submitting, since the domain would have been rejected as too small. An increase in user base, increase in malicious content and the ability to add your domain to the PSL all happen sort of simultaneously.<p>I'm also trusting my users to not expose their cookies for the whole *.statichost.eu domain. And all "production" sites use a custom domain anyway, which avoids all of this anyway.</p>
]]></description><pubDate>Fri, 10 Oct 2025 14:45:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539680</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45539680</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539680</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>I respectfully disagree with your premise. In this specific case, yes, "Google does good thing" in a sense. That is not why I'm saying Google has too much power. "Too much" is relative and whether they do good or bad debatable, of course, but it's hard to argue that they don't have a gigantic influence on the whole internet, no? :)<p>Helping people avoid potentially devastating mistakes is of course a good thing.</p>
]]></description><pubDate>Fri, 10 Oct 2025 14:24:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539454</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45539454</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539454</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>You are right, it would still affect all users. Until the pending PSL inclusion is complete, that is. But it now separates my own resources, such as the website and dashboard of statichost.eu from that.</p>
]]></description><pubDate>Fri, 10 Oct 2025 14:14:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539351</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45539351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539351</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>(Author here) This is all true. The main assumption from my part is that anything remotely important or even sensitive should be and is hosted on a domain that is _not_ companysubdomain.domain.com but instead www.company.com.</p>
]]></description><pubDate>Fri, 10 Oct 2025 14:06:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539250</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45539250</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539250</guid></item><item><title><![CDATA[New comment by ericselin in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>That is a great point. When I see these sites I'm always seeing a dozen red flags, and maybe the biggest one is that it's showing a "NatWest" banking site or something and is hosted on "portal-abc.statichost.eu". But the whole point is of course saving users from coming to harm, and if it did - great!</p>
]]></description><pubDate>Fri, 10 Oct 2025 14:01:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539188</link><dc:creator>ericselin</dc:creator><comments>https://news.ycombinator.com/item?id=45539188</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539188</guid></item></channel></rss>