<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ewpratten</title><link>https://news.ycombinator.com/user?id=ewpratten</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 28 Apr 2026 21:20:58 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ewpratten" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ewpratten in "Software Pump and Dump"]]></title><description><![CDATA[
<p>I’m doing that (similar scale and same language) with a base model M4 mini. Works great. Anything more is overkill imo.</p>
]]></description><pubDate>Fri, 30 Jan 2026 14:26:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46824757</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46824757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46824757</guid></item><item><title><![CDATA[New comment by ewpratten in ""We have stratum zero at home""]]></title><description><![CDATA[
<p>I completely agree with you. In my opinion, using GPS as Stratum 0 feels like a cheat. I do hope to some day (definitely not any time soon) own an atomic clock of some kind though.<p>Regarding PPS, the L76B does this cheaty thing where it actually sends the PPS signal over UART. They provide a calculation to go from “Time of first byte” to a regular PPS signal on the receiving side.</p>
]]></description><pubDate>Wed, 07 Jan 2026 14:56:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46527058</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46527058</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46527058</guid></item><item><title><![CDATA["We have stratum zero at home"]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/gps-timekeeping">https://ewpratten.com/blog/gps-timekeeping</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46522376">https://news.ycombinator.com/item?id=46522376</a></p>
<p>Points: 7</p>
<p># Comments: 2</p>
]]></description><pubDate>Wed, 07 Jan 2026 03:57:23 +0000</pubDate><link>https://ewpratten.com/blog/gps-timekeeping</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46522376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46522376</guid></item><item><title><![CDATA[Authenticating SSH Sessions with Secure Enclave]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/ssh-secure-enclave">https://ewpratten.com/blog/ssh-secure-enclave</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46381313">https://news.ycombinator.com/item?id=46381313</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 25 Dec 2025 01:37:58 +0000</pubDate><link>https://ewpratten.com/blog/ssh-secure-enclave</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46381313</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46381313</guid></item><item><title><![CDATA[New comment by ewpratten in "How I protect my Forgejo instance from AI web crawlers"]]></title><description><![CDATA[
<p>Regarding the Cloudflare part of this, I’d recommend taking a look at “Authenticated Origin Pulls”. It lets you perform your validation at the TLS layer instead of doing it with IP ACLs if that interests you.</p>
]]></description><pubDate>Mon, 22 Dec 2025 12:24:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46353607</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46353607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46353607</guid></item><item><title><![CDATA[Fuzix on a Raspberry Pi Pico]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/fuzix-pi-pico">https://ewpratten.com/blog/fuzix-pi-pico</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46271115">https://news.ycombinator.com/item?id=46271115</a></p>
<p>Points: 111</p>
<p># Comments: 14</p>
]]></description><pubDate>Mon, 15 Dec 2025 06:31:39 +0000</pubDate><link>https://ewpratten.com/blog/fuzix-pi-pico</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46271115</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46271115</guid></item><item><title><![CDATA[My snapshot-only Minecraft server]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/minecraft-snapshot-server">https://ewpratten.com/blog/minecraft-snapshot-server</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46005112">https://news.ycombinator.com/item?id=46005112</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 21 Nov 2025 14:50:45 +0000</pubDate><link>https://ewpratten.com/blog/minecraft-snapshot-server</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=46005112</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46005112</guid></item><item><title><![CDATA[Preliminary Thoughts on the Jujutsu VCS]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/learning-jj">https://ewpratten.com/blog/learning-jj</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44877564">https://news.ycombinator.com/item?id=44877564</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 12 Aug 2025 15:28:02 +0000</pubDate><link>https://ewpratten.com/blog/learning-jj</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=44877564</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44877564</guid></item><item><title><![CDATA[New comment by ewpratten in "Hurl: Run and test HTTP requests with plain text"]]></title><description><![CDATA[
<p>You should probably be looking at the Cargo.toml file(s) (for direct dependencies at least) instead of the lock file as the lock file will include dependencies used for dev/testing.</p>
]]></description><pubDate>Fri, 20 Jun 2025 13:15:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=44327444</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=44327444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44327444</guid></item><item><title><![CDATA[Learning (The Basics of) Nftables]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/learning-nftables">https://ewpratten.com/blog/learning-nftables</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44284535">https://news.ycombinator.com/item?id=44284535</a></p>
<p>Points: 8</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 15 Jun 2025 19:44:51 +0000</pubDate><link>https://ewpratten.com/blog/learning-nftables</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=44284535</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44284535</guid></item><item><title><![CDATA[New comment by ewpratten in "Tailscale has raised $160M"]]></title><description><![CDATA[
<p>It’s automated in the kind of way that makes a lot of sense to people familiar with the internal HR systems.</p>
]]></description><pubDate>Sun, 20 Apr 2025 12:59:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=43743492</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=43743492</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43743492</guid></item><item><title><![CDATA[Implantable SSH Credentials]]></title><description><![CDATA[
<p>Article URL: <a href="https://ewpratten.com/blog/implant-backed-ssh">https://ewpratten.com/blog/implant-backed-ssh</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42677818">https://news.ycombinator.com/item?id=42677818</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 12 Jan 2025 22:51:34 +0000</pubDate><link>https://ewpratten.com/blog/implant-backed-ssh</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42677818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42677818</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>Think of it like a subset of MIFARE.<p>In a simple sense, NTAG cards can do NFC things, but MIFARE can do lots more (access control for example)..and also NFC things..somewhat.<p>Magic mifare refers to special cards that let you bypass the write-lock of genuine mifare cards. These are mostly used for cloning keys (either for red-team pentesting or for people who want a copy of an office key for whatever reason)</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:51:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427585</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427585</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>All my knowledge is trial & error.<p>I've found the people over in the DT forum are pretty helpful with the cloning and usage aspect of things: <a href="https://forum.dangerousthings.com" rel="nofollow">https://forum.dangerousthings.com</a><p>Additionally, Iceman's Discord people has tons of smart people: <a href="https://discord.com/invite/iceman" rel="nofollow">https://discord.com/invite/iceman</a></p>
]]></description><pubDate>Mon, 16 Dec 2024 02:48:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427575</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427575</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427575</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>Are you sure? The NFC app for iPhone can always read tags. Its specifically getting phones <i>without</i> the app to read them.<p>Try wiping, then writing a URL from Android.<p>Then just tap to the iPhone and see if Safari opens or not. It shouldn't</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:38:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427511</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427511</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427511</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>There's lots of info about the NDEF "packet" format online.<p>I used this page as reference when I was putting together the "magic bytes" in the final section of the blog post: 
<a href="https://www.oreilly.com/library/view/beginning-nfc/9781449324094/ch04.html" rel="nofollow">https://www.oreilly.com/library/view/beginning-nfc/978144932...</a></p>
]]></description><pubDate>Mon, 16 Dec 2024 02:32:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427493</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427493</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427493</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>Thank you very much!<p>Something's clearly up there. You can see that even IOS and Android disagree with each other on what NDEF should look like by a few bytes. Very interesting.</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:23:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427468</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427468</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427468</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>Wipe the card.<p>Make a dump after doing "hf mf ndefformat".<p>Then make a dump after writing a payload from an iPhone. (since iPhone seems to want ndefformat anyways)<p>Then wipe again and make a dump after writing from Android.</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:17:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427442</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427442</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427442</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>Ya, looks like the iPhone is tinkering with the NDEF message itself.<p>If my Android phone wasn't dead, I'd love to compare an iPhone's write against the Android NFC Tools app's write.<p>If anyone else has an iPhone, an Android phone, and a Proxmark, I'd be interested in seeing a three-way diff between them all.<p>EDIT: I'm going to try to cross-post to the DT forum to see if anyone has ideas.</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:12:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427416</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427416</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427416</guid></item><item><title><![CDATA[New comment by ewpratten in "Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag"]]></title><description><![CDATA[
<p>There's approx 4 generations of "Magic".<p>Gen 1, 1a, 3 and 4 all use special commands to unlock and edit block 0.<p>Gen 2 treats block 0 as always being r/w. This allows Android phones to directly write to it (but also makes it possible to lock the card).<p>In terms of pm3 commands, "auto" tries everything. You might also want to use "lf search" or "hf search" to only try one of your antennas and not the other.<p>The actual Magic part isn't really important here, since my phone doesn't even care about block 0. It just makes it easier to read and wipe the card when you have the extra command set at your disposal.</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:10:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427411</link><dc:creator>ewpratten</dc:creator><comments>https://news.ycombinator.com/item?id=42427411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427411</guid></item></channel></rss>