<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: fictioncircle</title><link>https://news.ycombinator.com/user?id=fictioncircle</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 23 May 2026 17:23:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=fictioncircle" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by fictioncircle in "The Decline of Imgur on Reddit and the Rise of Reddit's Native Image Hosting"]]></title><description><![CDATA[
<p>You don't even need to do that.<p>Just have people opt in for NSFW content on their accounts. Leave them opted out by default (or public).<p>There is no reason it shouldn't be a human controlled flag.</p>
]]></description><pubDate>Tue, 20 Jun 2017 17:53:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=14596865</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14596865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14596865</guid></item><item><title><![CDATA[New comment by fictioncircle in "The Stack Clash"]]></title><description><![CDATA[
<p>> I can understand it may be the right approach from a day-to-day IT management perspective, but I'm not so sure it's the most viable path towards better security long-term.<p>Yeah, this is why I had the caveat:<p>> At least imho, given my time constraints/budget.<p>The "best" long term path is to have larger security budgets that allow for the objective you and the other folks who dislike my response want. The problem, frankly, is we just aren't there yet.<p>For instance, our budget for maintaining security is ~5% of the IT budget. A large portion of that goes to perimeter defense appliances (firewalls, barracuda antispam/antivirus filters, etc.) as well as making sure ublock, anti-malware, etc are installed on every machine. The other major chunk ends up in securing WAN-facing services that can be exploited remotely. The last major chunk is user training to get them to stop doing things like pay bills for services we never purchased, clicking on strange links, running strange attachments, etc.<p>After that, we have no resources to do more than run apt-get update && apt-get upgrade -y for protecting the attack surface once an account is breached. We've got a few things we had to re-compile ourselves manually and break with that process so we moved them out of the package manager for the OS. Our actual applications we build internally also likely have exploitable vulnerabilities if attacked from a local account. Those items never have the budget to be maintained and we certainly wouldn't survive someone taking over a local shell account.<p>I suspect given this is (roughly) the situation every place I've worked at, its simply too common to be an issue.</p>
]]></description><pubDate>Tue, 20 Jun 2017 17:29:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=14596561</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14596561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14596561</guid></item><item><title><![CDATA[New comment by fictioncircle in "ProtonVPN"]]></title><description><![CDATA[
<p>No VPN can reliably anonymize you against government agents so I think the con is a non-issue. VPNs are only really useful when the local network is hostile and/or you want some degree of privacy from the sites you visit.<p>Anyone with sigint capability is going to figure out who you are with a VPN. (i.e. Government agents)</p>
]]></description><pubDate>Tue, 20 Jun 2017 17:08:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=14596367</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14596367</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14596367</guid></item><item><title><![CDATA[New comment by fictioncircle in "Bancor Is Flawed"]]></title><description><![CDATA[
<p>Now, now. I assure you once the permitting issue is resolved I'll deliver your bridge.<p>I just need another $10,000 :p</p>
]]></description><pubDate>Tue, 20 Jun 2017 02:37:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=14591826</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14591826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14591826</guid></item><item><title><![CDATA[New comment by fictioncircle in "Government Spyware Targets Mexican Journalists and Their Families"]]></title><description><![CDATA[
<p>Buy parts and run your own firewall/dns setup to drop anything odd.<p>Its honestly the only way to be "sure" if worry about a manufacturer doing that sort of thing. It won't be perfect but the odds of someone targeting you for hardware spyware is prettttttttty low. And most manufacturers of comp enthusiast parts know its suicide to do it mass-market like that.</p>
]]></description><pubDate>Mon, 19 Jun 2017 21:21:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=14590563</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14590563</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14590563</guid></item><item><title><![CDATA[New comment by fictioncircle in "The Stack Clash"]]></title><description><![CDATA[
<p>> Isn't that just saying "I don't believe in multiuser systems and/or their security models"...? If so, what specifically do you have against them?<p>[Core Services] + SSH is generally something you can harden effectively against attacks.<p>[2903429034902323094230 binaries] is something you generally struggle to maintain security patches/etc on.<p>The simple fact is, there is just too much attack surface on a vanilla Linux box once you have an account that you can reliably do <i>EVERYTHING</i> you need to do to secure it 24/7/365.<p>At least imho, given my time constraints/budget.</p>
]]></description><pubDate>Mon, 19 Jun 2017 20:29:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=14590191</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14590191</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14590191</guid></item><item><title><![CDATA[New comment by fictioncircle in "Horcrux: A Password Manager for Paranoids"]]></title><description><![CDATA[
<p>>  True, in theory, though in practice, i know plenty of capable people but almost none of them bothers to read the openssh source (or even a subset, like recent changes) before updating or recompiling.<p>Then they aren't paranoid but normal folks, eh?</p>
]]></description><pubDate>Mon, 19 Jun 2017 20:22:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=14590128</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14590128</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14590128</guid></item><item><title><![CDATA[New comment by fictioncircle in "Horcrux: A Password Manager for Paranoids"]]></title><description><![CDATA[
<p>Valid point.<p><a href="https://github.com/HainaLi/horcrux_password_manager" rel="nofollow">https://github.com/HainaLi/horcrux_password_manager</a><p>It is in JS at least. Underhanded C is likely an easier trick to manage.</p>
]]></description><pubDate>Mon, 19 Jun 2017 20:21:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=14590123</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14590123</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14590123</guid></item><item><title><![CDATA[New comment by fictioncircle in "Horcrux: A Password Manager for Paranoids"]]></title><description><![CDATA[
<p>For purposes of security paranoia, if you can perform a security audit on open source code it is just as good as any other code you've written.<p>Idk about other people but I find anything I don't find security holes in myself "as good" as anything I've written. I've got the same set of assumptions/blinders/competence either way.</p>
]]></description><pubDate>Mon, 19 Jun 2017 20:19:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=14590107</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14590107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14590107</guid></item><item><title><![CDATA[New comment by fictioncircle in "Horcrux: A Password Manager for Paranoids"]]></title><description><![CDATA[
<p>If you can audit the code yourself, you can treat it as code you authored. (assuming you are competent to perform the audit)</p>
]]></description><pubDate>Mon, 19 Jun 2017 14:41:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=14587318</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14587318</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14587318</guid></item><item><title><![CDATA[New comment by fictioncircle in "“Someone was typing in a URL and WhatsApp was fetching it off my server”"]]></title><description><![CDATA[
<p>> And, transmitting an URL usually has no use beyond accessing it. They are doing what the user expects, it's just lacking some communication and power-user tools to override the default behavior.<p>Let us just say there are certain things that can cause legal complications merely accessing it and not reporting it is technically still a crime.</p>
]]></description><pubDate>Mon, 19 Jun 2017 14:37:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=14587280</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14587280</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14587280</guid></item><item><title><![CDATA[New comment by fictioncircle in "Social Cooling – How big data is increasing pressure to conform"]]></title><description><![CDATA[
<p>And this is why we need online anonymity, to be perfectly honest.<p>Its too dangerous to be honest under you real name and has been for years.<p>Its alot like Roko's basilisk that way. Once you <i>know</i> the capability exists, you have to destroy it or help it. There isn't really any middle ground.</p>
]]></description><pubDate>Mon, 19 Jun 2017 14:32:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=14587234</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14587234</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14587234</guid></item><item><title><![CDATA[New comment by fictioncircle in "Reddit Is Raising Funds at a Valuation of $1.7B"]]></title><description><![CDATA[
<p>To be fair, doing so would require a bunch of cache invalidations and they've always barely had enough money to limp on to the next investor. It would also likely be abused.<p>Its quite possible many features simply would raise their costs by .X% and therefore were impossible for that reason.</p>
]]></description><pubDate>Sat, 17 Jun 2017 02:01:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=14573886</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14573886</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14573886</guid></item><item><title><![CDATA[New comment by fictioncircle in "“Someone was typing in a URL and WhatsApp was fetching it off my server”"]]></title><description><![CDATA[
<p>Yeah but tbh, its still not e2e encrypted. It just means WhatsApp is ignorant.<p>So they are in the clear legally, but morally, its still dubious to do that given its effectively disclosing what is often a substantial portion of the conversation.</p>
]]></description><pubDate>Wed, 14 Jun 2017 21:53:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=14556410</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14556410</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14556410</guid></item><item><title><![CDATA['Social Cooling': If you feel you are being watched, you change your behavior]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.socialcooling.com/">https://www.socialcooling.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14553078">https://news.ycombinator.com/item?id=14553078</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 14 Jun 2017 14:44:07 +0000</pubDate><link>https://www.socialcooling.com/</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14553078</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14553078</guid></item><item><title><![CDATA[Ninth Circuit Sends a Message to Platforms: Use a Moderator, Go to Trial]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.eff.org/deeplinks/2017/04/ninth-circuit-sends-message-platforms-use-moderator-go-trial">https://www.eff.org/deeplinks/2017/04/ninth-circuit-sends-message-platforms-use-moderator-go-trial</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14524861">https://news.ycombinator.com/item?id=14524861</a></p>
<p>Points: 16</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 09 Jun 2017 21:47:34 +0000</pubDate><link>https://www.eff.org/deeplinks/2017/04/ninth-circuit-sends-message-platforms-use-moderator-go-trial</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14524861</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14524861</guid></item><item><title><![CDATA[New comment by fictioncircle in "Facebook's tentacles reach further than people think"]]></title><description><![CDATA[
<p>I don't have a FB account.</p>
]]></description><pubDate>Tue, 06 Jun 2017 16:30:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=14498529</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14498529</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14498529</guid></item><item><title><![CDATA[New comment by fictioncircle in "Cloud Firewalls"]]></title><description><![CDATA[
<p>I use the San Jose facility for my Linodes. I haven't had a  problem since the rolling power outages years ago where Hurricane Electric's backup power failed to kick in.</p>
]]></description><pubDate>Tue, 06 Jun 2017 16:29:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=14498521</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14498521</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14498521</guid></item><item><title><![CDATA[New comment by fictioncircle in "Facebook's tentacles reach further than people think"]]></title><description><![CDATA[
<p>It terms of a hostile 3rd party and not an automated system? 5 times.<p>Snoopy relatives of women I have dated a couple times, a couple times by PIs paid to track me down, and a stalker once.<p>So...yeah. It's a real problem and none of these people had a legitimate cause to do so. Even beyond FB, etc. I don't post my face online because of shit like that.<p>Other people have stopped posting pics of me as well, a couple people have been called based on my name being tagged to things on social media.</p>
]]></description><pubDate>Sat, 27 May 2017 03:32:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=14428794</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14428794</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14428794</guid></item><item><title><![CDATA[New comment by fictioncircle in "Imzy is shutting down"]]></title><description><![CDATA[
<p>I know it's probably out of your hands but if you could AGPL the codebase, pitch decks, etc. It would be wonderful to help ppl learn, if nothing else.</p>
]]></description><pubDate>Thu, 25 May 2017 04:47:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=14415343</link><dc:creator>fictioncircle</dc:creator><comments>https://news.ycombinator.com/item?id=14415343</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14415343</guid></item></channel></rss>