<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: flipped</title><link>https://news.ycombinator.com/user?id=flipped</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 03:59:16 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=flipped" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by flipped in "German police name alleged leaders of GandCrab and REvil ransomware groups"]]></title><description><![CDATA[
<p>German govt is also one of the most corrupt and vastly incompetent govt. It's run by bunch of boomers. Most of the prolific ransomware gangs have terrible opsec. De-anon'ing them is child's play. Most of the opsec-aware TAs never even get attributed, let alone get caught for any breaches.</p>
]]></description><pubDate>Mon, 06 Apr 2026 18:10:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47664630</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47664630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47664630</guid></item><item><title><![CDATA[New comment by flipped in "German police name alleged leaders of GandCrab and REvil ransomware groups"]]></title><description><![CDATA[
<p>People often forget that Threat Actors (TA) are the ones keeping the infosec alive. They are doing a good job of scaring people into implementing actual security protocols and thereby improving everyone's security posture. The whole infosec would collapse without TAs, let's not forget that. They create jobs.</p>
]]></description><pubDate>Mon, 06 Apr 2026 16:40:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47663281</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47663281</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47663281</guid></item><item><title><![CDATA[The Internet Is for End Users]]></title><description><![CDATA[
<p>Article URL: <a href="https://datatracker.ietf.org/doc/html/rfc8890">https://datatracker.ietf.org/doc/html/rfc8890</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47337431">https://news.ycombinator.com/item?id=47337431</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 11 Mar 2026 16:07:24 +0000</pubDate><link>https://datatracker.ietf.org/doc/html/rfc8890</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47337431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47337431</guid></item><item><title><![CDATA[New comment by flipped in "First Website (1992)"]]></title><description><![CDATA[
<p>More than money, it's the curse of going mainstream.</p>
]]></description><pubDate>Thu, 26 Feb 2026 08:55:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47163622</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47163622</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47163622</guid></item><item><title><![CDATA[New comment by flipped in "Tech companies shouldn't be bullied into doing surveillance"]]></title><description><![CDATA[
<p>Bullied? When they find out how much money there is to be made in surveillance business, they will do it voluntarily.</p>
]]></description><pubDate>Thu, 26 Feb 2026 08:50:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47163586</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47163586</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47163586</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>[flagged]</p>
]]></description><pubDate>Sun, 22 Feb 2026 13:21:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47110791</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47110791</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47110791</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>All of his dox articles are based on sloppy practices from threat actors.</p>
]]></description><pubDate>Sun, 22 Feb 2026 12:54:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47110619</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47110619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47110619</guid></item><item><title><![CDATA[New comment by flipped in "Back to FreeBSD: Part 1"]]></title><description><![CDATA[
<p>Anyone looking to use jails might find BastileBSD helpful. It's a nice and modern jail manager.</p>
]]></description><pubDate>Sun, 22 Feb 2026 12:22:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47110444</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47110444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47110444</guid></item><item><title><![CDATA[New comment by flipped in "Back to FreeBSD: Part 1"]]></title><description><![CDATA[
<p>Never understood why satoshi was a prime windows user.</p>
]]></description><pubDate>Sun, 22 Feb 2026 12:20:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47110433</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47110433</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47110433</guid></item><item><title><![CDATA[New comment by flipped in "Back to FreeBSD: Part 1"]]></title><description><![CDATA[
<p>Is there any technical writeup which explains <i>how</i> the isolation exactly works, on containers and VMs? I have always heard the high level arguments of weak isolation, same kernel, etc but never the implementation details.</p>
]]></description><pubDate>Sun, 22 Feb 2026 12:17:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47110411</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47110411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47110411</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>"Since the abstraction layers have quadrupled, let's not just care about the actual performance anymore!"</p>
]]></description><pubDate>Sun, 22 Feb 2026 09:46:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109728</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47109728</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109728</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>Krebs lack any sort of real credibility. He's pushing out slop with a govern-mentalist propaganda. Tech journalists are the worst form to gather any actual information.</p>
]]></description><pubDate>Sun, 22 Feb 2026 09:44:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109717</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47109717</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109717</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>State sponsored cyber attacks are news to you? It's been a thing since more than 2 decades now.</p>
]]></description><pubDate>Sun, 22 Feb 2026 09:41:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109703</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47109703</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109703</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>The mentioned botnet didn't intentionally take down I2P. It's run by bunch of kids who don't know what they're doing.</p>
]]></description><pubDate>Sun, 22 Feb 2026 09:39:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109697</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47109697</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109697</guid></item><item><title><![CDATA[New comment by flipped in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>It's 10, not 9. And there are severe problems with having a total of 10 DA be the essential source of truth for whole network. It would be trivial to DDoS the DAs and bring down the Tor network or at the very least, disrupt it: <a href="https://arxiv.org/abs/2509.10755" rel="nofollow">https://arxiv.org/abs/2509.10755</a>.<p>It's the only complaint I have of the current state of Tor. Anyone should be able to run directory authority, regardless if you trust the operator or not (same as normal relays).</p>
]]></description><pubDate>Sun, 22 Feb 2026 09:35:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109672</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47109672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109672</guid></item><item><title><![CDATA[New comment by flipped in "Ghidra by NSA"]]></title><description><![CDATA[
<p>Almost every hobbyist reverse engineer uses cracked IDA which is easily available. I have never seen ghidra being recommended for serious work.</p>
]]></description><pubDate>Mon, 16 Feb 2026 15:27:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47036211</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47036211</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47036211</guid></item><item><title><![CDATA[New comment by flipped in "Ghidra by NSA"]]></title><description><![CDATA[
<p>You're just giving the troll an audience by reacting to it.</p>
]]></description><pubDate>Mon, 16 Feb 2026 15:24:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47036174</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47036174</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47036174</guid></item><item><title><![CDATA[New comment by flipped in "Ghidra by NSA"]]></title><description><![CDATA[
<p>Can you be more specific? Is it getting easier to reverse rust and go, since I have read about it being the hardest to reverse.</p>
]]></description><pubDate>Mon, 16 Feb 2026 15:22:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47036156</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47036156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47036156</guid></item><item><title><![CDATA[New comment by flipped in "The Israeli spyware firm that accidentally just exposed itself"]]></title><description><![CDATA[
<p>Jia Tan wouldn't be interested in secret spyware firms. They hide their code in plain sight.</p>
]]></description><pubDate>Mon, 16 Feb 2026 14:21:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47035297</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47035297</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47035297</guid></item><item><title><![CDATA[New comment by flipped in "The Israeli spyware firm that accidentally just exposed itself"]]></title><description><![CDATA[
<p>Regulation never works in the interwebs*</p>
]]></description><pubDate>Mon, 16 Feb 2026 14:19:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47035269</link><dc:creator>flipped</dc:creator><comments>https://news.ycombinator.com/item?id=47035269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47035269</guid></item></channel></rss>