<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: frereit</title><link>https://news.ycombinator.com/user?id=frereit</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 06:47:56 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=frereit" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by frereit in "Multiple vulnerabilities in ingress-Nginx (Score 9.8)"]]></title><description><![CDATA[
<p>> January 9, 2025 – Kubernetes proposed a fix for CVE-2025-1097.<p>> January 10, 2025 – Wiz Research reported a bypass for the proposed fix for CVE-2025-1097.<p>> January 12, 2025 – Kubernetes proposed a fix for CVE-2025-1974.<p>> January 16, 2025 – Wiz Research reported a bypass for the proposed fix for CVE-2025-1974.<p>> January 20, 2025 – Kubernetes proposed a fix for CVE-2025-24513.<p>> January 21, 2025 – Wiz Research reported a bypass for the proposed fix for CVE-2025-24513.<p>Lol, lmao even. [1]<p>[1]: <a href="https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities" rel="nofollow">https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabili...</a></p>
]]></description><pubDate>Tue, 25 Mar 2025 06:47:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=43468622</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=43468622</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43468622</guid></item><item><title><![CDATA[New comment by frereit in "Smuggling arbitrary data through an emoji"]]></title><description><![CDATA[
<p>Would this patent cover just the encoding alone? The first sentence says:
> A method, apparatus, and system relating to embedding hidden content within a Unicode message and using the hidden content to perform a particular computer action.<p>So, in my extremely unqualified opinion, just the encoding technique alone is not covered by the patent, only when combined with some action performed based on the encoding?</p>
]]></description><pubDate>Wed, 12 Feb 2025 15:17:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=43026196</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=43026196</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43026196</guid></item><item><title><![CDATA[New comment by frereit in "Jiff: Datetime library for Rust"]]></title><description><![CDATA[
<p>I agree. Personally, I'd prefer<p><pre><code>    let span = 5.days() + 8.hours() + 1.minutes();</code></pre></p>
]]></description><pubDate>Mon, 22 Jul 2024 06:02:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=41031294</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=41031294</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41031294</guid></item><item><title><![CDATA[New comment by frereit in "Syscall.sh"]]></title><description><![CDATA[
<p>Cool! I built something very similar but for Windows a while back: <a href="https://syscalls.win" rel="nofollow">https://syscalls.win</a></p>
]]></description><pubDate>Sun, 21 Jul 2024 09:42:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=41023782</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=41023782</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41023782</guid></item><item><title><![CDATA[New comment by frereit in "AES-GCM and breaking it on nonce reuse"]]></title><description><![CDATA[
<p>> But it strangely leaves open the possibility, without saying either way, that a longer iv, with r(i)>96 random bits might allow generating more iv's. As you point out, it will depend on the properties of GHASH (and potentially on how the result is used downstream from there).<p>There is some details on the "GHASH as initial counter value" which seem to suggest that for larger nonces, the total number of messages shouldn't exceed 2^44.5 here: <a href="https://neilmadden.blog/2024/05/23/galois-counter-mode-and-random-nonces/" rel="nofollow">https://neilmadden.blog/2024/05/23/galois-counter-mode-and-r...</a></p>
]]></description><pubDate>Wed, 12 Jun 2024 14:21:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=40658507</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40658507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40658507</guid></item><item><title><![CDATA[New comment by frereit in "AES-GCM and breaking it on nonce reuse"]]></title><description><![CDATA[
<p>Well, the nonce is (usually) public information. It is shared along with the ciphertext, so that the other party can use the same nonce to validate and decrypt the ciphertext.
So it is trivial to detect which two messages share a nonce, if any do.</p>
]]></description><pubDate>Wed, 12 Jun 2024 11:59:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=40657072</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40657072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40657072</guid></item><item><title><![CDATA[New comment by frereit in "AES-GCM and breaking it on nonce reuse"]]></title><description><![CDATA[
<p>Correct. However, some implementations actually incorrectly refer to the nonce as an "IV" (initialization vector), where it's not so obvious.<p>Also, it's not entirely clear just how bad a reuse actually is. For example, in AES-CBC, reusing the IV has much less impact than reusing the nonce with AES-GCM.</p>
]]></description><pubDate>Wed, 12 Jun 2024 09:30:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=40656193</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40656193</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40656193</guid></item><item><title><![CDATA[New comment by frereit in "AES-GCM and breaking it on nonce reuse"]]></title><description><![CDATA[
<p>Yes, I am, but unfortunately I do not think I can provide any answers here. A quick internet search reveals some CVEs for nonce reuse.<p>If I had to, based on absolutely nothing but a gut feeling, guess, I'd think this may appear more frequently in IoT devices, where AES-GCM is attractive because of its speed, but randomness is sometimes in low supply?</p>
]]></description><pubDate>Wed, 12 Jun 2024 04:36:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=40654570</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40654570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40654570</guid></item><item><title><![CDATA[AES-GCM and breaking it on nonce reuse]]></title><description><![CDATA[
<p>Article URL: <a href="https://frereit.de/aes_gcm/">https://frereit.de/aes_gcm/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40623885">https://news.ycombinator.com/item?id=40623885</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 09 Jun 2024 12:06:14 +0000</pubDate><link>https://frereit.de/aes_gcm/</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40623885</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40623885</guid></item><item><title><![CDATA[New comment by frereit in "Wiley shuts down 19 science journals and retracts 11,000 gobbledygook papers"]]></title><description><![CDATA[
<p>Website seems down. Archive: <a href="https://web.archive.org/web/20240527041229/https://joannenova.com.au/2024/05/so-much-for-peer-review-wiley-shuts-down-19-science-journals-and-retracts-11000-fraudulent-or-gobblygook-papers/" rel="nofollow">https://web.archive.org/web/20240527041229/https://joannenov...</a></p>
]]></description><pubDate>Mon, 27 May 2024 04:36:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=40487587</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40487587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40487587</guid></item><item><title><![CDATA[New comment by frereit in "I Spent 24 Hours with GitHub Copilot Workspaces"]]></title><description><![CDATA[
<p>I'm honestly surprised at the relatively positive reception to this. While there isn't any problem with the code shown, the same effect couldn've probably been achieved with a few well thought out shortcuts in any IDE (delete outerHTML of svg tag, add new tag, add attributes). The only "more complex" output that is shown is the specification that CW produces, which literally contains an error in the first line ("Sp<logo>ral").<p>Moving on to the complex task, the author simply hand-waves "this isn't good yet but surely it will be". No evidence is given as to _why_ there should be any expectation of LLMs getting there.<p>And the perceived benefit of discovering that their idea of the more complex task was not thought out enough did not come from the LLM, it came from the author itself. They may as well have spoken to ELIZA or a rubber duck.<p>What am I missing?</p>
]]></description><pubDate>Fri, 03 May 2024 17:20:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=40250002</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=40250002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40250002</guid></item><item><title><![CDATA[New comment by frereit in "Linux Crosses 4% Market Share Worldwide"]]></title><description><![CDATA[
<p>This article does not mention the release of the SteamDeck at all. I wonder if this could have had an impackt on Linux usage large enough to see in trends like these or if it's just a drop in the bucket.</p>
]]></description><pubDate>Tue, 05 Mar 2024 07:25:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=39600358</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=39600358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39600358</guid></item><item><title><![CDATA[New comment by frereit in "[dead]"]]></title><description><![CDATA[
<p>This is my first ever blog post. It's about Bootstring, the encoding algorithm behind Punycode domain names. I wanted to cover both encoding and decoding in a single post, but I spent so much time on this already I decided to publish the decoding part as a Part 1, covering the encoding in a second part.<p>I spent a lot of time building small demos / widgets so you can see the algorithm in action.<p>As I said, it's my first ever blog post, so if you read it, please let me know what you think and what I can improve!</p>
]]></description><pubDate>Sat, 02 Mar 2024 21:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=39575793</link><dc:creator>frereit</dc:creator><comments>https://news.ycombinator.com/item?id=39575793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39575793</guid></item></channel></rss>