<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: frogsRnice</title><link>https://news.ycombinator.com/user?id=frogsRnice</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 19:12:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=frogsRnice" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by frogsRnice in "Why I no longer have an old-school cert on my HTTPS site"]]></title><description><![CDATA[
<p>Sure - but people are still free to decide where they draw the line.<p>Each extra bit of software is an additional attack surface after all</p>
]]></description><pubDate>Fri, 23 May 2025 12:06:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=44072096</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=44072096</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44072096</guid></item><item><title><![CDATA[New comment by frogsRnice in "Making PyPI's test suite faster"]]></title><description><![CDATA[
<p>You all do amazing work, hope I can boast the same someday - or even 50% of it ;)<p>Seriously, you are my heroes!</p>
]]></description><pubDate>Mon, 12 May 2025 20:11:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=43967006</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=43967006</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43967006</guid></item><item><title><![CDATA[New comment by frogsRnice in "Making PyPI's test suite faster"]]></title><description><![CDATA[
<p>Imo its not just crypto- a lot of their reports are enlightening to read</p>
]]></description><pubDate>Mon, 12 May 2025 20:10:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43966993</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=43966993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43966993</guid></item><item><title><![CDATA[New comment by frogsRnice in "Everything wrong with MCP"]]></title><description><![CDATA[
<p>It absolutely does</p>
]]></description><pubDate>Mon, 14 Apr 2025 03:19:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=43677774</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=43677774</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43677774</guid></item><item><title><![CDATA[New comment by frogsRnice in "Anyone can push updates to the doge.gov website"]]></title><description><![CDATA[
<p>It could be pulling these resources over http ;)<p>Edit: Whoops sorry, morning fog</p>
]]></description><pubDate>Sat, 15 Feb 2025 05:43:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=43056202</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=43056202</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43056202</guid></item><item><title><![CDATA[New comment by frogsRnice in "Beej's Guide to Git"]]></title><description><![CDATA[
<p>Unrelated; I just wanted to say that I learned programming from your socket tutorials when I was a kid. Everything was so well written that I used it from highschool, to varsity to my day2day job.<p>Without your tutorials I’m not even sure if I would have chosen the carreer I did- thank you for all the love and effort you put into your posts; Im sure that there are many other people who you’ve touched in a similar way</p>
]]></description><pubDate>Thu, 06 Feb 2025 04:48:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=42959191</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42959191</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42959191</guid></item><item><title><![CDATA[New comment by frogsRnice in "Httptap: View HTTP/HTTPS requests made by any Linux program"]]></title><description><![CDATA[
<p>At some point someone needs to take responsibility for allowing modification of environment variables via something dumb like http. Debugging interfaces are fine- we should expect more from developers.</p>
]]></description><pubDate>Tue, 04 Feb 2025 11:44:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=42931148</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42931148</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42931148</guid></item><item><title><![CDATA[New comment by frogsRnice in "What's OAuth2, anyway?"]]></title><description><![CDATA[
<p>No you misunderstand- it is super simple to pay some other company a small amount to do this for you.  No complexity to worry about what so ever.<p>And if things require even a slim amount of thought and planning - chuck it to your favourite LLM and call it a day.<p>Just in case the sarcasm wasn’t clear I want to personally assure you that nobody ever will confuse an access token for an ID token. :p</p>
]]></description><pubDate>Wed, 29 Jan 2025 11:55:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=42863916</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42863916</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42863916</guid></item><item><title><![CDATA[New comment by frogsRnice in "Using AI for Coding: My Journey with Cline and LLMs"]]></title><description><![CDATA[
<p>Yeah I agree- I think the time spent verifying should vary based on the complexity and sensitivity of what you are looking at, but you never really get away from it.<p>I think my issue with LLMs is moreso aimed at people who wouldn’t have ever done the bare minimum verification anyway.</p>
]]></description><pubDate>Tue, 28 Jan 2025 14:53:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=42852972</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42852972</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42852972</guid></item><item><title><![CDATA[New comment by frogsRnice in "Using AI for Coding: My Journey with Cline and LLMs"]]></title><description><![CDATA[
<p>As opposed to wondering if the llm is hallucinating?<p>You have to expend a mental effort to think about your solutions anyway; I guess it’s pick your poison really.</p>
]]></description><pubDate>Tue, 28 Jan 2025 04:37:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=42848874</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42848874</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42848874</guid></item><item><title><![CDATA[New comment by frogsRnice in "0-click deanonymization attack targeting Signal, Discord, other platforms"]]></title><description><![CDATA[
<p>My main gripe is that if someone finds a vulnerability that gives you a list of urls the model falls apart. I’ve seen this happen in organisations :/<p>But agree with your statement here and others about the lifetime of the data - if something is sensitive or secret you want proper access controls applied, not just openssl rand -hex 8</p>
]]></description><pubDate>Wed, 22 Jan 2025 05:42:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42789426</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42789426</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42789426</guid></item><item><title><![CDATA[New comment by frogsRnice in "Reverse engineering Call of Duty anti-cheat"]]></title><description><![CDATA[
<p>I guess were talking about optimising tail recursion. Would there be any reason to refer to a tail call other than that optimisation?<p>I’ll do some reading on the latter part of your post, thank you!</p>
]]></description><pubDate>Tue, 21 Jan 2025 09:58:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=42778246</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42778246</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42778246</guid></item><item><title><![CDATA[New comment by frogsRnice in "Reverse engineering Call of Duty anti-cheat"]]></title><description><![CDATA[
<p>Would you not have to use a jump instead of call for it to be a tail call at all- ie otherwise a new frame is created on each call</p>
]]></description><pubDate>Tue, 21 Jan 2025 03:36:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=42776294</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42776294</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42776294</guid></item><item><title><![CDATA[New comment by frogsRnice in "Extracting AI models from mobile apps"]]></title><description><![CDATA[
<p>frida is an amazing tool - it has empowered me to do things that would have otherwise took weeks or even months. This video is a little old, but the creator is also cracked <a href="https://www.youtube.com/watch?v=CLpW1tZCblo" rel="nofollow">https://www.youtube.com/watch?v=CLpW1tZCblo</a><p>It's supposed to be "free-IDA" and the work put in by the developers and maintainers is truly phenomenal.<p>EDIT: This isn't really an attack imo. If you are going to take "secrets" and shove it into a mobile app, they can't really be considered secret. I suppose it's a tradeoff - if you want to do this kind of thing client-side - the secret sauce isn't so secret.</p>
]]></description><pubDate>Sun, 05 Jan 2025 21:09:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=42605063</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42605063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42605063</guid></item><item><title><![CDATA[New comment by frogsRnice in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>I work in the security space and fell victim to an internal campaign as they sent a very enticing looking email at a point where I was on leave and my grandfather just passed.<p>You simply cannot know what mindset youll be in when you get phished :)<p>Edit: To clarify i was itching to work because it helps distract me from the reality that someone so dear to me was gone forever. I didnt want to cancel leave though because my output would have been absolutely turdy</p>
]]></description><pubDate>Thu, 26 Dec 2024 21:19:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=42517909</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42517909</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42517909</guid></item><item><title><![CDATA[New comment by frogsRnice in "Microsoft Confirms Password Deletion for 1B Users"]]></title><description><![CDATA[
<p>Fair enough on the device compromise point, that said the implementation is still terrible and illustrates what I would be worried about-<p>Maybe more succinctly put, how a credential is initially enrolled, managed and finally removed is an implementation detail which leaves room for funky implementations like the above.<p>I do agree that it is an improvement over passwords though. Furthermore I guess the same applies to password based logins where everybody just kind of wings it anyway.</p>
]]></description><pubDate>Fri, 20 Dec 2024 14:03:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=42471139</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42471139</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42471139</guid></item><item><title><![CDATA[New comment by frogsRnice in "Microsoft Confirms Password Deletion for 1B Users"]]></title><description><![CDATA[
<p>Ive also seen some pretty terrible implementations that don’t even allow end users to manage enrolled devices; so if someone steals your authenticator they have access to your account indefinitely.<p>Personally I like the benefits passkeys offer but some work still needs to be done around management of enrolled devices</p>
]]></description><pubDate>Wed, 18 Dec 2024 17:11:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=42452425</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42452425</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42452425</guid></item><item><title><![CDATA[New comment by frogsRnice in "Upcoming Hardening in PHP"]]></title><description><![CDATA[
<p>Making a website about it benefits other people; finding the vulnerability helps other people; even if its 10%, why can’t someone else do it?<p>Surely someone doing all this would already have submitted a patch if they felt comfortable.</p>
]]></description><pubDate>Fri, 15 Nov 2024 16:27:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=42148379</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42148379</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42148379</guid></item><item><title><![CDATA[New comment by frogsRnice in "Upcoming Hardening in PHP"]]></title><description><![CDATA[
<p>Don’t necessarily agree that selling hacks is ethical, but if I already spent time figuring out how to exploit a system - reporting it to the relevant place is charity. Ill do that, but Im definitely not spending time trying to fix the code if the solution isn’t immediately obvious. ++ so if you have to fight to get the bug recognised in the first place</p>
]]></description><pubDate>Fri, 15 Nov 2024 16:19:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=42148285</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=42148285</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42148285</guid></item><item><title><![CDATA[New comment by frogsRnice in "Ask HN: Dangers of Unsecured WiFi?"]]></title><description><![CDATA[
<p>A vpn (that you trust) would certainly help a little, but in the above case the connection can still be mitmed from the vpn server to the application backend<p>Edit: I would for my personal devices, unless I knew the app did something horrendous in advance- but I guess the core problem is you really have no way of knowing unless you check the app yourself or there is a known and reported vulnerability.</p>
]]></description><pubDate>Thu, 26 Sep 2024 10:26:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=41656695</link><dc:creator>frogsRnice</dc:creator><comments>https://news.ycombinator.com/item?id=41656695</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41656695</guid></item></channel></rss>