<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: fruitreunion1</title><link>https://news.ycombinator.com/user?id=fruitreunion1</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 07:28:30 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=fruitreunion1" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by fruitreunion1 in "Inactive Google Account Policy"]]></title><description><![CDATA[
<p>How does this affect old YouTube videos (and possibly other historical public content)? (obviously, save everything you love while you still can in case things get removed or difficult to archive due to attestation/DRM)</p>
]]></description><pubDate>Sat, 12 Aug 2023 12:28:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=37099504</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37099504</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37099504</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Russia Starts Blocking VPN Protocols"]]></title><description><![CDATA[
<p>The idea is you connect to the wireguard UDP port from one of the obfuscation tunnels.<p>laptop -> obfuscation tunnel (udp2raw/iodine/ssh/tor/wstunnel/etc.) -> wireguard UDP port. Though some protocols like ssh or tor only support TCP, so you have to run an additional tunnel in the machine to get to wireguard (udp-over-tcp).</p>
]]></description><pubDate>Fri, 11 Aug 2023 09:00:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=37086584</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37086584</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37086584</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Browsers barely care what HTTP status code your web pages are served with"]]></title><description><![CDATA[
<p>Their point I think is that often (to varying degrees), 'power user' things are less convenient to do or behind configuration options or menus and so on nowadays.</p>
]]></description><pubDate>Fri, 11 Aug 2023 08:47:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=37086491</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37086491</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37086491</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Russia Starts Blocking VPN Protocols"]]></title><description><![CDATA[
<p>I think this is a good thing. Apply obfuscation on top of WireGuard, that way you can have the functionality and security of the WireGuard tunnel and swap between different obfuscation techniques as needed.</p>
]]></description><pubDate>Thu, 10 Aug 2023 12:39:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=37075444</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37075444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37075444</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Russia Starts Blocking VPN Protocols"]]></title><description><![CDATA[
<p>No. <a href="https://www.wireguard.com/known-limitations/" rel="nofollow noreferrer">https://www.wireguard.com/known-limitations/</a><p>>Deep Packet Inspection<p>>WireGuard does not focus on obfuscation. Obfuscation, rather, should happen at a layer above WireGuard, with WireGuard focused on providing solid crypto with a simple implementation. It is quite possible to plug in various forms of obfuscation, however.<p>>TCP Mode<p>>WireGuard explicitly does not support tunneling over TCP, due to the classically terrible network performance of tunneling TCP-over-TCP. Rather, transforming WireGuard's UDP packets into TCP is the job of an upper layer of obfuscation (see previous point), and can be accomplished by projects like udptunnel and udp2raw.</p>
]]></description><pubDate>Thu, 10 Aug 2023 12:37:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=37075423</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37075423</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37075423</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Russia Starts Blocking VPN Protocols"]]></title><description><![CDATA[
<p>I disagree. I think it's good that implementing a secure network tunnel and obfuscation are separate. WireGuard can handle the secure tunnel functionality while I can apply any sort of obfuscation protocol on top of it without worrying about its security or having to reconfigure the network, like udp2raw, iodine, shadowsocks, websockets, etc.</p>
]]></description><pubDate>Thu, 10 Aug 2023 12:35:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=37075409</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37075409</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37075409</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Infrastructure audit completed by Radically Open Security"]]></title><description><![CDATA[
<p>I don't want to revoke a key to test but I'm pretty sure that just sets the port in the Endpoint part of the WireGuard config file. (the port you use to connect, for if the regular one is blocked). Are you sure your service behind Mullvad is accepting incoming connections?</p>
]]></description><pubDate>Wed, 09 Aug 2023 12:55:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=37061930</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37061930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37061930</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The year of Linux On Desktop^WMobile [video]"]]></title><description><![CDATA[
<p>You forget that some people like general purpose computing. Android and other mobile operating systems (as well as Chrome OS) do have great security, but that comes at the expense of functionality (arbitrary code execution is discouraged, putting things inside apps and strict APIs make scripting and tinkering infeasible) and user control. One of the mentioned in the talk was being able to use the traditional Linux stack and being able to use your smartphone as a general purpose computer (2:22, 4:12). I hope one day there's a solution, but it seems trade offs have to be made to have one or the other.</p>
]]></description><pubDate>Wed, 09 Aug 2023 00:10:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=37057159</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37057159</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37057159</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The year of Linux On Desktop^WMobile [video]"]]></title><description><![CDATA[
<p>Another term I've seen used is "traditional Linux distributions" as opposed to locked-down/less general purpose like Android and Chrome OS.</p>
]]></description><pubDate>Tue, 08 Aug 2023 23:47:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=37056986</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37056986</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37056986</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The year of Linux On Desktop^WMobile [video]"]]></title><description><![CDATA[
<p>Well, Alpine wouldn't fit that definition but is still a user-controlled Linux.</p>
]]></description><pubDate>Tue, 08 Aug 2023 23:46:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=37056978</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37056978</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37056978</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Your computer should say what you tell it to say"]]></title><description><![CDATA[
<p>>We should not destroy the entire internet to protect/increase adtech profits.<p>Yeah, ideally businesses wouldn't be built on this model (free service funded by ads at the expense of privacy and now user control). Then we might not have had to worry about widespread fingerprinting AND we can maintain user control too.</p>
]]></description><pubDate>Tue, 08 Aug 2023 23:39:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=37056938</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37056938</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37056938</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Your computer should say what you tell it to say"]]></title><description><![CDATA[
<p>>To prevent ad fraud either you need to increase the fingerprintablity of users on the web, violating people's privacy, or implemented a form of remote attestation, which protects people's privacy.<p>>If EFF cares no much about privacy on the web they should be in favor of this proposal.<p>Privacy on the web by implementing remote attestation across the web will inevitably in practice reduce digital rights and user control/freedom. The EFF also cares a lot about this, so it makes sense that they would be against the proposal. Both of these goals could be achieved by websites providing the same behavior regardless of the client browser/software that is requesting pages. The reason we have to lie is because user-hostile businesses/sites don't want to adhere to this (advertising, DRM). (ignoring useful things like providing a mobile version of a site)<p>To note, fingerprinting is always going to be technically possible (especially given the larger and larger feature scope that businesses have wanted to impose upon the web since its inception), WEI is just an attempt to stop ad-driven sites from trying to do it.</p>
]]></description><pubDate>Tue, 08 Aug 2023 23:32:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=37056873</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37056873</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37056873</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "mCaptcha: Open-source proof-of-work captcha for websites"]]></title><description><![CDATA[
<p>When the alternative is sacrificing privacy or anonymity, I think it's at least useful, even if not ideal given the current energy situation.</p>
]]></description><pubDate>Tue, 08 Aug 2023 22:34:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=37056387</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=37056387</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37056387</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The Right to Lie and Google’s “Web Environment Integrity”"]]></title><description><![CDATA[
<p>I think in internal environments like within a company it's fine. Just not in the public, user-facing web.</p>
]]></description><pubDate>Mon, 31 Jul 2023 13:48:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=36942394</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36942394</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36942394</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The Right to Lie and Google’s “Web Environment Integrity”"]]></title><description><![CDATA[
<p>>Can someone give a counter argument of how this might benefit the users themselves?<p>Remote attestation might reduce the amount of cheaters in games and fraud in banks if implemented properly. So, through potential indirect means.<p>I don't think any of this is worth the loss of user freedom and functionality, though. So I will vehemently oppose WEI and similar to be used outside of internal facilities.</p>
]]></description><pubDate>Mon, 31 Jul 2023 13:21:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=36942093</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36942093</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36942093</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The Right to Lie and Google’s “Web Environment Integrity”"]]></title><description><![CDATA[
<p>Is there really much browsers can do to actually effectively restrict fingerprinting without going all out like Tor Browser? WEI <i>may</i> disincentivize websites to not use fingerprinting, but if they really wanted to, they could use it for de-anonymization purposes.</p>
]]></description><pubDate>Mon, 31 Jul 2023 13:12:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=36942012</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36942012</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36942012</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "The Right to Lie and Google’s “Web Environment Integrity”"]]></title><description><![CDATA[
<p>Tor Browser defaults to JS enabled.</p>
]]></description><pubDate>Mon, 31 Jul 2023 13:05:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=36941956</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36941956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36941956</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "IRC is the only viable chat protocol (2022)"]]></title><description><![CDATA[
<p>Yeah, I think there's just a disconnect in culture. Making IRC more viable towards those who like Discord etc. would fundamentally change and ruin it for many who like IRC. And vice versa. So IRC will never resurrect and be used by the masses again.</p>
]]></description><pubDate>Sat, 29 Jul 2023 12:01:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=36919392</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36919392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36919392</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "IRC is the only viable chat protocol (2022)"]]></title><description><![CDATA[
<p>>Go ahead and create 1 account per 1 server, nothing prevents you.<p>Doesn't having to give up a phone number for each account (and you can't use the same number on different accounts) make it difficult? (unless you haven't had to, maybe my browser is suspicious, but it's just regular old Chromium). Would like to do this so that I can separate IRL/weak pseudonym (from random people in servers, obviously you can't be truly anonymous on Discord)</p>
]]></description><pubDate>Sat, 29 Jul 2023 11:57:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=36919363</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36919363</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36919363</guid></item><item><title><![CDATA[New comment by fruitreunion1 in "Tor’s shadowy reputation will only end if we all use it"]]></title><description><![CDATA[
<p>I use it for just about everything except for things tied to IRL identities. (short-lived usage like making a search request, to persistent identities like this)<p>Some services block Tor. Sometimes they can be bypassed by pressing "New Tor circuit for this site" a few times, sometimes they cannot. Some of the methods listed here [0] can help (though I wouldn't log into any accounts using this as TLS isn't being terminated at your machine).<p>Some features don't work in Tor Browser, off the top off my head, sites using AudioContext, Webauthn, Webassembly. (webassembly can be a pain due to some encrypted paste bin sites using it).<p>I run multiple instances of Tor Browser (separated with Linux namespaces, particularly netns because Tor Browser will fail to load if an existing Tor service is running at port 9150) so that I can multitask between for example posting this on HN and random browsing in another instance. That also helps with the webassembly thing as I run a script to spin up a temporary instance of Tor Browser, enable webassembly in about:config, and load the failing page.<p>For the sites that block Tor that I need to login to or that don't work with the ad-hoc methods listed above, I will fallback to using a VPN + an about:config-modified version of Tor Browser that has the Tor proxy disabled. Mullvad Browser can also be used as an alternative.<p>I also use it outside of TB for IRC among other things. You have to be careful as there is no uniform configuration for everyone like TB.<p>0: <a href="https://gitlab.torproject.org/legacy/trac/-/wikis/org/doc/ListOfServicesBlockingTor#ad-hoc-solutions-for-accessing-blocked-content-on-tor" rel="nofollow noreferrer">https://gitlab.torproject.org/legacy/trac/-/wikis/org/doc/Li...</a></p>
]]></description><pubDate>Sat, 29 Jul 2023 01:26:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=36915789</link><dc:creator>fruitreunion1</dc:creator><comments>https://news.ycombinator.com/item?id=36915789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36915789</guid></item></channel></rss>