<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: g_p</title><link>https://news.ycombinator.com/user?id=g_p</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 05 Apr 2026 16:26:09 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=g_p" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by g_p in "UK: Phone networks down: EE, BT, Three, Vodafone, O2 not working in mass outage"]]></title><description><![CDATA[
<p>Even with a ported number, inbound call routing still heavily relies on the "number range" owner to direct the incoming call to the correct network.<p>If the original number range owner has their subscriber database go down, they can't do the lookup for the network to direct the incoming call towards, so it can cause disruption. The same is true if the incoming signalling endpoints are unavailable, as the incoming call requests won't be responded to.</p>
]]></description><pubDate>Thu, 24 Jul 2025 19:45:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=44675170</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=44675170</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44675170</guid></item><item><title><![CDATA[New comment by g_p in "UK: Phone networks down: EE, BT, Three, Vodafone, O2 not working in mass outage"]]></title><description><![CDATA[
<p>When roaming, your home network is needed for routing incoming calls to you, and handling authenticating your device to the visited network.</p>
]]></description><pubDate>Thu, 24 Jul 2025 19:37:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=44675074</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=44675074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44675074</guid></item><item><title><![CDATA[New comment by g_p in "Why are banks still getting authentication so wrong?"]]></title><description><![CDATA[
<p>There are absolutely ways to intercept a call from a targeted user that would be viable to use to gain access to a mid to high value user's funds.<p>SS7 call routing and rogue 2G base stations are some potential approaches.<p>In terms of banking security, a good (ideal) architecture would treat the user PIN as a credential which is not transmitted over insecure means. Unfortunately many banks don't do this right, and still support bank-side PIN verification (with the PIN sent over the wire to the bank), rather than using the bank card's smart card features to carry out on-chip PIN verification.<p>If you built a bank from scratch, for security first, you'd likely still use smart cards as bank cards, but you'd only do PIN verification on-card, so the user PIN is never exposed to even the bank - the card can securely vouch for the PIN in a manner that's far more costly for an attacker to defeat than using a $5 wrench against the user of the card to make them reveal the PIN (h/t to XKCD).<p>Sending the card number and PIN over the phone is just asking for trouble - mobile phone calls are decrypted at the base station and available in the clear, before being transmitted up into the wider telecoms network.</p>
]]></description><pubDate>Tue, 13 May 2025 21:56:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=43978212</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=43978212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43978212</guid></item><item><title><![CDATA[New comment by g_p in "Did 5G kill the IMSI catcher?"]]></title><description><![CDATA[
<p>You need a SIM card (ideally) with support for elliptic curve crypto, and some additional fields added in the profile (SIM services 124 and 125). You can then, once those services are enabled, place network public keys on the SIM itself.<p>There are 2 ways to do SUCI calculation - both require SIM support to hold public keys. SUCI-on-SIM requires a SIM that can do the encryption to the public key on the SIM itself, and issue that in response to the IDENTITY command; SUCI-on-phone requires a SIM that "just" has the public key fields present, and the handset can do the SUCI calculation and encrypt the SUPI for the public key stored on the SIM.<p>Either way, your scenario isn't using SUCI concealment by my understanding, unless you got a new SIM card, or it was reprogrammed somehow to support the SIM service fields needed (but I'm not aware of operators doing that).</p>
]]></description><pubDate>Mon, 28 Apr 2025 23:25:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=43827202</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=43827202</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43827202</guid></item><item><title><![CDATA[New comment by g_p in "Did 5G kill the IMSI catcher?"]]></title><description><![CDATA[
<p>In terms of existing examples, there's a few equivalent (or at least similar) fields defined as SIM files - for example, the FPLMN (forbidden PLMN) list of networks your phone shouldn't attempt to attach to.<p>You're right that this needs limited at the modem - but the main user accessible method of configuring the modem is the phone UI. As this setting is one which needs network support, and is likely to disconnect a user who misconfigured this, a SIM file for permitted RAT (radio access technology) types would make sense, as SIM files are under the responsibility of the operator.<p>Where this would get complex is edge cases, like under roaming scenarios, where your home network can't predict what might be available, and your handset may need to permit downgrading to a technology not permitted on the home network.<p>The toggle in Android to disable 2G seems a start towards a user accessible setting for this, which selects what the modem is willing to join, but it's certainly far from a user friendly way to enable and disable particular technologies.</p>
]]></description><pubDate>Sun, 27 Apr 2025 18:29:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=43814055</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=43814055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43814055</guid></item><item><title><![CDATA[New comment by g_p in "Did 5G kill the IMSI catcher?"]]></title><description><![CDATA[
<p>> 5G Standalone security and privacy requirements<p>> To help ensure compatibility of iPhone and cellular iPad devices on private 5G SA networks, infrastructure vendors must adhere to the following security and privacy requirements:<p>> Privacy concealment: The Subscription Concealed Identifier (SUCI) must use a non-null protection scheme. This can be achieved through either an on-SIM SUCI calculation or an ME SUCI calculation, as outlined in TCA 2.3.1 and 3.1 specifications. For detailed information, refer to the 3GPP Technical Specification 33.501.<p>(From <a href="https://support.apple.com/en-gb/guide/deployment/depac6747317/web" rel="nofollow">https://support.apple.com/en-gb/guide/deployment/depac674731...</a>)<p>This pertains to private networks rather than public operator networks, but it certainly seems to imply that use of SUCI is an expectation on 5G SA networks (private in this context).</p>
]]></description><pubDate>Sun, 27 Apr 2025 17:48:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=43813797</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=43813797</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43813797</guid></item><item><title><![CDATA[New comment by g_p in "US Judge invalidates blood glucose sensor patent, opens door for Apple Watch"]]></title><description><![CDATA[
<p>A lot of the patents needed to implement mobile standards are designated as "standards essential patents", meaning that the party bringing them up the table in the standards committees needs to disclose them and agree to licence them on a FRAND basis to anyone who asks (fair, reasonable and non-discriminatory).<p>In many cases there are patent pools you can license that cover large areas of the standards, without needing to negotiate each one individually.<p>Many very fundamental parts of 4G/ 5G are patented and you'll not be able to get your device to work on the network without those patents, so Apple will have licensed those patents under FRAND for their new C1 modem.</p>
]]></description><pubDate>Fri, 21 Feb 2025 08:54:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=43125495</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=43125495</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43125495</guid></item><item><title><![CDATA[New comment by g_p in "Fair Pricing"]]></title><description><![CDATA[
<p>You might find Privacy Pass of interest then - <a href="https://help.kagi.com/kagi/privacy/privacy-pass.html" rel="nofollow">https://help.kagi.com/kagi/privacy/privacy-pass.html</a><p>It should be out in the next day or so.</p>
]]></description><pubDate>Wed, 05 Feb 2025 13:27:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=42948156</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42948156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42948156</guid></item><item><title><![CDATA[New comment by g_p in "Sniffnet – monitor your Internet traffic"]]></title><description><![CDATA[
<p>There's a couple of options in settings worth checking, as Netguard works for me when roaming just fine.<p>Under Settings > Defaults, make sure you don't have "block roaming" turned on.<p>Expand the rules for the apps giving you issues, and check "Block roaming" isn't ticked for them.</p>
]]></description><pubDate>Mon, 03 Feb 2025 07:55:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42915950</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42915950</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42915950</guid></item><item><title><![CDATA[New comment by g_p in "Hell is overconfident developers writing encryption code"]]></title><description><![CDATA[
<p>I recently came across a signature check that was (correctly) checking the signature against a public key... The issue was the public key itself was unauthenticated, and provided by the (signed) ciphertext itself... Meaning the crypto was fine, but it wasn't checking anything meaningful, as any rogue message would just include its own public key in the message!<p>It's not only about the raw operation of checking bytes are equal (hopefully in a constant time manner, if applicable), but also about ensuring the desired security properties are actually present in the application!</p>
]]></description><pubDate>Sat, 01 Feb 2025 09:54:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=42897253</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42897253</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42897253</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>Thanks - yeah it seems like this is supported in FIDO 2.1 (but not 2.0). I suspect this is only implemented in Yubikey 5.7 and above.<p>Once the technology is there to support it, hopefully the user experience part can be improved with time.<p>Ref in the standard - <a href="https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html#mandatory-features" rel="nofollow">https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-cl...</a></p>
]]></description><pubDate>Fri, 27 Dec 2024 23:48:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=42527178</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42527178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42527178</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>That's a pretty neat solution. I like that idea.<p>If you wanted to go a step further, you could use a smartcard with hardware PIN reader as a PKCS11 crypto device, and use that to decrypt the long lived keys in the store, then pass it back to the host encrypted by a platform-protected key to be decrypted and used.<p>If you could get the right implementation specifics together, you could likely then have the smart card simultaneously re-encrypt the credential with a key bound to PCR state of the TPM via a policy. You'd then decrypt that ciphertext on TPM without a PIN, but conditional on PCR state of a couple of PCRs that represent your system like the secure boot toggle state and allowed CAs.<p>That lets you be a bit more "cross device" than a fully TPM solution does, though your certificate technique works fine as long as you keep an offline backup for enrollment if anything changes on your system.</p>
]]></description><pubDate>Fri, 27 Dec 2024 03:27:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=42519715</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42519715</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42519715</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>That's a fair point, although as the PIN is validated locally, you could argue from the server perspective you gain a second (knowledge) factor, but from a local perspective it's entirely correlated with the existing stored factor (a weakness in the local device implementation can skip that PIN check and yield the result).<p>Perhaps this is excessive, but it's a model where I like to see layers of security that depend on different, uncorrelated failures being required to bypass them.<p>Today if you want to get into an account using "FIDO2 as MFA" you need both the account credentials or ability to reach the Fido prompt (say password reset), and the hardware token device (with optional pin). The device alone being compromised shouldn't get you into the account.</p>
]]></description><pubDate>Fri, 27 Dec 2024 03:16:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=42519669</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42519669</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42519669</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>I share your paranoia and felt that passkeys were a step back as anything getting access to your browser extension memory can realistically dump both your "password" and MFA ("passkey") in one move.<p>I wonder if there would be a way for vaultwarden to wrap passkeys such that a hardware FIDO2 key is needed to decrypt them "per-use", and prevent software on the host from stealing a pile of passkeys that give direct access to accounts without further MFA.<p>Right now it feels like passkeys in the password manager is akin to storing MFA seeds and recovery keys in the same password manager...</p>
]]></description><pubDate>Thu, 26 Dec 2024 23:50:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=42518793</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42518793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42518793</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>Yeah, a fair point (though if you can't manage keys one by one that seems a massive usability issue and oversight with no safe path to resolution).<p>This adds another step needing considered for a user, as finite storage means a whole edge case to consider (can't register as slots full), and no simple actionable step to take ("which account would you like to never be able to log into again?" or "sorry you need to wipe this key and lose everything, or buy another one")<p>I feel there is a usability aspect of FIDO2 (for non-resident MFA) that is being overlooked - the paradigm was simple - a physical key you don't lose, and you can have multiple keys. The gotcha was no way to replicate backup keys, which becomes fairly difficult for users. But hey - passkeys launched with no export or migration process between closed device ecosystems!<p>From my perspective though, I won't use passkeys until I get sufficient control over them to be allowed to decide if I want to make them "resident" or not. (I don't want resident keys!!)<p>I want to use non-resident keys everywhere as a hardware-backed second factor that is phishing resistant, without capacity limitations (so zero cognitive burden on whether to use or not).<p>It feels like a regression for passkeys to be forgetting about what (for me at least) was the core basic use-case of FIDO2 - as a highly secure second factor for someone who already can manage storage of secrets in software, and just wants high assurance phishing resistant MFA during their conventional login process.</p>
]]></description><pubDate>Thu, 26 Dec 2024 23:35:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=42518720</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42518720</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42518720</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>The downside of this (at least in my personal view) is it's a regression from the elevated security you got with non-resident FIDO/U2F MFA.<p>The moment you go "passkey" and have to use a system like the one you suggest, you need to trust software based storage of long term credentials.<p>That isn't the case with a hardware FIDO2/U2F token, which has unlimited capacity for non-resident MFA keys the server holds for you to decrypt and use locally to sign login attempts.<p>I liked that FIDO seemed to get towards hardware backed security modules for login, without cognitive load of worrying about number of sites and yubikey slot capacity. Resident Webauthn keys limit the number of sites you can have, and push you towards software based solutions (so you lose out on doing the crypto on the single purpose, limited platform that's dedicated to generating those signatures).</p>
]]></description><pubDate>Thu, 26 Dec 2024 23:12:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=42518609</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42518609</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42518609</guid></item><item><title><![CDATA[New comment by g_p in "A Tour of WebAuthn"]]></title><description><![CDATA[
<p>TOTP codes are phishable and repayable in real-time - both via web (visiting the wrong site which asks for a TOTP and relays it within a few seconds), and via social engineering over the phone (give us one of the codes to prove it's you and we can keep your account safe).<p>Adding number matching or similar helps ensure that the same user is initiating the session as is approving it - an issue when people discovered that Microsoft (among others) would do push messages to authenticate a login, and that users (if spammed late at night with constant requests), would often eventually hit allow to stop the notifications.</p>
]]></description><pubDate>Thu, 26 Dec 2024 23:08:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=42518587</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42518587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42518587</guid></item><item><title><![CDATA[New comment by g_p in "Watchdog to issue new guidance after report finds air fryers may be listening"]]></title><description><![CDATA[
<p>Which? is a UK brand, and in the UK it's fairly common to see the postcode (or rather the first couple of digits) used to determine which regional programming a user wants, given the (to some extent historical) TV regions and channel numbering.<p>I've seen "always offline" pre internet era satellite TV set top boxes do this, and use the first 2 or 3 characters of the postcode to work out the correct region and show the correct programme guide information and channel numbering.<p>I imagine that on a modern internet enabled device this might also pre-select some of the "watch later" apps, based on your region.<p>Doesn't mean there's no wider issue about data gathering and exfiltration over the internet, but just to add some regional context as this postcode point might not be as egregious as it sounds at first.</p>
]]></description><pubDate>Mon, 16 Dec 2024 08:38:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=42429115</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=42429115</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42429115</guid></item><item><title><![CDATA[New comment by g_p in "Omnivore Is Joining ElevenLabs"]]></title><description><![CDATA[
<p>Readeck saves an archived copy of the links you save (where it can).<p>From their docs,
"Every bookmark is stored in a single, immutable, ZIP file. Parts of this file (HTML content, images, etc.) are directly served by the application or converted to a web page or an e-book when needed."<p><a href="https://codeberg.org/readeck/readeck" rel="nofollow">https://codeberg.org/readeck/readeck</a></p>
]]></description><pubDate>Wed, 30 Oct 2024 13:35:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=41994586</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=41994586</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41994586</guid></item><item><title><![CDATA[New comment by g_p in "Screenpipe: 24/7 local AI screen and mic recording"]]></title><description><![CDATA[
<p>The issue so far seems to be that most OSs don't really have an effective way to restrict that file to a single application. User-oriented filesystem permissions don't work, as all software runs "as" the user.<p>If you assume there's a way to restrict permissions by application (a bit like TCC on Mac for certain folders), you need to then go down a rabbit-hole of what matcher you use to decide what is a "single application" - Mac OS can use developer Team ID (i.e. app signature identity), or similar. You wouldn't want to rely on path or binary name, as those could be spoofed or modified by a rogue app.<p>So in short, in a multi-user OS, generally the filesystem (asides from Mac OS, under certain circumstances) is fairly widely readable by other software running as the current user. At least in my experience, Mac OS is the desktop OS that is closest to having some level of effective protections against apps accessing "everything" owned by the user (but belonging to other apps).</p>
]]></description><pubDate>Mon, 30 Sep 2024 17:59:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=41700084</link><dc:creator>g_p</dc:creator><comments>https://news.ycombinator.com/item?id=41700084</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41700084</guid></item></channel></rss>