<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: garrettr_</title><link>https://news.ycombinator.com/user?id=garrettr_</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 23 May 2026 17:39:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=garrettr_" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by garrettr_ in "Dust from car brakes more harmful than exhaust, study finds"]]></title><description><![CDATA[
<p>EVs are heavier than similar ICE vehicles, but they also have regenerative braking, which greatly reduces wear on the brake pads. I suspect EVs produce much less particulate pollution from brake pads, but somewhat more from their tires.</p>
]]></description><pubDate>Sat, 15 Feb 2025 16:51:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=43059968</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=43059968</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43059968</guid></item><item><title><![CDATA[New comment by garrettr_ in "Computer use, a new Claude 3.5 Sonnet, and Claude 3.5 Haiku"]]></title><description><![CDATA[
<p>Go to the left sidebar, open the dropdown menu labeled with your account email at the bottom, click Feature Preview, enable LaTeX Rendering.</p>
]]></description><pubDate>Tue, 22 Oct 2024 18:34:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=41917279</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=41917279</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41917279</guid></item><item><title><![CDATA[New comment by garrettr_ in "Don't defer Close() on writable files (2017)"]]></title><description><![CDATA[
<p>w.r.t SQLite, the only horrifying revelation I’ve had is that it allows NULLs in composite primary keys, which I’ve seen lead to some nasty bugs in practice.</p>
]]></description><pubDate>Tue, 10 Sep 2024 14:39:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=41501261</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=41501261</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41501261</guid></item><item><title><![CDATA[New comment by garrettr_ in "iOS 16 Available September 12th"]]></title><description><![CDATA[
<p>Exporting is purposefully made impossible in many implementations of Passkeys (aka Webauthn authenticators) other than Apple's. For example, Yubikeys are designed so private keys can never leave the authenticator [0]. Enabling the export of private keys from an authenticator greatly increases the attack surface of an authenticator.<p>This is a long-standing security/usability tradeoff in the Webauthn spec. Various solutions have been proposed, but as far as I know most of them are still just drafts, e.g. [1]. The best practice has been and, as far as I know, continues to be to register multiple authenticators, e.g. a primary and a backup authenticator. This practice has a variety of benefits:<p>1. Avoids lockout if an authenticator is lost.<p>2. If you use multiple authenticators from different vendors (e.g. Yubico and Google) you:<p>1. Avoid vendor lock-in<p>2. Can rapidly respond in case a security vulnerability is discovered in one of your authenticators, as has occurred for both Yubico [2] and Google [3].<p>One could use Apple's Passkeys as one's day-to-day "personal" authenticator, and use an authenticator from a different vendor (e.g. Yubico Yubikey or Google Titan Security Key) as their backup key. I don't see how Apple's implementation increases the risk of lock-in beyond that of any of the other major Webauthn authenticator providers.<p>[0]: <a href="https://github.com/w3c/webauthn/issues/865#issuecomment-380434642" rel="nofollow">https://github.com/w3c/webauthn/issues/865#issuecomment-3804...</a><p>[1]: <a href="https://github.com/Yubico/webauthn-recovery-extension" rel="nofollow">https://github.com/Yubico/webauthn-recovery-extension</a><p>[2]: <a href="https://www.yubico.com/support/issue-rating-system/security-advisories/ysa-2019-02/" rel="nofollow">https://www.yubico.com/support/issue-rating-system/security-...</a><p>[3]: <a href="https://security.googleblog.com/2019/05/titan-keys-update.html" rel="nofollow">https://security.googleblog.com/2019/05/titan-keys-update.ht...</a></p>
]]></description><pubDate>Thu, 15 Sep 2022 06:07:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=32847745</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=32847745</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32847745</guid></item><item><title><![CDATA[New comment by garrettr_ in "Maccy is an open source lightweight and searchable clipboard manager for macOS"]]></title><description><![CDATA[
<p>Paste (<a href="https://pasteapp.io/" rel="nofollow">https://pasteapp.io/</a>) has this feature too.</p>
]]></description><pubDate>Sat, 25 Jun 2022 05:40:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=31872862</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=31872862</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31872862</guid></item><item><title><![CDATA[New comment by garrettr_ in "System Preferences Reimagined on macOS"]]></title><description><![CDATA[
<p>There's a striking similarity between the author's mockups from Feb 15 and the redesigned System Settings announced in the beta of macOS Ventura and last week's WWDC [0]. I guess they got their wish!<p>[0]: <a href="https://www.macrumors.com/2022/06/06/macos-ventura-system-settings-app/" rel="nofollow">https://www.macrumors.com/2022/06/06/macos-ventura-system-se...</a></p>
]]></description><pubDate>Tue, 14 Jun 2022 05:15:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=31734997</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=31734997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31734997</guid></item><item><title><![CDATA[New comment by garrettr_ in "SoCal man says computer on his Tesla froze, causing it to be stuck at 83 MPH"]]></title><description><![CDATA[
<p>Regenerative braking</p>
]]></description><pubDate>Wed, 13 Apr 2022 18:07:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=31018071</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=31018071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31018071</guid></item><item><title><![CDATA[New comment by garrettr_ in "Firefox 76"]]></title><description><![CDATA[
<p>There are numerous Firefox add-ons that provide this feature, e.g. <a href="https://addons.mozilla.org/en-US/firefox/addon/leechblock-ng/" rel="nofollow">https://addons.mozilla.org/en-US/firefox/addon/leechblock-ng...</a>. IMHO, the main benefit of using Safari/Screen Time for this is that it automatically syncs the same limits across all of your iCloud-connected devices, which is great. I know Firefox has a Sync feature but I'm not sure if any of the add-ons leverage it to provide a similar seamless cross-device experience.</p>
]]></description><pubDate>Tue, 05 May 2020 20:08:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=23084372</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=23084372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23084372</guid></item><item><title><![CDATA[New comment by garrettr_ in "The browsers are probably running the TLS show now"]]></title><description><![CDATA[
<p>> I don't know what you mean by "Firefox doesn't enforce [CT]".<p>They mean Firefox, unlike Chrome and Safari, doesn't require proof of inclusion in a CT log for recently issued TLS certificates to be considered valid.<p>Source: <a href="https://developer.mozilla.org/en-US/docs/Web/Security/Certificate_Transparency#Browser_Requirements" rel="nofollow">https://developer.mozilla.org/en-US/docs/Web/Security/Certif...</a>.</p>
]]></description><pubDate>Mon, 09 Mar 2020 19:50:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=22529044</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=22529044</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22529044</guid></item><item><title><![CDATA[New comment by garrettr_ in "Ask HN: Who is hiring? (December 2019)"]]></title><description><![CDATA[
<p>The jobs.apple.com link appears to be broken :) It doesn't link to a specific job description, just an empty search form with 100s of results.</p>
]]></description><pubDate>Tue, 03 Dec 2019 03:24:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=21689651</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=21689651</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21689651</guid></item><item><title><![CDATA[New comment by garrettr_ in "Google reveals fistful of flaws in Apple's iMessage app"]]></title><description><![CDATA[
<p>Project Zero also regularly publishes on flaws in Google's own products. Check out <a href="https://googleprojectzero.blogspot.com" rel="nofollow">https://googleprojectzero.blogspot.com</a>: they do a fair amount of reports on Chrome, ChromeOS, Android, etc.</p>
]]></description><pubDate>Tue, 30 Jul 2019 17:15:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=20566902</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=20566902</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20566902</guid></item><item><title><![CDATA[New comment by garrettr_ in "Ask HN: I need ideas to impress fifth graders with technology"]]></title><description><![CDATA[
<p>I was recently asked by a friend who teaches 5th graders to do something similar for their school's "career month." I tried a few different things, and found the most successful was showing them how to use a web browser's built-in developer tools to inspect the source of and make live modifications to web pages.<p>My reasoning behind this exercise was:<p>- I checked in with their teacher ahead of time and confirmed that all of these kids had a least some experience using a web browser. Generally it seems like a likely "lowest common denominator" of tech experience for kids.<p>- Most web browsers have powerful developer tools that can be used to inspect and modify source and will display the results of many types of changes in real time. It is easy to get kids to understand the relationship between HTML/CSS code and the webpage that results from rendering it when you can make live changes to the code and see it immediately reflected in the rendered page.<p>- Web browsers are freely available. I gave them a handout with instructions on how to access the developer tools in web browsers that are either free (Chrome, Firefox) or readily available to them (Safari, since their school computer lab had a few Macs). I specifically wanted them to be inspired and continue experimenting after I left.<p>I concluded by spending 10 minutes taking student's requests for the modifications to nytimes.com. It ended up with a bizarro color scheme, comic sans on all the things, and pictures of dinosaurs and Pixar characters at the top of every article. Everyone had a blast, myself included!<p>I think the demonstration tickled the kid's innate predisposition towards mischief. An immediate question was "can everyone in the world see this changes? are you hacking right now?," which allowed me to naturally give a high-level explanation of the server-client architecture of the web. A few kids came up to me afterwards and asked me to specifically walk them through finding and opening the developer tools so they could continue experimenting at home, and that was the best outcome I could've hoped for!</p>
]]></description><pubDate>Mon, 03 Jun 2019 16:38:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=20085150</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=20085150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20085150</guid></item><item><title><![CDATA[New comment by garrettr_ in "We’re asking Apple to change the advertising ID for each iPhone every month"]]></title><description><![CDATA[
<p>> It's a video with no transcript<p>While Apple only started posting transcripts of WWDC presentations last year, <a href="https://asciiwwdc.com" rel="nofollow">https://asciiwwdc.com</a> has been around for a while and is a great searchable archive of WWDC transcripts. Here's the transcript for the presentation you referenced: <a href="https://asciiwwdc.com/2014/sessions/715?q=user%20privacy%20in%20ios" rel="nofollow">https://asciiwwdc.com/2014/sessions/715?q=user%20privacy%20i...</a>.</p>
]]></description><pubDate>Tue, 16 Apr 2019 04:10:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=19671076</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=19671076</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19671076</guid></item><item><title><![CDATA[New comment by garrettr_ in "A Humility Training Exercise for Technical Interviewers"]]></title><description><![CDATA[
<p>“What this does is free your co-worker to be 100% honest. They don't know which parts of the interview were really you trying to perform well.”<p>Since there was no mention of it in the post, this is called “randomized response,” and is a building block for modern privacy-preserving protocols e.g. RAPPOR, which is used in Google Chrome: <a href="https://security.googleblog.com/2014/10/learning-statistics-with-privacy-aided.html" rel="nofollow">https://security.googleblog.com/2014/10/learning-statistics-...</a></p>
]]></description><pubDate>Tue, 05 Feb 2019 04:11:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=19082965</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=19082965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19082965</guid></item><item><title><![CDATA[New comment by garrettr_ in "Pizza Dough"]]></title><description><![CDATA[
<p>It's fiddly, but you can get good results in a consumer grade oven if you:<p>1. Use a preheated pizza stone or similar (e.g. cast iron pan) to get as much radiant heat into the crust as possible.<p>2. Position the pizza stone close to the upper heating element and/or switch to broil for the last few minutes of cooking.</p>
]]></description><pubDate>Mon, 07 Jan 2019 22:33:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=18850942</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=18850942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18850942</guid></item><item><title><![CDATA[New comment by garrettr_ in "Firefox Profilemaker"]]></title><description><![CDATA[
<p>Good point. I'm pretty sure this component of resistFingerprinting is derived from Project Fusion, which uplifts privacy/anonymity-related changes from Tor Browser into Firefox. In the Tor Browser threat model, the idea is that you can't avoid looking like a Tor user, so the goal is to make all Tor users indistinguishable from each other. Flipping this pref as a regular Firefox user is incompatible with its primary intent/threat model, so it fails to deliver and may even make you _more_ identifiable in some circumstances.<p>This is a great example of why I'm generally skeptical of these scattershot approaches to making users more secure by changing default settings in mainstream browsers. Security and privacy features always entail tradeoffs and should be designed and implemented holistically for best results.</p>
]]></description><pubDate>Mon, 03 Dec 2018 21:15:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=18593107</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=18593107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18593107</guid></item><item><title><![CDATA[New comment by garrettr_ in "Stealing Chrome cookies without a password"]]></title><description><![CDATA[
<p>Windows’ OS keychain API is pretty weak, accessing secrets does not require user authorization. macOS and some Linux desktops environments do it slightly better, but there’s only so much you can do to defend against an attacker with the same privileges as the user.</p>
]]></description><pubDate>Sun, 04 Nov 2018 19:51:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=18377740</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=18377740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18377740</guid></item><item><title><![CDATA[New comment by garrettr_ in "Stealing Chrome cookies without a password"]]></title><description><![CDATA[
<p>This a nice practical technique for extracting Chrome cookies, and is slightly less work than the alternative of writing a cookie db decyptor based on Chromium’s publicly available source code.<p>On platforms that have a decent OS-level keychain API (not Windows), this technique does not actually bypass password encryption and may trigger a password prompt/require the user to enter their password. This depends on whether the user previously granted permanent access to a given secret by a given application (e.g. by clicking “Always Allow” in the macOS keychain prompt). The author of the exploit probably did this at some point and forgot about it, which is why this appears to be a bypass of Chrome’s cookie db encryption.<p>Ultimately, encrypting the cookie DB provides limited protection anyway and if you have user privileges then you’ll eventually be able to access their data. This is not news, although it was the topic of some controversy back when Chrome resisted making changes to support this specific threat model, which is impossible to completely defend in the general case from the POV of a typical application developer on a modern desktop OS.</p>
]]></description><pubDate>Sun, 04 Nov 2018 19:44:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=18377709</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=18377709</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18377709</guid></item><item><title><![CDATA[New comment by garrettr_ in "Libssh 0.8.4 and 0.7.6 Authentication Bypass Vulnerability Fix (CVE-2018-10933)"]]></title><description><![CDATA[
<p>As pronoiac has already said, libssh != OpenSSH, which is far more widely used. According to the footer on <a href="https://www.libssh.org/" rel="nofollow">https://www.libssh.org/</a>, projects using LibSSH include KDE's sftp implementation, X2Go, and... GitHub: "GitHub uses libssh in production to power its git SSH infrastructure, serving millions of requests daily." If the footer text is still accurate, that's probably the most concerning potential issue with this vuln, although it's also possible GitHub has mitigated this risk in other ways. It would be nice to see GitHub publish something about this, one way or the other.<p>Update: they recently tweeted confirming they were not at risk, <a href="https://twitter.com/GitHubSecurity/status/1052317333379723265" rel="nofollow">https://twitter.com/GitHubSecurity/status/105231733337972326...</a></p>
]]></description><pubDate>Tue, 16 Oct 2018 22:33:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=18233882</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=18233882</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18233882</guid></item><item><title><![CDATA[New comment by garrettr_ in "Dear Crypto, You’re Being Played by Wall Street"]]></title><description><![CDATA[
<p>For the love of god, please stop calling all cryptocurrencies and cryptocurrency-related projects "crypto."</p>
]]></description><pubDate>Thu, 07 Sep 2017 04:48:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=15189204</link><dc:creator>garrettr_</dc:creator><comments>https://news.ycombinator.com/item?id=15189204</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15189204</guid></item></channel></rss>