<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: gnfurlong</title><link>https://news.ycombinator.com/user?id=gnfurlong</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 20:15:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=gnfurlong" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by gnfurlong in "Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign"]]></title><description><![CDATA[
<p>That's just not true.<p>The original pass is just a single shell script. It's short, pretty easy to read and likely in part because it's so simple, it's also very stable. The only real dependencies are bash, gnupg and optionally git (history/replication). These are most likely already on your machine and whatever channel you're getting them from (ex: distribution package manager) should be much more resilient to supply chain vulnerabilities.<p>It can also be used with a pgp smartcard (in my case a Yubikey) so all encryption/decryption happens on the smartcard. Every attempt to decrypt a credential requires a physical button press of the yubikey, making it pretty obvious if some malware is trying to dump the contents of the password store.</p>
]]></description><pubDate>Thu, 23 Apr 2026 20:26:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47881402</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=47881402</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47881402</guid></item><item><title><![CDATA[New comment by gnfurlong in "Real-Time Settlers of Catan"]]></title><description><![CDATA[
<p>I absolutely adore Hanabi, especially for two players. It's a cooperative game with very limited communication.<p>Also another vote for Splendor Duel. The original Splendor is probably my favorite game and Duel is the better version for two players.</p>
]]></description><pubDate>Wed, 12 Jun 2024 23:43:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=40664389</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=40664389</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40664389</guid></item><item><title><![CDATA[New comment by gnfurlong in "Ask HN: What are your predictions for 2024?"]]></title><description><![CDATA[
<p>I'm waiting for pov perspectives for sporting events and I say that as someone who doesn't really watch sports.</p>
]]></description><pubDate>Wed, 27 Dec 2023 16:26:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=38783514</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=38783514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38783514</guid></item><item><title><![CDATA[New comment by gnfurlong in "Wrap Up: Bicycle trip logistics"]]></title><description><![CDATA[
<p>Most of the popular touring bikes fit your budget. Really you're just looking for durable, a wide gear range and the capacity to mount gear. Surly disc trucker has historically been one of the most popular as an example, but there are a lot of others.<p>Also, it can absolutely be done with cheaper. My partner and I finished a 4800 mile trip last year. I used a second hand cyclocross bike that I got off craiglist for ~500 a few years ago. She had a road bike that she bought for 200 from the local bike project.</p>
]]></description><pubDate>Mon, 14 Nov 2022 23:18:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=33602814</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=33602814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33602814</guid></item><item><title><![CDATA[New comment by gnfurlong in "Node.js HTTP client axios pushes broken update breaking production apps"]]></title><description><![CDATA[
<p>It looks like at least some of the individuals claiming production issues are pulling the latest version of Axios from a CDN. It doesn't seem like they actively pushed a release to production without adequate testing. Not that I disagree with your overall point, but it's at least a little bit less damning.</p>
]]></description><pubDate>Fri, 07 Oct 2022 14:01:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=33121442</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=33121442</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33121442</guid></item><item><title><![CDATA[New comment by gnfurlong in "Former U.S. congressman, operative pleads guilty to election fraud charges"]]></title><description><![CDATA[
<p>Delaware definitely replaced their voting machines after that article was published. I think in 2020.</p>
]]></description><pubDate>Wed, 08 Jun 2022 23:04:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=31675587</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=31675587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31675587</guid></item><item><title><![CDATA[New comment by gnfurlong in "Docker is dead? Podman – an alternative tool?"]]></title><description><![CDATA[
<p>The parent comment is still talking about rootless podman (and really just user namespaces). Root in the container is absolutely mapped to the user executing podman outside the container.<p>If it mapped to root outside the container, you could just use podman to create setuid scripts owned by root for very trivial privelege escalation.</p>
]]></description><pubDate>Sat, 04 Jun 2022 11:16:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=31619058</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=31619058</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31619058</guid></item><item><title><![CDATA[New comment by gnfurlong in "Fedora considers deprecating legacy BIOS"]]></title><description><![CDATA[
<p>I've happily used systemd-boot in the past, but it's definitely less featureful than grub. Notably, it doesn't support the use of a (LUKS) encrypted boot partition. I'm not even sure it supports /boot on btrfs? Both are necessary if you want to have an encrypted root AND include the matching kernel / initramfs in any snapshots of root.</p>
]]></description><pubDate>Thu, 21 Apr 2022 13:39:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=31109223</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=31109223</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31109223</guid></item><item><title><![CDATA[New comment by gnfurlong in "Systemd-homed merged as a fundamental change to Linux home directories"]]></title><description><![CDATA[
<p>Systemd-homed isn't inventing the idea of encrypted home partitions and fundamentally, what you're saying is that cron is incompatible with encrypted home partitions (or any other auto mounted home partition, ex: network mounted).  The same is true for the concerns about ssh.<p>If you listened to the original talk from Lennart, you're really just giving examples of one of his major points.  Because /etc/passwd wasnt flexible enough to accomodate arbitrary user properties, user configuration has organically spread out over time into all these "side car" configuration files.  Some are scattered around /etc so not easily portable while others are in the user's home directory and suffer from exactly the scenario you've mentioned.  One of the goals of systemd-homed is to add a portable, extensible format for a user record external to the home directory which would mean that systemd-homed rather than causing, could actually lead to a solution for the issue you've highlighted.</p>
]]></description><pubDate>Sun, 02 Feb 2020 19:04:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=22218648</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=22218648</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22218648</guid></item><item><title><![CDATA[New comment by gnfurlong in "Systemd-homed merged as a fundamental change to Linux home directories"]]></title><description><![CDATA[
<p>One of the supposed benefits I remember from his original talk on systemd-homed is better handling of encrypted home directories even for a single user workstation.<p>Even on a single user workstation, having an encrypted root filesystem doesn't do as much good if your laptop is left booted up with the root filesystem unlocked most of the time.  Systemd-homed in that scenario is supposed to make it easier to automatically unmount/mount on locking/unlocking the workstation.</p>
]]></description><pubDate>Sun, 02 Feb 2020 18:52:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=22218575</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=22218575</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22218575</guid></item><item><title><![CDATA[New comment by gnfurlong in "Ask HN: What do you self-host?"]]></title><description><![CDATA[
<p>I have to admit, the biggest selling point to me for podman is the removal of the central docker daemon.  For my use case (personal workstation and home lab), it seems strange to me that I need essentially another service manager for these processes just because I want to slap them in a container.  It definitely makes sense that there would still be some gaps though as it's a less mature product.<p>You've definitely convinced me to take a good look at LXC/LXD though.  Thanks for the thorough response!</p>
]]></description><pubDate>Tue, 15 Oct 2019 12:31:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=21257699</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=21257699</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21257699</guid></item><item><title><![CDATA[New comment by gnfurlong in "Ask HN: What do you self-host?"]]></title><description><![CDATA[
<p>Have you taken a look at podman / buildah? My understanding is that podman resolves all of the security concerns you highlight above while mostly maintaining compatability with the docker cli and existing docker images.  It gets rid of the docker daemon so your containers (and restart policy) can just be managed by your existing service manager.<p>I only just recently discovered podman and I've been pretty excited.  Having never used LXD and only understanding the high level differences between the two, I'm curious how it compares with regards to security and usability.</p>
]]></description><pubDate>Tue, 15 Oct 2019 03:23:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=21255287</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=21255287</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21255287</guid></item><item><title><![CDATA[New comment by gnfurlong in "Facebook scans system libraries on Android and uploads them to their server"]]></title><description><![CDATA[
<p>Regarding apparmor/selinux, who creates/audits those profiles to make sure each application only has access to exactly the libraries it needs?  It probably defeats the purpose if it's the app authors.  Similarly, who validates that these profiles don't break functionality for any device/os version?  I could see this being an option for power users who are willing to collaborate on creating the profiles and deal with fixing the occasional incomplete profile.  I'm not sure how feasible it'd be as a solution for your typical user though.</p>
]]></description><pubDate>Sun, 01 Sep 2019 17:18:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=20853402</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=20853402</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20853402</guid></item><item><title><![CDATA[New comment by gnfurlong in "Google Plans to Deprecate FTP URL Support in Chrome"]]></title><description><![CDATA[
<p>Chrome didn't exist 20 years ago, but you can trace its lineage back that far.  Khtml dates back to 1998 apparently.</p>
]]></description><pubDate>Sat, 17 Aug 2019 11:57:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=20723550</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=20723550</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20723550</guid></item><item><title><![CDATA[New comment by gnfurlong in "What is Silverblue?"]]></title><description><![CDATA[
<p>Also "Must be real evil"</p>
]]></description><pubDate>Sun, 14 Jul 2019 14:33:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=20433607</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=20433607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20433607</guid></item><item><title><![CDATA[New comment by gnfurlong in "REST and GraphQL framework to build API-driven projects"]]></title><description><![CDATA[
<p>JSON Schema and Swagger/OpenAPI provide some of the missing functionality described above (type definitions, enumeration, validation).  It's not quite the same and in particular I'm not sure I've seen a reference to the schema passed with the json itself (although that could easily be ignorance on my part).</p>
]]></description><pubDate>Mon, 17 Jun 2019 11:59:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=20202021</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=20202021</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20202021</guid></item><item><title><![CDATA[New comment by gnfurlong in "Docker Hub Hacked – 190k accounts, GitHub tokens revoked, builds disabled"]]></title><description><![CDATA[
<p>I'll admit to being ignorant of apt as my primary distributions aren't debian based, but aren't packages cryptographically signed?  If package signatures are validated after download, then it shouldn't matter right?
Edit: Skimming and I shamefully didn't the read grandparent post.  The link addresses exactly this point.</p>
]]></description><pubDate>Sat, 27 Apr 2019 13:22:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=19765359</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=19765359</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19765359</guid></item><item><title><![CDATA[New comment by gnfurlong in "Password Managers: Under the Hood of Secrets Management"]]></title><description><![CDATA[
<p>YubiKey is at least supported, but only because it also functions as a pgp smartcard.  You can load you pgp private keys on the yubikey and then all decryption will only be done on the Yubikey itself.</p>
]]></description><pubDate>Thu, 21 Feb 2019 19:46:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=19219919</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=19219919</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19219919</guid></item><item><title><![CDATA[New comment by gnfurlong in "Password Managers: Under the Hood of Secrets Management"]]></title><description><![CDATA[
<p>I'm surprised there's not more discussion of passwordstore in this thread.  In light of the parent article, I want to point out one of it's killer features (from my perspective).  As it's built on top of PGP, you can move your private key to a PGP smart card and then decryption operations are done entirely on the smart card.  Your private key never leaves the card.  If you're using a Yubikey as the smart card, there's also a feature where you have to touch the card to approve of any operation (even when already unlocked by entering the smart card's password).</p>
]]></description><pubDate>Thu, 21 Feb 2019 13:18:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=19216628</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=19216628</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19216628</guid></item><item><title><![CDATA[New comment by gnfurlong in "Disguised user location data collection on Huawei phone?"]]></title><description><![CDATA[
<p>If you want to buy my house, sure.  You're free to look at anything you want once you own it.  It's yours.<p>What's not okay is for me to build a house and add recording devices all around and then sell it to you without informing you.  Using your house example, that's the most direct comparison and would 100% be illegal.<p>There's obviously a trade off most users are willing to make between privacy and functionality, but I do believe the exchange should be 100% in the open and a conscious decision made by the user.</p>
]]></description><pubDate>Sun, 14 Oct 2018 13:10:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=18212699</link><dc:creator>gnfurlong</dc:creator><comments>https://news.ycombinator.com/item?id=18212699</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18212699</guid></item></channel></rss>