<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: honzaik</title><link>https://news.ycombinator.com/user?id=honzaik</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 16 Apr 2026 07:40:43 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=honzaik" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by honzaik in "LinkedIn Is Illegally Searching Your Computer"]]></title><description><![CDATA[
<p>I am aware that google will take looong time to act. that is why I mentioned that it is LinkedIn (Microsoft) or its contracted fingerprinting/"monitoring" partner who may have more direct ways to report this if they actually investigate malicious extensions.<p>but that doesn't really matter. for the sake of the argument assume the extensions are not malicious (as evidenced e.g. by the PQC one with ?16 users?) does that change the situation?</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:57:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47615368</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=47615368</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615368</guid></item><item><title><![CDATA[New comment by honzaik in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>well if they have evidence why they dont report it? why are these extensions on the store? im sure linkedin has enough motion to report it directly to google<p>also, having a PQC enabled extension doesnt seem like a good "large user base capture" tactic.<p>the source code is as usual obfuscated react but that doesnt mean its malicious...<p>EDIT: i debuged the extension quickly and it doesnt seem to do anything malicious. it only sends <a href="https://pqc-extension.vercel.app/?hostname=[domain]" rel="nofollow">https://pqc-extension.vercel.app/?hostname=[domain]</a> request to this backend to which it has permissions. it doesnt seem to exfiltrate anything else. it might get triggered later but it has very limited permissions anyway so it doesnt seem to be a malicious extension. (but im no expert)</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:22:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47614914</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=47614914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47614914</guid></item><item><title><![CDATA[New comment by honzaik in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>it apparently scans for something like "PQC Checker", an extension for checking if TLS connection is PQC-enabled? how is that a spam extension (and thats just a random one i saw)</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:16:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47614826</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=47614826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47614826</guid></item><item><title><![CDATA[New comment by honzaik in "Quantum computing bombshells that are not April Fools"]]></title><description><![CDATA[
<p>1) yes, everything is affected, but everything else is being migrated to PQC as we speak<p>2) "256-bit encryption" has different meanings in different contexts. "256-bit security" generally refers to cryptosystem for which an attack takes roughly 2^256 operations. this is true for AES-256 (symmetric encryption) assuming classical adversaries. this is not true for elliptic curve-based algorithms even though the standard curves are "256-bit curves", but that refers to the size of the group and consequently to the size of the private key. the best general attacks use Pollard's rho algorithm which takes roughly 2^128 operations, i.e., 256-bit curves have 128-bit security.<p>in the context of quantum attackers, AES-256 is still fine although theoretically QCs halve the security; however its not that big of a deal in practice and ultimately AES-128 is still fine, because doing 2^64 "quantum operations" is presumed to be difficult to do in practice due to parallelization issues etc.<p>the elliptic curve signatures (used in Bitcoin) are attacked using Shor's algorithm where the big deal is that it is asymptotically polynomial (about O(n^3)) meaning that factoring a 256-bit number is only 256^3/4^3 = 262144x more difficult compared to factoring 15. this is a big difference from "standard" exponential complexity where the difficulty increases exponentially by factors of 2^n. (+ lets ignore that elliptic curve signatures dont rely on factoring but the problem is essentially the same because Shor does both because those are hidden subgroup problems)<p>the analysis is more complex but most of it is essentially in that paper and explains it nicely.</p>
]]></description><pubDate>Thu, 02 Apr 2026 08:13:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47611433</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=47611433</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47611433</guid></item><item><title><![CDATA[New comment by honzaik in "US asked Ukraine for help fighting Iranian drones, Zelensky says"]]></title><description><![CDATA[
<p>the NYT is reporting this was the US <a href="https://www.nytimes.com/2026/03/05/world/middleeast/iran-school-us-strikes-naval-base.html" rel="nofollow">https://www.nytimes.com/2026/03/05/world/middleeast/iran-sch...</a>  i recommend employing more critical thinking in the future and less propaganda spreading</p>
]]></description><pubDate>Fri, 06 Mar 2026 09:50:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47272968</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=47272968</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272968</guid></item><item><title><![CDATA[New comment by honzaik in "OpenAI needs to raise $207B by 2030 so it can continue to lose money"]]></title><description><![CDATA[
<p>this comment feels so eerie as I am currently reading Zuboff's "The Age of Surveillance Capitalism," which itself is interesting to read now since its written before the huge AI leap.<p>Also, it reminded me of the following quote, mentioned in the book, from Langdon Winner<p><i>The changes and disruptions that an evolving technology repeatedly caused in modern life were accepted as given or inevitable simply because no one bothered to ask whether there were other possibilities.</i></p>
]]></description><pubDate>Wed, 26 Nov 2025 09:45:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46055829</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=46055829</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46055829</guid></item><item><title><![CDATA[New comment by honzaik in "Quantum Computation Lecture Notes (2022)"]]></title><description><![CDATA[
<p>this may give you an idea about his current outlook <a href="https://www.youtube.com/watch?v=DQFyQgA_GE4" rel="nofollow">https://www.youtube.com/watch?v=DQFyQgA_GE4</a></p>
]]></description><pubDate>Thu, 12 Jun 2025 21:23:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=44263352</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=44263352</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44263352</guid></item><item><title><![CDATA[New comment by honzaik in "Why cryptography is not based on NP-complete problems"]]></title><description><![CDATA[
<p>afaik the "right kind of code" does a lot of heavy lifting for practical implementations, such as Classical McEliece.<p>correct me if I am wrong as I havent spent much time looking into it, but the security analysis essentially says "we assume the Goppa code is indistinguishable from a random code so the best attack is to do generic decoding for a random code (NP-hard problem)". but there is no reduction to some NP-hard problem that Goppa code (the specific code used in Classical McEliece) is indistinguishable.<p>the assumption is reasonable as nobody has been able to find a distinguisher for decades. also, if a distinguisher exists, it also doesn't translate into a direct attack against the system, it just means you cannot rule out "structural attacks" and jump to NP-hard problem.</p>
]]></description><pubDate>Thu, 13 Feb 2025 09:22:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=43034215</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=43034215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43034215</guid></item><item><title><![CDATA[New comment by honzaik in "U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, First-Ever Report"]]></title><description><![CDATA[
<p>OK, hoarding discovered zero-days might not be the best strategy, BUT if we actually create a backdoor and don't tell anyone about it, then this should be safer right? right? /s<p><a href="https://www.wired.com/2015/12/researchers-solve-the-juniper-mystery-and-they-say-its-partially-the-nsas-fault/" rel="nofollow">https://www.wired.com/2015/12/researchers-solve-the-juniper-...</a><p><a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" rel="nofollow">https://en.wikipedia.org/wiki/Dual_EC_DRBG</a><p><a href="https://en.wikipedia.org/wiki/Juniper_Networks#ScreenOS_Backdoor" rel="nofollow">https://en.wikipedia.org/wiki/Juniper_Networks#ScreenOS_Back...</a></p>
]]></description><pubDate>Thu, 06 Feb 2025 17:15:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=42964403</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=42964403</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42964403</guid></item><item><title><![CDATA[New comment by honzaik in "Understanding Memory Management, Part 1: C"]]></title><description><![CDATA[
<p>i am no C programmer, but doesnt the first pseudocode make no sense (and others after since they reuse it)?<p><pre><code>  address = X
  length = *X
  address = address + 1
  while length > 0 {
    address = address + 1
    print *address
  }
</code></pre>
1) length is never updated so while is infinite loop (if length is not 0)<p>2) the first character is never output since at address 0 (assuming X=0 at the start) is the value length but then the pointer is incremented twice so the first print *address prints the character at address 2?<p>if I am mistaken I'd be happy if someone explained why it makes sense</p>
]]></description><pubDate>Fri, 24 Jan 2025 09:35:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=42811719</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=42811719</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42811719</guid></item><item><title><![CDATA[New comment by honzaik in "Benchmarking RSA Key Generation"]]></title><description><![CDATA[
<p>well, it depends on the size of the quantum computer. of course you can make large enough RSA keys (depends whats your security margin/assumptions) but the problem is that the size/computational increase is exponential whereas the solving speed scales polynomially.<p><a href="https://eprint.iacr.org/2017/351" rel="nofollow">https://eprint.iacr.org/2017/351</a></p>
]]></description><pubDate>Fri, 03 Jan 2025 16:09:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=42586810</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=42586810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42586810</guid></item><item><title><![CDATA[New comment by honzaik in "Benchmarking RSA Key Generation"]]></title><description><![CDATA[
<p>it might be this <a href="https://facthacks.cr.yp.to/fermat.html" rel="nofollow">https://facthacks.cr.yp.to/fermat.html</a><p>if N=p*q and p-q < sqrt(p) then its easy to factor</p>
]]></description><pubDate>Fri, 03 Jan 2025 16:01:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=42586748</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=42586748</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42586748</guid></item><item><title><![CDATA[New comment by honzaik in "Hezbollah pager explosions kill several people in Lebanon"]]></title><description><![CDATA[
<p>It may be a combination of making the battery overheat which would trigger the planted explosives from a supply chain attack. Of course, I am no hardware engineer/bomb expert to know if that is possible.</p>
]]></description><pubDate>Tue, 17 Sep 2024 15:58:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=41569074</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=41569074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41569074</guid></item><item><title><![CDATA[New comment by honzaik in "CrowdStrike will be liable for damages in France, based on the OVH precedent"]]></title><description><![CDATA[
<p>time to issue 50€ gift cards!</p>
]]></description><pubDate>Thu, 25 Jul 2024 10:40:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=41066978</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=41066978</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41066978</guid></item><item><title><![CDATA[New comment by honzaik in "Visual explanation of SAML authentication (2020)"]]></title><description><![CDATA[
<p>Well that depends on the binding right? In case you use the "artifact binding" then theres also direct communication between SP and IdP. I havent seen it in the wild and I am also no professional, but I saw it in the 2.0 standard, e.g., see <a href="https://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0-cd-02.html#5.1.3.SP-Initiated%20SSO:%20%20POST/Artifact%20Bindings|outline" rel="nofollow">https://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-...</a></p>
]]></description><pubDate>Wed, 24 Jul 2024 16:15:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=41058575</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=41058575</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41058575</guid></item><item><title><![CDATA[New comment by honzaik in "Deep Dive into XZ Utils Backdoor [video]"]]></title><description><![CDATA[
<p>I watched the TC interview with Durov (Telegram) and apart from it being a big Telegram ad what struck me is that he told a story about his employee being approached by "an intelligence agency" and asked to reveal information about what open-source libraries they use.<p>It is kind of strange since their apps are supposed to be open source, maybe he meant the backend? Nonetheless, it seems this has been their modus operandi for a long time.</p>
]]></description><pubDate>Tue, 30 Apr 2024 07:50:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=40208295</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=40208295</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40208295</guid></item><item><title><![CDATA[New comment by honzaik in "TwitchAdSolutions – Blocking Twitch Ads"]]></title><description><![CDATA[
<p>These solutions are not perfect and typically stop working after a certain time because they patch it/unintentionally break it.<p>The only reliable solution I found is to VPN to some non-western country where they typically don't have advertisers. Of course, this brings a load of other issues :`).</p>
]]></description><pubDate>Mon, 15 Apr 2024 14:50:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=40041324</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=40041324</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40041324</guid></item><item><title><![CDATA[New comment by honzaik in "XZ backdoor story – Initial analysis"]]></title><description><![CDATA[
<p>I mean it highly depends on the CPU so I only posted it to show the relative slowdown compared to ECDSA. I ran this on my free tier Google Cloud server so it is not some super CPU.<p>However yes, even on this, not so powerful CPU, it doesnt take 500ms so I dont think it explains it.</p>
]]></description><pubDate>Sat, 13 Apr 2024 11:20:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=40022300</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=40022300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40022300</guid></item><item><title><![CDATA[New comment by honzaik in "XZ backdoor story – Initial analysis"]]></title><description><![CDATA[
<p>Another interesting thing regarding the ECC is they use Ed448, compared to something conventional like ECDSA with P-256 or Ed25519, which is way slower (30x-ish slower verification):<p>(OpenSSL benchmark numbers)<p><pre><code>                              sign/s verify/s

   256 bits ecdsa (nistp256)   34642.6 11700.3

                              sign/s verify/s

   456 bits EdDSA (Ed448)   3209.5 409.5
</code></pre>
There is basically no incentive to use Ed448 unless you think ECDSA with 256-bit curves is insecure or will become in the near future.</p>
]]></description><pubDate>Sat, 13 Apr 2024 10:12:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=40021928</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=40021928</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40021928</guid></item><item><title><![CDATA[New comment by honzaik in "Recent 'MFA Bombing' Attacks Targeting Apple Users"]]></title><description><![CDATA[
<p>I am confused. What does happen after clicking allow? Does Apple just provide a password reset form to the person on the iForgot website or does it show up only on the device?</p>
]]></description><pubDate>Wed, 27 Mar 2024 08:43:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=39836779</link><dc:creator>honzaik</dc:creator><comments>https://news.ycombinator.com/item?id=39836779</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39836779</guid></item></channel></rss>