<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: iscoelho</title><link>https://news.ycombinator.com/user?id=iscoelho</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 14 May 2026 15:23:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=iscoelho" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by iscoelho in "Microsoft BitLocker – YellowKey zero-day exploit"]]></title><description><![CDATA[
<p>If the device does not have BitLocker, WinRE already by default provides full Administrator access to the unencrypted disk via Command Prompt.<p>> I think that level of pushback against the claims is a valid (and small) amount of "downplaying". I haven't seen anyone claiming this isn't a serious issue.<p>If you look in the other threads about this, it's much more obvious. Look for brand new users. There's comparatively few in this thread, but the pattern is there: if the user's name is green, they're downplaying this.</p>
]]></description><pubDate>Thu, 14 May 2026 07:21:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=48132130</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=48132130</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48132130</guid></item><item><title><![CDATA[New comment by iscoelho in "Microsoft BitLocker – YellowKey zero-day exploit"]]></title><description><![CDATA[
<p>If the device doesn't have BitLocker, this exploit is pointless because you can already boot any OS USB and immediately have full access to the unencrypted disk.<p>This exploit is only ever relevant with BitLocker enabled (as a method to "bypass" BitLocker's security premise [categorically classifying this as, dare I say, a "BitLocker bypass"]).<p>To avoid typing 1)2)3)4) a bunch of more times, I'll just say 2/3/4) all still fit the definition of downplaying the situation.</p>
]]></description><pubDate>Thu, 14 May 2026 07:06:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=48132048</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=48132048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48132048</guid></item><item><title><![CDATA[New comment by iscoelho in "Microsoft BitLocker – YellowKey zero-day exploit"]]></title><description><![CDATA[
<p>1) Except that the entire premise behind BitLocker TPM's security relies on the login screen as a hard security boundary, and thus any attack on the login screen is an attack on BitLocker. It is semantics to dispute this and certainly fits "downplaying."<p>2) I'm sure many organizations are thankful that the researcher has decided not to release that exploit chain at this time. I am hopeful that Microsoft will not be as dismissive and will resolve it before it is publicly released.<p>3) It distracts from the point. The point is that Microsoft's security record is so bad that many of the vulnerabilities appear deliberate and obvious enough to be backdoors.<p>4) Yes, this also fits the definition of downplaying.</p>
]]></description><pubDate>Thu, 14 May 2026 06:43:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=48131914</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=48131914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48131914</guid></item><item><title><![CDATA[New comment by iscoelho in "Mystery Microsoft bug leaker keeps the zero-days coming"]]></title><description><![CDATA[
<p>Considering the researcher had already reported these to Microsoft, and delayed releasing them publicly until Microsoft "pulled every childish game possible" (quote) instead of patching them, it's not unreasonable for the researcher to be withholding another exploit from the public to limit harm.<p>I also disagree that the PIN bypass would be "10 times more impressive," but that's just my professional opinion.</p>
]]></description><pubDate>Thu, 14 May 2026 06:13:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=48131723</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=48131723</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48131723</guid></item><item><title><![CDATA[New comment by iscoelho in "Microsoft BitLocker – YellowKey zero-day exploit"]]></title><description><![CDATA[
<p>What's with all the replies on these threads downplaying this? Why is it mainly brand new accounts? What's going on here?<p>I've seen every variant of:<p>1) "this is an authentication/privilege escalation bug, not a bitlocker exploit" (? what are you even trying to say)<p>2) "even though the attacker explicitly warns that this is capable of bypassing TPM+PIN, that isn't actually true or what he meant"<p>3) "we shouldn't jump to conclusions that this is a backdoor"<p>4) "we already knew BitLocker with just TPM isn't secure" (? except many organizations depend on it to be)</p>
]]></description><pubDate>Thu, 14 May 2026 05:31:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=48131443</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=48131443</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48131443</guid></item><item><title><![CDATA[New comment by iscoelho in "Mystery Microsoft bug leaker keeps the zero-days coming"]]></title><description><![CDATA[
<p>That’s quite a stretch, to say the least.</p>
]]></description><pubDate>Thu, 14 May 2026 05:26:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=48131415</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=48131415</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48131415</guid></item><item><title><![CDATA[New comment by iscoelho in "Despite doubts, federal cyber experts approved Microsoft cloud service"]]></title><description><![CDATA[
<p>But it doesn't. Full authentication bypass exploits are extremely rare and unheard of among tech giants. Maybe account takeover/recovery, sure, but full bypass? It just never happens.<p>Microsoft goes beyond that: they've managed to have a critical vulnerability in almost every authentication product they have ever created. It's exceptional.</p>
]]></description><pubDate>Wed, 18 Mar 2026 18:52:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47429859</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=47429859</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47429859</guid></item><item><title><![CDATA[New comment by iscoelho in "Despite doubts, federal cyber experts approved Microsoft cloud service"]]></title><description><![CDATA[
<p>I knew there was another incident that I was forgetting, insanity... I don't understand how Microsoft keeps getting away with this and everyone just forgets.</p>
]]></description><pubDate>Wed, 18 Mar 2026 15:51:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47427311</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=47427311</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47427311</guid></item><item><title><![CDATA[New comment by iscoelho in "Despite doubts, federal cyber experts approved Microsoft cloud service"]]></title><description><![CDATA[
<p>Microsoft has <i>never</i> been good at security, and that is why their centralization to cloud is absolutely terrifying.<p>I'm reminded of Storm-0558 [1] where a stolen signing key was able to forge authentication tokens for any MSA / Azure AD / Government AD user. They downplayed the severity. Just imagine if that level of access was used to pull a Stryker on a nation-wide scale. That is an economic disaster waiting to happen.<p>[1] <a href="https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/" rel="nofollow">https://www.microsoft.com/en-us/security/blog/2023/07/14/ana...</a></p>
]]></description><pubDate>Wed, 18 Mar 2026 15:22:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47426921</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=47426921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47426921</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>I'd use WireGuard in that case. The main reason WireGuard is popular at all is because it is approachable. IPsec is much more complicated and is designed for network engineers, not users.</p>
]]></description><pubDate>Wed, 14 Jan 2026 19:35:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46621579</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46621579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46621579</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>That's a large packet benchmark, not mixed packet size, and it <i>just barely</i> hits it. If you need consistent 10Gbps for a business use case, I would not consider that sufficient.<p>> "To me, the bulk of Tailscale's overhead comes from the fact that the dataplane is running between user and kernel space."<p>Yes and no, it's more complicated. DPDK is the industry standard library for fast packet processing, and it is in entirely user space. The Linux kernel netstack is just not very fast.</p>
]]></description><pubDate>Wed, 14 Jan 2026 19:28:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46621447</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46621447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46621447</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>Mikrotik can be popular for CE (Customer Edge) devices, that is correct. Those are not ISPs however, those are customers.</p>
]]></description><pubDate>Wed, 14 Jan 2026 19:12:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46621110</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46621110</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46621110</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>CE (Customer Edge) is what you are referring to. ISPs would be the PE (Provider Edge). I am aware it can be popular for SMB CE devices, however that is simply not the case for PE devices.<p>Service Provider ISPs cannot use Mikrotik - It is impossible. RouterOS supports none of the features required for a service provider. VRFs are even still unsupported in HW [1]. I am confused why this is even a discussion as anyone with experience working at an ISP/SP would come to the same conclusion.<p>[1] <a href="https://help.mikrotik.com/docs/spaces/ROS/pages/62390319/L3+Hardware+Offloading" rel="nofollow">https://help.mikrotik.com/docs/spaces/ROS/pages/62390319/L3+...</a></p>
]]></description><pubDate>Wed, 14 Jan 2026 19:11:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46621094</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46621094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46621094</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>AWS/GCE/Azure's network implementations pre-date EVPN and are proprietary to their cloud. EVPN is for on-premise. You don't exactly have the opportunity to use their implementation unless you are on their cloud, so I am not sure comparing the merits of either is productive.</p>
]]></description><pubDate>Wed, 14 Jan 2026 08:59:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46613867</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46613867</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46613867</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>I'm curious what you classify as a business ISP?<p>Take a look at AMS-IX, one of the largest internet exchanges: <a href="https://bgp.tools/ixp/AMS-IX" rel="nofollow">https://bgp.tools/ixp/AMS-IX</a><p>21/1020 (2%) of all peers are Mikrotik. 15 (1.4%) of those are >=1000mbps. 7 (0.6%) of those are 10gbps. None are larger than 10gbps.</p>
]]></description><pubDate>Wed, 14 Jan 2026 08:38:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46613732</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46613732</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46613732</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>wireguard-go is indeed very slow. For example, the official WireGuard Mac client uses it, and performance on my M1 Max is CPU capped at 200Mbps. The kernel WireGuard implementation available for Linux is certainly faster, but I would not consider it fast.<p>Tailscale however, although it derives from WireGuard libraries and the protocol, is really not WireGuard at all- so comparing it is a bit apples to oranges. With that said, it is still entirely userspace and its performance is less than stellar.</p>
]]></description><pubDate>Wed, 14 Jan 2026 08:17:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46613600</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46613600</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46613600</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>I have not seen a case where I could not source a Juniper switch (for example) for lower $/port than Mikrotik, even at 400GE. It is unheard of to pay MSRP. YMMV.</p>
]]></description><pubDate>Wed, 14 Jan 2026 08:09:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46613552</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46613552</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46613552</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>VXLAN is used in cloud/virtualization networks commonly. VM HA/migration becomes trivial with VXLAN. It also replaces L3VPN/VRFs for private networks.</p>
]]></description><pubDate>Wed, 14 Jan 2026 00:00:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46610377</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46610377</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46610377</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>I don't disagree (:<p>Though there are definitely use cases where it is needed, and it is way easier to implement earlier than later.</p>
]]></description><pubDate>Tue, 13 Jan 2026 23:52:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46610281</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46610281</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46610281</guid></item><item><title><![CDATA[New comment by iscoelho in "Ask HN: Vxlan over WireGuard or WireGuard over Vxlan?"]]></title><description><![CDATA[
<p>If I can source an enterprise Cisco/Juniper/Arista ASIC switch that is 1) rock-solid 2) full featured 3) cheaper - which I can - there is unfortunately no rationale where Mikrotik would be applicable in any professional project of mine.<p>With that said, I love Mikrotik for what it is: it is very approachable and it fills a niche. I believe it has added a lot of value to the industry and I'm excited to see their products mature.</p>
]]></description><pubDate>Tue, 13 Jan 2026 23:49:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46610233</link><dc:creator>iscoelho</dc:creator><comments>https://news.ycombinator.com/item?id=46610233</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46610233</guid></item></channel></rss>