<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jamesmotherway</title><link>https://news.ycombinator.com/user?id=jamesmotherway</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 10 Apr 2026 05:52:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jamesmotherway" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Widespread Data Theft Targets Salesforce Instances via Salesloft Drift]]></title><description><![CDATA[
<p>Article URL: <a href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift/">https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45043522">https://news.ycombinator.com/item?id=45043522</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 27 Aug 2025 18:54:07 +0000</pubDate><link>https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift/</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=45043522</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45043522</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Favicon Hasher – An Osint Tool"]]></title><description><![CDATA[
<p>I've used favicons (along with analytics IDs) to identify related malicious sites. You can also apply this to detect brand abuse and phishing pages.</p>
]]></description><pubDate>Tue, 25 Feb 2025 16:56:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=43174382</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=43174382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43174382</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Apple pulls data protection tool after UK government security row"]]></title><description><![CDATA[
<p>See the "Data categories and encryption" section:<p>"The table below provides more detail on how iCloud protects your data when using standard data protection or Advanced Data Protection."<p><a href="https://support.apple.com/en-us/102651" rel="nofollow">https://support.apple.com/en-us/102651</a></p>
]]></description><pubDate>Fri, 21 Feb 2025 16:13:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=43129220</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=43129220</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43129220</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Why does storing 2FA codes in your password manager make sense?"]]></title><description><![CDATA[
<p>Sorry, I overlooked part of your post earlier - I'm tired. As I previously alluded to, I don't use passkeys due to concerns about their implementation. Whether passkeys are better than TOTP really depends on the individual user's circumstances.<p>Which service is it? Do they ever use that password?<p>If I were used to signing in with a passkey, I'd find a password prompt suspicious. While the average person might not, it's also possible they would have forgotten the password entirely. There are other services that force TOTP even with hardware keys enrolled. Technically they can be phished, but it would not be successful in all cases.<p>Unfortunately, varying behavior and support for multifactor protocols (along with risky reset flows) makes it hard to give blanket recommendations.</p>
]]></description><pubDate>Thu, 02 Jan 2025 03:30:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=42571358</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42571358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42571358</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Why does storing 2FA codes in your password manager make sense?"]]></title><description><![CDATA[
<p>Hardware keys and passkeys are better because they can't be phished. In the case of hardware keys, one should register multiple to prevent lockout. Most implementations of passkeys seem to be portable, letting them exist on multiple devices (something that gives me pause).<p>If an adversary can successfully phish someone, they can often also trick them into providing TOTP codes or approving push notifications. However, TOTP remains significantly better than the alternatives, as it prevents credential stuffing attacks and SMS-related compromises while potentially limiting any account breach to a single session.</p>
]]></description><pubDate>Wed, 01 Jan 2025 18:54:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=42568182</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42568182</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42568182</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Why does storing 2FA codes in your password manager make sense?"]]></title><description><![CDATA[
<p>If the vault requires a hardware key and master password to access the encrypted password and token, would you still describe it as single-factor authentication?</p>
]]></description><pubDate>Wed, 01 Jan 2025 18:45:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=42568108</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42568108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42568108</guid></item><item><title><![CDATA[New comment by jamesmotherway in "More telcos confirm Salt Typhoon breaches as White House weighs in"]]></title><description><![CDATA[
<p>China-nexus threat actors tend to be focused on espionage, including intellectual property theft. "Prepositioning" is a more recent observation, but it doesn't mean a war is inevitable. While it would be useful in that scenario, in others it may act only as a deterrent. Everyone should hope a war does not occur.<p>The NSA and CIA are neither able nor authorized to defend all privately-owned critical infrastructure. While concerns about agency oversight are warranted, I can assure you that spying on the population is not their top priority. It's abundantly clear that foreign threats aren't confined to their own geographies and networks. That can't be addressed without having the capability to look inward.<p>Secure by Design is an initiative led by CISA, which frequently shares guidance and threat reporting from the NSA and their partners. Unfortunately, they also can't unilaterally secure the private sector overnight.<p>These are difficult problems. Critical infrastructure owners and operators need to rise to the challenge we face.</p>
]]></description><pubDate>Tue, 31 Dec 2024 19:13:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=42561025</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42561025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42561025</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Apple Photos phones home on iOS 18 and macOS 15"]]></title><description><![CDATA[
<p>Is your system configured to share analytics and diagnostics? I disable both, and when a crash occurs, I receive a dialog with an "ignore" option.</p>
]]></description><pubDate>Mon, 30 Dec 2024 22:29:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=42554253</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42554253</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42554253</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Personal Mail Server on OpenBSD (2019)"]]></title><description><![CDATA[
<p>Bad actors frequently use BuyVM's services, also known as FranTech and Ponynet. Their popularity with Tor operators probably doesn't help how their network traffic is perceived either. As a result, organizations may handle traffic from their ASNs unfavorably.<p>I don't have a personal opinion about the company; however, email is important enough that it's worth considering edge cases and future scenarios.</p>
]]></description><pubDate>Mon, 30 Dec 2024 22:17:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=42554150</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42554150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42554150</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Unidentified Drones Light Up New Jersey's Skies, Baffling Residents"]]></title><description><![CDATA[
<p><a href="https://archive.is/NKPrR" rel="nofollow">https://archive.is/NKPrR</a></p>
]]></description><pubDate>Wed, 11 Dec 2024 02:06:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=42383943</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42383943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42383943</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Simple Sabotage for the 21st Century – Specific Suggestions"]]></title><description><![CDATA[
<p>I'm assuming by "significant" you mean an attack on critical infrastructure.<p>That's a strategic capability that very likely requires multiple attack chains, not a single exploit. For Western countries, cost is probably the least significant factor in deciding to use it.<p>One would want to be certain that option is available, but only when absolutely necessary. Using it on a random Tuesday would take that particular option off the table forever. Best case scenario, Russia discovers the means by which the attack was carried out. Worst case, they retaliate with nuclear weapons.<p>Globally, I believe there are only a few countries capable of executing such a plan.</p>
]]></description><pubDate>Sat, 30 Nov 2024 01:23:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=42278658</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42278658</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42278658</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Malware can turn off webcam LED and record video, demonstrated on ThinkPad X230"]]></title><description><![CDATA[
<p>The X230 is still relevant for those who want a ThinkPad that supports Libreboot (an alternative firmware without proprietary components). I personally found this demonstration interesting; users of these devices often believe they're at risk of targeted attacks.</p>
]]></description><pubDate>Thu, 28 Nov 2024 18:01:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=42267311</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42267311</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42267311</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Malware can turn off webcam LED and record video, demonstrated on ThinkPad X230"]]></title><description><![CDATA[
<p>I'm inclined to believe it. If someone managed to prove Apple's lying about it, there would be serious reputational (and other) risks to their business. I also can't imagine how they would benefit from such a fabrication.<p>That said, I still use "Nanoblock" webcam covers and monitor for when either the camera or microphone are activated.</p>
]]></description><pubDate>Thu, 28 Nov 2024 16:58:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=42266787</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42266787</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42266787</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Malware can turn off webcam LED and record video, demonstrated on ThinkPad X230"]]></title><description><![CDATA[
<p>"All Apple silicon-based Mac notebooks and Intel-based Mac notebooks with the Apple T2 Security Chip feature a hardware disconnect that disables the microphone whenever the lid is closed. On all 13-inch MacBook Pro and MacBook Air notebooks with the T2 chip, all MacBook notebooks with a T2 chip from 2019 or later, and Mac notebooks with Apple silicon, this disconnect is implemented in hardware alone." [1]<p>[1] <a href="https://support.apple.com/guide/security/hardware-microphone-disconnect-secbbd20b00b/web" rel="nofollow">https://support.apple.com/guide/security/hardware-microphone...</a></p>
]]></description><pubDate>Thu, 28 Nov 2024 02:22:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=42261825</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42261825</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42261825</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Security researchers identify new malware targeting Linux"]]></title><description><![CDATA[
<p>Threat actors don't create malware to impress people; they do it to accomplish their goals. Apparently, this sample was sufficient for them.<p>Security companies attribute activity based on their observations. ESET- a Slovakian company- is no exception.</p>
]]></description><pubDate>Fri, 22 Nov 2024 02:48:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=42210706</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42210706</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42210706</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Why NSA Rules Say No to Smartphones, No to Texting, Yes to Podcasts"]]></title><description><![CDATA[
<p>The NSA publishes excellent cybersecurity resources:<p><a href="https://www.nsa.gov/press-room/cybersecurity-advisories-guidance/" rel="nofollow">https://www.nsa.gov/press-room/cybersecurity-advisories-guid...</a><p>I've highlighted advisories that may give you some perspective, listed in chronological order:<p>Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations<p>Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure<p>North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs<p>PRC MSS Tradecraft in Action</p>
]]></description><pubDate>Tue, 19 Nov 2024 18:46:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42186799</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42186799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42186799</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Apple Intelligence notification summaries are pretty bad"]]></title><description><![CDATA[
<p>I understand where you're coming from, but Apple Intelligence is labelled as a beta feature.</p>
]]></description><pubDate>Tue, 19 Nov 2024 02:22:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=42179519</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=42179519</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42179519</guid></item><item><title><![CDATA[New comment by jamesmotherway in "U.S. Consumer Watchdog Cautions Businesses on Surveillance of Workers"]]></title><description><![CDATA[
<p>The alternative in many cases would be to install MDM software on one's personal device, which seems like the worse option to me.</p>
]]></description><pubDate>Fri, 25 Oct 2024 15:39:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=41946309</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=41946309</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41946309</guid></item><item><title><![CDATA[New comment by jamesmotherway in "FTC: Vast Surveillance of Users by Social Media and Video Streaming Companies"]]></title><description><![CDATA[
<p>Banks use various other services such as Early Warning. Still, it's absurd the lengths we need to go to for any level of assurance against fraud.</p>
]]></description><pubDate>Sat, 21 Sep 2024 14:47:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=41610348</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=41610348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41610348</guid></item><item><title><![CDATA[New comment by jamesmotherway in "Correlating Ownership of Sites Protected by Cloudflare"]]></title><description><![CDATA[
<p>Thanks for your feedback. I posted this because I've seen many people stop their analysis when they find a site is on Cloudflare.<p>Were you able to solve the challenge at the end?</p>
]]></description><pubDate>Sun, 15 Sep 2024 14:58:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=41547873</link><dc:creator>jamesmotherway</dc:creator><comments>https://news.ycombinator.com/item?id=41547873</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41547873</guid></item></channel></rss>