<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jeffmcjunkin</title><link>https://news.ycombinator.com/user?id=jeffmcjunkin</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 08:05:59 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jeffmcjunkin" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by jeffmcjunkin in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>Can confirm.</p>
]]></description><pubDate>Tue, 07 Apr 2026 22:49:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47682353</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=47682353</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47682353</guid></item><item><title><![CDATA[Google releases Gemma 4 open models]]></title><description><![CDATA[
<p>Article URL: <a href="https://deepmind.google/models/gemma/gemma-4/">https://deepmind.google/models/gemma/gemma-4/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47616361">https://news.ycombinator.com/item?id=47616361</a></p>
<p>Points: 1810</p>
<p># Comments: 473</p>
]]></description><pubDate>Thu, 02 Apr 2026 16:10:54 +0000</pubDate><link>https://deepmind.google/models/gemma/gemma-4/</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=47616361</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47616361</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Kerberoasting"]]></title><description><![CDATA[
<p>I absolutely agree that Microsoft could do better, but they are making progress in removing support entirely for broken (from a security perspective) older protocols such as NTLMv1 (which uses DES as well: more here -- <a href="https://bit.ly/crackingntlmv1" rel="nofollow">https://bit.ly/crackingntlmv1</a>) and SMB1.<p>The financial incentives drive Microsoft to support every possible (mis)configuration, forever. It's the tireless work of a few folk at Microsoft like Ned Pyle, Steve Syfus, and Mark Morowczynski that have landed the changes so far.<p>There could absolutely be a "security check" tool deployed by default with Server 2025 or similar that looks for Kerberoastable user accounts (any account with a ServicePrincipalName is technically Kerberoastable, like computer accounts), AS-REP roastable accounts, weak encryption types, etc. That would probably get more traction than changing defaults out of the box for everyone, as that's another way to phrase "breaking customer environments when they upgrade".</p>
]]></description><pubDate>Wed, 10 Sep 2025 23:09:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45205367</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=45205367</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45205367</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Kerberoasting"]]></title><description><![CDATA[
<p>The RC4 encryption type correlates to the DES hash (more commonly the "NT" hash), so PingCastle has the right warning.</p>
]]></description><pubDate>Wed, 10 Sep 2025 23:00:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45205275</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=45205275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45205275</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "I bought the cheapest EV, a used Nissan Leaf"]]></title><description><![CDATA[
<p>KeySavvy is the normal workaround for this. $99 extra cost to both sides for them to handle the title verification and shipping, and to act as the dealer to make it qualify for EV credits.</p>
]]></description><pubDate>Fri, 05 Sep 2025 23:19:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=45144868</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=45144868</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45144868</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Introducing Gemma 3n"]]></title><description><![CDATA[
<p>Thank you, this was affecting me too.</p>
]]></description><pubDate>Fri, 27 Jun 2025 04:29:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=44393710</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=44393710</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44393710</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "CLP Calculus Textbooks"]]></title><description><![CDATA[
<p>From <a href="https://personal.math.ubc.ca/~CLP/about/" rel="nofollow">https://personal.math.ubc.ca/~CLP/about/</a> :<p>> For various reasons we have christened these notes “CLP” - none of those reasons can be found [here](<a href="https://en.m.wikipedia.org/wiki/CLP" rel="nofollow">https://en.m.wikipedia.org/wiki/CLP</a>)<p>Presumably it's an inside joke or something.</p>
]]></description><pubDate>Sat, 12 Apr 2025 20:01:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=43667503</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=43667503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43667503</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Colorado scrambles to change voting-system passwords after accidental leak"]]></title><description><![CDATA[
<p>Recently, yes :)<p><a href="https://www.cnn.com/2023/08/06/us/oregon-drivers-pump-own-fuel-law/index.html" rel="nofollow">https://www.cnn.com/2023/08/06/us/oregon-drivers-pump-own-fu...</a></p>
]]></description><pubDate>Sat, 02 Nov 2024 22:40:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=42029747</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=42029747</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42029747</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "What I've Learned in the Past Year Spent Building an AI Video Editor"]]></title><description><![CDATA[
<p>We don't advance as a society unless people ask new questions. Having folk willing to spend some time answering those questions (in public, no less!) helps others. It's really, really damn hard to predict how advancements in one area can help another.<p>All that said, thanks for your interesting new question, and thanks for spending time on it :D</p>
]]></description><pubDate>Tue, 24 Sep 2024 17:37:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=41638985</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=41638985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41638985</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Ping Ff02:1"]]></title><description><![CDATA[
<p>Title needs a small fix, it should be `ping ff02::1` (with two colons) to be a valid IPv6 address, match the actual command, and match the original title.</p>
]]></description><pubDate>Tue, 28 May 2024 17:20:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=40503060</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=40503060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40503060</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Backblaze Scales Storage Cloud"]]></title><description><![CDATA[
<p>FWIW I've heard the term "dark fiber" used in both ways as well. Whenever there's ambiguity in jargon, I just avoid that jargon and use more words to describe the actual concept.</p>
]]></description><pubDate>Tue, 21 May 2024 19:09:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=40432526</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=40432526</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40432526</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "BlackCat ransomware group implodes after apparent payment by Change Healthcare"]]></title><description><![CDATA[
<p>That helps with "we've encrypted your data; pay us for the key" but doesn't help you with "we've made copies of your patient records, leadership's emails; pay us or we publish it all".<p>The phrase to describe this is double extortion.<p>As for your question, <a href="https://www.cisa.gov/stopransomware" rel="nofollow">https://www.cisa.gov/stopransomware</a> is a decent start, but it's a complicated issue. In short, if a pentester can get inside your environment and gain privileges, so can an attacker. You want to slow down attackers enough to buy time for detection and response capabilities.</p>
]]></description><pubDate>Wed, 06 Mar 2024 03:33:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=39612011</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=39612011</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39612011</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (Fixed)"]]></title><description><![CDATA[
<p>Sorry, it was alluded to elsewhere: <a href="https://infosec.exchange/@iagox86/112045097519922098" rel="nofollow">https://infosec.exchange/@iagox86/112045097519922098</a><p>There's more to the story that Rapid7 didn't want to air publicly, and none of it is good for JetBrains.</p>
]]></description><pubDate>Tue, 05 Mar 2024 22:43:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=39610083</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=39610083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39610083</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (Fixed)"]]></title><description><![CDATA[
<p>Yup, silently patching (like JetBrains did) has a lot of downsides. Let alone the deception from JetBrains to the Rapid7 team.<p>(Disclosure: I know some of the folk on the Rapid7 side, so I'm perhaps biased towards their interpretation of events)</p>
]]></description><pubDate>Tue, 05 Mar 2024 19:41:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=39608289</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=39608289</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39608289</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Encrypted Client Hello"]]></title><description><![CDATA[
<p>For whatever reason, Domain Fronting is considered more of an attack behavior, used by red teamers and penetration testers. Doubling down on that behavior likely didn't seem as appealing from a PR perspective.</p>
]]></description><pubDate>Fri, 29 Sep 2023 15:28:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=37705670</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=37705670</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37705670</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "x86 is dead, long live x86"]]></title><description><![CDATA[
<p>Ahem, that's _9000_.</p>
]]></description><pubDate>Mon, 31 Jul 2023 18:52:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=36947163</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=36947163</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36947163</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Does Company ‘X’ have an Azure Active Directory Tenant?"]]></title><description><![CDATA[
<p>Nearly 100% have on-prem AD (full name: "Active Directory: Domain Services"). Azure AD is a separate identity provider -- to a first approximation it's HTTPS and cookies, not Kerberos, LDAP, and Ticket-Granting Tickets that we see on-prem.</p>
]]></description><pubDate>Sat, 01 Oct 2022 13:50:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=33046573</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=33046573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33046573</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Does Company ‘X’ have an Azure Active Directory Tenant?"]]></title><description><![CDATA[
<p>In contrast, the vast majority of companies with Azure AD also have on-prem AD (full name: "Active Directory: Domain Services") with some type of synchronization between them. Usually this amounts to having an on-prem service that shleps password hashes (technically salted, stretched hashed versions of the on-prem hashes) to Azure.</p>
]]></description><pubDate>Sat, 01 Oct 2022 13:49:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=33046565</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=33046565</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33046565</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "T-Mobile: Breach Exposed SSN/DOB of 40M+ People"]]></title><description><![CDATA[
<p>Smart cards are essentially a big Secure Enclave themselves.<p>The whole point of a smart card (same as a military CAC, and almost the same as a TPM chip on computers) is to sign operations using the private key, without allowing export of that private key. They're still made of atoms, like all objects, and susceptible to physical key extraction attacks.</p>
]]></description><pubDate>Wed, 18 Aug 2021 19:14:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=28225851</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=28225851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28225851</guid></item><item><title><![CDATA[New comment by jeffmcjunkin in "Privilege escalation with polkit: How to get root on Linux with a seven-year-ol"]]></title><description><![CDATA[
<p>Title doesn't quite fit, how about this instead?<p>"Privilege escalation with polkit: Rooting Linux with a 7-year-old bug"</p>
]]></description><pubDate>Fri, 11 Jun 2021 00:06:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=27467706</link><dc:creator>jeffmcjunkin</dc:creator><comments>https://news.ycombinator.com/item?id=27467706</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27467706</guid></item></channel></rss>