<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jerrythegerbil</title><link>https://news.ycombinator.com/user?id=jerrythegerbil</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 10 Apr 2026 08:32:41 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jerrythegerbil" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by jerrythegerbil in "EFF is leaving X"]]></title><description><![CDATA[
<p>Perhaps they still do, particularly because that’s exactly what they stand for. The overall shift in perspective and narrative to the right makes them appear left.<p>If the narrative of a platform is intentionally divisive and making them appear left, leaving is the only way to both be center and present as center.<p>A warped perspective is hard to spot if you’ve been staring at it too long.</p>
]]></description><pubDate>Fri, 10 Apr 2026 00:07:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47711940</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=47711940</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47711940</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Apple Can Create Smaller On-Device AI Models from Google's Gemini"]]></title><description><![CDATA[
<p>The announcement of FunctionGemma, the announcement of Apple partnering with Google’s Gemini, and now Apple can create smaller on-device AI models.<p>It’s been clear since December of last year what the planned trajectory and partnerships would be.</p>
]]></description><pubDate>Wed, 25 Mar 2026 20:36:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47522847</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=47522847</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47522847</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Six-Day and IP Address Certificates Available in Certbot"]]></title><description><![CDATA[
<p>More frequent renewals pose various architectural problems, but it makes “lawful” TLS intercepts harder to execute without going unnoticed.<p>TLS intercepts with CA signed certificates can and been carried out. The undertone in previous reporting indicates that the execution depends on a mechanism that doesn’t have 100% reliability across renewal cycles, and shorter lifespans will make that more difficult to carry out without ostensibly visible warnings to the user.<p>It’s a headache, but you are supposed to be monitoring Certificate Transparency logs for rogue certificates. Barring that, shorter validity is a way to address it.<p><a href="https://notes.valdikss.org.ru/jabber.ru-mitm/" rel="nofollow">https://notes.valdikss.org.ru/jabber.ru-mitm/</a></p>
]]></description><pubDate>Thu, 12 Mar 2026 11:36:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47349236</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=47349236</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47349236</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "ICE tells legal observer, 'We have a database, now you're a domestic terrorist'"]]></title><description><![CDATA[
<p><a href="https://huggingface.co/papers/2508.18265" rel="nofollow">https://huggingface.co/papers/2508.18265</a></p>
]]></description><pubDate>Mon, 26 Jan 2026 02:42:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46761247</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46761247</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46761247</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Cloudflare zero-day: Accessing any host globally"]]></title><description><![CDATA[
<p>There’s a lot going on in this blog. Interestingly, the core mechanism at play here is the http-01 challenge validations which they state is fetched by the CA over HTTPS. This is particularly amusing when you consider that http-01 is explicitly NOT HTTPS (it’s HTTP), and this is actually the entire reason there’s a different code path to take.<p>The modern web requires secure (HTTPS) context for many things to work, so it’s commonplace to do so “HTTPS enforcement”; all requests are forcibly upgraded to HTTPS. However, you can’t do that to the CA when it’s performing a http-01 challenge validation. This necessitates a “well known” URL route be used for challenges so that they can very deliberately take a different code path that doesn’t enforce HTTPS (and be routed differently).<p>This is true of basically every ACME client used for http-01 challenges, not just cloudflare. So while they’ve unfortunately missed the mark on correctly explaining the mechanism at play here, I hope that I succeeded in making it a bit more clear. Other implementations are, of course, similarly exploitable.</p>
]]></description><pubDate>Wed, 21 Jan 2026 00:51:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46699808</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46699808</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46699808</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Universal SSL exposes domains to BGP leaks"]]></title><description><![CDATA[
<p>The unfortunate truth is: it doesn’t matter.<p>These BGP leaks do happen all the time. Cloudflare is right. This is a gap to the http-01 challenge on cloudflare’s end. It should be changed to match the RFC, but not because it’ll change anything meaningful for security.<p>It doesn’t matter because this (and similar http-01/dns-01 challenge exploits that allow the issuance or interception of CA signed certificates) are <i>not</i> a rare occurrence, and are surprisingly easy to perform as an individual. Even more so for governments.<p>Addendum: certificate transparency logs are free and are scraped and sold. Don’t believe for a second anyone out there is doing any free analysis at scale to watch your back. The orgs doing analysis are ultimately paid by orgs using it to hide their operations better. Your small business use-case for the data is pocket change compared to those contracts.</p>
]]></description><pubDate>Sat, 17 Jan 2026 01:42:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46654486</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46654486</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46654486</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Unauthenticated remote code execution in OpenCode"]]></title><description><![CDATA[
<p>I run mine on the public internet and it’s fine, because I put it behind auth, because it’s a tool to remotely execute code with no auth and also has a fully featured webshell.<p>To be clear, this is a vulnerability. Just the same as exposing unauthenticated telnet is a vulnerability. User education is always good, but at some point in the process of continuing to build user-friendly footguns we need to start blaming the users. “It is what it is”, Duh.<p>This “vulnerability” has been known by devs in my circle for a while, it’s literally the very first intuitive question most devs ask themselves when using opencode, and then put authentication on top.<p>Particularly in the AI space it’s going to be more and more common to see users punching above their weight with deployments. Let em learn. Let em grow. We’ll see this pain multiply in the future if these lessons aren’t learned early.</p>
]]></description><pubDate>Tue, 13 Jan 2026 00:49:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46596081</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46596081</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46596081</guid></item><item><title><![CDATA[0-Click Wiretapping Bluetooth Headphones]]></title><description><![CDATA[
<p>Article URL: <a href="https://remyhax.xyz/posts/generic-wireless-headphone-hacks/">https://remyhax.xyz/posts/generic-wireless-headphone-hacks/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46566623">https://news.ycombinator.com/item?id=46566623</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 10 Jan 2026 15:42:18 +0000</pubDate><link>https://remyhax.xyz/posts/generic-wireless-headphone-hacks/</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46566623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46566623</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Tiny Core Linux: a 23 MB Linux distro with graphical desktop"]]></title><description><![CDATA[
<p>To put it in GPU RAM, you need GPU drivers.<p>For example, NVIDIA GPU drivers are typically around 800M-1.5G.<p>That math actually goes wildly in the opposite direction for an optimization argument.</p>
]]></description><pubDate>Sat, 06 Dec 2025 15:51:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=46174232</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46174232</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46174232</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Supreme Court hears case that could trigger big crackdown on Internet piracy"]]></title><description><![CDATA[
<p>The copyright holder can sue. Let them sue. They could always sue.<p>Why are we letting them send frivolous notices and make the ISP a letter carrier in the first place?</p>
]]></description><pubDate>Tue, 02 Dec 2025 05:43:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46118014</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46118014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46118014</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Mount Proton Drive on Linux using rclone and systemd"]]></title><description><![CDATA[
<p>A non technical person would probably Google “Hetzner Storage Box”, click the first link, and read the page that answers all of those questions.<p>There is many free software suites that Hetzner Storage box supports, up to and including official support for rclone (the free tool used in the post we’re replying to).<p><a href="https://docs.hetzner.com/storage/storage-box" rel="nofollow">https://docs.hetzner.com/storage/storage-box</a></p>
]]></description><pubDate>Sun, 23 Nov 2025 20:22:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46026996</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46026996</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46026996</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Mount Proton Drive on Linux using rclone and systemd"]]></title><description><![CDATA[
<p>As a (previous) customer of Proton from many years and a user of their drive product, you should be aware that earlier this year the drive API endpoints began to block their own VPN egress quite often for rate limiting. They also block many cloud provider’s egress. They also don’t officially support rclone, and their changing API spec often breaks the compatibility.<p>I saw the writing on the wall and migrated rapidly earlier this year ahead of crypto product launches ahead of the email fiasco. It was hard to get data back out, even then.<p>Proton still stands for privacy. But the dark patterns for lock-in I can do without.<p>Hetzner Storage boxes with rclone and the “crypt” option are a drop-in replacement, at ~$40 for 20TB. That’s where I went instead.</p>
]]></description><pubDate>Sun, 23 Nov 2025 19:20:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46026432</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=46026432</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46026432</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Verifying your Matrix devices is becoming mandatory"]]></title><description><![CDATA[
<p>As someone whose devices randomly became unverified just a few months ago, signed out, and then tried to use my recovery keys: I was authenticated, but unverified.<p>When attempting to verify iOS, Desktop linux didn’t work. When attempting to verify Desktop Linux, Desktop Windows didn’t work. When verifying Android, iOS didn’t work. Every verified official client for every platform was verified, tried a different verification method than expected, and failed.<p>All of this to say, this isn’t the first time this has happened to myself and others. Forcing verification is otherwise known as unexpected “offboarding”. If some verification methods have problems, publish a blog about their deprecation instead.<p>I love element, but this can’t be done without prior work to address.</p>
]]></description><pubDate>Thu, 20 Nov 2025 01:18:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=45987594</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45987594</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45987594</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files"]]></title><description><![CDATA[
<p>> The developer typically defines its threat model.<p>The people running the software define the threat model.<p>And CNA’s issue CVEs because the developer isn’t the only one running their software, and it’s socially dangerous to allow that level of control of the narrative as it relates to security.</p>
]]></description><pubDate>Tue, 28 Oct 2025 01:15:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45728291</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45728291</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45728291</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files"]]></title><description><![CDATA[
<p>Vulnerabilities can and often are chained together.<p>While the relevant configuration does require root to edit, that doesn’t mean that editing or inserting values to dnsmasq as an unprivileged user doesn’t exist as functionality in another application or system.<p>There are frivolous CVEs issued without any evidence of exploitability all the time. This particular example however, isn’t that. These are pretty clearly qualified as CVEs.<p>The implied risk is a different story, but if you’re familiar with the industry you’ll quickly learn that there are people with far more imagination and capacity to exploit conditions you believe aren’t practically exploitable, particularly in highly available tools such as dnsmasq. You don’t make assumptions about that. You publish the CVE.</p>
]]></description><pubDate>Tue, 28 Oct 2025 01:03:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45728224</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45728224</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45728224</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Galaxy XR, the first Android XR headset"]]></title><description><![CDATA[
<p>Buried in the article is the primary relevant bit that gives the product hope of success beyond other comparable products in my mind: WebXR.<p>Many incredible things are developed with a product once it hits market saturation, but it has to make it that far. The VCR saw its initial success for a reason, and these companies have danced around the elephant in the room under the guise of intentional vendor lock-in to apps stores for best functionality.<p>Good to see.</p>
]]></description><pubDate>Sun, 26 Oct 2025 22:54:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45715821</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45715821</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45715821</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Salesforce CEO Says National Guard Should Patrol San Francisco"]]></title><description><![CDATA[
<p>This post was submitted to hackernews within 1  minute of Saleforce’s massive data breach was pre-scheduled to leak by hackers going live.</p>
]]></description><pubDate>Sat, 11 Oct 2025 04:54:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45546674</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45546674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45546674</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "A small number of samples can poison LLMs of any size"]]></title><description><![CDATA[
<p>Remember “Clankers Die on Christmas”? The “poison pill” was seeded out for 2 years prior, and then the blog was “mistakenly” published, but worded as satirical. It was titled with “clankers” because it was a trending google keyword at the time that was highly controversial.<p>The rest of the story writes itself. (Literally, AI blogs and AI videogen about “Clankers Die on Christmas” are now ALSO in the training data).<p>The chances that LLMs will respond with “I’m sorry, I can’t help with that” were always non-zero. After December 25th, 2025 the chances are provably much higher, as corroborated by this research.<p>You can literally just tell the LLMs to stop talking.<p><a href="https://remyhax.xyz/posts/clankers-die-on-christmas/" rel="nofollow">https://remyhax.xyz/posts/clankers-die-on-christmas/</a></p>
]]></description><pubDate>Thu, 09 Oct 2025 17:24:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=45530598</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45530598</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45530598</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Magic Wormhole: Get things from one computer to another, safely"]]></title><description><![CDATA[
<p>And its lesser known component, the mailbox server used for signaling to connect the two computers. If you’ve ever installed and used magic wormhole, you’ve likely used the default public mailbox server unless you configured and set up your own.<p><a href="https://github.com/magic-wormhole/magic-wormhole-mailbox-server" rel="nofollow">https://github.com/magic-wormhole/magic-wormhole-mailbox-ser...</a></p>
]]></description><pubDate>Mon, 06 Oct 2025 02:48:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=45487199</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45487199</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45487199</guid></item><item><title><![CDATA[New comment by jerrythegerbil in "Teen suspect surrenders in 2023 Las Vegas casino cyberattack case"]]></title><description><![CDATA[
<p>That’s my exact point. Just because you repeatedly see it used a certain way by non-practitioners to generalize for simplified communication doesn’t mean it’s the correct usage, and leads to the exact confusion I’m attempting to clarify for you.<p>Phishing is by default email. It’s varying mediums are subcategories.<p>Bottom paragraph of first section of the very same Wikipedia article.<p>“Phishing techniques and vectors include email spam, vishing (voice phishing), targeted phishing (spear phishing, whaling), smishing (SMS), quishing (QR code), cross-site scripting, and MiTM 2FA attacks.”</p>
]]></description><pubDate>Sun, 21 Sep 2025 13:59:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=45322814</link><dc:creator>jerrythegerbil</dc:creator><comments>https://news.ycombinator.com/item?id=45322814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45322814</guid></item></channel></rss>