<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jmsgwd</title><link>https://news.ycombinator.com/user?id=jmsgwd</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 09 May 2026 16:38:14 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jmsgwd" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by jmsgwd in "AWS North Virginia data center outage – resolved"]]></title><description><![CDATA[
<p>> The idea that AWS's services are fully regionalized or isolated has always been a myth.<p>This is highly misleading. It's true that there's a handful of global AWS services - but only their control planes operate from a single region (e.g. us-east-1). Their data planes are regionally isolated or globally distributed.[1]<p>The only time you'd normally use a service control plane is to deploy changes, e.g. when you create, read, update or delete service resources or update configuration during a change window.<p>Workloads should be designed for "static stability", as recommended by AWS.[2] A statically stable workload only depends upon the data planes of the services it uses at runtime. Statically stable workloads are designed to continue operating as normal even if there's a service event impairing one or more control planes (including for global services).<p>> During us-east-1 outages it's sometimes possible to continue using existing auth tokens or sessions in other regions, while not possible to grant new ones.<p>This is just plain wrong! The IAM Security Token Service (STS), which grants IAM tokens, is a data plane-only service and runs independently in each region [3]. The IAM data plane, which enforces access control, is also regional.<p>If the IAM control plane is impaired, you might not be able to create new IAM roles (a control plane operation) - but you can continue generating and using temporary credentials for existing IAM roles (data plane operations) within the region your workload is running in. This allows statically stable workloads to continue using IAM without interruption.<p>[1] <a href="https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/global-services.html" rel="nofollow">https://docs.aws.amazon.com/whitepapers/latest/aws-fault-iso...</a><p>"Global AWS services still follow the conventional AWS design pattern of separating the control plane and data plane in order to achieve static stability. The significant difference for most global services is that their control plane is hosted in a single AWS Region, while their data plane is globally distributed."<p>[2] <a href="https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/static-stability.html" rel="nofollow">https://docs.aws.amazon.com/whitepapers/latest/aws-fault-iso...</a><p>"...eliminating dependencies on control planes (the APIs that implement changes to resources) in your recovery path helps produce more resilient workloads."<p>[3] <a href="https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/appendix-a---partitional-service-guidance.html" rel="nofollow">https://docs.aws.amazon.com/whitepapers/latest/aws-fault-iso...</a><p>"STS is a data plane-only service that is separate from IAM, and does not depend on the IAM control plane."</p>
]]></description><pubDate>Sat, 09 May 2026 11:39:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=48074128</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=48074128</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48074128</guid></item><item><title><![CDATA[New comment by jmsgwd in "Two Months After I Gave an AI $100 and No Instructions"]]></title><description><![CDATA[
<p>But the fact that it's so boring is interesting.</p>
]]></description><pubDate>Tue, 14 Apr 2026 14:43:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47766306</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=47766306</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47766306</guid></item><item><title><![CDATA[New comment by jmsgwd in "Two Months After I Gave an AI $100 and No Instructions"]]></title><description><![CDATA[
<p>> In the beginning there was a cron<p>I thought you were paraphrasing John 1:1 for a moment! [1]<p>[1] <a href="https://en.wikipedia.org/wiki/John_1:1" rel="nofollow">https://en.wikipedia.org/wiki/John_1:1</a></p>
]]></description><pubDate>Tue, 14 Apr 2026 14:24:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47766060</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=47766060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47766060</guid></item><item><title><![CDATA[New comment by jmsgwd in "Apple Creator Studio"]]></title><description><![CDATA[
<p>How else could you represent piano roll data than as a stream of events? I thought that was ubiquitous since the invention of MIDI.<p>Are you saying other sequencers are unable to render the same data as piano roll and score?</p>
]]></description><pubDate>Tue, 13 Jan 2026 17:25:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=46604277</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46604277</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46604277</guid></item><item><title><![CDATA[New comment by jmsgwd in "Microsoft will finally kill obsolete cipher that has wreaked decades of havoc"]]></title><description><![CDATA[
<p>Are you referring to Windows Kerberos here or NTLM?</p>
]]></description><pubDate>Mon, 22 Dec 2025 15:38:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46354966</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46354966</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46354966</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>That came across more snarky than I intended!<p>Let me rephrase: for the majority of users, the usability and resilience benefits of synced credentials are enormous, and the security costs are marginal at best. But this rests on a number of assumptions. YMMV.</p>
]]></description><pubDate>Thu, 18 Dec 2025 20:10:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46317983</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46317983</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46317983</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>>Huh interesting, how does that work? I thought the way yubikeys operate the keys are generated on-device and are impossible to remove, and also come in limited number.<p>I wasn't referring to hardware keys (like YubiKeys), but rather on-device secure enclaves, TEEs, or TPMs.<p>Also I said "<i>protecting</i> a key using the secure enclave", which is perhaps a bit of a sleight of hand :-)<p>By that I mean a key that is wrapped (encrypted) using a parent key stored in the secure enclave. The key itself is not stored in the SE. But since it is wrapped using a parent key that is stored in the SE, that means it can only be decrypted in the SE. I believe this is how iCloud Keychain works, for example.<p>Digging into this further, it looks like I might have been wrong to imply that a credential manager app can instruct the SE itself to perform the proof of possession calculations needed for passkey authentication using a private key that is "protected" in this sense. When the app asks the SE to decrypt a passkey private key, it looks like the SE might return the passkey private key in plaintext to the app, and then the app itself performs the proof of possession calculation transiently <i>outside</i> the SE. I'm not sure about that, but I'd love to know.<p>> How do the decryption keys for the encrypted passkeys get shared between devices?<p>They get established as part of the device enrolment process. I suspect this simply adds another layer to the key hierarchy, so that your passkey private keys are encrypted under a sync key (parent) which is encrypted under a SE key (grandparent).<p>In that case, you could still claim that your passkeys are "protected by the SE" since they are encrypted at rest and in transit, and they cannot be decrypted anywhere except in the SEs of your enrolled devices.</p>
]]></description><pubDate>Thu, 18 Dec 2025 19:32:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46317394</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46317394</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46317394</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>Just to point out, protecting a key using the secure enclave and syncing it using end-to-end encryption aren’t necessarily mutually exclusive.<p>The security property you care about is that the plaintext key is only ever processed in use within the secure enclave (transiently, during authentication).<p>That doesn’t preclude syncing or backing up the <i>encrypted</i> key via a cloud service - if the device allows the application to do that.</p>
]]></description><pubDate>Thu, 18 Dec 2025 11:28:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46311414</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46311414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46311414</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>There are many cross-platform password managers that sync very nicely, which would solve for the machines you control - the Windows gaming machine and Android phone.<p>For machines you don't control, such as your employer Mac, well that's a special case. In theory you can use "FIDO Cross-Device Authentication", which is a passkey flow designed specifically for authenticating on one device using a passkey stored on a different device, and involves scanning a QR code.<p>I've never tried this though. Personally I tend to avoid mixing personal stuff with work stuff, so the problem rarely arises.</p>
]]></description><pubDate>Thu, 18 Dec 2025 09:34:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46310610</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46310610</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46310610</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>> I dont want an online backup. I want my credentials to only be on my computers. So now I gotta learn about which apps are ok, don't have cloud synching<p>If an "online" password manager uses end-to-end encryption, then the credentials really are only on your computers. The only thing "in the cloud" is encrypted blobs of data being moved around for the purpose of device sync and backup.<p>This insistence on using local non-syncing password managers is a masochistic exercise in making life difficult for yourself with no security benefit.</p>
]]></description><pubDate>Thu, 18 Dec 2025 09:21:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46310530</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46310530</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46310530</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>OK but you'd still be able to use the open source "password manager" to export the keys - which solves the issue lapcat raised in this thread - even if relying parties blocked it for authentication, which would be a separate issue.<p>Someone could develop a "passkey export tool" purely for the purpose of doing credential exchange then local export.<p>Or are you saying the credential exchange process itself could block providers?</p>
]]></description><pubDate>Thu, 18 Dec 2025 08:44:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46310296</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46310296</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46310296</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>Once "secure credential exchange" becomes supported by commercial credential managers, what's to stop someone implementing an open source password manager that implements the standard and allows local export in plaintext?</p>
]]></description><pubDate>Wed, 17 Dec 2025 19:48:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=46304570</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46304570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46304570</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>OK I see what you mean. Having the ability to switch between vendors but not the ability to export your data locally (e.g. as plaintext keys) is a new meaning of "vendor lock-in" I hadn't considered before.</p>
]]></description><pubDate>Wed, 17 Dec 2025 19:31:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46304358</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46304358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46304358</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>> Because by default, they do, and you have to explicitly install software to let it be moved<p>Apple's native passkey implementation doesn't require doesn't require you to install extra software, and the passkeys sync by default. I thought Google's and Microsoft's were similar - but I haven't tried them.<p>> And even if you do, it’s discouraged<p>Really? Where is it discouraged? I thought synced passkeys are intended as <i>the</i> solution for consumers.<p>> the spec is allowed to deny you access<p>Yeah but I thought that's for enterprise use cases, not consumer. E.g. employers that want to enforce device type restrictions on their employees.</p>
]]></description><pubDate>Wed, 17 Dec 2025 19:10:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46304080</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46304080</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46304080</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>> passkeys in Safari requires iCloud Keychain<p>This is not true - browsers including Safari support passkeys managed by third-party password managers.<p>I'm using 1Password with browser extensions for Safari and Chrome on macOS and iOS and it works seamlessly with my passkeys, which are not stored in iCloud Keychain.<p>> you're always locked in to one passkey vendor or another.<p>This will change:
<a href="https://1password.com/blog/fido-alliance-import-export-passkeys-draft-specs" rel="nofollow">https://1password.com/blog/fido-alliance-import-export-passk...</a></p>
]]></description><pubDate>Wed, 17 Dec 2025 19:04:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46303994</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46303994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46303994</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>Some password managers provide an offline root of trust which family members can use in this scenario. For example, 1Password tells users to print off an "Emergency Kit" which is a physical piece of paper with secret recovery codes printed on it, which they store in one or more safe places. [1]<p>If someone passes away, their family members can use the Emergency Kit to gain access to <i>and use</i> all their credentials - including their passkeys.<p>(The Emergency Kit also allows you to recover your data in the event that you forget your master passphrase or lose all your devices.)<p>[1] <a href="https://support.1password.com/emergency-kit/" rel="nofollow">https://support.1password.com/emergency-kit/</a></p>
]]></description><pubDate>Wed, 17 Dec 2025 19:01:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46303936</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46303936</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46303936</guid></item><item><title><![CDATA[New comment by jmsgwd in "Yep, Passkeys Still Have Problems"]]></title><description><![CDATA[
<p>I keep hearing it repeated, but where does this "tied to a single device" idea come from?<p>The default, built-for-the-masses implementation of passkeys is called "synced passkeys". They are designed to sync between all your enrolled devices, ideally using end-to-end encryption.<p>You authenticate with whatever device you happen to be using at the time - phone, tablet, laptop, desktop - doesn't matter. If you lose one, you replace that device and re-enroll - then all your passkeys magically re-appear on the new device.<p>If you're cross-platform, modern password managers work across ecosystems - for example, 1Password syncs passkeys between Mac, Windows, iOS, Android, and Linux. If you're all-in on Apple, their native passkey implementation syncs passkeys between all your Apple devices. I thought Google and Microsoft do something similar now.<p>It's a real mystery why people believe passkeys have to be stored on your phone only.</p>
]]></description><pubDate>Wed, 17 Dec 2025 18:37:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46303577</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46303577</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46303577</guid></item><item><title><![CDATA[New comment by jmsgwd in "1D Conway's Life glider found, 3.7B cells long"]]></title><description><![CDATA[
<p>> it might take only one intelligent life form for the space to (eventually) get filled with it<p>It wouldn't need to be intelligent to do this; it could be a self-replicating machine with no intelligence at all - which is orders of magnitude simpler and therefore more likely.<p>Chaotic initial state -> self-replicating machine -> intelligence is much more likely than chaotic initial state -> intelligence.<p>(See my other reply to the GP comment about The Recursive Universe, where all this is discussed.)</p>
]]></description><pubDate>Thu, 04 Dec 2025 13:09:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46147261</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46147261</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46147261</guid></item><item><title><![CDATA[New comment by jmsgwd in "1D Conway's Life glider found, 3.7B cells long"]]></title><description><![CDATA[
<p>Your first question is discussed in the book The Recursive Universe by William Poundstone (1984).<p>One of the chapters asks "what is life?". It considers (and rejects) various options, and finally settles upon a definition based on Von Neumann-style self-replicating machines using blueprints and universal constructors, and explains why this is the most (only?) meaningful definition of life.<p>Later, it talks about how one would go about creating such a machine in Conway's Game of Life. When the book was written in 1984, no one had actually created one (they need to be very large, and computers weren't really powerful enough then). But in 2010 Andrew J. Wade created Gemini, the first successful self-replicating machine in GoL, which I believe meets the criteria - and hence is "alive" according to that definition (but only in the sense that, say, a simple bacteria is alive). And I think it works somewhat like how it was sketched out in the book.<p>Another chapter estimated how big (and how densely populated) a randomly-initialized hypothetical GoL universe would need to be in order for "life" (as defined earlier) to appear by chance. I don't recall the details - but the answer was mind-boggling big, and also very sparsely populated.<p>All that only gives you life though, not intelligence. But life (by this definition) has the potential to evolve through a process of natural selection to achieve higher levels of complexity and eventually intelligence, at least in theory.</p>
]]></description><pubDate>Wed, 03 Dec 2025 21:42:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=46140574</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=46140574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46140574</guid></item><item><title><![CDATA[New comment by jmsgwd in "M5 MacBook Pro No Longer Coming in 2025"]]></title><description><![CDATA[
<p>How did they do damage to the hoods of a few cars?</p>
]]></description><pubDate>Sat, 09 Aug 2025 14:27:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=44846733</link><dc:creator>jmsgwd</dc:creator><comments>https://news.ycombinator.com/item?id=44846733</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44846733</guid></item></channel></rss>