<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kackerlacker</title><link>https://news.ycombinator.com/user?id=kackerlacker</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 05:29:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kackerlacker" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kackerlacker in "LibreOffice – Let's put an end to the speculation"]]></title><description><![CDATA[
<p>I think such situations are rather big risk that a community that already wasn't very active atrophies or splits and then atrophies. With code bases like that there's also a lot of maintenance so being able to run an old version is not necessarily enough.</p>
]]></description><pubDate>Sun, 05 Apr 2026 21:47:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47654218</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47654218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47654218</guid></item><item><title><![CDATA[New comment by kackerlacker in "Common drug tests lead to tens of thousands wrongful arrests a year"]]></title><description><![CDATA[
<p>Police have to be winning the war on drugs but not literally taking that financing that doesn't require congressional oversight away from the CIA.</p>
]]></description><pubDate>Sun, 05 Apr 2026 17:50:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47651970</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47651970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47651970</guid></item><item><title><![CDATA[New comment by kackerlacker in "German implementation of eIDAS will require an Apple/Google account to function"]]></title><description><![CDATA[
<p>One could say the same thing about virus scanners. They are obviously too little too late "security" so standards that require them have given up on real requirements like a way to achieve actual assurance of no buffer overflows. Nonetheless, an implementation to such a standard that chooses any off the shelf scanner is a lot less work than implementing a new scanner.</p>
]]></description><pubDate>Sun, 05 Apr 2026 13:53:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47649480</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47649480</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47649480</guid></item><item><title><![CDATA[New comment by kackerlacker in "F-15E jet shot down over Iran"]]></title><description><![CDATA[
<p>This is exactly the situation I think of when I hear news of rescue missions. Running a rescue in a place with functional air defense is a recursive rescue problem that could quickly get out of control.</p>
]]></description><pubDate>Fri, 03 Apr 2026 19:14:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47630856</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47630856</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47630856</guid></item><item><title><![CDATA[New comment by kackerlacker in "SSH certificates: the better SSH experience"]]></title><description><![CDATA[
<p>In my view it is more important to stop using software keys so probably use sk (fido) for both host and user.. From there CAs would be a next step.. The level of documentation and example setups is astoundingly poor if you even look at step 2 for any feature. I.e. SK keys are reasonably understood for user keys but the setup as host keys is vague and needs testing to see if it really works.</p>
]]></description><pubDate>Fri, 03 Apr 2026 19:00:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47630669</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47630669</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47630669</guid></item><item><title><![CDATA[New comment by kackerlacker in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>Eh, with browsers you can tell the user to go to hell if they don't like a secure but broken experience. The problem in most software is that you commit to bad ideas and then have to upset people who have higher status than the software dev that would tell them to go to hell.</p>
]]></description><pubDate>Tue, 31 Mar 2026 07:14:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47583804</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47583804</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47583804</guid></item><item><title><![CDATA[New comment by kackerlacker in "America Is Now a Rogue Superpower"]]></title><description><![CDATA[
<p>I think most far from center paper writers are more successful if they don't let reality limit their ideas. Probably few consider a real idiot with enough power to ruin them as a threat when they start putting pen to page.</p>
]]></description><pubDate>Mon, 30 Mar 2026 21:47:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47580129</link><dc:creator>kackerlacker</dc:creator><comments>https://news.ycombinator.com/item?id=47580129</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47580129</guid></item></channel></rss>