<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kafrofrite</title><link>https://news.ycombinator.com/user?id=kafrofrite</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 03 May 2026 17:45:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kafrofrite" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kafrofrite in "VS Code inserting 'Co-Authored-by Copilot' into commits regardless of usage"]]></title><description><![CDATA[
<p>Please do share</p>
]]></description><pubDate>Sat, 02 May 2026 21:33:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47990774</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=47990774</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47990774</guid></item><item><title><![CDATA[New comment by kafrofrite in "Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised"]]></title><description><![CDATA[
<p>It's probably not trivial to implement and there's already a bunch of problems that need solving (e.g., trusting keys etc.) but... I think that if we had some sort of lightweight code provenance (on top of my head commits are signed from known/trusted keys, releases are signed by known keys, installing signed packages requires verification), we could probably make it somewhat harder to introduce malicious changes.<p>Edit: It looks like there's already something similar using sigstore in npm <a href="https://docs.npmjs.com/generating-provenance-statements#about-npm-provenance" rel="nofollow">https://docs.npmjs.com/generating-provenance-statements#abou...</a>. My understanding is that its use is not widespread though and it's mostly used to verify the publisher.</p>
]]></description><pubDate>Tue, 16 Sep 2025 22:29:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=45269081</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=45269081</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45269081</guid></item><item><title><![CDATA[New comment by kafrofrite in "The Chrome VRP Panel has decided to award $250k for this report"]]></title><description><![CDATA[
<p>The answer to your question is WebKit (because iOS), kernels (XNU, Linux, Windows) etc. In case you are not familiar with the domain I'd start with user-space exploitation and relevant write ups to get my feet wet. You'll find plenty of write ups, blogs etc. so I'll skip those.
Some of the books I generally found interesting are [1],[2], [3]. There's more to that, including fundamental concepts of CS (e.g., compilers and optimization in JITs, OS architecture etc.). I believe also <a href="https://p.ost2.fyi/dashboard" rel="nofollow">https://p.ost2.fyi/dashboard</a> has some relevant training.<p>[1] <a href="https://nostarch.com/zero-day" rel="nofollow">https://nostarch.com/zero-day</a><p>[2] <a href="https://nostarch.com/hacking2.htm" rel="nofollow">https://nostarch.com/hacking2.htm</a><p>[3] <a href="https://ia801309.us.archive.org/26/items/Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007/Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.pdf" rel="nofollow">https://ia801309.us.archive.org/26/items/Wiley.The.Shellcode...</a></p>
]]></description><pubDate>Mon, 11 Aug 2025 07:33:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=44861627</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=44861627</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44861627</guid></item><item><title><![CDATA[New comment by kafrofrite in "Apple Confirms Zero-Day Attacks Hitting macOS Systems"]]></title><description><![CDATA[
<p>Most probably what Apple means is that since their codebase is shared, the vulnerability exists across devices. This does not mean that the vulnerability is actively exploited in iOS nor that it will not be actively exploited as part of some other campaign.</p>
]]></description><pubDate>Wed, 20 Nov 2024 07:36:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=42191576</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=42191576</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42191576</guid></item><item><title><![CDATA[New comment by kafrofrite in "Apple Confirms Zero-Day Attacks Hitting macOS Systems"]]></title><description><![CDATA[
<p>> Has this happened before? That iPhones had a security hole that could be exploited over the web?
Yes, there were exploits in the past that could be exploited remotely, including some that were used for jailbreaking.</p>
]]></description><pubDate>Wed, 20 Nov 2024 07:25:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=42191533</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=42191533</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42191533</guid></item><item><title><![CDATA[New comment by kafrofrite in "I looked through attacks in my access logs"]]></title><description><![CDATA[
<p>I work as a security engineer and, yes, the CT logs are extremely useful not only for identifying new targets the moment you get a certificate but also for identifying patterns in naming your infra (e.g., dev-* etc.).<p>A good starting point for hardening your servers is CIS Hardening Guides and the relevant scripts.</p>
]]></description><pubDate>Mon, 29 Jan 2024 10:49:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=39174905</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=39174905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39174905</guid></item><item><title><![CDATA[New comment by kafrofrite in "AI and Mass Spying"]]></title><description><![CDATA[
<p>IIRC, in [1] it mentioned a few examples of AI that exhibited the same bias that is currently present in the judicial system, banks etc.<p>[1] <a href="https://en.wikipedia.org/wiki/Weapons_of_Math_Destruction" rel="nofollow noreferrer">https://en.wikipedia.org/wiki/Weapons_of_Math_Destruction</a></p>
]]></description><pubDate>Tue, 05 Dec 2023 16:18:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=38532832</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=38532832</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38532832</guid></item><item><title><![CDATA[New comment by kafrofrite in "Stuxnet Source Code"]]></title><description><![CDATA[
<p>I'm not a fan of Windows but Stuxnet didn't happen because of Windows. Iran decided to spin up a nuclear program and Israel and the US had concerns and wanted to stop it. They had the resources to develop something tailored for this unique situation, which included windows, Siemens PLCs (IIRC), Centrifuges etc. and developed the malware based on their target. Even if their target used a different stack, they'd find a way to achieve the same result.</p>
]]></description><pubDate>Mon, 04 Dec 2023 10:52:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=38515801</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=38515801</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38515801</guid></item><item><title><![CDATA[New comment by kafrofrite in "Ask HN: Why do people use password managers?"]]></title><description><![CDATA[
<p>I'll try my best to explain everything (trying to avoid too much security lingo, hopefully).<p>A password manager is a big database of passwords. There is a master password that decrypts the database and from there you can use your passwords. Notice that hashes are one-way operations thus not used in password managers. The benefits of using a password manager are that that users need to remember and handle only one password, that of their password manager, the rest of the passwords are unique and can be rotated quickly. Ideally, your password manager does a few more things, including taking precautions against leaving traces of passwords in memory etc.<p>There's another part of commercial password managers which is mostly convenience functionality. Passwords are synced across devices, specific members access specific passwords etc.<p>Some people do use local password managers, depending on their threat model (i.e., who's after them) and their level of expertise/time on their hands. Setting up something locally requires taking additional precautions (such as permissions, screen locks etc.) that are typically handled by commercial password managers.<p>Reg. Okta, Okta is an identity provider. In theory, identity providers can provide strong guarantees regarding a user, i.e., "I authenticated him thus I gave him those token to pass around". Strong guarantees can include a number of things, including Multi-factor Authentication, VPN restrictions etc.<p>Funny story: during an internal red team engagement on a previous employer of mine, we took over the local password manager of a subset of the security org, twice. The first time, they had a VNC, unauthenticated, with the password manager running and the file unlocked. The second time, a team conveniently used Git to sync their password manager file, with their password tracked.</p>
]]></description><pubDate>Wed, 29 Nov 2023 20:01:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=38464470</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=38464470</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38464470</guid></item><item><title><![CDATA[New comment by kafrofrite in "I analyzed Stack Overflow for secrets"]]></title><description><![CDATA[
<p>Most providers had a semi-automated process that granted you permission to conduct your pentest (assuming you'd share any findings reg. their infra with them). In reality though, most of the findings didn't come from poking around but from tapping the wire. I'd spin up VMs and tcpdump for hours, then look at the logs for odd packets, plaintext etc. etc. which makes it hard to detect such shenanigans<p>Edit: We went through the process for everything, including having a provider ship us a back-up solution to pentest. My desk became everyone's favourite place in the building :P</p>
]]></description><pubDate>Fri, 17 Nov 2023 12:04:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=38302383</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=38302383</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38302383</guid></item><item><title><![CDATA[New comment by kafrofrite in "I analyzed Stack Overflow for secrets"]]></title><description><![CDATA[
<p>Reminded me of a funny story. Maybe a decade ago, when moving to the cloud was all the rage, my then employer decided to check whether the cloud was any good. Long story short, he asked me to conduct penetration tests against the major providers. In one of the providers I pivoted through some network and hit a webpage that looked like some sort of control plane panel (but required authentication so...). I decided to google part of the HTML and... A stack overflow thread pops up with the code and parts of the backend code/logic. So much win.</p>
]]></description><pubDate>Fri, 17 Nov 2023 09:47:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=38301439</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=38301439</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38301439</guid></item><item><title><![CDATA[New comment by kafrofrite in "Enable ARMv9 Memory Tagging Extension (MTE) on Pixel 8"]]></title><description><![CDATA[
<p>IIRC, Intel announced about a year later plans to develop something similar. That being said, at the time they didn't have a specific timeline.</p>
]]></description><pubDate>Fri, 03 Nov 2023 11:38:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=38127242</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=38127242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38127242</guid></item><item><title><![CDATA[New comment by kafrofrite in "macOS Containers v0.0.1"]]></title><description><![CDATA[
<p>>  I don't think OS becomes any less vulnerable than usual Linux/Windows installation.<p>is not a good enough argument.<p>For the story, SIP is Apple's "rootless". Effectively the OS runs with less privileges than root. Disabling SIP significantly increases the attack surface.<p>That being said, I'm grateful that someone decided to do something more native for containers in macOS.</p>
]]></description><pubDate>Tue, 26 Sep 2023 10:19:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=37657112</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=37657112</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37657112</guid></item><item><title><![CDATA[New comment by kafrofrite in "NSO group iPhone zero-click, zero-day exploit captured in the wild"]]></title><description><![CDATA[
<p>DEP is a Windows implementation of a non-executable stack, i.e., memory permissions that do not allow execution on specific pages. Depending on the situation, an attacker can e.g., mmap() a new page with the execute permission set, write his shellcode there and jump there. Another way to bypass the NX bit is to actually use gadgets (snippets of code essentially) that are already there in the code thus they can be executed and redirect your instruction pointer to those addresses. Reusing code is generally known as ROP, JOP etc. and is mitigated by PAC for ARM (after v.8.3) and CFI for Intel (11th Gen onwards I believe).<p>That being said, Apple implements a ton of mitigations, both on a hardware level and on a software level which generally makes exploits on Apple devices interesting to analyze and see how they bypassed stuff.<p>Edit: For clarity, Apple requires both codesigning and implements PAC, among others. mmap'ing or ROP won't make the cut in this case.</p>
]]></description><pubDate>Fri, 08 Sep 2023 06:41:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=37430262</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=37430262</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37430262</guid></item><item><title><![CDATA[New comment by kafrofrite in "Apple clarifies why it abandoned plan to detect CSAM in iCloud photos"]]></title><description><![CDATA[
<p>My two cents reg. this.<p>Creating backdoors that allow encryption schemes to be subverted is _fundamentally_ going to cause harm on the internet, and eventually fail the weakest users/those that need privacy/security the most.<p>A mechanism that can subvert cryptographic protocols can be used by any party, including oppressive regimes, private entities etc. that have the resources/will/knowledge to use the backdoor etc. Backdoors harm both the trust on the web (which can have an impact on economic transactions among many others) and the people that need security/privacy the most. In the meantime, criminals will wise up and move their operations elsewhere where no backdoors exist.<p>We basically end up with a broken internet, we are putting people in harm's way and the criminals we are targeting are probably updating their OPSEC/MO not to rely on E2EE.</p>
]]></description><pubDate>Fri, 01 Sep 2023 22:45:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=37356934</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=37356934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37356934</guid></item><item><title><![CDATA[New comment by kafrofrite in "Google engineers want to make ad-blocking (near) impossible"]]></title><description><![CDATA[
<p>In the above he's mentioning that<p><i>Privacy features like user-agent reduction, IP reduction, preventing cross- site storage, and fingerprint randomization make it more difficult to distinguish or reidentify individual clients, which is great for privacy, but makes fighting fraud more difficult. This matters to users because making the web more private without providing new APIs to developers could lead to websites adding more:</i><p><i>- sign-in gates to access basic content</i><p><i>- invasive user fingerprinting, which is less transparent to users and more difficult to control</i><p><i>- excessive challenges (SMS verification, captchas) </i><p>My question is whether there is any data to back up those claims.</p>
]]></description><pubDate>Wed, 26 Jul 2023 11:11:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=36875738</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=36875738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36875738</guid></item><item><title><![CDATA[New comment by kafrofrite in "Why MD5('240610708') is equal to MD5('QNKCDZO')?"]]></title><description><![CDATA[
<p>Uh the joys of PHP's type juggling. Fairly sure this bug is still present in many systems.</p>
]]></description><pubDate>Wed, 12 Apr 2023 12:45:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=35538757</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=35538757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35538757</guid></item><item><title><![CDATA[New comment by kafrofrite in "Finding and exploiting vulnerabilities in H.264 decoders [pdf]"]]></title><description><![CDATA[
<p>You can target co-processors in general, e.g., here [1], thus I assume people do hack GPUs.<p>Generally, the better we become in introducing mitigations, the more expensive attacks become and attackers have bosses, budgets and deadlines. They will try to find other avenues to land on a target :-)<p>[1]<a href="https://objectivebythesea.org/v5/talks/OBTS_v5_iBeer.pdf" rel="nofollow">https://objectivebythesea.org/v5/talks/OBTS_v5_iBeer.pdf</a></p>
]]></description><pubDate>Wed, 29 Mar 2023 20:19:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=35362870</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=35362870</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35362870</guid></item><item><title><![CDATA[New comment by kafrofrite in "Does your office have a library?"]]></title><description><![CDATA[
<p>We actually have two libraries in the office :)<p>The first library has, for the biggest part, engineering books. Everyone can order books and everyone can borrow them. Most modern books also exist internally as e-books so the physical library currently is a mix of books, 3D prints, random music collections etc.<p>The second library is everything else. Multiple copies of various titles are available to take and keep, for free. Only requirement is to inform someone if the copy you picked up is the last one. Many employees are totally oblivious about this library.</p>
]]></description><pubDate>Thu, 16 Feb 2023 23:18:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=34828129</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=34828129</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34828129</guid></item><item><title><![CDATA[New comment by kafrofrite in "Code Review Handbook"]]></title><description><![CDATA[
<p>>  I like that they suggest better solutions I didn't think of.<p>Although I don't write code full-time, when I do this is the part I enjoy more. People reviewing my code and coming up with better solutions on that same problem amazes me.</p>
]]></description><pubDate>Fri, 14 Oct 2022 10:17:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=33201623</link><dc:creator>kafrofrite</dc:creator><comments>https://news.ycombinator.com/item?id=33201623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33201623</guid></item></channel></rss>