<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: keisborg</title><link>https://news.ycombinator.com/user?id=keisborg</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 19:14:05 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=keisborg" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by keisborg in "How we rooted Copilot"]]></title><description><![CDATA[
<p>One step closer to container breakout? Gaining root access give you a bigger attack surface for kernel exploits.</p>
]]></description><pubDate>Sun, 27 Jul 2025 08:24:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=44699741</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=44699741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44699741</guid></item><item><title><![CDATA[New comment by keisborg in "XBOW, an autonomous penetration tester, has reached the top spot on HackerOne"]]></title><description><![CDATA[
<p>I cannot answer for all the program owners, but I imagine that there are other concerns than reproducibility</p>
]]></description><pubDate>Wed, 25 Jun 2025 18:56:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44380724</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=44380724</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44380724</guid></item><item><title><![CDATA[New comment by keisborg in "XBOW, an autonomous penetration tester, has reached the top spot on HackerOne"]]></title><description><![CDATA[
<p>The policies states it’s not allowed to use automated tools, not to submit report using automated tools alone. Human review does not really change that.</p>
]]></description><pubDate>Wed, 25 Jun 2025 16:48:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=44379364</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=44379364</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44379364</guid></item><item><title><![CDATA[New comment by keisborg in "XBOW, an autonomous penetration tester, has reached the top spot on HackerOne"]]></title><description><![CDATA[
<p>«XBOW submitted nearly 1,060 vulnerabilities. All findings were fully automated, though our security team reviewed them pre-submission to comply with HackerOne’s policy on automated tools»<p>That seems a bit unethical. I’ve thought companies specifically deny usage of automated tools. A bit too late ey…?</p>
]]></description><pubDate>Wed, 25 Jun 2025 14:54:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=44378064</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=44378064</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44378064</guid></item><item><title><![CDATA[New comment by keisborg in "Show HN: I built a knife steel comparison tool"]]></title><description><![CDATA[
<p>I looked through most of the charts, and I it seems like you cannot get the best of two worlds. Can you get good edge retention, ease of sharpening and toughness at the same time?<p>It would be nice with an example on how knife steel properties work. I assume there are balanced tradeoffs.</p>
]]></description><pubDate>Sat, 17 May 2025 19:36:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=44016437</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=44016437</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44016437</guid></item><item><title><![CDATA[New comment by keisborg in "Anti-Personnel Computing (2023)"]]></title><description><![CDATA[
<p>I love term how it plays on the words and the negative association we have with anti-personell mines<p>If we could have a ban on anti-personell computers…</p>
]]></description><pubDate>Tue, 13 May 2025 11:20:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=43971680</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43971680</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43971680</guid></item><item><title><![CDATA[New comment by keisborg in "U.S. autism data project sparks uproar over ethics, privacy and intent"]]></title><description><![CDATA[
<p>I get a cloudflare puzzle when I try to visit this link :(</p>
]]></description><pubDate>Sun, 27 Apr 2025 11:03:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=43811022</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43811022</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43811022</guid></item><item><title><![CDATA[New comment by keisborg in "Wikipedia’s nonprofit status questioned by D.C. U.S. attorney"]]></title><description><![CDATA[
<p>Ed Martin seems like a SME when he himself has been influenced by foreign agencies and spoke their case.</p>
]]></description><pubDate>Sat, 26 Apr 2025 07:01:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43801507</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43801507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43801507</guid></item><item><title><![CDATA[New comment by keisborg in "A Man Who Went to Fake Prison Also Went to Real Jail"]]></title><description><![CDATA[
<p>Link is paywalled. Not possible to read</p>
]]></description><pubDate>Mon, 31 Mar 2025 18:26:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=43538088</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43538088</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43538088</guid></item><item><title><![CDATA[New comment by keisborg in "In Jail Without a Lawyer: How a Texas Town Fails Poor Defendants"]]></title><description><![CDATA[
<p>We do not know why you are in jail, but because you are
in jail you must have done something bad. We cannot just let bad people roam freely</p>
]]></description><pubDate>Wed, 26 Mar 2025 07:34:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=43479729</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43479729</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43479729</guid></item><item><title><![CDATA[New comment by keisborg in "Crew-9 Returns to Earth"]]></title><description><![CDATA[
<p>We all are</p>
]]></description><pubDate>Wed, 19 Mar 2025 06:09:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=43408691</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43408691</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43408691</guid></item><item><title><![CDATA[New comment by keisborg in "Espressif's Response to Undocumented Commands in ESP32 Bluetooth by Tarlogic"]]></title><description><![CDATA[
<p>So, they are basically saying that bash is vulnerable to arbitrary command execution?</p>
]]></description><pubDate>Tue, 11 Mar 2025 22:51:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=43337969</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43337969</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43337969</guid></item><item><title><![CDATA[New comment by keisborg in "Espressif's Response to Undocumented Commands in ESP32 Bluetooth by Tarlogic"]]></title><description><![CDATA[
<p>I would hope so, but on<p>Tarlogics blog post, it is mentioned “modifying chips arbitrarily”, “infecting chips with malicious code”, “obtain confidential information stored on them”.<p>Even though they rephrased the backdoor wording, the remaining statements make me believe the undocumented functions can be used to gain code execution on the main cpu.</p>
]]></description><pubDate>Tue, 11 Mar 2025 22:28:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=43337789</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43337789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43337789</guid></item><item><title><![CDATA[New comment by keisborg in "Espressif's Response to Undocumented Commands in ESP32 Bluetooth by Tarlogic"]]></title><description><![CDATA[
<p>It it possible to create firmware that is encrypted and cannot be read out. Espressif state there is no security issues, but I have a feeling that these debug commands may be used to read out the flash of a properly secured esp32 that otherwise would not be possible…</p>
]]></description><pubDate>Tue, 11 Mar 2025 20:57:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=43336919</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43336919</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43336919</guid></item><item><title><![CDATA[New comment by keisborg in "A game of learning your homelab into a cyberpunk mystery adventure"]]></title><description><![CDATA[
<p>There was someone that figured out how to detect if the output was piped or not to bash on the webserver, can consider the fact and chose to be malicious or not</p>
]]></description><pubDate>Sat, 08 Mar 2025 12:36:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=43299742</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43299742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43299742</guid></item><item><title><![CDATA[New comment by keisborg in "What if America turned off Britain's weapons?"]]></title><description><![CDATA[
<p>My understanding of the article is that it was about shutting down the program that keeps the nuclear navy afloat, not about a backdoor with a switch to turn off the arsenal</p>
]]></description><pubDate>Fri, 07 Mar 2025 18:58:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=43293075</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43293075</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43293075</guid></item><item><title><![CDATA[New comment by keisborg in "I created an MVP for an AI SVG maker in a week! Check it out!"]]></title><description><![CDATA[
<p>Yeah, it says it will create an SVG in seconds, but seconds later, there is no SVG. Did not occur to me that I had to log in, but probably won’t as I cannot be bothered to follow black patterns…</p>
]]></description><pubDate>Tue, 04 Mar 2025 06:44:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=43251106</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43251106</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43251106</guid></item><item><title><![CDATA[New comment by keisborg in "Docker limits unauthenticated pulls to 10/HR/IP from Docker Hub, from March 1"]]></title><description><![CDATA[
<p>I feel that dockerhub no longer can be the steward for the default docker repo because of this and the limitations they previously have implemented. It is time for them to hand over the baton stick to someone else, or that the notion of a default repo is removed all together</p>
]]></description><pubDate>Fri, 21 Feb 2025 20:34:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=43132638</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43132638</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43132638</guid></item><item><title><![CDATA[New comment by keisborg in "Docker limits unauthenticated pulls to 10/HR/IP from Docker Hub, from March 1"]]></title><description><![CDATA[
<p>Exactly this. And when a base image has a new release, all images based on this will also need an update</p>
]]></description><pubDate>Fri, 21 Feb 2025 11:05:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=43126246</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43126246</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43126246</guid></item><item><title><![CDATA[New comment by keisborg in "Docker limits unauthenticated pulls to 10/HR/IP from Docker Hub, from March 1"]]></title><description><![CDATA[
<p>It is not immediately clear to me if the limit is per repo/package or globally in the hub. For instance, I fear it will not be possible to add a new kubernetes node to my cluster without hitting the limit as it would need to pull all the individual images.</p>
]]></description><pubDate>Fri, 21 Feb 2025 10:27:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=43125986</link><dc:creator>keisborg</dc:creator><comments>https://news.ycombinator.com/item?id=43125986</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43125986</guid></item></channel></rss>