<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kenniskrag</title><link>https://news.ycombinator.com/user?id=kenniskrag</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 13 Apr 2026 05:41:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kenniskrag" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kenniskrag in "State of Homelab 2026"]]></title><description><![CDATA[
<p>Is that legal? Do you avoid uploading somehow?</p>
]]></description><pubDate>Mon, 13 Apr 2026 05:23:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47747918</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=47747918</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47747918</guid></item><item><title><![CDATA[New comment by kenniskrag in "Password managers less secure than promised"]]></title><description><![CDATA[
<p>Not if the advertise zero knowledge encryption. As far as I understand the password sharing / collaboration feature is often the problem.<p>Second: The provider can get the passwords with a simple server change.</p>
]]></description><pubDate>Sat, 21 Feb 2026 22:59:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47105846</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=47105846</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47105846</guid></item><item><title><![CDATA[New comment by kenniskrag in "Password managers less secure than promised"]]></title><description><![CDATA[
<p>> Much like the other products we analyse, 1Password lacks
authentication of public keys. This trivially enables sharing
attacks similar to BW09, LP07 and DL02, something that the
1Password whitepaper...<p>> IMPACT. Complete compromise of vault confidentiality and
integrity. The adversary can read and decrypt all vault con-
tents encrypted after the attack, including passwords, credit
card information, secure notes, and other sensitive data stored
in the vault. Similarly, they can inject new items into the vault
after the attack.
REQUIREMENTS. The client fetches key material from the
server, for example due to the user logging in on a new device.
If executed on a non-empty vault, the attack results in the
client losing access to all items already in their vault, while
leaking any new items added to the vault after the attack took
place. If the attack is executed at the time of vault creation,
the attack is effectively undetectable by the client, since it
cannot distinguish between a ciphertext it created and the
ciphertext created by the server during the attack.
PROPOSED MITIGATION. A straightforward mitigation is to
have the client sign vault keys using the RSA private key in
the keyset before encrypting them with the RSA public key.
Ideally, two different key pairs would be used for...<p>from the paper: <a href="https://eprint.iacr.org/2026/058.pdf" rel="nofollow">https://eprint.iacr.org/2026/058.pdf</a></p>
]]></description><pubDate>Sat, 21 Feb 2026 22:54:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47105780</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=47105780</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47105780</guid></item><item><title><![CDATA[New comment by kenniskrag in "Discord Alternatives, Ranked"]]></title><description><![CDATA[
<p>In europe you need identification to buy a sim or esim.<p><a href="https://www.reddit.com/r/europe/comments/9ziqfi/european_countries_requiring_registration_of/" rel="nofollow">https://www.reddit.com/r/europe/comments/9ziqfi/european_cou...</a></p>
]]></description><pubDate>Tue, 10 Feb 2026 11:04:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46958084</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=46958084</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46958084</guid></item><item><title><![CDATA[New comment by kenniskrag in "Supreme Court wants US input on whether ISPs should be liable for users' piracy"]]></title><description><![CDATA[
<p>> online access is as necessary as water
We have paper money and also can work and buy stuff offline.<p>I would say online access is as necessary as a car. Possible without but less flexible.</p>
]]></description><pubDate>Tue, 26 Nov 2024 10:56:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=42244573</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=42244573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42244573</guid></item><item><title><![CDATA[New comment by kenniskrag in "Supreme Court wants US input on whether ISPs should be liable for users' piracy"]]></title><description><![CDATA[
<p>Driving licence is a bad argument because there is public transportation service. If you're reckless or have other issues the licence is revoked.</p>
]]></description><pubDate>Tue, 26 Nov 2024 10:53:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=42244557</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=42244557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42244557</guid></item><item><title><![CDATA[New comment by kenniskrag in "We are shutting down Ondsel"]]></title><description><![CDATA[
<p>One reason was, that the security model wasn't enough anymore. E.g. every application was trusted and can listen to key inputs e.g. steal passwords and credit card infos. Btw there was an issue that screenshotting in wayland was not possible. But easy in X11 because everything was visible.<p>Don't know much about the architecture about wayland but I think grahic driver handling changed in wayland too.</p>
]]></description><pubDate>Mon, 18 Nov 2024 12:15:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=42171728</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=42171728</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42171728</guid></item><item><title><![CDATA[New comment by kenniskrag in "Andrew S. Tanenbaum Receives ACM Software System Award"]]></title><description><![CDATA[
<p>One of these: <a href="https://media.pearsoncmg.com/bc/abp/cs-resources/products/series.html#series,series=Tanenbaum" rel="nofollow">https://media.pearsoncmg.com/bc/abp/cs-resources/products/se...</a></p>
]]></description><pubDate>Sat, 22 Jun 2024 19:23:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=40761440</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=40761440</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40761440</guid></item><item><title><![CDATA[New comment by kenniskrag in "Please support "skip to main content" on your docs site"]]></title><description><![CDATA[
<p>qutebrowser does that.<p><a href="https://en.m.wikipedia.org/wiki/Qutebrowser" rel="nofollow">https://en.m.wikipedia.org/wiki/Qutebrowser</a></p>
]]></description><pubDate>Tue, 04 Jun 2024 03:33:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=40570423</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=40570423</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40570423</guid></item><item><title><![CDATA[New comment by kenniskrag in "Claude is now available in Europe"]]></title><description><![CDATA[
<p>Which ones? I try to learn how these systems work</p>
]]></description><pubDate>Tue, 14 May 2024 11:03:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=40353830</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=40353830</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40353830</guid></item><item><title><![CDATA[New comment by kenniskrag in "Looo.lol – a binary math site"]]></title><description><![CDATA[
<p>You can edit the url to use any number. :)</p>
]]></description><pubDate>Sat, 06 Jan 2024 00:48:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=38887093</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=38887093</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38887093</guid></item><item><title><![CDATA[New comment by kenniskrag in "We don't have official RSS feed support for now, but we're working on a solution"]]></title><description><![CDATA[
<p>which rss reader do you use?</p>
]]></description><pubDate>Mon, 11 Dec 2023 13:03:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=38600281</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=38600281</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38600281</guid></item><item><title><![CDATA[New comment by kenniskrag in "Untrusted Device Encryption"]]></title><description><![CDATA[
<p>Generally it depends on the threat vector.<p>* Do you trust the hardware<p>* Do you trust the OS<p>* Do you trust the user<p>* Do you trust the software<p>On a rootkit you don't trust the OS anymore. So a safe location inside the OS space isn't an option anymore. But often you are not a root user (e.g. android, windows in a corporate environment)<p>If you have OS backups there is a risk it is readable by others (e.g. cloud, different IT department). There is also a risk a user uploads the config somewhere.<p>If you want to rotate keys you would have to search all keys compared to a centralized location.</p>
]]></description><pubDate>Thu, 07 Dec 2023 10:21:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=38554867</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=38554867</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38554867</guid></item><item><title><![CDATA[New comment by kenniskrag in "Untrusted Device Encryption"]]></title><description><![CDATA[
<p>yes because more than one process can access the file.<p>A "password manager" provides a defined api and schields the password away from everything. It can also ask the user if process x can access the key y.</p>
]]></description><pubDate>Thu, 07 Dec 2023 09:17:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=38554471</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=38554471</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38554471</guid></item><item><title><![CDATA[Android Permission Bypass: Unauthorized Access Through Read_external_storage]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@yuva.phalle/android-permission-bypass-5d4f307600f">https://medium.com/@yuva.phalle/android-permission-bypass-5d4f307600f</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37089441">https://news.ycombinator.com/item?id=37089441</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 11 Aug 2023 14:58:57 +0000</pubDate><link>https://medium.com/@yuva.phalle/android-permission-bypass-5d4f307600f</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=37089441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37089441</guid></item><item><title><![CDATA[New comment by kenniskrag in "Firefox has surpassed Chrome on Speedometer"]]></title><description><![CDATA[
<p>TL;DR: Windows Defender had a bug that made certain system calls expensive on CPU cycles when Defender's Real-time Protection feature is enabled. After discovery, Mozilla reported this issue to Microsoft. Microsoft is releasing a patch that should result in lower CPU usage when using Firefox on sites like YouTube (a ~75% CPU usage reduction was noted when browsing YouTube in Firefox with the fixed version of Defender).<p><a href="https://news.ycombinator.com/item?id=35458746">https://news.ycombinator.com/item?id=35458746</a></p>
]]></description><pubDate>Tue, 18 Jul 2023 14:24:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=36772820</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=36772820</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36772820</guid></item><item><title><![CDATA[New comment by kenniskrag in "Pricing Money: A beginner's guide to money, bonds, futures and swaps"]]></title><description><![CDATA[
<p>Is <a href="https://www.portvintages.com/" rel="nofollow noreferrer">https://www.portvintages.com/</a> the book?</p>
]]></description><pubDate>Sat, 17 Jun 2023 06:17:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=36367778</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=36367778</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36367778</guid></item><item><title><![CDATA[New comment by kenniskrag in "Intravenous Caffeine"]]></title><description><![CDATA[
<p>chocolate</p>
]]></description><pubDate>Thu, 08 Jun 2023 16:07:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=36244196</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=36244196</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36244196</guid></item><item><title><![CDATA[New comment by kenniskrag in "France legalizes remote camera and microphone activation in smartphones"]]></title><description><![CDATA[
<p>I recently saw a green dot on the right corner during camera usage on android. Probably a (new) feature of android.</p>
]]></description><pubDate>Thu, 08 Jun 2023 13:02:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=36241164</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=36241164</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36241164</guid></item><item><title><![CDATA[New comment by kenniskrag in "Brute.Fail: Watch brute force attacks fail in real time"]]></title><description><![CDATA[
<p>Nice idea. From the docs:<p>Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server.<p>Since the tarpit is in the banner before any cryptographic exchange occurs, this program doesn't depend on any cryptographic libraries. It's a simple, single-threaded, standalone C program. It uses poll() to trap multiple clients at a time.<p><a href="https://github.com/skeeto/endlessh">https://github.com/skeeto/endlessh</a></p>
]]></description><pubDate>Fri, 02 Jun 2023 20:59:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=36170678</link><dc:creator>kenniskrag</dc:creator><comments>https://news.ycombinator.com/item?id=36170678</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36170678</guid></item></channel></rss>