<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kkl</title><link>https://news.ycombinator.com/user?id=kkl</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 25 Apr 2026 16:24:28 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kkl" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kkl in "You don't want long-lived keys"]]></title><description><![CDATA[
<p>Part of the threat model for an Engineering team is that people come and go. They move teams which have different levels of access. They leave the organization, in most cases, on good terms. I want to set up infrastructure where I don't need to remember that your SSH pubkey is baked into production configuration after you leave the company.<p>There are several options for setting up per-connection keys that are dispensed to users through the company SSO. That setup means you don't need to maintain separate infrastructure for (de-)provisioning SSH keys.</p>
]]></description><pubDate>Sat, 25 Apr 2026 02:34:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47898108</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47898108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47898108</guid></item><item><title><![CDATA[You don't want long-lived keys]]></title><description><![CDATA[
<p>Article URL: <a href="https://argemma.com/blog/long-lived-keys/">https://argemma.com/blog/long-lived-keys/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47851377">https://news.ycombinator.com/item?id=47851377</a></p>
<p>Points: 74</p>
<p># Comments: 53</p>
]]></description><pubDate>Tue, 21 Apr 2026 16:55:04 +0000</pubDate><link>https://argemma.com/blog/long-lived-keys/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47851377</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47851377</guid></item><item><title><![CDATA[Anonymous credentials: an illustrated primer (Part 2)]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.cryptographyengineering.com/2026/04/17/anonymous-credentials-an-illustrated-primer-part-2/">https://blog.cryptographyengineering.com/2026/04/17/anonymous-credentials-an-illustrated-primer-part-2/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47838134">https://news.ycombinator.com/item?id=47838134</a></p>
<p>Points: 37</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 20 Apr 2026 17:58:13 +0000</pubDate><link>https://blog.cryptographyengineering.com/2026/04/17/anonymous-credentials-an-illustrated-primer-part-2/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47838134</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47838134</guid></item><item><title><![CDATA[New comment by kkl in "A rogue AI led to a serious security incident at Meta"]]></title><description><![CDATA[
<p>> "Had the engineer that acted on that known better, or did other checks, this would have been avoided."<p><insert <i>takes long drag</i> tweet[1] here><p>I personally find "LLMs can do $THING poorly" and "LLMs can do $THING well" articles kinda boring at this point. But! I'm hopeful that stories like this will shift the industry's focus towards robustness instead of just short-term efficiency. I suspect many decision making and change management processes accidentally benefited from just being a bit slow.<p>[1] <a href="https://waffles.fun/amy.png" rel="nofollow">https://waffles.fun/amy.png</a></p>
]]></description><pubDate>Thu, 19 Mar 2026 22:07:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47446984</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47446984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47446984</guid></item><item><title><![CDATA[New comment by kkl in "Every layer of review makes you 10x slower"]]></title><description><![CDATA[
<p>> The job of a code reviewer isn't to review code. It's to figure out how to obsolete their code review comment, that whole class of comment, in all future cases, until you don't need their reviews at all anymore.<p>Making entire classes of issues effectively impossible is definitely the ideal outcome. But, this feels much more complicated when you consider that trust doesn't always extend beyond the company's wall and you cannot always ignore that fact because the negative outcomes can be external to the company.<p>What if I, a trusted engineer, run `npm update` at the wrong time and malware makes its way into production and user data is stolen? A mistake to learn from, for sure, but a post-mortem is too late for those users.<p>I'm certainly not advocating for relying on human checks everywhere, but reasoning about where you crank the trust knob can get very complicated or costly. Occasionally a trustworthy human reviewer can be part of a very reasonable control.</p>
]]></description><pubDate>Tue, 17 Mar 2026 17:40:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47415814</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47415814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47415814</guid></item><item><title><![CDATA[New comment by kkl in "Every layer of review makes you 10x slower"]]></title><description><![CDATA[
<p>It’s also the case that someone you trust makes an honest mistake and, for example, gets their laptop stolen and their credentials compromised. I do trust my team, and want that to be the foundation to our relationship, but I also recognize that humans are infallible and having guardrails (eg code review) is beneficial.</p>
]]></description><pubDate>Tue, 17 Mar 2026 17:00:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47415337</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47415337</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47415337</guid></item><item><title><![CDATA[New comment by kkl in "Fish Shell 4.0 released. Rust re write finished"]]></title><description><![CDATA[
<p>Congratulations! Fish is such a wonderful shell. It’s been my daily driver for many years now but I’ve had a renewed appreciation for it now that I’m working in several different development environments. 
The default fish install Just Works so well that I don’t bother with trying to schlep my dotfiles around.</p>
]]></description><pubDate>Wed, 25 Feb 2026 18:12:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47155322</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47155322</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47155322</guid></item><item><title><![CDATA[New comment by kkl in "Never buy a .online domain"]]></title><description><![CDATA[
<p>I could also buy that the free domains were ran up by scammers which could have caused some of the hair trigger Safe Browsing denylisting.</p>
]]></description><pubDate>Wed, 25 Feb 2026 16:36:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47153889</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47153889</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47153889</guid></item><item><title><![CDATA[New comment by kkl in "Minions – Stripe's Coding Agents Part 2"]]></title><description><![CDATA[
<p>While there are compliance/security benefits it is not the primary motivation.<p>If you have fairly complicated infrastructure it can be way more efficient to have a pool of ready to go beefy EC2 instances on a recent commit of your multi-GB git repo instead of having to run everything on a laptop.</p>
]]></description><pubDate>Sat, 21 Feb 2026 03:59:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47097359</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=47097359</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47097359</guid></item><item><title><![CDATA[Go's filepath.Clean does not prevent path traversal]]></title><description><![CDATA[
<p>Article URL: <a href="https://argemma.com/blog/go-filepath-clean/">https://argemma.com/blog/go-filepath-clean/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46810843">https://news.ycombinator.com/item?id=46810843</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 29 Jan 2026 14:44:49 +0000</pubDate><link>https://argemma.com/blog/go-filepath-clean/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=46810843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46810843</guid></item><item><title><![CDATA[String comparison timing attacks in Go]]></title><description><![CDATA[
<p>Article URL: <a href="https://kel.bz/post/go-timing/">https://kel.bz/post/go-timing/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46501251">https://news.ycombinator.com/item?id=46501251</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 05 Jan 2026 16:53:47 +0000</pubDate><link>https://kel.bz/post/go-timing/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=46501251</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46501251</guid></item><item><title><![CDATA[Confessions to a Data Lake]]></title><description><![CDATA[
<p>Article URL: <a href="https://confer.to/blog/2025/12/confessions-to-a-data-lake/">https://confer.to/blog/2025/12/confessions-to-a-data-lake/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46367377">https://news.ycombinator.com/item?id=46367377</a></p>
<p>Points: 37</p>
<p># Comments: 13</p>
]]></description><pubDate>Tue, 23 Dec 2025 17:51:13 +0000</pubDate><link>https://confer.to/blog/2025/12/confessions-to-a-data-lake/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=46367377</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46367377</guid></item><item><title><![CDATA[Control planes are a useful concept]]></title><description><![CDATA[
<p>Article URL: <a href="https://kel.bz/post/control-plane/">https://kel.bz/post/control-plane/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46283855">https://news.ycombinator.com/item?id=46283855</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 16 Dec 2025 02:06:15 +0000</pubDate><link>https://kel.bz/post/control-plane/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=46283855</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46283855</guid></item><item><title><![CDATA[Authenticated Dictionaries with Skip Lists and Commutative Hashing]]></title><description><![CDATA[
<p>Article URL: <a href="https://kel.bz/post/authdict/">https://kel.bz/post/authdict/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=21964499">https://news.ycombinator.com/item?id=21964499</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 05 Jan 2020 22:08:18 +0000</pubDate><link>https://kel.bz/post/authdict/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=21964499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21964499</guid></item><item><title><![CDATA[RSA-Based Key Encapsulation Mechanisms]]></title><description><![CDATA[
<p>Article URL: <a href="https://kel.bz/post/kem/">https://kel.bz/post/kem/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=20023974">https://news.ycombinator.com/item?id=20023974</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 27 May 2019 17:50:53 +0000</pubDate><link>https://kel.bz/post/kem/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=20023974</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20023974</guid></item><item><title><![CDATA[Building lattice reduction (LLL) intuition]]></title><description><![CDATA[
<p>Article URL: <a href="https://kel.bz/post/lll/">https://kel.bz/post/lll/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14847560">https://news.ycombinator.com/item?id=14847560</a></p>
<p>Points: 81</p>
<p># Comments: 7</p>
]]></description><pubDate>Tue, 25 Jul 2017 13:33:29 +0000</pubDate><link>https://kel.bz/post/lll/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=14847560</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14847560</guid></item><item><title><![CDATA[The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem]]></title><description><![CDATA[
<p>Article URL: <a href="https://kel.bz/post/lattices/">https://kel.bz/post/lattices/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14200300">https://news.ycombinator.com/item?id=14200300</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 26 Apr 2017 03:50:54 +0000</pubDate><link>https://kel.bz/post/lattices/</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=14200300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14200300</guid></item><item><title><![CDATA[New comment by kkl in "Show HN: Evilpass – A slightly evil password strength checker"]]></title><description><![CDATA[
<p>Losing control of your actual phone is not the same as losing control of your phone number.<p>I'm not sure about Microsoft, but Google supports several other 2FA mechanisms in addition to SMS.</p>
]]></description><pubDate>Sat, 18 Feb 2017 18:08:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=13675843</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=13675843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13675843</guid></item><item><title><![CDATA[New comment by kkl in "Differences between Heavy Metal, Thrash Metal, Black Metal, and Death Metal"]]></title><description><![CDATA[
<p>I think this is true of "Second Wave" black metal bands but less true of more recent output.</p>
]]></description><pubDate>Wed, 11 Jan 2017 01:24:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=13370985</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=13370985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13370985</guid></item><item><title><![CDATA[New comment by kkl in "I'm giving up on PGP"]]></title><description><![CDATA[
<p>What properties does email have that asynchronous messaging services (e.g. Signal) do not?</p>
]]></description><pubDate>Tue, 06 Dec 2016 16:18:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=13115741</link><dc:creator>kkl</dc:creator><comments>https://news.ycombinator.com/item?id=13115741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13115741</guid></item></channel></rss>