<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kro</title><link>https://news.ycombinator.com/user?id=kro</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 13:43:28 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kro" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kro in "Migrating from DigitalOcean to Hetzner"]]></title><description><![CDATA[
<p>Hetzner normally advertises their hardware servers as 2x 1 TB SSD, because it's strongly recommended to run them in SWraid1 for net 1TB. (Their image installer will default to that)<p>Once the first SSD fails after some years, and your monitoring catches that, you can either migrate to a new box, find another intermediate solution/replica, or let them hotswap it while the other drive takes on.<p>Of course though, going to physical servers loses redundency of the cloud, but that's something you need to price in when looking at the savings and deciding your risk model.<p>And yes, running this without also at least daily snapshotting/backup to remote storage is insane - that applies to cloud aswell, albeit easier to setup there.</p>
]]></description><pubDate>Sat, 18 Apr 2026 14:15:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47816104</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47816104</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47816104</guid></item><item><title><![CDATA[New comment by kro in "OpenSSL 4.0.0"]]></title><description><![CDATA[
<p>Nginx mainline 1.29.x supports it.
So once you get that and also the openssl version on your system, good to go.
Likely too late for ubuntu 26.04, maybe in debian 14 next year, or of course rolling release distros / containers.<p>But, in a personal/single website server, ech does not really add privacy, adversaries can still observe the IP metadata and compare what's hosted there. The real benefits are on huge cloud hosting platforms.</p>
]]></description><pubDate>Tue, 14 Apr 2026 19:13:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47770041</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47770041</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47770041</guid></item><item><title><![CDATA[New comment by kro in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>The URL does not even need to change, you can pushState with just a JavaScript object, catch the pop and do something like display a modal. (I use this pattern to allow closing fullscreen filter overlays the user opened)<p>Still, requires user interaction, on any element, once.
So the crawler needs to identify and click most likely the consent/reject button. Which may not even trigger for Googlebot.<p>So they likely will rely on reports or maybe even Chrome field data.</p>
]]></description><pubDate>Tue, 14 Apr 2026 18:56:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47769797</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47769797</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47769797</guid></item><item><title><![CDATA[New comment by kro in "A new spam policy for “back button hijacking”"]]></title><description><![CDATA[
<p>It's a valid question how they detect it. As there are valid usages, just checking for the existence of the function call would not be correct.<p>These sites likely pushState on consent actions so it appears like any user interaction.</p>
]]></description><pubDate>Tue, 14 Apr 2026 04:59:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47761420</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47761420</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47761420</guid></item><item><title><![CDATA[New comment by kro in "Simplest Hash Functions"]]></title><description><![CDATA[
<p>It's very very unlikely to get collisions there, but still not impossible. Whenever you map data of arbitrary length (infinite possibilities) to a limited length collisions are possible.</p>
]]></description><pubDate>Sun, 12 Apr 2026 07:30:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47736967</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47736967</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47736967</guid></item><item><title><![CDATA[New comment by kro in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>I wonder, what is the impact of this to widely deployed smartcards like credit cards / EID passports?<p>Aren't they relying on asymmetrical signing aswell?</p>
]]></description><pubDate>Mon, 06 Apr 2026 19:18:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47665557</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47665557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47665557</guid></item><item><title><![CDATA[New comment by kro in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>The argument to skip hybrid keys sounds dangerous to me. 
These algorithms are not widely deployed and thus real world tested at all. If there is a simple flaw, suddenly any cheap crawler pwns you while you tried to protect against state actors.</p>
]]></description><pubDate>Mon, 06 Apr 2026 19:11:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47665446</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47665446</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47665446</guid></item><item><title><![CDATA[New comment by kro in "German implementation of eIDAS will require an Apple/Google account to function"]]></title><description><![CDATA[
<p>It will likely display something like a QR Code with signature anyways, otherwise it's just a glorified passport picture?<p>Authorities/anyone could verify that it's not counterfeit. And photo should be checked anyways to match the person.<p>So I also don't see the need for attestation. For ID check it should be ok without. For signing stuff ofc it is not resistant to copying. But EID smartcard function already exists.</p>
]]></description><pubDate>Sun, 05 Apr 2026 10:10:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47647866</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47647866</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47647866</guid></item><item><title><![CDATA[New comment by kro in "Post Mortem: axios NPM supply chain compromise"]]></title><description><![CDATA[
<p>I really don't get this either, I've always removed axios when it was preinstalled in a framework.<p>I use "xhr" via fetch extensively, it can do everything in day to day business for years with minimal boilerplate.<p>(The only exception known to me being upload progress/status indication)</p>
]]></description><pubDate>Sat, 04 Apr 2026 07:20:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47636719</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47636719</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47636719</guid></item><item><title><![CDATA[New comment by kro in "Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot"]]></title><description><![CDATA[
<p>In Q2 this year, so very soon, there will be the DNS PERSIST method, which is non rotating.</p>
]]></description><pubDate>Fri, 27 Mar 2026 15:52:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544341</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47544341</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544341</guid></item><item><title><![CDATA[New comment by kro in "Google details new 24-hour process to sideload unverified Android apps"]]></title><description><![CDATA[
<p>Not advocating for cashless only, but cash also has costs: banks charge for deposits and coinrolls, and you need to protect against robbery</p>
]]></description><pubDate>Fri, 20 Mar 2026 12:54:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47453859</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47453859</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47453859</guid></item><item><title><![CDATA[New comment by kro in "SSH has no Host header"]]></title><description><![CDATA[
<p>Almost certainly it does, as public key auth takes place after setting up the session encryption</p>
]]></description><pubDate>Wed, 18 Mar 2026 05:53:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47421989</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47421989</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47421989</guid></item><item><title><![CDATA[New comment by kro in "Cert Authorities Check for DNSSEC from Today"]]></title><description><![CDATA[
<p>I have a setup with separated dns and domain since 2021. Using a CSK with unlimited lifetime, I never had to rotate. And could easily also migrate both parts (having a copy of the key material)<p>Register only has public material<p>The master is bind9, and any semi-trusted provider can be used as slave/redundency/cdn getting zonetransfers including the RRsigs</p>
]]></description><pubDate>Mon, 16 Mar 2026 17:32:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47402071</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47402071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47402071</guid></item><item><title><![CDATA[New comment by kro in "Remotely unlocking an encrypted hard disk"]]></title><description><![CDATA[
<p>TPM is good when combined with secureboot and these hashes being part of the attestation, that eliminates initramfs swapping. 
Still with Physical access being a factor bustapping can happen, ftpm - if available - is much harder to crack then than a discrete module.<p><a href="https://news.ycombinator.com/item?id=46676919">https://news.ycombinator.com/item?id=46676919</a></p>
]]></description><pubDate>Fri, 06 Mar 2026 05:52:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47271375</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47271375</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47271375</guid></item><item><title><![CDATA[New comment by kro in "Remotely unlocking an encrypted hard disk"]]></title><description><![CDATA[
<p>TPM definitely rises the effort by a lot to break it. But by default the communication with it is not encrypted, so especially for modules not built into the cpu wire/bus-tapping is a thing.<p><a href="https://news.ycombinator.com/item?id=46676919">https://news.ycombinator.com/item?id=46676919</a></p>
]]></description><pubDate>Thu, 05 Mar 2026 21:54:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47267835</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47267835</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47267835</guid></item><item><title><![CDATA[New comment by kro in "Remotely unlocking an encrypted hard disk"]]></title><description><![CDATA[
<p>Good FAQ, clearly stating the weak point of physical access. For a server that threatmodel can work, for a fleet of edge/iot devices in unsecured locations without permanent uptime there is no real solution to be expected without custom silicon logic (like in smartcards) on the soc.</p>
]]></description><pubDate>Thu, 05 Mar 2026 21:46:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47267746</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47267746</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47267746</guid></item><item><title><![CDATA[New comment by kro in "Payment fees matter more than you think"]]></title><description><![CDATA[
<p>In general I'm all for free and European systems, but SEPA payments imo still have pain points:<p>- you can send money to companies and individuals alike. It's easier to trick people into fake shop payments, a card payment provider requires at least a bit it verification/registration<p>- it's really hard to dispute/call back sepa payments. The card companies often step in there afaik</p>
]]></description><pubDate>Tue, 03 Mar 2026 22:09:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47239767</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47239767</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47239767</guid></item><item><title><![CDATA[New comment by kro in "Robust and efficient quantum-safe HTTPS"]]></title><description><![CDATA[
<p>The title is vague, my first thought was "We already have MLKEM". Which is enough against passive attackers.<p>The article apparently is about the CA/certs for authenticating the server, a part of HTTPS</p>
]]></description><pubDate>Sun, 01 Mar 2026 13:51:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47206683</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=47206683</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47206683</guid></item><item><title><![CDATA[New comment by kro in "We Do Not Support Opt-Out Forms (2025)"]]></title><description><![CDATA[
<p>+1, Even if they validate DKIM/SPF+alignment (aka DMARC) that would only verify the domain. There is no local part verification possible for the receiver, the sending server needs to be trusted with proper auth</p>
]]></description><pubDate>Tue, 27 Jan 2026 16:41:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46782394</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=46782394</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46782394</guid></item><item><title><![CDATA[New comment by kro in "Getting a Gemini API key is an exercise in frustration"]]></title><description><![CDATA[
<p>Agree, Google made it really easy here, compared to using service account certificates like with some of their other APIs.</p>
]]></description><pubDate>Thu, 11 Dec 2025 05:59:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46228172</link><dc:creator>kro</dc:creator><comments>https://news.ycombinator.com/item?id=46228172</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46228172</guid></item></channel></rss>