<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: krooj</title><link>https://news.ycombinator.com/user?id=krooj</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 22 Apr 2026 10:14:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=krooj" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by krooj in "The Vercel breach: OAuth attack exposes risk in platform environment variables"]]></title><description><![CDATA[
<p>Interesting - I wonder if this isn't a case of theft on a refresh token that was minted by a non-confidential 3LO flow w/PKCE. That would explain how a leaked refresh token could then be used to obtain access, but does the Vercel A/S not implement any refresh token reuse detection? i.e.: you see the same R/T more than once, you nuke the entire session b/c it's assumed the R/T was compromised.</p>
]]></description><pubDate>Tue, 21 Apr 2026 18:26:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47852530</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=47852530</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47852530</guid></item><item><title><![CDATA[New comment by krooj in "Dell admits consumers don't care about AI PCs"]]></title><description><![CDATA[
<p>Question - from the perspective of the actual silicon, are these NPUs just another form of SIMD? If so, that's laughable sleight of hand and the circuits will be relegated to some mothball footnote in the same manner as AVX512, etc.<p>To be fair, SIMD made a massive difference for early multimedia PCs for things like music playback, gaming, and composited UIs.</p>
]]></description><pubDate>Thu, 08 Jan 2026 21:51:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46547002</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=46547002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46547002</guid></item><item><title><![CDATA[New comment by krooj in "Cloudlflare builds OAuth with Claude and publishes all the prompts"]]></title><description><![CDATA[
<p>The comment in lines 163 - 172 make some claims that are outright false and/or highly A/S dependent, to the point where I question the validity of this post entirely. While it's possible that an A/S can be pseudo-generated based on lots of training data, each implementation makes very specific design choices: i.e.: Auth0's A/S allows for a notion of "leeway" within the scope of refresh token grant flows to account for network conditions, but other A/S implementations may be far more strict in this regard.<p>My point being: assuming you have RFCs (which leave A LOT to the imagination) and some OSS implementations to train on, each implementation usually has too many highly specific choices made to safely assume an LLM would be able to cobble something together without an amount of oversight effort approaching simply writing the damned thing yourself.</p>
]]></description><pubDate>Mon, 02 Jun 2025 16:05:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=44160267</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=44160267</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44160267</guid></item><item><title><![CDATA[New comment by krooj in "Alberta separatism push roils Canada"]]></title><description><![CDATA[
<p>This is one of those cases where I would hope that extremely strong federalism is exercised from Ottawa: essentially, Alberta could be dissolved, stripped of its provincial status and relegated to a territory. From that point, allow for further subdivision to the various First Nations people, allowing reformation into other territories or offer provincial status. The rest of it could be federally administered - see how they like that.<p>As much as it pains me to say it, Canada's diversity is also it's weakness, and there needs to be precedent - perhaps not as severe as in the US - that you do NOT leave the dominion.</p>
]]></description><pubDate>Fri, 23 May 2025 21:40:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=44076876</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=44076876</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44076876</guid></item><item><title><![CDATA[New comment by krooj in "California's most neglected group of students: the gifted ones"]]></title><description><![CDATA[
<p>Yep - I remember the CCAT from 4th grade that resulted in my being placed into a different class for 5th. AFAIK, we were given this test "cold" (no prep) and I remember it being timed.</p>
]]></description><pubDate>Tue, 26 Nov 2024 20:18:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42249601</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=42249601</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42249601</guid></item><item><title><![CDATA[New comment by krooj in "OpenID Connect specifications published as ISO standards"]]></title><description><![CDATA[
<p>> In short, Open ID Connect is quite accurately described as an Authentication standard. But OAuth 2.0 has little to do with Authorization. It allows clients to specify the "scope" parameter, but does not determine how scopes are parsed, when user and client are permitted to request or grant a certain scope and what kind of access control model (RBAC, ABAC, PBAC, etc.) is used. That's ok, since it leaves the implementers with a lot of flexibility, but it clearly means OAuth 2.0 is not an authorization standard. It only concerns itself with requesting authorization in unstructured form[3].<p>This misses the mark - scopes are abstractions for capabilities granted to the authorized bearer (client) of the issued access token. These capabilities are granted by the resource owner, let's say, a human principal, in the case of the authorization_code grant flow, in the form of a prompt for consent. The defined capabilities/scopes are specifically ambiguous as to how they would/should align with finer-grained runtime authorization checks (RBAC, etc), since it's entirely out of the purview of the standard and would infringe on underlying product decisions that may have been established decades prior. Moreover, scopes are overloaded in the OAuth2.0/OIDC ecosystem: some trigger certain authorization server behaviours (refresh token, OIDC, etc), whereas others are concerned with the protected resource.<p>It's worth noting that the ambiguity around scopes and fine-grained runtime access permissions is an industry unto itself :)<p>RFC 9396 is interesting, but naive, and for a couple of reasons: 1) it assumes that information would like to be placed on the front-channel; 2) does not scale in JWT-based token systems without introducing heavier back-channel state.<p>I personally do not view OIDC as an authentication standard - at least not a very good one - since all it can prove is that the principal was valid within a few milliseconds of the iat on that id_token. The recipient cannot and should not take receipt of this token as true proof of authentication, especially when we consider that the authorization server delegates authentication to a separate system. The true gap that OIDC fills is the omission of principal identification from the original OAuth2.0 specification. Prior to OIDC, many authorization servers would issue principal information as part of their response to a token introspection endpoint.</p>
]]></description><pubDate>Mon, 11 Nov 2024 04:33:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=42104604</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=42104604</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42104604</guid></item><item><title><![CDATA[New comment by krooj in "Good programmers worry about data structures and their relationships"]]></title><description><![CDATA[
<p>> The industry predominately rewards writing code, not designing software.<p>The sad part of this is that code is absolutely a side-effect of design and conception: without a reason and reasonable approach, code shouldn't exist. I really think that the relative austerity happening in industry right now will shine a light on poor design: if your solution to solving poorly understood spaces was to add yet another layer of indirection in the form of a new "microservice" as the problem space changed over time, it's probably more likely that there was an inherent poor underlying understanding of the domain and lack of planning extensibility in anticipation. Essentially, code (bodies) and compute aren't as "cheap" as they were when money was free, so front-loading intelligent design and actually thinking about your space and it's use-cases becomes more and more important.</p>
]]></description><pubDate>Fri, 16 Aug 2024 21:09:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41270441</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=41270441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41270441</guid></item><item><title><![CDATA[New comment by krooj in "Good programmers worry about data structures and their relationships"]]></title><description><![CDATA[
<p>Linus always has a great way of summarizing what others might be thinking (nebulously). What's being said in the article is really mirrored in the lost art of DDD, and when I say "lost" I mean that most developers I encounter these days are far more concerned with algorithms and shuttling JSON around than figuring out the domain they're working within and modelling entities and interactions. In modern, AWS-based, designs, this looks like a bunch of poorly reasoned GSIs in DDB, anemic objects, and script-like "service" layers that end up being hack upon hack. Maybe there was an implicit acknowledgement that the domain's context would be well defined enough within the boundaries of a service? A poor assumption, if you ask me.<p>I don't know where our industry lost design rigor, but it happened; was it in the schools, the interviewing pipeline, lowering of the bar, or all of the above?</p>
]]></description><pubDate>Fri, 16 Aug 2024 19:07:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=41269385</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=41269385</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41269385</guid></item><item><title><![CDATA[New comment by krooj in "Ontario Science Centre to close immediately due to risk of roof collapse"]]></title><description><![CDATA[
<p>Weird - this is the first place I saw the "internet" on display as a kid. Shame to see it close in such an unceremonious way.</p>
]]></description><pubDate>Fri, 21 Jun 2024 20:45:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=40753607</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=40753607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40753607</guid></item><item><title><![CDATA[New comment by krooj in "Microsoft is a national security threat: ex-White House cyber policy director"]]></title><description><![CDATA[
<p>You'd be surprised at how little cloud vendors give a shit about security internally. Story time: I recently went ahead and implemented key rotation for one of our authz services, since it had none, and was reprimanded for "not implementing it like Google". Fun fact: Google's jwks.json endpoint claims to be "certs" from the path (<a href="https://www.googleapis.com/oauth2/v3/certs" rel="nofollow">https://www.googleapis.com/oauth2/v3/certs</a>). They are not certs - there is no X.509 wrapper, no stated expiration, no trust hierarchy. Clients are effectively blind when performing token validation with this endpoint, and it's really shitty.<p>Other nonsense I've seen: leaking internally signed tokens for external use (front-channel), JWTs being validated without a kid claim in the header - so there's some sketchy coupling going on, skipping audience validation, etc...<p>Not much surprises me anymore when it comes to this kinda stuff - internally, I suspect most cloud providers operate like "feature factories" and security is treated as a CYA/least-concern thing. Try pushing for proper authz infrastructure inside your company and see what kinda support you'll get.</p>
]]></description><pubDate>Sun, 21 Apr 2024 17:22:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=40107438</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=40107438</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40107438</guid></item><item><title><![CDATA[New comment by krooj in "Why drivers risk tickets instead of parking in their garages"]]></title><description><![CDATA[
<p>You really think that's anti-social behaviour? It's a matter of practicality, my delicate flower.</p>
]]></description><pubDate>Sun, 14 Apr 2024 00:23:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=40027532</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=40027532</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40027532</guid></item><item><title><![CDATA[New comment by krooj in "Why drivers risk tickets instead of parking in their garages"]]></title><description><![CDATA[
<p>This is basically how I handle it, and we live in the neighborhood mentioned by this article. The disability claim is largely a straw man argument: I've never seen someone in a wheelchair try to navigate SF streets - they're far, far too hilly and para-transport exists. This whole thing comes down to SFMTA being a bunch of crash-grabbing motherfuckers. The amount of revenue the city takes in through ticketing is outrageous, to the point that it's less and less about bylaw enforcement and more about making money.<p>I think last year my total $-amount for SFMTA tickets came to ~$1300? Still cheaper than paying for a garage or wasting my time trying to find street parking.<p>More on context here: the sidewalks of the outer sunset and outer richmond are extremely wide, to the point were you could easily parallel park 1.5 cars right on the sidewalk, so it's trivial to park a car such that it being partially in the driveway will leave more than enough space for anyone to pass.</p>
]]></description><pubDate>Sat, 13 Apr 2024 20:57:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=40026047</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=40026047</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40026047</guid></item><item><title><![CDATA[New comment by krooj in "Cystic fibrosis breakthrough has given patients a chance to live longer"]]></title><description><![CDATA[
<p>I also have the same mutation, as does my wife. From what I've been told by various hematologists, vascular surgeons, and interventional radiologists, it's a very weak clotting disorder, but you do have to keep an eye on certain environmental factors: smoking, hydration, movement, and trauma/surgery. To put it another way, FVL is fairly benign until you're already way into Virchow's danger done, and at that point it's gonna work against you. When it comes to VTE in the presence of ONLY FVL, I would shoot serious side-eye at a doc that chalked it up to the mutation - there's usually something else going on.</p>
]]></description><pubDate>Sun, 10 Mar 2024 02:54:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=39656373</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=39656373</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39656373</guid></item><item><title><![CDATA[New comment by krooj in "Cystic fibrosis breakthrough has given patients a chance to live longer"]]></title><description><![CDATA[
<p>I'll echo this - I have had two left leg DVTs, spaced about 7 years apart, and after the second event, really started diving into medical publications - surgical journals, medical textbooks, clinical trials - as a means to better understand the condition, it's pathology, etc. I ultimately submitted to testing and discovered a congenital stenosis of the left iliac vein with heavy retroperitoneal collateralization that necessitated a stent to keep that iliac vein open.<p>I also had a quick look into the social media (primarily reddit) aspect of these vascular conditions, and it's a pile of dogshit. Most of these patient communities bill themselves as "support groups", but there's never any real discussion on meaningful research, drug, or device advancements. They places serve primarily as "pity pits" for chronic moaners and scammers selling alternative medicine.</p>
]]></description><pubDate>Sat, 09 Mar 2024 20:04:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=39654337</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=39654337</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39654337</guid></item><item><title><![CDATA[New comment by krooj in "How Open ID Connect Works"]]></title><description><![CDATA[
<p>They absolutely do not and also introduce a significant amount of overhead with respect to key/certificate management.</p>
]]></description><pubDate>Thu, 04 Jan 2024 19:09:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=38870951</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=38870951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38870951</guid></item><item><title><![CDATA[New comment by krooj in "How Open ID Connect Works"]]></title><description><![CDATA[
<p>No, there's no explanation.</p>
]]></description><pubDate>Thu, 04 Jan 2024 18:54:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=38870793</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=38870793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38870793</guid></item><item><title><![CDATA[New comment by krooj in "Google OAuth is broken (sort of)"]]></title><description><![CDATA[
<p>Agree - you only need to look at things like the hybrid flows to see where things fall apart: why would you issue an id_token that contains user information to a client which hasn't yet fully authenticated itself via a code-to-token exchange with passing it's client_id + secret? If you look at certain implementations, such as Auth0, you'll find that they actually POST that token back at the redirect_uri, since, a) it's at least registered against the client; b) it's not subject to capture as easily. The spec says NOTHING about protecting this info, though.</p>
]]></description><pubDate>Fri, 22 Dec 2023 05:04:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=38731128</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=38731128</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38731128</guid></item><item><title><![CDATA[New comment by krooj in "What Is OIDC?"]]></title><description><![CDATA[
<p>Yup - OIDC can be boiled down to:<p>1. The OG OAuth2 spec never said anything about identifying principals
2. OIDC mandated an id_token to avoid the hit of POSTing the access token to an introspection endpoint
3. The shape of the id_token is a JWT<p>This doc is junk, btw - it's suggesting the client use the id_token for the purposes of authentication? I wouldn't trust that token beyond some basics, unless you have very strong controls over the authorization server and IdP to ensure things like email verification are propagated correctly.</p>
]]></description><pubDate>Fri, 22 Dec 2023 04:53:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=38731070</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=38731070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38731070</guid></item><item><title><![CDATA[New comment by krooj in "What Is OIDC?"]]></title><description><![CDATA[
<p>1000x this - each and every CAIM has their own "interpretation" of what the various constructs actually mean in the various RFCs and it leads to a lot of hodge-podge integrations that organizations outgrow. Things like Okta and Auth0 might seem shiny and easy on the face of it, and they are for very small startups, but quickly devolve into dogshit as you scale.</p>
]]></description><pubDate>Fri, 22 Dec 2023 04:48:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=38731044</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=38731044</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38731044</guid></item><item><title><![CDATA[New comment by krooj in "Google OAuth is broken (sort of)"]]></title><description><![CDATA[
<p>I feel as though this is a consequence of organizations not really understanding how complex the space truly is. The way I've watched OAuth2 + OIDC get adopted in various companies was never from a security-first perspective; rather, it's always sold as a "feature": login with x, etc. Even when there are moves to make flows more secure - PKCE, for example - you end up playing a game of "whack-a-mole" with various platforms doing shitty things in terms of cookie sharing, redirect handling, and the like. The fundamentals of 3-legged OAuth2 are sound and there's tons of prior art (CAS comes to mind), but the OpenID Foundation should be tarred and feathered for the shitty way they market and sold OIDC.</p>
]]></description><pubDate>Thu, 21 Dec 2023 16:34:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=38722715</link><dc:creator>krooj</dc:creator><comments>https://news.ycombinator.com/item?id=38722715</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38722715</guid></item></channel></rss>