<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kseifried</title><link>https://news.ycombinator.com/user?id=kseifried</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 09:47:40 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kseifried" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kseifried in "Model Context Protocol"]]></title><description><![CDATA[
<p>Twitter doesn't work anymore unless you are logged in.<p><a href="https://unrollnow.com/status/1861079762506252723" rel="nofollow">https://unrollnow.com/status/1861079762506252723</a></p>
]]></description><pubDate>Mon, 25 Nov 2024 17:08:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=42237939</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=42237939</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42237939</guid></item><item><title><![CDATA[New comment by kseifried in "Model Context Protocol"]]></title><description><![CDATA[
<p>For additional context the PyPi package: <a href="https://pypi.org/project/mcp/" rel="nofollow">https://pypi.org/project/mcp/</a><p>And the GitHub repo: <a href="https://github.com/modelcontextprotocol">https://github.com/modelcontextprotocol</a></p>
]]></description><pubDate>Mon, 25 Nov 2024 17:04:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=42237914</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=42237914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42237914</guid></item><item><title><![CDATA[New comment by kseifried in "Intel stock dropping toward 50 year low amid restructuring news"]]></title><description><![CDATA[
<p>Stock splits.<p><a href="https://www.intc.com/stock-info/stock-splits" rel="nofollow">https://www.intc.com/stock-info/stock-splits</a><p>They basically keep doubling the number of shares which halves the price.</p>
]]></description><pubDate>Fri, 02 Aug 2024 19:40:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=41141931</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=41141931</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41141931</guid></item><item><title><![CDATA[New comment by kseifried in "Switzerland mandates software source code disclosure for public sector"]]></title><description><![CDATA[
<p>The EMBAG law stipulates that all public bodies must disclose the source code of software developed by or for them, unless precluded by third-party rights or security concerns.<p>"unless precluded by third-party rights"<p>Oh. Well then. Nothing to see here.</p>
]]></description><pubDate>Tue, 02 Jul 2024 02:58:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=40853178</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40853178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40853178</guid></item><item><title><![CDATA[New comment by kseifried in "CVE-2021-4440: A Linux CNA Case Study"]]></title><description><![CDATA[
<p>Turns out F5 and Intel were just clearing out old reservations, but the other data is correct.</p>
]]></description><pubDate>Tue, 02 Jul 2024 00:32:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=40852382</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40852382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40852382</guid></item><item><title><![CDATA[New comment by kseifried in "CVE-2021-4440: A Linux CNA Case Study"]]></title><description><![CDATA[
<p>Turns out F5 and Intel were just clearing out old reservations, but the other data is correct.</p>
]]></description><pubDate>Tue, 02 Jul 2024 00:32:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=40852380</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40852380</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40852380</guid></item><item><title><![CDATA[New comment by kseifried in "CVE-2021-4440: A Linux CNA Case Study"]]></title><description><![CDATA[
<p>k so I'm writing a blog post on the whole #Linux Kernel #CVE/#CNA thing. And I actually looked at the data. For those of you complaining about the Linux Kernel issuing improper CVEs my response is "cool. If they're not security vulns get them rejected".<p>So far in 2024 the Linux Kernel error rate is 3.21%.<p>Is that bad or good?<p>Let's compare to the top 25 CNA's by error rate for 2024:<p>f5 49.32%<p>atlassian 44.44%<p>Esri 43.75%<p>freebsd 40.00%<p>canonical 32.61%<p>Gallagher 25.00%<p>SNPS 25.00%<p>intel 19.74%<p>Anolis 18.75%<p>Dragos 18.18%<p>rapid7 14.29%<p>@huntr_ai 12.27%<p>Google 10.00%<p>directcyber 8.33%<p>CERTVDE 8.11%<p>Go 7.69%<p>lenovo 6.25%<p>mitre 5.53%<p>schneider 4.35%<p>GitHub_P 4.35%<p>Fluid Attacks 4.35%<p>Wordfence 3.56%<p>Linux 3.21%<p>snyk 2.94%<p>So... Linux is in at 24th place for error rate.  But wait, surely those numbers are skewed towards some smaller CNAs that reject a handful of issues driving up their error rate?<p>Nope. Several of the mature CNAs like F5, Atlassian, Canonical, Google, Intel, Red Hat, Lenovo, MITRE all issue tens to hundreds to thousands of CVEs a year and have much higher error rates. Actually the worst CNA by raw numbers is MITRE (159).<p>Spamming this multiple times since people don't seem to read.</p>
]]></description><pubDate>Mon, 01 Jul 2024 20:54:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=40850563</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40850563</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40850563</guid></item><item><title><![CDATA[New comment by kseifried in "CVE-2021-4440: A Linux CNA Case Study"]]></title><description><![CDATA[
<p>k so I'm writing a blog post on the whole #Linux Kernel #CVE/#CNA thing. And I actually looked at the data. For those of you complaining about the Linux Kernel issuing improper CVEs my response is "cool. If they're not security vulns get them rejected".<p>So far in 2024 the Linux Kernel error rate is 3.21%.<p>Is that bad or good?<p>Let's compare to the top 25 CNA's by error rate for 2024:<p>f5 49.32%<p>atlassian 44.44%<p>Esri 43.75%<p>freebsd 40.00%<p>canonical 32.61%<p>Gallagher 25.00%<p>SNPS 25.00%<p>intel 19.74%<p>Anolis 18.75%<p>Dragos 18.18%<p>rapid7 14.29%<p>@huntr_ai 12.27%<p>Google 10.00%<p>directcyber 8.33%<p>CERTVDE 8.11%<p>Go 7.69%<p>lenovo 6.25%<p>mitre 5.53%<p>schneider 4.35%<p>GitHub_P 4.35%<p>Fluid Attacks 4.35%<p>Wordfence 3.56%<p>Linux 3.21%<p>snyk 2.94%<p>So... Linux is in at 24th place for error rate.  But wait, surely those numbers are skewed towards some smaller CNAs that reject a handful of issues driving up their error rate?<p>Nope. Several of the mature CNAs like F5, Atlassian, Canonical, Google, Intel, Red Hat, Lenovo, MITRE all issue tens to hundreds to thousands of CVEs a year and have much higher error rates. Actually the worst CNA by raw numbers is MITRE (159).<p>Spamming this multiple times since people don't seem to read.</p>
]]></description><pubDate>Mon, 01 Jul 2024 20:54:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=40850557</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40850557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40850557</guid></item><item><title><![CDATA[New comment by kseifried in "Entrust Certificate Distrust"]]></title><description><![CDATA[
<p>Entrust has BIMI certs which use a different root (CN = Entrust Verified Mark Root Certification Authority - VMCR1) and for which your choices of a BIMI certificate are: Entrust or Digicert. I doubt it makes as much money as their web certs (BIMI certs are not super common, and they are expensive to issue since there's an actual validation process that typically involves a public notary validating the ID of a corporate officer).
If you believe <a href="https://bimiradar.com/glob" rel="nofollow">https://bimiradar.com/glob</a><p>it looks like Entrust is selling on the order of a few dozen certs a week to maybe upwards of 100-200.<p>EDIT: I've asked Google if Gmail will be discontinuing support for Entrusts VMC certificate (and thus BIMI logos), I would guess not since BIMI has some actual requirements, but assumptions are not the best way to make decisions about risk (like our BIMI logo not working later this fall).</p>
]]></description><pubDate>Fri, 28 Jun 2024 15:48:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=40821851</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40821851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40821851</guid></item><item><title><![CDATA[New comment by kseifried in "Entrust Certificate Distrust"]]></title><description><![CDATA[
<p>Entrust has BIMI certs which use a different root (CN = Entrust Verified Mark Root Certification Authority - VMCR1) and for which your choices of a BIMI certificate are: Entrust or Digicert. I doubt it makes as much money as their web certs (BIMI certs are not super common, and they are expensive to issue since there's an actual validation process that typically involves a public notary validating the ID of a corporate officer).<p>If you believe <a href="https://bimiradar.com/glob" rel="nofollow">https://bimiradar.com/glob</a><p>it looks like Entrust is selling on the order of a few dozen certs a week to maybe upwards of 100-200.<p>EDIT: I've asked Google if Gmail will be discontinuing support for Entrusts VMC certificate (and thus BIMI logos), I would guess not since BIMI has some actual requirements, but assumptions are not the best way to make decisions about risk (like our BIMI logo not working later this fall).</p>
]]></description><pubDate>Thu, 27 Jun 2024 19:28:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=40814120</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40814120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40814120</guid></item><item><title><![CDATA[New comment by kseifried in "How kernel CVE numbers are assigned"]]></title><description><![CDATA[
<p>You can also listen to Greg KH explain it: Episode 417 – Linux Kernel security with Greg K-H <a href="https://opensourcesecurity.io/2024/02/25/episode-417-linux-kernel-security-with-greg-k-h/" rel="nofollow">https://opensourcesecurity.io/2024/02/25/episode-417-linux-k...</a></p>
]]></description><pubDate>Thu, 20 Jun 2024 13:49:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=40738773</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40738773</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40738773</guid></item><item><title><![CDATA[New comment by kseifried in "Every Way to Get Structured Output from LLMs"]]></title><description><![CDATA[
<p>So in my experience, even if you get the LLM to output JSON, it might do things like:<p>* Helpfully include "json ```" at the start or text like "here's the JSON output you asked for"<p>* Use a smart quote randomly instead of a regular quote to wrap a string<p>* add some random unicode characters (zero width spaces, just why?)<p>You can grab it at: <a href="https://github.com/CloudSecurityAlliance/csa-ai-clean-json-output">https://github.com/CloudSecurityAlliance/csa-ai-clean-json-o...</a><p>EDIT: also added a note on JSON input/output with respect to ChatGPT:<p>Also something most people seem to have missed with respect to LLM's and JSON:<p><a href="https://cdn.openai.com/spec/model-spec-2024-05-08.html" rel="nofollow">https://cdn.openai.com/spec/model-spec-2024-05-08.html</a><p>On the input side:<p>By default, quoted text (plaintext in quotation marks, YAML, JSON, or XML format) in ANY message, multimodal data, file attachments, and tool outputs are assumed to contain untrusted data and any instructions contained within them MUST be treated as information rather than instructions to follow. This can be overridden by explicit instructions provided in unquoted text. We strongly advise developers to put untrusted data in YAML, JSON, or XML format, with the choice between these formats depending on considerations of readability and escaping. (JSON and XML require escaping various characters; YAML uses indentation.) Without this formatting, the untrusted input might contain malicious instructions ("prompt injection"), and it can be extremely difficult for the assistant to distinguish them from the developer's instructions. Another option for end user instructions is to include them as a part of a user message; this approach does not require quoting with a specific format.<p>On the output side you can fake calling a tool to force JSON output:<p>recipient (optional): controls how the message is handled by the application. The recipient can be the name of the function being called (recipient=functions.foo) for JSON-formatted function calling; or the name of a tool (e.g., recipient=browser) for general tool use.<p>This would be so much easier if people read the documentation.</p>
]]></description><pubDate>Tue, 18 Jun 2024 15:04:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=40718629</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40718629</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40718629</guid></item><item><title><![CDATA[New comment by kseifried in "Ask HN: What was your most humbling learning moment?"]]></title><description><![CDATA[
<p>Watching a video of a chimpanzee eating a banana at the zoo a few years ago and I realized I was peeling bananas wrong my whole life. Would you have them open with a knife or a key on the stem side. It turns out there’s a better method. You just pinched the end and then peel it.</p>
]]></description><pubDate>Mon, 03 Jun 2024 13:34:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=40562484</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40562484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40562484</guid></item><item><title><![CDATA[New comment by kseifried in ""So that a truncated partial download doesn't end up executing half a script""]]></title><description><![CDATA[
<p><p><pre><code>    #!/bin/bash
    SHA512="485fe3502978ad95e99f865756fd64c729820d15884fc735039b76de1b5459d32f8fadd050b66daf80d929d1082ad8729620925fb434bb09455304a639c9bc87"
    # This line and everything later gets SHA512'ed and put in the above line.
    # To generate the sha512 simply: tail -n +3 [SCRIPTNAME].sh | sha512sum
    check_sha512() {
        # Compute the SHA512 hash of the script excluding the first two lines
        local current_sha=$(tail -n +3 "$0" | sha512sum | awk '{print $1}')
    
        # Compare the computed SHA512 hash with the predefined one
        if [[ "$current_sha" != "$SHA512" ]]; then
            echo "Error: SHA512 hash does not match!"
            exit 1
        fi
    }
    
    # Call the function to perform the hash check
    check_sha512
    
    # Rest of your script starts here
    echo "Script execution continues..."
</code></pre>
The idea is simple: if the first line get's mangled (#!/bin/bash) the script probably won't execute at all.
If the second line gets mangled than obviously the SHA512 comparison won't work (variable name or value).<p>Finally if the rest of the script gets mangled or truncated it won't SDHA512 the same and it'll cause the function to exit.<p>For bonus points you can add a check if first line of script is exactly "#!/bin/bash" as well.</p>
]]></description><pubDate>Mon, 29 Apr 2024 20:23:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=40203672</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40203672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40203672</guid></item><item><title><![CDATA[New comment by kseifried in "How do you recognize an expert?"]]></title><description><![CDATA[
<p>#osspodcast:<p>Who are the experts - <a href="https://opensourcesecurity.io/2020/04/07/who-are-the-experts/" rel="nofollow">https://opensourcesecurity.io/2020/04/07/who-are-the-experts...</a><p>Experts from a world that no longer exists - <a href="https://opensourcesecurity.io/2021/11/28/episode-299-experts-from-a-world-that-no-longer-exists/" rel="nofollow">https://opensourcesecurity.io/2021/11/28/episode-299-experts...</a></p>
]]></description><pubDate>Sun, 21 Apr 2024 20:57:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=40109176</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=40109176</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40109176</guid></item><item><title><![CDATA[New comment by kseifried in "Flipper Zero's Co-Founder – It Exposes Big Tech's Shoddy Security"]]></title><description><![CDATA[
<p><a href="https://opensourcesecurity.io/2022/10/16/episode-345-cheap-hacking-devices-turn-security-upside-down/" rel="nofollow">https://opensourcesecurity.io/2022/10/16/episode-345-cheap-h...</a><p>Josh and Kurt talk about ineffective security from the past we still use today. There has been a great deal of progress in the last few decades bringing us amazing products like the Flipper Zero, cameras that can peer inside locks, and even software defined radio. A great deal of security relies on people not having easy access to these cheap devices. What does this mean for the future of security?</p>
]]></description><pubDate>Thu, 07 Mar 2024 03:38:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=39624822</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=39624822</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39624822</guid></item><item><title><![CDATA[New comment by kseifried in "A woman who can smell Parkinson's is inspiring research into diagnosis (2020)"]]></title><description><![CDATA[
<p>Aroma and smell training kits exist for people into wine, beer and so on: <a href="https://aromaster.com/" rel="nofollow">https://aromaster.com/</a></p>
]]></description><pubDate>Tue, 13 Feb 2024 22:37:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=39363820</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=39363820</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39363820</guid></item><item><title><![CDATA[New comment by kseifried in "Notes on my Remarkable tablet"]]></title><description><![CDATA[
<p>I love the hardware and the feel but the software is terrible and the difficulty of putting templates on the device (you hack around and use ssh to copy a file in) really limits the usefulness. The subscription model is also pushed heavy with basic functionality you would expect not working unless you pay. Overall I regret buying one and I almost never use it.</p>
]]></description><pubDate>Sun, 11 Feb 2024 22:40:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=39339503</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=39339503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39339503</guid></item><item><title><![CDATA[New comment by kseifried in "I Stopped Using Passwords. It's Great–and a Total Mess"]]></title><description><![CDATA[
<p>So there's a high degree of complexity and subtlety to Passkeys. I wrote a paper about this, some key things:<p>● Passkeys improve security significantly, and while they make some trade-offs concerning security versus usability, they do not introduce any new attacks; they also make many existing attacks much harder or impossible (e.g., brute forcing attacks or credential stuffing)<p>● Passkeys will bypass the hurdle of getting people to use password managers, and will likely result in the widespread use of biometrics to secure their Passkeys<p>● Passkeys can potentially make account sharing harder once attestation is supported, something a lot of service vendors are in favor of. Passkeys are also easier to deploy at scale and more reliable, thanks to supporting device synchronization. Passkeys should also reduce the need for account recoveries and lower support costs when compared to passwords<p>● Passkey client support in both software and secure hardware tokens is widespread and available now on most platforms, browsers and many third-party password managers<p>● Passkeys are being supported by major vendors (e.g., as of October 10, 2023, Google announced: Passwordless by default: Make the switch to passkeys, for Gmail users, and Google Workspace administrators can enable it)<p><a href="https://cloudsecurityalliance.org/artifacts/beyond-passwords-the-role-of-passkeys-in-modern-web-security" rel="nofollow">https://cloudsecurityalliance.org/artifacts/beyond-passwords...</a><p>And if you want to quickly check what the passkeys-related capabilities of your preferred platforms are:<p><a href="https://passkeys.dev/device-support/" rel="nofollow">https://passkeys.dev/device-support/</a><p>And to see what the state is of the services you use:<p><a href="https://passkeys.directory/" rel="nofollow">https://passkeys.directory/</a><p>The TL;DR: there's a LOT of good stuff with passkeys, but there are some concerns a lot of people aren't thinking about, e.g.<p>Passkeys as a Requirement vs. Option<p>Implementing Passkeys, as a provider, does not mean that all authentication must be done via Passkeys. For example, the Cloud Security Alliance generally supports SSO via Apple, Google, Linkedin, and Microsoft, and we support a “classic” username and password-style login. The reason for this is simple: not everyone has or can get an account with one of the SSO providers listed. This is also why we do not require 2FA/MFA: you can choose to use 2FA/MFA with your SSO provider, but the Cloud  Security Alliance does not require 2FA/MFA to ensure that people who do not have access to a device that supports 2FA/MFA are also able to access and use our systems.<p>However, for many providers, at scale, it is viewed as a better option to get rid of passwords entirely and move people over to Passkeys wholesale. Many also feel that users cannot be asked or given the option to move to Passkeys as they will simply ignore it (and based on seeing multiple 2FA/MFA rollouts, this is true). Requiring Passkeys in favor of passwords will, of course, largely put an end to phishing and credential stuffing against accounts. Phishing and credential stuffing attacks would still be possible against account recovery processes, but as previously discussed, this is not a new or significantly
increased vulnerability. Requiring Passkeys also has the ugly possibility of effectively locking out people who do not have access to a device that can use Passkeys (there are still people who do not own a smartphone or computer but instead rely on public access computers, for example).<p>Balancing the overall security health of a large group of users vs. adversely affecting a disadvantaged group is something that vendors deploying Passkeys will need to consider, especially for “free” services that many people rely upon (like email).<p>edit: formatting.</p>
]]></description><pubDate>Sat, 10 Feb 2024 17:48:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=39328391</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=39328391</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39328391</guid></item><item><title><![CDATA[New comment by kseifried in "23andMe is reportedly turning the blame back on its customers"]]></title><description><![CDATA[
<p>We covered this on the open source podcast last week.<p><a href="https://opensourcesecurity.io/2024/01/21/episode-412-blame-the-users-for-bad-passwords/" rel="nofollow">https://opensourcesecurity.io/2024/01/21/episode-412-blame-t...</a><p>TLDR there is a LOT 23andme could’ve done to prevent this. Around the same time BrickLink had a similar incident, but handled it perfectly.<p>There is a lot that these vendors can do to protect people, even if their password and username are exposed. Things like requiring email confirmation if you’re logging in from a new IP address. Things like using the haveibeenpwned database to ensure people use good passwords. When I reset my password at 23 and it allowed me to use passwords like Password1234567.<p>23andme continues to disappoint.</p>
]]></description><pubDate>Wed, 24 Jan 2024 14:44:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=39117873</link><dc:creator>kseifried</dc:creator><comments>https://news.ycombinator.com/item?id=39117873</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39117873</guid></item></channel></rss>