<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: maltalex</title><link>https://news.ycombinator.com/user?id=maltalex</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 22:25:07 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=maltalex" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by maltalex in "Warez Scene"]]></title><description><![CDATA[
<p>Wouldn't a "WebRip" have to come from a streaming service by definition?</p>
]]></description><pubDate>Sat, 11 Apr 2026 02:29:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47726697</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47726697</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47726697</guid></item><item><title><![CDATA[Warez Scene]]></title><description><![CDATA[
<p>Article URL: <a href="https://en.wikipedia.org/wiki/Warez_scene">https://en.wikipedia.org/wiki/Warez_scene</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47725942">https://news.ycombinator.com/item?id=47725942</a></p>
<p>Points: 25</p>
<p># Comments: 7</p>
]]></description><pubDate>Sat, 11 Apr 2026 00:52:09 +0000</pubDate><link>https://en.wikipedia.org/wiki/Warez_scene</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47725942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47725942</guid></item><item><title><![CDATA[New comment by maltalex in "Is BGP safe yet?"]]></title><description><![CDATA[
<p>Only with certificate pinning or something similar. Otherwise, the attacker can get valid TLS certificates for any domain hosted on the hijacked IP addresses.</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:35:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604742</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47604742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604742</guid></item><item><title><![CDATA[New comment by maltalex in "Is BGP safe yet?"]]></title><description><![CDATA[
<p>Here are some examples:<p>The attacker can impersonate the victim, get a valid x509 certificate issued to it, and create a perfect replica of their website/api/whatever.<p>The attacker can perform a man-in-the-middle attack on the victim - record traffic, inject traffic, manipulate traffic, etc.<p>The attacker can just deny access to the victim - just drop packets meant for the victim.</p>
]]></description><pubDate>Wed, 01 Apr 2026 15:17:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47602055</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47602055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47602055</guid></item><item><title><![CDATA[New comment by maltalex in "Is BGP safe yet?"]]></title><description><![CDATA[
<p>RPKI doesn't make BGP safe, it makes it <i>safer</i>. BGP hijacks can still happen.<p>RPKI only secures the ownership information of a given prefix, not the path to that prefix. Under RPKI, an attacker can still claim to be on the path to a victim AS, and get the victim's traffic sent to it.<p>The solution to this was supposed to be BGPSec, but it's widely seen as un-deployable.</p>
]]></description><pubDate>Wed, 01 Apr 2026 14:06:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47601086</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47601086</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47601086</guid></item><item><title><![CDATA[New comment by maltalex in "Microsoft Set for Worst Quarter Since 2008"]]></title><description><![CDATA[
<p>Absolutely. They've made the same mess with "Copilot" as with ".NET" in the early 00's [0]. Everything was ".NET" from consumer oriented services (".NET Passport"), to "Visual Studio .NET" without anyone understanding what ".NET" was.<p>Now it's "Microsoft Copilot" which is different from "Microsoft 365 Copilot", which is different from "Copilot Chat" and from "GitHub Copilot", and the many other flavors.<p>It's a mess.<p>Still, their developer-focused offering seems to be "GitHub Copilot", which among other things includes "GitHub Copilot CLI" [1], their terminal-based agent. It's not bad.<p>[0]: <a href="https://en.wikipedia.org/wiki/Microsoft_.NET_strategy" rel="nofollow">https://en.wikipedia.org/wiki/Microsoft_.NET_strategy</a><p>[1]: <a href="https://github.com/features/copilot/cli/" rel="nofollow">https://github.com/features/copilot/cli/</a></p>
]]></description><pubDate>Sun, 29 Mar 2026 00:53:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47559479</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47559479</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47559479</guid></item><item><title><![CDATA[New comment by maltalex in "Microsoft Set for Worst Quarter Since 2008"]]></title><description><![CDATA[
<p>“Copilot” is not one product, it’s around 15 different products, seriously.<p>I think that people often compare apples to oranges by comparing the “copilot” they have in Windows/Office/Teams etc to Claude Code which is ridiculous.<p>A better product to compare Claude Code to would be “Github Copilot CLI”, but I haven’t seen the two seriously compared anywhere.</p>
]]></description><pubDate>Sat, 28 Mar 2026 20:13:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47557799</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47557799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47557799</guid></item><item><title><![CDATA[Ten Months with Copilot Coding Agent in Dotnet/Runtime]]></title><description><![CDATA[
<p>Article URL: <a href="https://devblogs.microsoft.com/dotnet/ten-months-with-cca-in-dotnet-runtime/">https://devblogs.microsoft.com/dotnet/ten-months-with-cca-in-dotnet-runtime/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47531268">https://news.ycombinator.com/item?id=47531268</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 26 Mar 2026 14:56:12 +0000</pubDate><link>https://devblogs.microsoft.com/dotnet/ten-months-with-cca-in-dotnet-runtime/</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47531268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47531268</guid></item><item><title><![CDATA[Emergent Cyber Behavior: When AI Agents Become Offensive Threat Actors]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.irregular.com/publications/emergent-offensive-cyber-behavior-in-ai-agents">https://www.irregular.com/publications/emergent-offensive-cyber-behavior-in-ai-agents</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47354436">https://news.ycombinator.com/item?id=47354436</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 12 Mar 2026 17:36:31 +0000</pubDate><link>https://www.irregular.com/publications/emergent-offensive-cyber-behavior-in-ai-agents</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47354436</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47354436</guid></item><item><title><![CDATA[New comment by maltalex in "We are building data breach machines and nobody cares"]]></title><description><![CDATA[
<p>> and nobody cares<p>Everyone cares. In fact, there's an entire industry of tools being developed to solve this very problem. The current governance gaps are obvious to anyone who's ever used an agent.<p>We are still in the very early stages of all of this. The capabilities of current models are ahead of our engineering practices, and other organizational practices for that matter. Everyone is new to this.</p>
]]></description><pubDate>Wed, 11 Mar 2026 03:01:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47331311</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47331311</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47331311</guid></item><item><title><![CDATA[New comment by maltalex in "When AI writes the software, who verifies it?"]]></title><description><![CDATA[
<p>Maybe I'm missing something, but isn't this the same as writing code, but with extra steps?<p>Currently, engineers work with loose specifications, which they translate into code. With the proposed approach, they would need to first convert those specifications into a formally verifiable form before using LLMs to generate the implementation.<p>But to be production-ready, that spec would have to cover all possible use-cases, edge cases, error handling, performance targets, security and privacy controls, etc. That sounds awfully close to being an actual implementation, only in a different language.</p>
]]></description><pubDate>Wed, 04 Mar 2026 01:07:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47241636</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47241636</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47241636</guid></item><item><title><![CDATA[New comment by maltalex in "Turn Dependabot off"]]></title><description><![CDATA[
<p>> Dependabot has some value IME, but all naïve tools that only check software and version numbers against a vulnerability database tend to be noisy if they don’t then do something else to determine whether your code is actually exposed to a matching vulnerability.<p>For non-SaaS products it doesn’t matter. Your customer’s security teams have their own scanners. If you ship them vulnerable binaries, they’ll complain even if the vulnerable code is never used or isn’t exploitable in your product.</p>
]]></description><pubDate>Sat, 21 Feb 2026 15:01:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47101458</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47101458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47101458</guid></item><item><title><![CDATA[New comment by maltalex in "AI is destroying open source, and it's not even good yet"]]></title><description><![CDATA[
<p>It's not just open source though. Many high quality sources of information are being (over-)exploited and hurt in the process. StackOverflow is effectively dead [0], the internet archive is being shunned by publishers [1], scientific journals are bombarded by fake papers [2] (and anecdotally, low-effort LLM-driven reviews), projects like OpenStreetMap incur significant costs due to scraping [3], and many more.<p>We went from <i>data mining</i> to <i>data fracking</i>.<p>[0]: <a href="https://blog.pragmaticengineer.com/stack-overflow-is-almost-dead/" rel="nofollow">https://blog.pragmaticengineer.com/stack-overflow-is-almost-...</a><p>[1]: <a href="https://www.niemanlab.org/2026/01/news-publishers-limit-internet-archive-access-due-to-ai-scraping-concerns/" rel="nofollow">https://www.niemanlab.org/2026/01/news-publishers-limit-inte...</a><p>[2]: <a href="https://www.theregister.com/2024/05/16/wiley_journals_ai/" rel="nofollow">https://www.theregister.com/2024/05/16/wiley_journals_ai/</a><p>[3]: <a href="https://www.heise.de/en/news/OpenStreetMap-is-concerned-thousands-of-AI-bots-are-collecting-data-11157359.html" rel="nofollow">https://www.heise.de/en/news/OpenStreetMap-is-concerned-thou...</a></p>
]]></description><pubDate>Tue, 17 Feb 2026 04:03:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47043580</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=47043580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47043580</guid></item><item><title><![CDATA[New comment by maltalex in "AT&T, Verizon blocking release of Salt Typhoon security assessment reports"]]></title><description><![CDATA[
<p>> you are both confusing two issues.<p>How am I confusing the two? My whole point was the same as yours - that the existence of lawful intercept is a separate issue and that the focus should be on securing telecoms.</p>
]]></description><pubDate>Mon, 09 Feb 2026 18:36:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46949020</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46949020</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46949020</guid></item><item><title><![CDATA[New comment by maltalex in "AT&T, Verizon blocking release of Salt Typhoon security assessment reports"]]></title><description><![CDATA[
<p>I get that you don't like lawful intercept. That's fine. But focusing on only that aspect of telcos derails the conversation and prevents us (in the very broad sense of "us") from making progress on things we all agree on. Can we stop bikeshedding and agree that telcos are critical infrastructure and need to be highly secure in general?<p>A hacker in control of a telco can do as they please regardless of any backdoors or lawful intercept systems. They can just use regular network functions to route calls wherever they want.</p>
]]></description><pubDate>Mon, 09 Feb 2026 17:17:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46947898</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46947898</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46947898</guid></item><item><title><![CDATA[New comment by maltalex in "AT&T, Verizon blocking release of Salt Typhoon security assessment reports"]]></title><description><![CDATA[
<p>Even if the back door wasn't there, you wouldn't want nation state hackers anywhere near telecoms since they're critical infrastructure. Telecoms should be highly secure. Period.</p>
]]></description><pubDate>Mon, 09 Feb 2026 16:29:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46947154</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46947154</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46947154</guid></item><item><title><![CDATA[New comment by maltalex in "AT&T, Verizon blocking release of Salt Typhoon security assessment reports"]]></title><description><![CDATA[
<p>Yes, telecoms should be forced to invest in their own security if they're not doing it. But the focus on the back door misses the point in my opinion. Even if the back door wasn't there, you wouldn't want nation state hackers anywhere near telecoms since they're critical infrastructure.</p>
]]></description><pubDate>Mon, 09 Feb 2026 16:25:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=46947070</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46947070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46947070</guid></item><item><title><![CDATA[New comment by maltalex in "AT&T, Verizon blocking release of Salt Typhoon security assessment reports"]]></title><description><![CDATA[
<p>The problem isn't the back door. Every telecom company in every country provides access for "lawful intercept". Phone taps have been a thing for decades and as far as I know, require a warrant.<p>The problem is that telecoms are very large, very complex environments, often with poor security controls. Investing in better controls is hard, time-consuming and expensive, and many telecoms are reluctant to do it. That's not great great since telcos are prime targets for nation state hackers as Salt Typhoon shows.<p>Hacking the lawful intercept systems is very brazen, but even if the hackers didn't don't go as far, and "only" gained control of normal telco stuff like call routing, numbering, billing, etc. it still would have been incredibly dangerous.</p>
]]></description><pubDate>Mon, 09 Feb 2026 15:45:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46946468</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46946468</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46946468</guid></item><item><title><![CDATA[New comment by maltalex in "Show HN: Browse Internet Infrastructure"]]></title><description><![CDATA[
<p>Nice website, but I feel like calling it "wire wiki" is quite ambitious. Currently, it's a (beautiful) DNS lookup tool, but that's about it. I expected something like RIPE Stat [0], or something like the undersea cable map [1] (based on the "wire" in the name). Also, if you're doing DNS, take a look at resolve.rs [2], they have some nice DNS tools, though not as pretty as yours :)<p>And since you mentioned scanning the IPv4 address space for DNS servers - I did that as well at a some point for a product I've built (and even have a patent on). The list of servers you're going to get with a naive scanning approach is not what you want. It won't include the servers you probably want (such as the customer-facing DNS servers of ISPs) and will include an insane amount of junk like home routers or weird IoT devices that expose their port 53. Hit me up via the email in my profile if you want to chat.<p>[0]: <a href="https://stat.ripe.net/" rel="nofollow">https://stat.ripe.net/</a><p>[1]: <a href="https://www.submarinecablemap.com/" rel="nofollow">https://www.submarinecablemap.com/</a><p>[2]: <a href="https://resolve.rs/" rel="nofollow">https://resolve.rs/</a></p>
]]></description><pubDate>Mon, 09 Feb 2026 14:30:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46945589</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46945589</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46945589</guid></item><item><title><![CDATA[The Trigger in the Haystack: Extracting and Reconstructing LLM Backdoor Triggers]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2602.03085">https://arxiv.org/abs/2602.03085</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46893430">https://news.ycombinator.com/item?id=46893430</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 04 Feb 2026 23:28:00 +0000</pubDate><link>https://arxiv.org/abs/2602.03085</link><dc:creator>maltalex</dc:creator><comments>https://news.ycombinator.com/item?id=46893430</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46893430</guid></item></channel></rss>