<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: maxed</title><link>https://news.ycombinator.com/user?id=maxed</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 01:14:32 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=maxed" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by maxed in "Self-contained Python scripts with uv"]]></title><description><![CDATA[
<p>I took a closer look; uv installs the inline required packages in it's cache directory `~/.cache/uv` (if they are not already there). So the packages will probably exist until the cache is cleared with for example `uv clear`.<p>It's not that the inline requirements make a new `.venv` directory or something, uv seems to link the packages to a central location and reuse them if already there.</p>
]]></description><pubDate>Sun, 30 Mar 2025 15:46:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=43525050</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=43525050</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43525050</guid></item><item><title><![CDATA[Open letter calling for digital autonomy and independence from Big Tech]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.cs.ru.nl/~jhh/open-letter-big-tech.html">https://www.cs.ru.nl/~jhh/open-letter-big-tech.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43321869">https://news.ycombinator.com/item?id=43321869</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 10 Mar 2025 15:52:00 +0000</pubDate><link>https://www.cs.ru.nl/~jhh/open-letter-big-tech.html</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=43321869</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43321869</guid></item><item><title><![CDATA[New comment by maxed in "In memoriam"]]></title><description><![CDATA[
<p>Is Hacker News also affected by this act?</p>
]]></description><pubDate>Sun, 23 Feb 2025 21:22:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=43153339</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=43153339</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43153339</guid></item><item><title><![CDATA[New comment by maxed in "Leaking the email of any YouTube user for $10k"]]></title><description><![CDATA[
<p>It does not make sense to value these kind of (web) bugs by their potential price on the grey market. I think its better to value these bugs by their potential impact, although that is hard to express in money.<p>In this case there were 4 billion email addresses on the line from being scraped, imagine if this was exploited and the data was leaked. The news would hit the headliners which would definitely be bad for Google's reputation and stock price.<p>However, the impact of the leak is not that high as it only consists of a channel <> email address mapping, and therefore I think 10k is a fair price</p>
]]></description><pubDate>Wed, 12 Feb 2025 15:59:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=43026642</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=43026642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43026642</guid></item><item><title><![CDATA[New comment by maxed in "Cracking a 512-bit DKIM key for less than $8 in the cloud"]]></title><description><![CDATA[
<p>Sorry, I somehow made a typo in the quoted text, the RFC says<p><pre><code>  Verifiers MUST be able to validate signatures with keys ranging from 1024 bits to 4096* bits
</code></pre>
So mail providers MUST support up to 4096 bits if they follow the latest RFC.</p>
]]></description><pubDate>Sun, 12 Jan 2025 12:35:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=42673130</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=42673130</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42673130</guid></item><item><title><![CDATA[New comment by maxed in "Cracking a 512-bit DKIM key for less than $8 in the cloud"]]></title><description><![CDATA[
<p>I tested this last year, they properly reject mails signed with DKIM keys from <1024 bits</p>
]]></description><pubDate>Sat, 11 Jan 2025 13:29:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=42665731</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=42665731</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42665731</guid></item><item><title><![CDATA[New comment by maxed in "Cracking a 512-bit DKIM key for less than $8 in the cloud"]]></title><description><![CDATA[
<p>The latest RFC does require it though (RFC8301):<p><pre><code>  Verifiers MUST be able to validate signatures with
  keys ranging from 512 bits to 2048 bits, and they MAY be able to
  validate signatures with larger keys.
</code></pre>
I did my master thesis on this topic one year ago and found that all popular mail providers nowadays support 4096 bits, and some even up to 16384 bits.</p>
]]></description><pubDate>Sat, 11 Jan 2025 13:19:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=42665669</link><dc:creator>maxed</dc:creator><comments>https://news.ycombinator.com/item?id=42665669</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42665669</guid></item></channel></rss>