<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: maxo133</title><link>https://news.ycombinator.com/user?id=maxo133</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 05:17:40 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=maxo133" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by maxo133 in "Veracrypt project update"]]></title><description><![CDATA[
<p>I can completely believe this.<p>I was always convinced that Skype was bought by microsoft so  CIA/US intelligence agencies to have listening capabilities.<p>The first thing Microsoft did after the Skype purchase was making it easier to tap into the calls by removing p2p calling and routing calls using centralized servers.</p>
]]></description><pubDate>Wed, 08 Apr 2026 15:18:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47691433</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=47691433</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47691433</guid></item><item><title><![CDATA[New comment by maxo133 in "Dumping Memory to Bypass BitLocker on Windows 11"]]></title><description><![CDATA[
<p>You are right, but i still have no idea what is the point of this article.<p>The guy unlocked the bitlocker, then restarted PC just before login screen appeared. He said that's when he had most success. What sense does it make to restart and start looking for key in memory, when bitlocker has been just unlocked.</p>
]]></description><pubDate>Mon, 30 Dec 2024 20:18:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42553043</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=42553043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42553043</guid></item><item><title><![CDATA[New comment by maxo133 in "Dumping Memory to Bypass BitLocker on Windows 11"]]></title><description><![CDATA[
<p>Too bad the author did not provide hardware specs. Such attack is even harder on DDR4 and DDR5 memory and most publications refer to legacy ram such as DDR3<p>> In my experience I have had the most success restarting the system while Windows is loading but before the login screen has appeared, at least in the case of finding FVEK keys.<p>So what is this? It was supposed to be memory attack and he's dumping the keys after someone unlocked it and it's booting?<p>So this is just another theoretical attack where perfect conditions must be met.</p>
]]></description><pubDate>Mon, 30 Dec 2024 20:13:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=42552992</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=42552992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42552992</guid></item><item><title><![CDATA[New comment by maxo133 in "Telegram founder Pavel Durov arrested at French airport"]]></title><description><![CDATA[
<p>Yes and the DGSE agents visiting every week or so giving him an release offer you can't refuse.</p>
]]></description><pubDate>Sun, 25 Aug 2024 01:47:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=41343634</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=41343634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41343634</guid></item><item><title><![CDATA[New comment by maxo133 in "Telegram founder Pavel Durov arrested at French airport"]]></title><description><![CDATA[
<p>CEO getting arrested does not mean telegram will go down.<p>Direct involvement with scams? You got to be kidding me.
This guy is worth 15 billion USD, he does need to do anything.<p>It's about lack of cooperation in censoring content.</p>
]]></description><pubDate>Sun, 25 Aug 2024 01:43:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=41343616</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=41343616</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41343616</guid></item><item><title><![CDATA[New comment by maxo133 in "DNS traffic can leak outside the VPN tunnel on Android"]]></title><description><![CDATA[
<p>This is a good point. It doesn't have to be Mullvad but it's almost guaranteed based on what we've seen in the history (see CIA + swiss crypto company) that some of the major VPN providers are managed by intelligence agencies. Either VPN companies were bought via shell companies after reaching certain market share or they were even developed 
from the scratch.</p>
]]></description><pubDate>Fri, 03 May 2024 20:30:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=40252035</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=40252035</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40252035</guid></item><item><title><![CDATA[New comment by maxo133 in "Gmail, Yahoo announce new 2024 authentication requirements for bulk senders"]]></title><description><![CDATA[
<p>This is step closer, after few more steps they'll make sure only those "approved" companies can operate email server... leading to more internet centralization.</p>
]]></description><pubDate>Tue, 31 Oct 2023 01:48:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=38079085</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=38079085</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38079085</guid></item><item><title><![CDATA[New comment by maxo133 in "The FBI's internal guide for getting data from AT&T, T-Mobile, Verizon"]]></title><description><![CDATA[
<p>this is most interesting piece of entire presentation.<p>They can query location remotely using GPS and likely turn on microphone too.</p>
]]></description><pubDate>Mon, 25 Oct 2021 20:34:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=28992786</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28992786</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28992786</guid></item><item><title><![CDATA[New comment by maxo133 in "Cybersecurity: EU to Ban Anonymous Websites"]]></title><description><![CDATA[
<p>Dont worry, registrants will move to offshore locations and that's how it's gonna end.</p>
]]></description><pubDate>Tue, 12 Oct 2021 22:15:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=28845723</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28845723</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28845723</guid></item><item><title><![CDATA[New comment by maxo133 in "ProtonMail deletes 'we don't log your IP' from website after activist arrested"]]></title><description><![CDATA[
<p>Today, i read somewhere while watching protonmail case comments, that switzerland has quite extensive surivellance laws which include possiblity of logging whole country inbound and outbound traffic for period of 6 months.</p>
]]></description><pubDate>Tue, 07 Sep 2021 12:48:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=28444058</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28444058</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28444058</guid></item><item><title><![CDATA[New comment by maxo133 in "ProtonMail deletes 'we don't log your IP' from website after activist arrested"]]></title><description><![CDATA[
<p>If they really cared about anonymity ProtonMail would ship their mobile app with bundled TOR. Especially the mobile version, since plenty of non-tech savy people use mobile only.</p>
]]></description><pubDate>Tue, 07 Sep 2021 12:46:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=28444034</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28444034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28444034</guid></item><item><title><![CDATA[New comment by maxo133 in "ProtonMail deletes 'we don't log your IP' from website after activist arrested"]]></title><description><![CDATA[
<p>Nothing stops them from deploying malicious javascript code to comply with court orders.<p>Nothing stops them from logging user password either, then the entire mailbox contents is compromised<p>Many good points + 1.</p>
]]></description><pubDate>Tue, 07 Sep 2021 12:42:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=28444002</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28444002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28444002</guid></item><item><title><![CDATA[New comment by maxo133 in "ProtonMail deletes 'we don't log your IP' from website after activist arrested"]]></title><description><![CDATA[
<p>So... if they receive valid swiss court order they can be forced to log user passwords on demand and their entire service is then useless? As when you have password you can decrypt entire mailbox content.<p>They market their service to journalists and activists, which are often targetted by their own governments. Seems that they cannot protect any of them.</p>
]]></description><pubDate>Tue, 07 Sep 2021 12:40:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=28443975</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28443975</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28443975</guid></item><item><title><![CDATA[New comment by maxo133 in "Climate activist arrested after ProtonMail provided his IP address"]]></title><description><![CDATA[
<p>So right, people just dont get the big picture.<p>If they were forced to log the IP address, they can be forced to log user password. This makes entire encrypted mailbox useless.</p>
]]></description><pubDate>Tue, 07 Sep 2021 12:20:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=28443782</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=28443782</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28443782</guid></item><item><title><![CDATA[New comment by maxo133 in "YouTube-dl has received a DMCA takedown from RIAA"]]></title><description><![CDATA[
<p>Isn't DMCA working the way that if you disagree with dmca takedown and fill certain form, the side asking to take down content (RIAA) needs to get court order?<p>That's the way how it works with google search.</p>
]]></description><pubDate>Fri, 23 Oct 2020 21:21:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=24874326</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=24874326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24874326</guid></item><item><title><![CDATA[New comment by maxo133 in "Ask HN: How do you backup your files without depending on a third party service?"]]></title><description><![CDATA[
<p>How can you advise synology when their system doesn't even have FULL DISK ENCRYPTION? As longas it doesn't have it, i wont be even interested looking at their platform.<p>Can you imagine it? NAS'es usually are targeted for business users, yet they dont have full disk encryption...<p>For now i'm using QNAP, in terms of possible features i believe QNAP is little ahead (x86 cpu, virtualization, containers, fde). It has all what synology has + more.<p>However their platform is badly constructed, most processes are esentially running as root user...
You get like firmware update every 2 weeks. It doesn't mean that there are bugs tho. I'm running it for 2 years and never had a problem.</p>
]]></description><pubDate>Thu, 26 Jul 2018 15:53:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=17618420</link><dc:creator>maxo133</dc:creator><comments>https://news.ycombinator.com/item?id=17618420</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17618420</guid></item></channel></rss>