<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mentalpagefault</title><link>https://news.ycombinator.com/user?id=mentalpagefault</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 03:35:26 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mentalpagefault" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mentalpagefault in "Book review: There is no antimemetics division"]]></title><description><![CDATA[
<p>This review appears to be of the first version despite the recent date. (The rewrite filed the serial numbers off the SCP references and changed character names both for copyright reasons and to provide a degree of separation from the original.)<p>I read both versions and agree that the second half of the first version was very abstract and difficult to follow. While I would consider the first half of the new version more edited than rewritten, the second half got a significant overhaul which fixed almost all of my issues with it and made for (in my opinion) a much more satisfying ending. I would recommend giving the new version another chance, though those who read the first version may find the new character names distracting. (Most didn't bother me, but Marion Wheeler -> Marie Quinn never felt quite right.)</p>
]]></description><pubDate>Mon, 06 Apr 2026 16:05:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47662731</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=47662731</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47662731</guid></item><item><title><![CDATA[New comment by mentalpagefault in "The Future of SCIP"]]></title><description><![CDATA[
<p>The similar acronym appears to be intentional:<p>> Note on the name: SCIP is pronounced the same way as “skip” and it’s a recursive acronym that stands for “SCIP Code Intelligence Protocol.”<p>> SCIP is also a purposeful nod to SICP (Structure and Interpretation of Programs), a book about analyzing programs.<p><a href="https://sourcegraph.com/blog/announcing-scip#:~:text=SCIP%20is%20also%20a%20purposeful%20nod%20to%20SICP" rel="nofollow">https://sourcegraph.com/blog/announcing-scip#:~:text=SCIP%20...</a></p>
]]></description><pubDate>Fri, 27 Mar 2026 23:26:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47549711</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=47549711</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47549711</guid></item><item><title><![CDATA[New comment by mentalpagefault in "Mind the encryptionroot: How to save your data when ZFS loses its mind"]]></title><description><![CDATA[
<p>You don't actually have to restore the entire snapshot if you just want a single file! ZFS mounts snapshots read-only in an extra hidden .zfs/snapshot directory that doesn't even show up in ls -a unless you set snapdir=visible on the dataset but you can copy files out of there.<p>For example, cp /path/to/dataset/mountpoint/.zfs/snapshot/<snapshot_name>/path/to/file ~/path/to/file</p>
]]></description><pubDate>Wed, 01 Oct 2025 22:49:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45444552</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45444552</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45444552</guid></item><item><title><![CDATA[New comment by mentalpagefault in "Mind the encryptionroot: How to save your data when ZFS loses its mind"]]></title><description><![CDATA[
<p>It didn't make the cut for the article, but I do recall trying to import older uberblocks still in the label ring buffer with zpool import -T at some point, but none were before the zfs destroy. I assume that was because TrueNAS logs to the .system dataset and presumably wrote through the entire ring buffer before I got to it.</p>
]]></description><pubDate>Wed, 01 Oct 2025 22:36:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45444428</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45444428</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45444428</guid></item><item><title><![CDATA[New comment by mentalpagefault in "Mind the encryptionroot: How to save your data when ZFS loses its mind"]]></title><description><![CDATA[
<p>Thanks! If you'd like to read another encryption related horror story, this one served as a bit of stylistic inspiration: <a href="https://max.levch.in/post/724289457144070144/shamir-secret-sharing-its-3am-paul-the-head-of" rel="nofollow">https://max.levch.in/post/724289457144070144/shamir-secret-s...</a></p>
]]></description><pubDate>Wed, 01 Oct 2025 22:17:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=45444219</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45444219</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45444219</guid></item><item><title><![CDATA[New comment by mentalpagefault in "Mind the encryptionroot: How to save your data when ZFS loses its mind"]]></title><description><![CDATA[
<p>Hi, author here! I'm not sure why you're getting downvoted because you're absolutely right.<p>Depending on if you're being optimistic or pessimistic, either 1) neither I nor ZFS did anything wrong or 2) both ZFS and I did some things wrong. Either way, neither one nor the other is particularly at fault.<p>While I said "ZFS lost its mind" for title length reasons, it really would be more accurate to say "ZFS appeared to loose its mind", since as I learned, everything makes sense when you consider the encryption root.<p>My only disagreement is that the only possible improvement is in documentation. I answered this in a reply to OpenZFS developer robn in another thread (<a href="https://old.reddit.com/r/zfs/comments/1ntwrjx/mind_the_encryptionroot_how_to_save_your_data/nh4xn9p/" rel="nofollow">https://old.reddit.com/r/zfs/comments/1ntwrjx/mind_the_encry...</a>) which I'll copy here:<p>> This is great writeup, and I really appreciate you taking the time on it. With my OpenZFS dev hat on, it's often quite difficult to understand exactly how people are using the things we make, especially when they go wrong - what were they expecting, what conceptual errors were involved, and so on. I'm passing it around at the moment and will give it a much slower and more thoughtful read as soon as I can. Thanks!<p>> While it's fresh on your mind, what would be one simple change that we could make today that would have prevented this is or made it much less likely? Doc change, warning output, etc. I have some ideas, but I don't want to lead the witness :)<p>First off, thank you for taking the effort to try and understand this from the OpenZFS side. It's really easy to dismiss this kind of thing as user error (which is true) since OpenZFS did actually behave as designed (which is also true), rather than taking it as an opportunity to better understand and improve the user experience.<p>When I think of the factors that lead me to make the mistake of not sending a snapshot of the encryption root, I think it comes down to a difference in expectations vs reality. When I think of a snapshot, I conceptualize it as fully consistent version of a dataset at a point in time (which as far as I know is still true for unencrypted datasets). Native encryption violates that expectation by 1) storing the wrapping key parameters in the encryption root which may be a different dataset and therefore exists outside of the snapshot and 2) allowing the wrapping key and dataset master keys to get out of sync.<p>If I send a snapshot from one pool to another, I expect ZFS to send everything necessary to reproduce the same state on the destination pool. As an uneducated user, I'd find it very unintuitive that I also need to send a new snapshot of another empty, unchanged dataset which through some "spooky action at a distance" affects the decryptability other child encrypted datasets just because it's the parent dataset at the root of the encrypted tree. I expect datasets to be isolated from one another. Users shouldn't have to know about wrapping keys and master keys, let alone worry about keeping them in sync across multiple datasets.<p>While I do think the docs could be improved to emphasize the importance of the encryption root (especially in zfs-send -w, --raw which doesn't even mention it) which would've made debugging the issue a bit easier, I'm not sure how much that would've helped prevent the issue in the first place. The reality we must face is that people don't read the docs unprompted to challenge their fundamental expectations; they work with the mental model they have and only consult the docs when they have a question to answer.<p>What I do think would've really helped is if zfs-recv could check the wrapping key parameters on the encryption root when it sees a new encrypted master key in the send stream and abort if they don't match. This wouldn't prevent every scenario, (eg. if instead of forgetting to send a snapshot of the encryption root, you forgot to send snapshots of the child encrypted datasets), but it would have prevented this one and would be a step in the right direction.<p>In the long term, I'd really love for OpenZFS to treat keeping wrapping keys and master keys in sync as an invariant that is always maintained so users don't need to know about encryption roots, wrapping keys, or master keys and can ignore them like any other implementation details. I've only just begun thinking about some potential options in the solution space, but I have a feeling this will not be an easy problem to fully solve. I'd love to hear your ideas as an actual OpenZFS developer.</p>
]]></description><pubDate>Wed, 01 Oct 2025 22:07:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45444119</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45444119</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45444119</guid></item><item><title><![CDATA[New comment by mentalpagefault in "Mind the encryptionroot: How to save your data when ZFS loses its mind"]]></title><description><![CDATA[
<p>Thank you!<p>I emphatically agree, unencrypted ZFS on top of GELI or LUKS encrypted block devices is the way to go for now. Plus it also has the benefit of not leaking metadata like a sieve.<p>My mistake was placing too much trust in ZFS's reputation for data integrity; clearly not all features hold that value in the same regard.<p>The openness of OpenZFS was a real saving grace. If this had occurred on a propriety SAN, that data would be gone forever.</p>
]]></description><pubDate>Tue, 30 Sep 2025 23:22:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45432508</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45432508</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45432508</guid></item><item><title><![CDATA[New comment by mentalpagefault in "Mind the encryptionroot: How to save your data when ZFS loses its mind"]]></title><description><![CDATA[
<p>While ZFS has a well-earned reputation for data integrity and reliability, ZFS native encryption has some incredibly sharp edges that will cut you if you don't know where to be careful. I learned this the hard way, and this postmortem is an attempt to share my experience in the hope that others may learn from my mistakes. Feel free to ask any questions!</p>
]]></description><pubDate>Mon, 29 Sep 2025 06:40:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=45410931</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45410931</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45410931</guid></item><item><title><![CDATA[Mind the encryptionroot: How to save your data when ZFS loses its mind]]></title><description><![CDATA[
<p>Article URL: <a href="https://sambowman.tech/blog/posts/mind-the-encryptionroot-how-to-save-your-data-when-zfs-loses-its-mind/">https://sambowman.tech/blog/posts/mind-the-encryptionroot-how-to-save-your-data-when-zfs-loses-its-mind/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45410930">https://news.ycombinator.com/item?id=45410930</a></p>
<p>Points: 6</p>
<p># Comments: 3</p>
]]></description><pubDate>Mon, 29 Sep 2025 06:40:01 +0000</pubDate><link>https://sambowman.tech/blog/posts/mind-the-encryptionroot-how-to-save-your-data-when-zfs-loses-its-mind/</link><dc:creator>mentalpagefault</dc:creator><comments>https://news.ycombinator.com/item?id=45410930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45410930</guid></item></channel></rss>