<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mroi</title><link>https://news.ycombinator.com/user?id=mroi</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 23 May 2026 20:08:08 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mroi" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Unmasking the Privacy Risks of Apple Intelligence]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.lumia.security/blog/applestorm">https://www.lumia.security/blog/applestorm</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44974109">https://news.ycombinator.com/item?id=44974109</a></p>
<p>Points: 101</p>
<p># Comments: 23</p>
]]></description><pubDate>Thu, 21 Aug 2025 15:36:51 +0000</pubDate><link>https://www.lumia.security/blog/applestorm</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=44974109</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44974109</guid></item><item><title><![CDATA[New comment by mroi in "OpenAI Limits Data Inspection for (Most) Organizations"]]></title><description><![CDATA[
<p>ChatGPT maintains a certificate pinning whitelist.</p>
]]></description><pubDate>Thu, 21 Aug 2025 15:34:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=44974076</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=44974076</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44974076</guid></item><item><title><![CDATA[OpenAI Limits Data Inspection for (Most) Organizations]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.lumia.security/blog/openai-limits-data-inspection-for-most-organizations">https://www.lumia.security/blog/openai-limits-data-inspection-for-most-organizations</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44974075">https://news.ycombinator.com/item?id=44974075</a></p>
<p>Points: 4</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 21 Aug 2025 15:34:34 +0000</pubDate><link>https://www.lumia.security/blog/openai-limits-data-inspection-for-most-organizations</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=44974075</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44974075</guid></item><item><title><![CDATA[Scaling out with Prometheus]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.perimeterx.com/blog/scaling-out-with-prometheus/">https://www.perimeterx.com/blog/scaling-out-with-prometheus/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=16791531">https://news.ycombinator.com/item?id=16791531</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 09 Apr 2018 09:21:47 +0000</pubDate><link>https://www.perimeterx.com/blog/scaling-out-with-prometheus/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=16791531</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=16791531</guid></item><item><title><![CDATA[New comment by mroi in "Cloudflare Reverse Proxies Are Dumping Uninitialized Memory"]]></title><description><![CDATA[
<p>The real problem is going to be where history matters and you can't delete - for example archive.org and httparchive.org. There is no way to reproduce the content in the archive obviously, so no one will be deleting it. The only way is to start a massive (and I mean MASSIVE) sanitization project...</p>
]]></description><pubDate>Sun, 26 Feb 2017 11:06:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=13736686</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=13736686</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13736686</guid></item><item><title><![CDATA[Zero-downtime deployment with Docker and HAProxy]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.perimeterx.com/zero-downtime-deployment-with-docker/">https://blog.perimeterx.com/zero-downtime-deployment-with-docker/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=13108716">https://news.ycombinator.com/item?id=13108716</a></p>
<p>Points: 21</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 05 Dec 2016 19:49:35 +0000</pubDate><link>https://blog.perimeterx.com/zero-downtime-deployment-with-docker/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=13108716</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13108716</guid></item><item><title><![CDATA[When Kafka met Bruce: How one service can boost app messaging reliability]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.perimeterx.com/when-kafka-met-bruce-how-one-service-can-boost-app-messaging-reliability/">https://blog.perimeterx.com/when-kafka-met-bruce-how-one-service-can-boost-app-messaging-reliability/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=12875053">https://news.ycombinator.com/item?id=12875053</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 04 Nov 2016 19:06:07 +0000</pubDate><link>https://blog.perimeterx.com/when-kafka-met-bruce-how-one-service-can-boost-app-messaging-reliability/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=12875053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12875053</guid></item><item><title><![CDATA[“There and Back Again” – The Story of a Stream (processing)]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.perimeterx.com/there-and-back-again-the-story-of-a-stream/">https://blog.perimeterx.com/there-and-back-again-the-story-of-a-stream/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=12754949">https://news.ycombinator.com/item?id=12754949</a></p>
<p>Points: 6</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 20 Oct 2016 18:36:43 +0000</pubDate><link>https://blog.perimeterx.com/there-and-back-again-the-story-of-a-stream/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=12754949</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12754949</guid></item><item><title><![CDATA[Hijacking a User’s Shadow: Affiliate Fraud via Malicious Extensions]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.perimeterx.com/hijacking-users-affiliate-fraud/">https://blog.perimeterx.com/hijacking-users-affiliate-fraud/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=12052170">https://news.ycombinator.com/item?id=12052170</a></p>
<p>Points: 11</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 07 Jul 2016 21:24:29 +0000</pubDate><link>https://blog.perimeterx.com/hijacking-users-affiliate-fraud/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=12052170</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12052170</guid></item><item><title><![CDATA[Reverse Engineering Sneaker Bots – Stealing Your New Shoes]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.perimeterx.com/sneaker-bots/">https://blog.perimeterx.com/sneaker-bots/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11630298">https://news.ycombinator.com/item?id=11630298</a></p>
<p>Points: 14</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 04 May 2016 18:04:55 +0000</pubDate><link>https://blog.perimeterx.com/sneaker-bots/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=11630298</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11630298</guid></item><item><title><![CDATA[Blocking Tor: A Case for Better Detection]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.perimeterx.com/blocking-tor-a-case-for-more-accuracy/">https://blog.perimeterx.com/blocking-tor-a-case-for-more-accuracy/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11435757">https://news.ycombinator.com/item?id=11435757</a></p>
<p>Points: 9</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 06 Apr 2016 00:36:30 +0000</pubDate><link>https://blog.perimeterx.com/blocking-tor-a-case-for-more-accuracy/</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=11435757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11435757</guid></item><item><title><![CDATA[Critical security vulnerability in Bugzilla]]></title><description><![CDATA[
<p>Article URL: <a href="http://blog.perimeterx.com/bugzilla-cve-2015-4499">http://blog.perimeterx.com/bugzilla-cve-2015-4499</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=10232405">https://news.ycombinator.com/item?id=10232405</a></p>
<p>Points: 7</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 17 Sep 2015 09:43:30 +0000</pubDate><link>http://blog.perimeterx.com/bugzilla-cve-2015-4499</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=10232405</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10232405</guid></item><item><title><![CDATA[Sniffing off the air NRF24L01+ and Bluetooth LE packets for under $30]]></title><description><![CDATA[
<p>Article URL: <a href="http://blog.cyberexplorer.me/2014/01/sniffing-and-decoding-nrf24l01-and.html">http://blog.cyberexplorer.me/2014/01/sniffing-and-decoding-nrf24l01-and.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=7094731">https://news.ycombinator.com/item?id=7094731</a></p>
<p>Points: 7</p>
<p># Comments: 4</p>
]]></description><pubDate>Tue, 21 Jan 2014 12:04:25 +0000</pubDate><link>http://blog.cyberexplorer.me/2014/01/sniffing-and-decoding-nrf24l01-and.html</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=7094731</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7094731</guid></item><item><title><![CDATA[Improving VM to VM network throughput on an ESXi platform]]></title><description><![CDATA[
<p>Article URL: <a href="http://blog.cyberexplorer.me/2013/03/improving-vm-to-vm-network-throughput.html">http://blog.cyberexplorer.me/2013/03/improving-vm-to-vm-network-throughput.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=5459869">https://news.ycombinator.com/item?id=5459869</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 29 Mar 2013 09:15:12 +0000</pubDate><link>http://blog.cyberexplorer.me/2013/03/improving-vm-to-vm-network-throughput.html</link><dc:creator>mroi</dc:creator><comments>https://news.ycombinator.com/item?id=5459869</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5459869</guid></item></channel></rss>