<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: neon_erosion</title><link>https://news.ycombinator.com/user?id=neon_erosion</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 20 May 2026 10:55:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=neon_erosion" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Don't forget the `githubusercontent.com` domain, which is specifically used to host risky, user-generated content, and fully documented in <a href="https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/about-anonymized-urls" rel="nofollow">https://docs.github.com/en/authentication/keeping-your-accou...</a> (using an open source component that other companies could also use, if they were interested in similar levels of security)</p>
]]></description><pubDate>Fri, 10 Oct 2025 21:03:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=45543758</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45543758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45543758</guid></item><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>This is the kind of thing that customers rely on you to do _before_ it causes an incident.</p>
]]></description><pubDate>Fri, 10 Oct 2025 21:00:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45543728</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45543728</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45543728</guid></item><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Then that would be an example of a system having failed and one that needs to change. Instead, this is an example of a hosting company complaining about the consequences of skipping some of the basic, well-documented safety and security practices that help to isolate domains for all sorts of reasons, from reputation to little things like user cookies.</p>
]]></description><pubDate>Fri, 10 Oct 2025 20:59:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=45543716</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45543716</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45543716</guid></item><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>There are well-documented solutions to this that don't rely on the PSL. Choosing to ignore all of that advice while hosting user content is a very irresponsible choice, at best.</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:07:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539916</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45539916</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539916</guid></item><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>Exactly, this has been documented knowledge for many years now, even decades. Github and other large providers of user-generated content have public-facing documentation on the risks and ways to mitigate them. Any hosting provider that chooses to ignore those practices is putting themselves, and their customers, at risk.</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:04:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539876</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45539876</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539876</guid></item><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>How does flagging a domain that was actively hosting phishing sites demonstrate that Google has too much power? They do, but this is a terrible example, undermining any point you are trying to make.</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:02:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539864</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45539864</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539864</guid></item><item><title><![CDATA[New comment by neon_erosion in "Google Safe Browsing incident"]]></title><description><![CDATA[
<p>What point are you trying to make here? You hosted phishing sites on your primary domain, which was then flagged as unsafe. You chose not to use the tools that would have marked those sites as belonging to individual users, and the system worked as designed.</p>
]]></description><pubDate>Fri, 10 Oct 2025 15:01:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=45539849</link><dc:creator>neon_erosion</dc:creator><comments>https://news.ycombinator.com/item?id=45539849</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45539849</guid></item></channel></rss>