<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: notakio</title><link>https://news.ycombinator.com/user?id=notakio</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 09:28:08 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=notakio" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by notakio in "uBlock Origin Lite now available for Safari"]]></title><description><![CDATA[
<p>I simply meant that if you monitor a given application using on-system network tools, you quickly get an accurate idea of what/who that application talks to. And browsers are super-chatty to all sorts of destinations that are not immediately apparent to an end user who is just clicking around the web.</p>
]]></description><pubDate>Mon, 11 Aug 2025 11:53:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44863185</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44863185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44863185</guid></item><item><title><![CDATA[New comment by notakio in "uBlock Origin Lite now available for Safari"]]></title><description><![CDATA[
<p>Besides lsof and netstat?</p>
]]></description><pubDate>Wed, 06 Aug 2025 12:55:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=44811326</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44811326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44811326</guid></item><item><title><![CDATA[New comment by notakio in "Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say"]]></title><description><![CDATA[
<p>We're still good now.</p>
]]></description><pubDate>Wed, 23 Jul 2025 20:50:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=44663892</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44663892</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44663892</guid></item><item><title><![CDATA[New comment by notakio in "Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say"]]></title><description><![CDATA[
<p>Whoops. I used hyperbole, and it went undetected. Here: s/the deciding factor/a deciding factor/g. We're good now.</p>
]]></description><pubDate>Wed, 23 Jul 2025 14:28:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=44659623</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44659623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44659623</guid></item><item><title><![CDATA[New comment by notakio in "Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say"]]></title><description><![CDATA[
<p>One should be wary of anyone selling you a solution to your problems they know nothing about. Naturally, the only way to be entirely secure is to shutdown all the applications and decommission all the computers, a solution which the business side tends to finds unreasonable. Thus the tender balance between business needs and business risk emerges as the deciding principle.<p>But the numbers are the numbers in heterogenous environments, regarding security problems by platform. And if it rains perpetual Windows-based incidents on your security staff, and you <i>don't</i> consider the numbers when evaluating what you will and will not do, compute/services-wise, then you are statistically likely to see the same rate of incidents, at whatever cost that comes to the business, indefinitely.</p>
]]></description><pubDate>Tue, 22 Jul 2025 13:17:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=44646504</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44646504</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44646504</guid></item><item><title><![CDATA[New comment by notakio in "Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say"]]></title><description><![CDATA[
<p>If every car in your neighborhood that gets broken into is manufactured by a single manufacturer, it is in your interest in asking why that is, and perhaps considering that fact when shopping for a new car.</p>
]]></description><pubDate>Tue, 22 Jul 2025 11:35:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=44645620</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44645620</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44645620</guid></item><item><title><![CDATA[New comment by notakio in "Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say"]]></title><description><![CDATA[
<p>Very curious. Just based on the incidents we see, and analyze over time, almost all of them are compromised Windows systems. When I say "almost", I'll provide these stats: ~4500 Windows incidents over 5 years, vs. two Linux incidents.<p>Similarly, looking at vulnerability counts by vendor doesn't paint a rosy picture of our largest vendor Microsoft, either. But it pales in comparison to the incident statistics, which speak for themselves.<p>To Microsoft's credit, they've managed to turn their weaknesses into a secondary industry, wherein they now no longer sell just the disease, they also sell the cure. "Oh, your Windows systems have security problems? Have we told you about our expansive security solutions? They're only an additional $your_budget_doubled per year!"</p>
]]></description><pubDate>Tue, 22 Jul 2025 11:33:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=44645608</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44645608</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44645608</guid></item><item><title><![CDATA[New comment by notakio in "LetsEncrypt – Expiration Notification Service Has Ended"]]></title><description><![CDATA[
<p>No, LetsEncrypt was not an EFF project to begin with. Look, it works how it's documented to work. If you wish it worked some other way, to solve your particular suggested workflow, you're likely free to fork it and make it work that way.<p>Good luck.</p>
]]></description><pubDate>Tue, 01 Jul 2025 11:45:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=44432930</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44432930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44432930</guid></item><item><title><![CDATA[New comment by notakio in "LetsEncrypt – Expiration Notification Service Has Ended"]]></title><description><![CDATA[
<p>No, it's not the LetsEncrypt people who make certbot. Certbot is an EFF project, managed by separate people. Additionally, most of the DNS implementations will require the use of a specific plug-in/library for your selected DNS platform, and those, also, are developed separately.</p>
]]></description><pubDate>Mon, 30 Jun 2025 13:47:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=44423224</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44423224</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44423224</guid></item><item><title><![CDATA[New comment by notakio in "LetsEncrypt – Expiration Notification Service Has Ended"]]></title><description><![CDATA[
<p>Regarding "the DNS record they had you add to begin with is still there", it generally isn't. Part of the automation process for certbot using the DNS-01 challenge is the removal of the DNS record, following successful validation of said record. In any complex DNS environment, leaving TXT records around just increases the debris.</p>
]]></description><pubDate>Mon, 30 Jun 2025 11:28:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=44421962</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=44421962</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44421962</guid></item><item><title><![CDATA[New comment by notakio in "Microsoft donates the Mono Project to the Wine team"]]></title><description><![CDATA[
<p>This is compounded by their propensity to rename everything at periodic intervals.</p>
]]></description><pubDate>Wed, 28 Aug 2024 12:21:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=41378662</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=41378662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41378662</guid></item><item><title><![CDATA[New comment by notakio in "Tell HN: Microsoft.com added 192.168.1.1 to their DNS record"]]></title><description><![CDATA[
<p>For the Microsoft.com domain, proper, there seem to be no existing CAA rules, allowing each and every CA on earth to issue certificates based on whatever criteria the CA requires. What could possibly go wrong with that approach?</p>
]]></description><pubDate>Wed, 20 Dec 2023 14:15:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=38708909</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=38708909</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38708909</guid></item><item><title><![CDATA[New comment by notakio in "Write more "useless" software"]]></title><description><![CDATA[
<p>I have not. I'm afraid I am a gaming luddite, though for no particular reason other than having a lengthy list of mental "to-dos" in front of it.</p>
]]></description><pubDate>Mon, 23 Oct 2023 13:13:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=37985128</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=37985128</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37985128</guid></item><item><title><![CDATA[New comment by notakio in "Write more "useless" software"]]></title><description><![CDATA[
<p>The article contains solid advice that certainly transcends coding, alone; in my free time, I try to essentially "find work". Sometimes that work consists of writing software to solve weird little home "problems" that may or may not be actual problems. Sometimes that means building something as a joke, just for fun. 
Sometimes that work consists of over-engineering a water heater box-turned-space shuttle for my daughter. Or recording my dog's wheezing and turning it into "classic industrial" music. It all feeds the same internal need, though; to learn, to build, and to produce something, rather than to passively consume other people's products. It keeps my brain alive, and I find improved performance/innovation in other work-related projects, as a result of just staying active, mentally.</p>
]]></description><pubDate>Thu, 19 Oct 2023 12:34:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=37941981</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=37941981</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37941981</guid></item><item><title><![CDATA[New comment by notakio in "BMW's Ultimate Driving Machine, for Driving Through Gunfire and Grenades"]]></title><description><![CDATA[
<p>And if you're the kind of person that travels in one of these, you likely also have a few additional vehicles in front of and behind your vehicle filled with highly-paid professionals ready and willing to carry you the last mile if your vehicle stops reason for any reason, to include mechanical failure.<p>The whole armored vehicle market is a relatively small one; it's interesting to learn that BMW is direct participant; I previously had no idea. I foresee a lot of wasted time scouring eBay looking for a project my family will resent me for later in my immediate future!</p>
]]></description><pubDate>Tue, 19 Sep 2023 14:56:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=37570820</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=37570820</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37570820</guid></item><item><title><![CDATA[New comment by notakio in "Helicopter Footage Reveals State Trooper Surveillance Capabilities"]]></title><description><![CDATA[
<p>I was surprised to not see IR beacons on LEO units. In military operations with air surveillance, individuals/vehicles often use IR flashing and IR reflection to mark themselves to air assets. If MPD has the money for 1) an air surveillance unit (this cost is not trivial; SFPD, for example, hasn't had their own aviation section in decades due to the cost), and 2) decent thermal optics on said surveillance unit, then it surprises me they don't spring for sub-$100 IR beacons to distinguish their own personnel from everyone else, and enable rudimentary "blue force tracking", as it were.</p>
]]></description><pubDate>Fri, 25 Aug 2023 12:38:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=37261025</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=37261025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37261025</guid></item><item><title><![CDATA[New comment by notakio in "Stolen from Apple (2004)"]]></title><description><![CDATA[
<p>Agreed. I invariably lose hours to Folklore every time I end up there. I previously worked for an original Mac team engineer, and he had some fascinating stories, but Hertzfeld's writing allows me to revisit those and so many more tales from that period of Apple/Silicon Valley history, and all without annoying my former boss for more stories.</p>
]]></description><pubDate>Tue, 22 Aug 2023 12:39:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=37221832</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=37221832</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37221832</guid></item><item><title><![CDATA[New comment by notakio in "The Cables That Run the Internet"]]></title><description><![CDATA[
<p>I vote for users. I'll stay down here with compute, I know how this ends.</p>
]]></description><pubDate>Tue, 01 Aug 2023 15:16:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=36957069</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=36957069</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36957069</guid></item><item><title><![CDATA[New comment by notakio in "How does iCloud work? Plus a new version of Cirrus"]]></title><description><![CDATA[
<p>`brctl status` will return sync status data without requiring Finder. It isn't pretty, but it's usable via stdout and whatever tooling you'd want to use.</p>
]]></description><pubDate>Mon, 24 Jul 2023 11:38:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=36846227</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=36846227</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36846227</guid></item><item><title><![CDATA[New comment by notakio in "S.F. says incidents by Cruise, Waymo driverless taxis are ‘skyrocketing.’"]]></title><description><![CDATA[
<p>SFPD won't do anything about property crimes, to include vandalism, other than to take a preliminary report, on a schedule determined by the department (eg: you call them, they show up 8-12 hours later, uninterested in taking your report). This is because, currently, their DA's office isn't going to prosecute any property crimes.<p>That can all change, but speculating about the nature or timing of any changes like that is well outside my area, so I'll sit and watch from a distance.<p>And, again, I'm not vested in any outcome here. It'll work out however it works out, and I'm 2000+ miles away from it, so it won't have much effect on my life.</p>
]]></description><pubDate>Mon, 17 Jul 2023 11:31:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=36756744</link><dc:creator>notakio</dc:creator><comments>https://news.ycombinator.com/item?id=36756744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36756744</guid></item></channel></rss>