<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: philodeon</title><link>https://news.ycombinator.com/user?id=philodeon</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 03:35:13 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=philodeon" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by philodeon in "Asahi Linux Progress Report: Linux 6.19"]]></title><description><![CDATA[
<p>There is no support for M3/M4/M5 GPUs, period.  Asahi Linux is only installable on M1 and M2 Macs.</p>
]]></description><pubDate>Wed, 18 Feb 2026 15:34:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47062121</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=47062121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47062121</guid></item><item><title><![CDATA[New comment by philodeon in "Ford Has Steered Its Former EV Truck and Plant Plans in to a Ditch"]]></title><description><![CDATA[
<p>Consider that a car made of plastic is something that only works pre-Ralph Nader. Now the NTSB would veto it in milliseconds.</p>
]]></description><pubDate>Wed, 17 Dec 2025 18:17:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46303298</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46303298</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46303298</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>Lattices themselves have been analyzed since the days of Gauss.  Lattice cryptography is only a couple decades old (in the unclassified literature).<p>The first proposed lattice-based cryptosystem was completely broken within 2 years of its announcement, which is an lovely harbinger of Kyber’s fate.</p>
]]></description><pubDate>Tue, 25 Nov 2025 20:44:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46050533</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46050533</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46050533</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>Because Bernstein addresses this:<p>>>> There is a committee at TU/e charged by law with ensuring proper
grading, and I have recently learned that claims by Mr. de Valence
related to this topic have been formally investigated and rejected by
that committee. Now that Mr. de Valence has issued public accusations,
it would seem that a public resolution will be necessary, starting with
Mr. de Valence making clear what exactly his accusations are.<p>He also points out that de Valence is himself likely guilty of academic misconduct based on his own admissions.<p>We have two people making contradictory statements.  The only ways to resolve it are facts (which were presumably reviewed by the committee) and credibility.  You clearly think de Valence is more credible because he’s one of your feline friends, and because your other feline friends accused Appelbaum of sexual crimes, and you hate that Bernstein worked with Appelbaum because in your mind a sexual abuse accusation is as good as guilt of sexual abuse.<p>de Valence chose the same credibility-destroying path as Lovecruft, Honeywell, et al. did:  make serious accusations in the public sphere instead of letting our public institutions charged with addressing these type of accusations do their job.  Wise people realize that you can’t be criminally charged for publishing a smear campaign online, but you can be criminally charged for filing a police report, and evaluate accordingly.</p>
]]></description><pubDate>Tue, 25 Nov 2025 20:36:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46050446</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46050446</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46050446</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>I’m not sure why you’re hung up on SNTRUP, since DJB didn’t submit it past round 2 of NISTPQC.  In round 3, DJB put his full weight behind Classic McEliece.<p>You’ve previously argued that “cryptosystems based on ring-LWE hardness have been worked on by giants in the field since the mid-1990s” and suggested this is a point in Kyber’s favor.  Well, news flash, McEliece has been worked on by giants in the field for 45 years.  It shows up in NSA’s declassified internal history book, though their insights into the crypto system are still classified to this day.</p>
]]></description><pubDate>Tue, 25 Nov 2025 20:25:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46050317</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46050317</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46050317</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>Very very incorrect.<p>EDIT: Adding more to my post here because it would be hypocritical for you to complain:<p>1. I feel like given how I can make accurate predictions about Henry’s sphere of influence, that might gain me a little credibility: <a href="https://news.ycombinator.com/item?id=45495180">https://news.ycombinator.com/item?id=45495180</a><p>2. The reason I insulted you is because I know for a fact that when the mob came and demanded you shun and persecute someone, you caved.</p>
]]></description><pubDate>Tue, 25 Nov 2025 18:19:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46048857</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46048857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46048857</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>At least in terms of the Bada55 paper, I think he writes in a fairly jocular style that sounds unprofessional unless you read his citations as well.  You seem to object to his occasional jocularity and take it as prima facie evidence of him being “batshit”.  Given that you are well known for a jocular writing style, perhaps you should extend some grace.<p>The slides seem like a pretty nice summary of the 2015-era SafeCurves work, which you acknowledge elsewhere on this site (this thread? They all blend together) was based on good engineering.</p>
]]></description><pubDate>Tue, 25 Nov 2025 18:19:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46048851</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46048851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46048851</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>I didn’t see anything “batshit” in either the paper or the slides.</p>
]]></description><pubDate>Tue, 25 Nov 2025 18:06:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46048689</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46048689</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46048689</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>There’s also a more approachable set of slides on the topic at <a href="https://cr.yp.to/talks/2025.11.14/slides-djb-20251114-safecurves-4x3.pdf" rel="nofollow">https://cr.yp.to/talks/2025.11.14/slides-djb-20251114-safecu...</a></p>
]]></description><pubDate>Tue, 25 Nov 2025 12:00:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46044997</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46044997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46044997</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p><a href="https://bada55.cr.yp.to/bada55-20150927.pdf" rel="nofollow">https://bada55.cr.yp.to/bada55-20150927.pdf</a></p>
]]></description><pubDate>Tue, 25 Nov 2025 10:38:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46044527</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46044527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46044527</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>That article is pure horsecrap: <a href="https://eindhoven.cr.yp.to/false-statements-by-henry-de-valence.txt" rel="nofollow">https://eindhoven.cr.yp.to/false-statements-by-henry-de-vale...</a></p>
]]></description><pubDate>Tue, 25 Nov 2025 10:33:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46044488</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=46044488</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46044488</guid></item><item><title><![CDATA[No Bounty: A Story of a Serious Privacy Leak in iOS]]></title><description><![CDATA[
<p>Article URL: <a href="https://paradisefacade.com/blog/2025/10/28/airtrafficdevice-ignored-reluctantly-fixed-no-cve-no-bounty-a-story-of-a-serious-privacy-leak-in-ios">https://paradisefacade.com/blog/2025/10/28/airtrafficdevice-ignored-reluctantly-fixed-no-cve-no-bounty-a-story-of-a-serious-privacy-leak-in-ios</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45732025">https://news.ycombinator.com/item?id=45732025</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 28 Oct 2025 12:36:40 +0000</pubDate><link>https://paradisefacade.com/blog/2025/10/28/airtrafficdevice-ignored-reluctantly-fixed-no-cve-no-bounty-a-story-of-a-serious-privacy-leak-in-ios</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45732025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45732025</guid></item><item><title><![CDATA[New comment by philodeon in "The great software quality collapse or, how we normalized catastrophe"]]></title><description><![CDATA[
<p>I thought one of the benefits of diversity and inclusion in tech was that it would lead to better software quality?  When does that kick in?</p>
]]></description><pubDate>Thu, 09 Oct 2025 18:06:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=45531055</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45531055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45531055</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF: Can an attacker purchase standardization of weakened cryptography?"]]></title><description><![CDATA[
<p>I thought the whole point of DJB’s “cache timing attacks in AES” is that Rijndael is not particularly great.</p>
]]></description><pubDate>Mon, 06 Oct 2025 20:58:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=45496259</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45496259</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45496259</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF: Can an attacker purchase standardization of weakened cryptography?"]]></title><description><![CDATA[
<p>“Module-LWE is not breakable within a Python script” —-Ptacek, 2025<p>“Apache chunked encoding is not exploitable” —- Dowd, 2002</p>
]]></description><pubDate>Mon, 06 Oct 2025 20:46:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=45496127</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45496127</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45496127</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF: Can an attacker purchase standardization of weakened cryptography?"]]></title><description><![CDATA[
<p>When someone discovers the trick necessary to decrypt ML-KEM in an hour and publishes it in the unclassified sphere, I assume your response will be “hey, I may have been wrong yet again, but at least I wasn’t impudent!”</p>
]]></description><pubDate>Mon, 06 Oct 2025 20:06:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=45495701</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45495701</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45495701</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF: Can an attacker purchase standardization of weakened cryptography?"]]></title><description><![CDATA[
<p>I fully agree Matthew Garrett is not a secret NSA propagandist.  There is a much simpler explanation.<p>In 2016, Isis Lovecruft was romantically involved with Jacob Appelbaum.  Isis lost a coveted PhD student spot studying under Bernstein to… Jacob Appelbaum.  Isis broke up with Jacob and accused him of sexual abuse in a spectacularly public manner.<p>Isis became romantically involved with Henry de Valence, another Bernstein PhD student.  Valence became acquainted with Appelbaum.  Later, under Isis’ direction, Valence published a wild screed full of bizarre accusations trying to get Appelbaum expelled and Bernstein fired.  When this failed, Isis dumped Valence and publicly accused him of sexual abuse.<p>Isis Lovecruft is now married to Matthew Garrett.  Obviously Matthew is going to work to discredit Bernstein, because if he fails, he knows what the next two steps are.</p>
]]></description><pubDate>Mon, 06 Oct 2025 19:18:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=45495180</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45495180</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45495180</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF: Can an attacker purchase standardization of weakened cryptography?"]]></title><description><![CDATA[
<p>You seem blind to the obvious corollary to that fact, which is if cryptosystems based on ring-LWE hardness have been worked on by giants for 30 years, then those same cryptosystems have been cryptanalyzed for 30 years, and a significant chunk of cryptanalytic research stays in NSA’s Classified Mathematics Library.<p>You’ve admitted you were “loudly wrong” when you announced Dual-EC couldn’t be an NSA cryptography backdoor.  Snowden let us all know the NSA spends $250 million every year secretly convincing/bribing the private sector to use bad cryptography.  Despite that history, you are still convinced there’s no way ML-KEM is an NSA cryptographic backdoor and that all the bizarre procedural errors in the PQ crypto contest are mere coincidences.<p>[checks my text messages] Lucy just texted me, Thomas.  She’s outside waiting for you to kick her football.</p>
]]></description><pubDate>Mon, 06 Oct 2025 18:41:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45494716</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45494716</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45494716</guid></item><item><title><![CDATA[New comment by philodeon in "MODPOD: The collapse of IETF's protections for dissent"]]></title><description><![CDATA[
<p>Why anyone thinks that the tech sphere is yearning for another “moderation team” after the past decade is beyond me.</p>
]]></description><pubDate>Mon, 06 Oct 2025 16:14:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=45492935</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45492935</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45492935</guid></item><item><title><![CDATA[New comment by philodeon in "NSA and IETF: Can an attacker purchase standardization of weakened cryptography?"]]></title><description><![CDATA[
<p>ML-KEM and SIKE were both candidates in the PQ competition which ML-KEM won.  SIKE was considered such a strong contender that it was used in production TLS experiments at scale by Google and Cloudflare. (I guess you didn’t read past the second paragraph?)<p>You find it offensive now to compare ML-KEM and SIKE because SIKE was so thoroughly broken and demonstrated to be worse than pre-quantum crypto.  But ML-KEM may already be broken this thoroughly by NSA and friends, and they’re keeping it secret because shipping bad crypto to billions of people enables SIGINT.  The idea that your professional crypto acquaintances might be on the NSA’s payroll clearly disturbs you enough that you dismiss it out of hand.<p>Bernstein is proposing more transparency because that is what was promised after the Dual-EC debacle.  Do you disagree with Bernstein because he advocates for transparency (which could prevent bad crypto shipping), or because of his rhetorical style?</p>
]]></description><pubDate>Mon, 06 Oct 2025 16:10:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=45492899</link><dc:creator>philodeon</dc:creator><comments>https://news.ycombinator.com/item?id=45492899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45492899</guid></item></channel></rss>