<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: preinheimer</title><link>https://news.ycombinator.com/user?id=preinheimer</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 04:15:20 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=preinheimer" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by preinheimer in "Someone at BrowserStack is leaking users' email addresses"]]></title><description><![CDATA[
<p>There was a research paper several years ago showing that the "residential IP" stuff is powered by botnets and compromised devices. Luminati is specifically called out.<p>Paper: <a href="https://xianghang.me/files/resi_paper.pdf" rel="nofollow">https://xianghang.me/files/resi_paper.pdf</a>
Medium Article: <a href="https://medium.com/@xianghangmi/resident-evil-understanding-residential-ip-proxy-as-a-dark-service-dea9010a0e29" rel="nofollow">https://medium.com/@xianghangmi/resident-evil-understanding-...</a></p>
]]></description><pubDate>Sun, 05 Apr 2026 20:52:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47653755</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=47653755</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47653755</guid></item><item><title><![CDATA[New comment by preinheimer in "We indexed the Delve audit leak: 533 reports, 455 companies, 99.8% identical"]]></title><description><![CDATA[
<p>I mean it’s a template, but in theory someone went and checked stuff. Did you actually have a quarterly security team meeting? Was there minutes? Was there an invite?<p>Did someone actually go and confirm your role based access control matrix is up to date and user accounts have the right access? Were all of those screenshots watermarked with timestamps?<p>There is work to do, whether or not auditors are doing it is another question.</p>
]]></description><pubDate>Sun, 22 Mar 2026 21:32:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47482390</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=47482390</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47482390</guid></item><item><title><![CDATA[New comment by preinheimer in "We indexed the Delve audit leak: 533 reports, 455 companies, 99.8% identical"]]></title><description><![CDATA[
<p>We did SOC 2 a few years ago, I'm glad we did it.<p>In my mind getting a clean report required three kinds of work:<p>1. Work that actively improved our security posture. 
2. Work that didn't change much, but made our security posture easier to understand.
3. Busy work.<p>I think for most companies all three kinds of work will be required, but you can also make decisions that will push the percentages around. SOC 2 required us to start doing an annual security table top exercise. You could sit down, run a scenario, run it as fast as you can, and come up with a few pre-determined "improvements" that would help if you actually had that problem in the future. Or you could sit down and really put work into it, and see what works well and what doesn't.<p>As an example in our last tabletop I "exfiltrated" some data from one of our servers, and challenged the team to figure out what I'd done. The easy way out would have been for someone to say "We'll look at the logs and figure it out", but instead I asked them to actually try and find it. We discovered that the sheer volume of logs for that system made them hard to work with. So we made some changes to make them easier to work with and repeated the exercise later.<p>It could have been busy work, but instead we got real value from it.</p>
]]></description><pubDate>Sun, 22 Mar 2026 21:12:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47482201</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=47482201</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47482201</guid></item><item><title><![CDATA[New comment by preinheimer in "We indexed the Delve audit leak: 533 reports, 455 companies, 99.8% identical"]]></title><description><![CDATA[
<p>Looking at our SOC 2 report (we don't use Delve, our auditor isn't on their list) I don't think this is quite the smoking gun it might look like if you're not reading SOC 2 reports for a living.<p>There's a fair amount of boiler plate language in these reports, and a bunch of re-stating the SOC 2 controls. I'd expect two reports (same auditors, same platforms) to be nearly identical. If they're both using AWS, Github, Stripe, Vetty, they're subbing a lot of the exact same thing out to the same companies, referencing the same set of internal controls.<p>Reading ours. There's a section titled $Company's Controls, followed by 20 pages listing the various SOC 2 controls. e.g.<p>---<p>CC9.0 Common Criteria Related to Risk Mitigation<p>CC9.1 The entity identifies, selects, and develops risk mitigation activities for risks arising from potential
business disruptions.<p>IR-01 A Security Incident Response Plan that outlines the process of identifying, prioritizing, communicating, assigning, and tracking confirmed incidents through to resolution is accessible to all relevant employees and contractors and is reviewed annually.<p>---<p>Then there's another 20 pages of those same controls being listed, some language about how they tested the controls, and hopefully "No Exceptions Noted".<p>That's not going to change much between companies.</p>
]]></description><pubDate>Sun, 22 Mar 2026 21:05:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47482143</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=47482143</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47482143</guid></item><item><title><![CDATA[New comment by preinheimer in "Montana passes Right to Compute act (2025)"]]></title><description><![CDATA[
<p>What about a “right to create act” giving people the right to create things and not have their creation be ingested to train ai for billion dollar companies?</p>
]]></description><pubDate>Sat, 14 Mar 2026 16:03:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47378025</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=47378025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47378025</guid></item><item><title><![CDATA[New comment by preinheimer in "I was banned from Claude for scaffolding a Claude.md file?"]]></title><description><![CDATA[
<p>> AI moderation is currently a "black box" that prioritizes safety over accuracy to an extreme degree.<p>I think there's a wide spread in how that's implemented. I would certainly not describe Grok as a tool that's prioritized safety at all.</p>
]]></description><pubDate>Thu, 22 Jan 2026 19:10:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46723776</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46723776</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46723776</guid></item><item><title><![CDATA[New comment by preinheimer in "Here is the 15 sec coding test I used to instantly filter out most applicants"]]></title><description><![CDATA[
<p>You're right. I agree.</p>
]]></description><pubDate>Wed, 17 Dec 2025 22:29:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46306474</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46306474</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46306474</guid></item><item><title><![CDATA[New comment by preinheimer in "Here is the 15 sec coding test I used to instantly filter out most applicants"]]></title><description><![CDATA[
<p>I think it’s important to test these systems. Let some % of candidates who get this wrong through to the next stage and see what happens. Does failing this test actually correlate with being a bad fit later?<p>If you want to ineffectivly filter out most candidates just auto-reject everything that doesn’t arrive on a timestamp ending in 1.</p>
]]></description><pubDate>Wed, 17 Dec 2025 22:16:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46306330</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46306330</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46306330</guid></item><item><title><![CDATA[New comment by preinheimer in "VPN location claims don't match real traffic exits"]]></title><description><![CDATA[
<p>We really don't want to operate our own hardware. The situation in Peru at the time was that there wasn't anyone offering the bandwidth we needed who could actually back up their bandwidth claims. Forget 95th percentile, bandwidth there was straight "you pay for a pipe, we give you that size pipe (but somewhat oversold)". But no one could do more than like 5mbit that was actually more like 3.</p>
]]></description><pubDate>Sun, 14 Dec 2025 17:50:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46265084</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46265084</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46265084</guid></item><item><title><![CDATA[New comment by preinheimer in "VPN location claims don't match real traffic exits"]]></title><description><![CDATA[
<p>We've got detailed global ping data here: <a href="https://wondernetwork.com/pings" rel="nofollow">https://wondernetwork.com/pings</a><p>One of our competitors was claiming a server in a middle eastern country we could not find any hosting in. So I figured out what that server's hostname was to do a little digging. It was >1ms away from my server in Germany.</p>
]]></description><pubDate>Sun, 14 Dec 2025 00:42:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46259757</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46259757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46259757</guid></item><item><title><![CDATA[New comment by preinheimer in "VPN location claims don't match real traffic exits"]]></title><description><![CDATA[
<p>I'm a co-founder at WonderProxy, we didn't make their list (we target people doing application testing, not consumer VPNs).<p>We're in 100+ countries, and I'll stand by that claim. It's a huge pain in the neck. In our early years we had a lot of problems with suppliers claiming to be in Mexico or South America who were actually just in Texas. I almost flew to Peru with a rackmount server in my luggage after weeks of problems, that plan died when we realized I'd need to figure out how to pay Peruvian income tax on the money I made in country before I could leave.<p>We've also had customers complaining that a given competitor had a country we'd had trouble sourcing in the Middle East. A little digging on our part and it's less than a ms away from our server in Germany.</p>
]]></description><pubDate>Sun, 14 Dec 2025 00:38:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46259730</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46259730</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46259730</guid></item><item><title><![CDATA[New comment by preinheimer in "Someone at YouTube Needs Glasses: The Prophecy Has Been Fulfilled"]]></title><description><![CDATA[
<p>Ive installed a browser extension to remove them on the desktop.<p>There should absolutely be a better answer here.</p>
]]></description><pubDate>Wed, 26 Nov 2025 00:45:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46052749</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=46052749</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46052749</guid></item><item><title><![CDATA[New comment by preinheimer in "Fighting the New York Times' invasion of user privacy"]]></title><description><![CDATA[
<p>"Your data belongs to you" but we can take any of your data we can find and use it for free for ever, without crediting you, notifying you, or giving you any way of having it removed.</p>
]]></description><pubDate>Wed, 12 Nov 2025 15:27:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45901357</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=45901357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45901357</guid></item><item><title><![CDATA[New comment by preinheimer in "Show HN: Traceroute Visualizer"]]></title><description><![CDATA[
<p>Love it, I'm still often surprised by how long a hop can be. e.g. I'm looking at one from France to Singapore.<p>If you're looking to trace to something far away when doing a demo we've got servers in ~280 cities around the world so <random large city>.wonderproxy.com works. e.g. taipei.wonderproxy.com or santiago.wonderproxy.com, berlin, newyork, etc.</p>
]]></description><pubDate>Fri, 03 Oct 2025 09:42:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=45460970</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=45460970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45460970</guid></item><item><title><![CDATA[New comment by preinheimer in "Stripe Launches L1 Blockchain: Tempo"]]></title><description><![CDATA[
<p>Speaking as a shareholder: It would be kinda swell if they went public though.</p>
]]></description><pubDate>Thu, 04 Sep 2025 18:29:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45130576</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=45130576</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45130576</guid></item><item><title><![CDATA[New comment by preinheimer in "The Rise of Hybrid PHP: Blending PHP with Go and Rust"]]></title><description><![CDATA[
<p>Reminds me of how Yahoo! worked back in the day. All their display logic in PHP, with the hard business logic in c extensions.</p>
]]></description><pubDate>Sat, 30 Aug 2025 22:10:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=45078424</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=45078424</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45078424</guid></item><item><title><![CDATA[New comment by preinheimer in "Ban me at the IP level if you don't like me"]]></title><description><![CDATA[
<p>MaxMind is very common, IPInfo is also good. <a href="https://ipinfo.io/developers/database-download" rel="nofollow">https://ipinfo.io/developers/database-download</a><p>If you want to test your IP blocks, we have servers on both China and Russia, we can try to take a screenshot from there to see what we get (free, no signup) <a href="https://testlocal.ly/" rel="nofollow">https://testlocal.ly/</a></p>
]]></description><pubDate>Mon, 25 Aug 2025 11:37:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45012750</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=45012750</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45012750</guid></item><item><title><![CDATA[New comment by preinheimer in "Newsmax agrees to pay $67M in defamation case over bogus 2020 election claims"]]></title><description><![CDATA[
<p>I don't think that in person voting with ID is a fool proof way to guarantee that only the people who "should be voting" get to vote.<p>I also think you disenfranchise too many people when you do that.<p>- People who work on oil rigs won't get to vote<p>- People who do shift work covering the hours the polls are open wont get to vote<p>- People who are of sound mind, but too unwell to travel to a polling location wont get to vote<p>- November is Red/blue king crab season in Alaska, guess those people don't get to vote<p>- Flight attendants & pilots might be away from home that day.<p>- People in the military might be on exercise that day, we're cutting them off (though I'll assume deployed service members will get to vote wherever they are)<p>- Long haul truckers are out of luck<p>- Anyone on vacation is missing their chance<p>- College students are always a wildcard, do they cast a ballot where they are (ID could be from a different state) or go home for the weekend?</p>
]]></description><pubDate>Tue, 19 Aug 2025 00:04:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=44946765</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=44946765</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44946765</guid></item><item><title><![CDATA[New comment by preinheimer in "Making Postgres slower"]]></title><description><![CDATA[
<p>Love it.</p>
]]></description><pubDate>Sun, 27 Jul 2025 22:20:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=44705250</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=44705250</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44705250</guid></item><item><title><![CDATA[New comment by preinheimer in "The ChompSaw: A Benchtop Power Tool That's Safe for Kids to Use"]]></title><description><![CDATA[
<p>It is not easy for children to cut cardboard with scissors. I'd say that remains true at least until age 10. Some younger may be able to manage a small amount of cutting but would get tired quickly.<p>I volunteer with scouts, kids aged 5-8. We ran a cardboard based activity with the makedo stuff. We tried to supplement with scissors, they were not effective.</p>
]]></description><pubDate>Thu, 10 Jul 2025 23:45:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=44526943</link><dc:creator>preinheimer</dc:creator><comments>https://news.ycombinator.com/item?id=44526943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44526943</guid></item></channel></rss>