<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: qual</title><link>https://news.ycombinator.com/user?id=qual</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 13:40:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=qual" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by qual in "X redesigns water pistol emoji back to a firearm"]]></title><description><![CDATA[
<p>><i>I don't understand why people ask for a definition. A quick search brings up many useful definitions</i><p>Note how the definition there doesn't match any of the three definitions people gave me here, and none of the three here seem to match each other. Also, as your link says, the definition seems to have changed drastically in the past few years, so I can't even be sure that the link has the most up-to-date definition.<p>So, I was asking someone who seemed to be very passionate about being "against woke culture", to hear it directly from them. This is a conversational site, I figured it'd be fine, but seeing that my question is now downvoted I guess I need to better learn what conversations and questions are appropriate here.<p>I'm still new around these parts. Forgive me.</p>
]]></description><pubDate>Wed, 24 Jul 2024 21:57:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=41062629</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41062629</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41062629</guid></item><item><title><![CDATA[New comment by qual in "X redesigns water pistol emoji back to a firearm"]]></title><description><![CDATA[
<p>Thanks for taking the time to write this out, I think it helps me understand a bit better. Every definition seems to be sort of different and personalized but I think it's beginning to coalesce into something in my mind, rather than just leaving me confused.<p>Usually when I try to ask this question, I just have angry people being angry with me, and I end up more confused. So it's nice to have some legitimate explanations come my way.</p>
]]></description><pubDate>Wed, 24 Jul 2024 20:55:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=41061990</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41061990</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41061990</guid></item><item><title><![CDATA[New comment by qual in "X redesigns water pistol emoji back to a firearm"]]></title><description><![CDATA[
<p>><i>Performative nonsense designed to appeal to emotions instead of doing something about the implied problem. (Guns and censorship, respectively.)</i><p>Thanks! This helps me understand it a bit more. Sort of a synonym for "virtue signalling" it seems?</p>
]]></description><pubDate>Wed, 24 Jul 2024 20:47:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=41061900</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41061900</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41061900</guid></item><item><title><![CDATA[New comment by qual in "X redesigns water pistol emoji back to a firearm"]]></title><description><![CDATA[
<p>><i>Note that I am not the one who brought up the term to the conversation.</i><p>Of course, but since you said you were <i>vehemently against</i> it, I thought you'd be the better person to give me some perspective and help me learn.<p>><i>I did want to avoid the labels as there's always someone who comes up and ask you to define the label instead of talking about the issue itself. In this case, censorship.</i><p>I would have found it much clearer if your comment said "I am against censorship at it's core, vehemently", and as an added bonus you wouldn't be annoyed by me asking about it.<p>But, to be clear, the reason I asked about the label instead of the issue is because I don't understand what issue(s) woke culture represents to you. So trying to talk about those issues would be difficult.<p>My impression so far is that woke culture is more than just censorship. I'm very anti-censorship, but I've also been called "woke" in passing as an insult, so unfortunately I'm still left a bit confused. Thanks anyways, though!</p>
]]></description><pubDate>Wed, 24 Jul 2024 20:45:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41061872</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41061872</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41061872</guid></item><item><title><![CDATA[New comment by qual in "X redesigns water pistol emoji back to a firearm"]]></title><description><![CDATA[
<p>(Not the person you were replying to)<p>I'm curious what/how you define "woke culture", because the only definitions of "woke" I've ever heard are basically "thing I don't like" or "the left". Neither of those definitions have helped me understand what you are so vehemently against.<p>Can you help me understand what woke culture is to you?<p>This is a genuine question.</p>
]]></description><pubDate>Wed, 24 Jul 2024 20:28:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=41061677</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41061677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41061677</guid></item><item><title><![CDATA[New comment by qual in "Anyone can access deleted and private repository data on GitHub"]]></title><description><![CDATA[
<p>><i>If you know the hash of some data, then you either already have the data yourself, or you learned the hash from someone who had the data.</i><p>From the article, you do not need to have the data nor learn the hash from someone who had the data.<p>><i>Commit hashes can be brute forced through GitHub’s UI, particularly because the git protocol permits the use of short SHA-1 values when referencing a commit. A short SHA-1 value is the minimum number of characters required to avoid a collision with another commit hash, with an absolute minimum of 4. The keyspace of all 4 character SHA-1 values is 65,536</i></p>
]]></description><pubDate>Wed, 24 Jul 2024 19:24:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=41060858</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41060858</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41060858</guid></item><item><title><![CDATA[New comment by qual in "Anyone can access deleted and private repository data on GitHub"]]></title><description><![CDATA[
<p>><i>Come on, this is not surprising.</i><p>Very cool that it is not surprising to you.<p>But to others (some are even in this thread!) it is both new and surprising. They unfortunately missed your 4 year old comment, but at least they get to learn it now.</p>
]]></description><pubDate>Wed, 24 Jul 2024 19:19:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41060800</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41060800</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41060800</guid></item><item><title><![CDATA[New comment by qual in "Give Me the Green Light Part 1: Hacking Traffic Control Systems"]]></title><description><![CDATA[
<p>You're presenting this as if its a new idea, but the security industry tried the above (for the majority of the time that "computer security" has been a thing) and... it didn't work! That's the whole reason public disclosure came about in the first place -- there's quite a rich history there if you're interested.<p>Some other thoughts:<p>><i>You let the manufacturer know, and you let them decide for the next steps.</i><p>Which, as history has proven, the "next steps" is generally to sweep it under the rug and to be forgotten about until it's exploited by a bad actor.<p>><i>it's not your business</i><p>But, what about when it is? On-topic: I drive a car, so I care about vulnerabilities in traffic lights and they may directly affect me. It's also my business if my personal data is stolen, or my identity, or corporate data, etc.<p>><i>You helped: no lawyers, no problems.</i><p>No problems... Until the vulnerability is exploited and it causes me a problem.</p>
]]></description><pubDate>Tue, 23 Jul 2024 16:12:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=41047650</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41047650</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41047650</guid></item><item><title><![CDATA[New comment by qual in "Give Me the Green Light Part 1: Hacking Traffic Control Systems"]]></title><description><![CDATA[
<p>Could you help me understand what you are suggesting is done instead?<p>To me, it seems like you're suggesting that vulnerabilities are just left in play until someone malicious comes along and decides to do some real damage. But that seems so silly that I must be missing some alternative that you're thinking about.</p>
]]></description><pubDate>Tue, 23 Jul 2024 15:36:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=41047139</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=41047139</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41047139</guid></item><item><title><![CDATA[New comment by qual in "Jailbreaking RabbitOS"]]></title><description><![CDATA[
<p>><i>Your outrage sounds disingenuous.</i><p>I've read through these comment chains a few times, but I'm having a really hard time finding the "outrage", disingenuous or otherwise. Can you quote the part of the comment that displayed outrage?<p>><i>Do you and their security engineers even live in the same time zone?</i><p>Reading through this thread, you can find where the OP says that the time zones were accounted for.</p>
]]></description><pubDate>Wed, 17 Jul 2024 20:20:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=40989955</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40989955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40989955</guid></item><item><title><![CDATA[New comment by qual in "Hard drive, SSD puncher of physical media with 12 tons of pressure"]]></title><description><![CDATA[
<p>><i>nobody's arguing that there are cases where you'd physically destroy a device, while cryptographic erasure of the data is not required as well.</i><p>I am very explicitly saying cryptographic erasure is not required if you are following physical destruction standards (in ISO 27001 and NIST 800-88, at least).</p>
]]></description><pubDate>Thu, 04 Jul 2024 21:58:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=40878414</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40878414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40878414</guid></item><item><title><![CDATA[New comment by qual in "Hard drive, SSD puncher of physical media with 12 tons of pressure"]]></title><description><![CDATA[
<p>Sure, if you don't need to meet any compliance standards and your threat model is pretty relaxed, this is likely okay.<p>But if your threat model is that relaxed, you can just encrypt the whole drive, toss the key, and then format the device. This would likely be quicker than doing 10x write passes.<p>As a note, write passes are really only good for HDDs due to wear-leveling algorithms in every SSD.</p>
]]></description><pubDate>Thu, 04 Jul 2024 21:55:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=40878391</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40878391</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40878391</guid></item><item><title><![CDATA[New comment by qual in "HE.net problem"]]></title><description><![CDATA[
<p>Wikipedia has it incorrect then, as they list it as "formerly web.com" (<i>"Network Solutions, LLC, formerly Web.com is an American-based technology company"</i>). Thanks for the clarification!</p>
]]></description><pubDate>Thu, 04 Jul 2024 20:19:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=40877741</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40877741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40877741</guid></item><item><title><![CDATA[New comment by qual in "Hard drive, SSD puncher of physical media with 12 tons of pressure"]]></title><description><![CDATA[
<p>Most standards (e.g. ISO 27001, NIST 800-88) do allow for physical destruction without cryptographic erasure if the device is being shredded or incinerated (to the applicable shredding/incineration standard of particulate size/temperature). Especially because cryptographic erasure is effectively pointless (at high data-sensitivity levels) if the device wasn't encrypted immediately and prior to data being written. Notably, NIST 800-88 2.6 explains when <i>not</i> to use cryptographic erasure, and when to <i>consider</i> it, but there is no <i>requirement</i> for it.<p>But, I mainly made my comment in reply to this part of your comment:<p>><i>I’d assume this device targets that market.</i><p>Because I don't think there is any market where this SSD punching device would be compliant <i>and</i> cryptographic erasure wouldn't be compliant. At least, in my career, I have not seen any environment or standard where this would be considered compliant but cryptographic erasure wouldn't be.</p>
]]></description><pubDate>Thu, 04 Jul 2024 20:01:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=40877635</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40877635</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40877635</guid></item><item><title><![CDATA[New comment by qual in "Hard drive, SSD puncher of physical media with 12 tons of pressure"]]></title><description><![CDATA[
<p>Most data destruction compliance standards I am familiar with allow for cryptographic erasure when the device is encrypted prior to sensitive data being written to it (excluding some specific data-sensitivity levels).<p>If they are strict enough to not allow for cryptographic erasure (or the data is above a specific sensitivity), this device would likely not be in compliance either -- physical destruction generally requires shredding/grinding to a specific particulate size, or incineration, and this device does not appear to do either.</p>
]]></description><pubDate>Thu, 04 Jul 2024 19:28:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=40877400</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40877400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40877400</guid></item><item><title><![CDATA[New comment by qual in "Hard drive, SSD puncher of physical media with 12 tons of pressure"]]></title><description><![CDATA[
<p>><i>I don't need to mind about this with encrypted data.</i><p>I'm not sure if I wasn't clear or if you didn't read my comment correctly.<p>Encrypting is <i>not</i> enough to prevent data recovery <i>if</i> data was written to disk prior to encrypting it.<p>In other words, if you want to be 100% sure about your data being safe, you <i>must</i> encrypt <i>first</i> (when the drive is brand new), or you <i>must</i> physically destroy the drive.</p>
]]></description><pubDate>Thu, 04 Jul 2024 19:22:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=40877355</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40877355</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40877355</guid></item><item><title><![CDATA[New comment by qual in "Hard drive, SSD puncher of physical media with 12 tons of pressure"]]></title><description><![CDATA[
<p>This isn't necessarily sufficient <i>unless</i> you encrypt the drives <i>before</i> any data is written to them. If any potentially sensitive data has been written to the drive prior to encryption, the only 100% method is physical destruction.<p>Of course, this clarification only matters if your threat model involves dealing with top-secret data and/or nation-state enemies.</p>
]]></description><pubDate>Thu, 04 Jul 2024 19:18:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=40877320</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40877320</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40877320</guid></item><item><title><![CDATA[New comment by qual in "An unexpected journey into Microsoft Defender's signature World"]]></title><description><![CDATA[
<p>More precisely, EDR (somtimes EDTR -- endpoint detection and threat response) is <i>one component</i> of a robust endpoint protection platform.<p>EPPs will consist of threat detection and response (EDR), as well as proactive prevention, vulnerability management, threat intelligence, data-loss prevention, encryption management, etc.</p>
]]></description><pubDate>Tue, 02 Jul 2024 14:41:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=40857179</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40857179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40857179</guid></item><item><title><![CDATA[New comment by qual in "New ways to catch gravitational waves"]]></title><description><![CDATA[
<p>Oh, yeah sorry, I was thinking more along the lines of inter-galaxy communications!<p>I definitely do not know enough about the topic to approach answering your questions, but I'd certainly be interested in knowing the answers. I really hadn't thought about it in that context.</p>
]]></description><pubDate>Fri, 28 Jun 2024 21:08:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=40825322</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40825322</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40825322</guid></item><item><title><![CDATA[New comment by qual in "New ways to catch gravitational waves"]]></title><description><![CDATA[
<p>><i>it would also be a demonstration of development and access to resources beyond our imagination. That's the upside [...] In a galaxy of sparse and sparingly advanced civilizations, the message might be "fear us and stay away" in a way that EM would not convey.</i><p>I think you've hit the crux the question. If there are only a few civilizations, I agree, that'd be an awe-inspiring deterrent.<p>However, if you don't know how many civilizations there are that are similarly advanced to your own, sending out a big "we're here!" message may be quite risky.<p>In terms of game theory, it's a sequential and incomplete information game. I think the smartest decision is to remain quiet.</p>
]]></description><pubDate>Fri, 28 Jun 2024 20:45:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=40825096</link><dc:creator>qual</dc:creator><comments>https://news.ycombinator.com/item?id=40825096</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40825096</guid></item></channel></rss>