<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: r1ch</title><link>https://news.ycombinator.com/user?id=r1ch</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 10 May 2026 08:45:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=r1ch" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by r1ch in "A Roblox cheat and one AI tool brought down Vercel's platform"]]></title><description><![CDATA[
<p>The timeline is off too if the Trend Micro report is to be believed. It makes for a catchy headline, but a source is definitely warranted here.</p>
]]></description><pubDate>Tue, 21 Apr 2026 12:49:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47848055</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=47848055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47848055</guid></item><item><title><![CDATA[New comment by r1ch in "My Google Workspace account suspension"]]></title><description><![CDATA[
<p>I recently had to go through the recovery flow for an admin account and it was wild. Despite Google manually unlocking the account and giving me a reset link, every login was forced to authenticate via SMS using the (removed) phone number. Luckily I was able to get a hold of it and get the code, but even after adding a TOTP and security key 2FA, further logins still required SMS.<p>It feels like the security team made this change to reduce account hijacking but it's at complete odds with the recovery flow and modern security practices. Better hope your phone number doesn't get hijacked or recycled because it's the key to your account now, security keys be damned.</p>
]]></description><pubDate>Sun, 05 Apr 2026 14:17:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47649712</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=47649712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47649712</guid></item><item><title><![CDATA[New comment by r1ch in "The RCE that AMD won't fix"]]></title><description><![CDATA[
<p>Anyone can request a CVE, this is sadly the most likely path towards getting it fixed.</p>
]]></description><pubDate>Fri, 06 Feb 2026 12:54:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46912228</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46912228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46912228</guid></item><item><title><![CDATA[New comment by r1ch in "Notepad++ hijacked by state-sponsored actors"]]></title><description><![CDATA[
<p>Every shared hosting provider has this risk. Critical projects should be using dedicated or VPS hosting, preferably with encrypted filesystems too as even datacenter techs can fall victim to social engineering.<p>I'm pretty surprised that they got away with unsigned updates and shared hosting as long as they did. I wonder how many similar popular projects are out there on dodgy infrastructure.</p>
]]></description><pubDate>Mon, 02 Feb 2026 04:39:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46852458</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46852458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46852458</guid></item><item><title><![CDATA[New comment by r1ch in "Vitamin D and Omega-3 have a larger effect on depression than antidepressants"]]></title><description><![CDATA[
<p>Please do not take 5000mg/day of Vitamin D. The author confuses IU and mg which is very dangerous.</p>
]]></description><pubDate>Thu, 29 Jan 2026 11:03:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46808507</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46808507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46808507</guid></item><item><title><![CDATA[New comment by r1ch in "Copy-Item is slower than File Explorer"]]></title><description><![CDATA[
<p>Yes, that's standardized but is only rated for up to 30 meters at the higher speeds you get from it, so it's not very useful outside of server room / data center applications and you probably want to be using fiber at that point.</p>
]]></description><pubDate>Sun, 07 Dec 2025 00:04:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=46177864</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46177864</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46177864</guid></item><item><title><![CDATA[New comment by r1ch in "Copy-Item is slower than File Explorer"]]></title><description><![CDATA[
<p>The bottleneck with SFTP / SCP / SSH is usually the server software - SSH can multiplex streams, so it implements its own TCP-style sliding windows for channel data. Unfortunately OpenSSH and similar server implementations suffer from the exact same problems that TCP did, where the windows don't scale up to modern connection speeds, so the maximum data in-flight quickly gets limited at higher BDPs.<p>HPN-SSH[1] resolves this but isn't widely deployed.<p>[1] <a href="https://www.psc.edu/hpn-ssh-home/" rel="nofollow">https://www.psc.edu/hpn-ssh-home/</a></p>
]]></description><pubDate>Sat, 06 Dec 2025 23:17:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46177513</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46177513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46177513</guid></item><item><title><![CDATA[New comment by r1ch in "Copy-Item is slower than File Explorer"]]></title><description><![CDATA[
<p>OP mentions using "Cat 7" cables - please don't buy these. Cat 7 isn't something that exists in TIA/EIA standards, only in ISO/IEC and it requires GG45 or TERA connectors. Cat 7 with RJ45 connectors isn't standardized, so you have no idea what you're actually getting. Stick with pure copper Cat 6A.</p>
]]></description><pubDate>Sat, 06 Dec 2025 23:12:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46177463</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46177463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46177463</guid></item><item><title><![CDATA[New comment by r1ch in "Trick users and bypass warnings – Modern SVG Clickjacking attacks"]]></title><description><![CDATA[
<p>The modern way to do this is with the Content-Security-Policy: frame-ancestors directive: <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Content-Security-Policy/frame-ancestors" rel="nofollow">https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/...</a></p>
]]></description><pubDate>Fri, 05 Dec 2025 04:09:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46156763</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=46156763</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46156763</guid></item><item><title><![CDATA[New comment by r1ch in "How to Run WordPress completely from RAM"]]></title><description><![CDATA[
<p>Cloudflare will actually slow down TTFB for small, less popular sites since they don't maintain a keepalive connection to the origin. This means you pay an additional TCP/TLS setup cost from the Cloudflare POP to the origin which is worse than a direct connection. I also tried testing a smart-placed worker and cloudflared, neither of which seemed to help.</p>
]]></description><pubDate>Sun, 12 Oct 2025 17:40:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=45560119</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=45560119</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45560119</guid></item><item><title><![CDATA[New comment by r1ch in "Cloudflare Radar: AI Insights"]]></title><description><![CDATA[
<p>Ironically the AI crawlers I do want to block - the million-IP-strong residential botnets that fake their user agents - Cloudflare doesn't detect at all.</p>
]]></description><pubDate>Tue, 02 Sep 2025 01:32:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=45098207</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=45098207</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45098207</guid></item><item><title><![CDATA[New comment by r1ch in "DSLRoot, proxies, and the threat of 'legal botnets'"]]></title><description><![CDATA[
<p>At first they were easily detectable using HTTP header analysis - e.g. pretending to be Chrome but not sending the headers that Chrome always sends. Now it's a combination of TLS / HTTP protocol level analysis and application layer - e.g. we send a cookie on the user's "normal" page view and check it exists on the higher-resource usage pages they might later visit - the bots don't care about normal viewing patterns and try to hit the higher-resource pages on their first visit, so  they get blocked.</p>
]]></description><pubDate>Thu, 28 Aug 2025 15:28:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=45053427</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=45053427</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45053427</guid></item><item><title><![CDATA[New comment by r1ch in "DSLRoot, proxies, and the threat of 'legal botnets'"]]></title><description><![CDATA[
<p>Residential proxy botnets have exploded since LLMs became a thing. The amount of DDoS-level scraping we receive from residential IPs has exploded over the last year, one of our sites that typically sees around 10k unique IPs per day jumped to over 2M before we were able to deploy appropriate mitigations. We originally started blocking the IPs, but then we ended up blocking legitimate users as they seem to specifically use ISPs that have very dynamic IPs (i.e. the customer's IP will change even if their router stays on 24/7).</p>
]]></description><pubDate>Tue, 26 Aug 2025 16:52:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=45029152</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=45029152</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45029152</guid></item><item><title><![CDATA[New comment by r1ch in "Google will allow only apps from verified developers to be installed on Android"]]></title><description><![CDATA[
<p>This is the same direction that Microsoft is taking Windows. Smart App Control is already rolling out to some regions - no .exe will run without a code signing certificate.<p><a href="https://learn.microsoft.com/en-us/windows/apps/develop/smart-app-control/overview" rel="nofollow">https://learn.microsoft.com/en-us/windows/apps/develop/smart...</a></p>
]]></description><pubDate>Mon, 25 Aug 2025 22:12:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=45019734</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=45019734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45019734</guid></item><item><title><![CDATA[New comment by r1ch in "A 14kb page can load much faster than a 15kb page (2022)"]]></title><description><![CDATA[
<p>Loss-based TCP congestion control and especially slow start are a relic from the 80s when the internet was a few dialup links and collapsed due to retransmissions. If an ISP's links can't handle a 50 KB burst of traffic then they need to upgrade them. Expecting congestion should be an exception, not the default.<p>Disabling slow start and using BBR congestion control (which doesn't rely on packet loss as a congestion signal) makes a world of difference for TCP throughput.</p>
]]></description><pubDate>Sat, 19 Jul 2025 16:10:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=44616705</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=44616705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44616705</guid></item><item><title><![CDATA[New comment by r1ch in "Show HN: I built a(nother) house optimized for LAN parties"]]></title><description><![CDATA[
<p>Thanks, somehow I missed that entry.</p>
]]></description><pubDate>Sun, 17 Nov 2024 01:49:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=42161305</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=42161305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42161305</guid></item><item><title><![CDATA[New comment by r1ch in "Show HN: I built a(nother) house optimized for LAN parties"]]></title><description><![CDATA[
<p>How did you deal with the length of the USB and display cables? I thought after 5m or so things would start falling apart. Are there active extenders and can they can handle 240+ Hz?</p>
]]></description><pubDate>Sat, 16 Nov 2024 22:45:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42160095</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=42160095</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42160095</guid></item><item><title><![CDATA[New comment by r1ch in "Before you buy a domain name, first check to see if it's haunted"]]></title><description><![CDATA[
<p>This can also happen with IP addresses. We recently moved one of our sites to a new IP and got a trickle of complaints about it being inaccessible from various authoritarian countries. After some digging, the new IP was used as a Tor bridge (not even an exit node) over _ten years ago_. I gave up any hope of fixing that and just ordered a different IP address.</p>
]]></description><pubDate>Sat, 26 Oct 2024 15:08:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=41955209</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=41955209</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41955209</guid></item><item><title><![CDATA[New comment by r1ch in "We accidentally burned through 200GB of proxy bandwidth in 6 hours"]]></title><description><![CDATA[
<p>The end user typically has their device compromised by using free apps where the developers were bribed $$$ to add the proxy "SDK". The botnet operator then rents out the bandwidth at exorbitant rates to anyone who will pay for it.<p>Chrome extensions are also a huge source of this, they look for extensions with a large install base and then make an offer to buy it to turn all the users into proxies.</p>
]]></description><pubDate>Thu, 19 Sep 2024 17:35:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41594264</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=41594264</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41594264</guid></item><item><title><![CDATA[New comment by r1ch in "Cloudflare Introduces Automatic SSL/TLS"]]></title><description><![CDATA[
<p>The re-encrypted part isn't necessarily true though and you have no way of knowing. Users are misled because they see a nice secure lock icon in the browser, but that only protects the connection to the local Cloudflare POP, the rest of the way to the origin is all vulnerable to MITM.<p>As a security company, anything less than "Full (Strict)" should not exist.</p>
]]></description><pubDate>Fri, 09 Aug 2024 08:54:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=41200050</link><dc:creator>r1ch</dc:creator><comments>https://news.ycombinator.com/item?id=41200050</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41200050</guid></item></channel></rss>