<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: rajsite</title><link>https://news.ycombinator.com/user?id=rajsite</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 21 Apr 2026 12:11:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=rajsite" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by rajsite in "Up to 4GB of Memory in WebAssembly"]]></title><description><![CDATA[
<p>Does the 4GB limit only apply per WebAssembly instance or does it apply to the V8 runtime as a whole? Can a single page run multiple separate 4GB WASM instances?</p>
]]></description><pubDate>Fri, 15 May 2020 04:11:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=23188818</link><dc:creator>rajsite</dc:creator><comments>https://news.ycombinator.com/item?id=23188818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23188818</guid></item><item><title><![CDATA[New comment by rajsite in "Vulnerability in the Mac Zoom client allows malicious websites to enable camera"]]></title><description><![CDATA[
<p>A user on Reddit suggested the image url hack was a way to bypass mixed content blocking from the zoom https site to the local http server: <a href="https://www.reddit.com/r/programming/comments/cavblo/zoom_zero_day_4_million_webcams_maybe_an_rce_just/etdw0qn/" rel="nofollow">https://www.reddit.com/r/programming/comments/cavblo/zoom_ze...</a><p>> One potential hiccup I encountered was that Firefox blocked my XHR request due to a policy against "mixed active content". This was because my origin site was accessed through an HTTPS connection and the localhost server was only HTTP. That's one potential reason Zoom might have opted to use their <img> garbage; since <img> elements are passive not active content, they could avoid using HTTPS on the localhost webserver. That's not a good excuse, but clearly they weren't interested in finding a good solution -- whatever the problem that prompted the <img> hack was.</p>
]]></description><pubDate>Wed, 10 Jul 2019 01:15:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=20398376</link><dc:creator>rajsite</dc:creator><comments>https://news.ycombinator.com/item?id=20398376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20398376</guid></item></channel></rss>