<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: reschlukas10</title><link>https://news.ycombinator.com/user?id=reschlukas10</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 23:59:00 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=reschlukas10" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[iMessage App to share music links]]></title><description><![CDATA[
<p>Article URL: <a href="https://apps.apple.com/us/app/tunes-sharing/id6670492234">https://apps.apple.com/us/app/tunes-sharing/id6670492234</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41501103">https://news.ycombinator.com/item?id=41501103</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 10 Sep 2024 14:23:59 +0000</pubDate><link>https://apps.apple.com/us/app/tunes-sharing/id6670492234</link><dc:creator>reschlukas10</dc:creator><comments>https://news.ycombinator.com/item?id=41501103</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41501103</guid></item><item><title><![CDATA[New comment by reschlukas10 in "Not Using Zoom"]]></title><description><![CDATA[
<p>Webex is pretty good</p>
]]></description><pubDate>Mon, 07 Aug 2023 15:19:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=37035677</link><dc:creator>reschlukas10</dc:creator><comments>https://news.ycombinator.com/item?id=37035677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37035677</guid></item><item><title><![CDATA[New comment by reschlukas10 in "Show HN: We built an end-to-end encrypted alternative to Google Photos"]]></title><description><![CDATA[
<p>1. Oh sorry, thanks for the clarification<p>2. How is the email address encrypted?
   Why would an attacker need a stored hash? In a database leak situation it's
   possible to get to the data with only a valid email-password combination or am I missing something ?
   There is no information from a registered device necessary for the decryption right ?</p>
]]></description><pubDate>Mon, 30 Aug 2021 17:10:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=28358047</link><dc:creator>reschlukas10</dc:creator><comments>https://news.ycombinator.com/item?id=28358047</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28358047</guid></item><item><title><![CDATA[New comment by reschlukas10 in "Show HN: We built an end-to-end encrypted alternative to Google Photos"]]></title><description><![CDATA[
<p>I think the idea is great, I'm looking for a E2EE photo service already for a long time.<p>Although I'm not a security expert, I have some worries about your security concept.<p>1. When the user wants to change the password, all photos&videos have to be reencrypted and uploaded
   which is absurd for most people because ~100GB of photo-storage is not an exception these days anymore.<p>2. When your database is leaked, it is very easy to compare with leaked passwords, putting users with
   reused passwords in great risk.<p>My proposal:<p>Masterkey: Random key encrypted with users password<p>Device A creates a masterkey and short-living rolling keys.
Device B creates private/pub keys.
If the user wants to add another device (B), he has to enter the current rolling key (from A).
Device B sends its public key to Device A, encrypted with rolling key.
Device A sends back masterkey encrypted with Device B public key.<p>en/decryption-key = masterkey decrypted with users password<p>With this method a database leak would be much less of a problem and a password change much less painful.</p>
]]></description><pubDate>Mon, 30 Aug 2021 11:44:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=28354658</link><dc:creator>reschlukas10</dc:creator><comments>https://news.ycombinator.com/item?id=28354658</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28354658</guid></item></channel></rss>