<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: rubendev</title><link>https://news.ycombinator.com/user?id=rubendev</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 09:58:52 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=rubendev" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by rubendev in "Claude Code Found a Linux Vulnerability Hidden for 23 Years"]]></title><description><![CDATA[
<p>With a capable static analyzer that is not true. In many common cases they can deduce the possible ranges of values based on branching checks along the data flow path, and if that range falls within the buffer then it does not report it.</p>
]]></description><pubDate>Sat, 04 Apr 2026 18:03:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47641579</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=47641579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47641579</guid></item><item><title><![CDATA[New comment by rubendev in "Why the EU's AI Act is about to become enterprises' biggest compliance challenge"]]></title><description><![CDATA[
<p>If you say you need the data for security reasons that’s all well and good, but then you can only use the data for that specific purpose. So you cannot suddenly start using it for targeted advertising just because you already have the data.</p>
]]></description><pubDate>Mon, 23 Feb 2026 18:21:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47126422</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=47126422</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47126422</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>Please elaborate why you believe that? The ability to easily rotate encryption keys is considered an anti pattern?</p>
]]></description><pubDate>Fri, 24 Oct 2025 17:35:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=45697042</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45697042</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45697042</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>Also, I gave the link to the appendix because there was a specific question about Argon2 parameters. For general developer audiences, they need to look at the standard itself which is a lot more high level about how to properly implement cryptography in software: 
<a href="https://github.com/OWASP/ASVS/blob/master/5.0/en/0x20-V11-Cryptography.md" rel="nofollow">https://github.com/OWASP/ASVS/blob/master/5.0/en/0x20-V11-Cr...</a><p>For the most common use-cases of cryptography like authentication and secure communication there is more specific, but still high level guidance that is useful for developers as well:<p>- <a href="https://github.com/OWASP/ASVS/blob/master/5.0/en/0x21-V12-Secure-Communication.md" rel="nofollow">https://github.com/OWASP/ASVS/blob/master/5.0/en/0x21-V12-Se...</a><p>- <a href="https://github.com/OWASP/ASVS/blob/master/5.0/en/0x18-V9-Self-contained-Tokens.md" rel="nofollow">https://github.com/OWASP/ASVS/blob/master/5.0/en/0x18-V9-Sel...</a><p>- <a href="https://github.com/OWASP/ASVS/blob/master/5.0/en/0x15-V6-Authentication.md#v65-general-multi-factor-authentication-requirements" rel="nofollow">https://github.com/OWASP/ASVS/blob/master/5.0/en/0x15-V6-Aut...</a></p>
]]></description><pubDate>Wed, 22 Oct 2025 19:49:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45674244</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45674244</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45674244</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>Which one would you recommend instead? Referring dev teams to NIST standards or the like doesn’t work well in my experience.</p>
]]></description><pubDate>Wed, 22 Oct 2025 17:39:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=45672516</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45672516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45672516</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>Yes it’s an audit checklist for when you need to know specifically what to use and with which parameters.<p>It’s unfortunate if there are mistakes in there. The people at OWASP would be very happy to receive feedback on their GitHub I’m sure.</p>
]]></description><pubDate>Wed, 22 Oct 2025 17:07:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=45672111</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45672111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45672111</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>Can you give some examples of such commonly used libraries for languages like Java / C# / C++?<p>In my experience there are not many libraries like Google Tink around, and they are not in widespread use at all. Most applications doing encryption manually for specific purposes still have the words AES, CBC, GCM, IV etc hardcoded in their source code.<p>If you review such code, it’s still useful to have resources that show industry best practices, but I agree that the gold standard is to not have these details in your own code at all.</p>
]]></description><pubDate>Wed, 22 Oct 2025 17:01:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45672025</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45672025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45672025</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>Yes I fully agree. I’m a big fan of libraries like Google Tink that make you pick a use case and use the best implementation for that use case with built in crypto agility.<p>Most crypto libraries are not built like that however. They just give you a big pile of primitives/algorithms to choose from. Then frameworks get built on top of that, not always taking into account best practices, and leave people that are serious about security the job of making sure the implementation is secure. This is the point where you need something like ASVS.</p>
]]></description><pubDate>Wed, 22 Oct 2025 16:42:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=45671740</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45671740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45671740</guid></item><item><title><![CDATA[New comment by rubendev in "Evaluating Argon2 adoption and effectiveness in real-world software"]]></title><description><![CDATA[
<p>The OWASP ASVS appendix on Cryptography is one of the best and concise resources I know for this kind of thing: <a href="https://github.com/OWASP/ASVS/blob/master/5.0/en/0x92-Appendix-C_Cryptography.md#hash-functions-for-password-storage" rel="nofollow">https://github.com/OWASP/ASVS/blob/master/5.0/en/0x92-Append...</a></p>
]]></description><pubDate>Wed, 22 Oct 2025 16:26:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=45671551</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=45671551</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45671551</guid></item><item><title><![CDATA[New comment by rubendev in "Show HN: I built website for sharing Drum Patterns"]]></title><description><![CDATA[
<p>If you only secure the login you will be sending your session cookies unencrypted for the other pages and they can be intercepted and used to impersonate you.</p>
]]></description><pubDate>Mon, 24 Mar 2025 06:17:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=43458132</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=43458132</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43458132</guid></item><item><title><![CDATA[New comment by rubendev in "Hacking 700M Electronic Arts Accounts"]]></title><description><![CDATA[
<p>If the program has access to the credential, and the program is running on your computer, you also have access to the credential no matter how they try to obfuscate it.<p>What the game dev is supposed to do is have an account system on their backend, and ask the player to enter their credentials in the game. The game can then identify itself as this player to the backend servers. That way any actions on the backend can be attributed to a particular player and you have a good basis to make security decisions on.</p>
]]></description><pubDate>Tue, 05 Nov 2024 18:18:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=42053902</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=42053902</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42053902</guid></item><item><title><![CDATA[New comment by rubendev in "Password protect a static HTML page, decrypted in-browser in JavaScript"]]></title><description><![CDATA[
<p>You can set a CSP in the HTML head section using a meta http-equiv tag. It has similar functionality to X-frame-options IIRC.</p>
]]></description><pubDate>Sun, 01 Sep 2024 10:25:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=41415702</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=41415702</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41415702</guid></item><item><title><![CDATA[New comment by rubendev in "Ask HN: Do you think Hacker News is missing any features?"]]></title><description><![CDATA[
<p>A dark mode would be nice.</p>
]]></description><pubDate>Mon, 25 Jul 2022 20:11:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=32230272</link><dc:creator>rubendev</dc:creator><comments>https://news.ycombinator.com/item?id=32230272</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32230272</guid></item></channel></rss>