<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sarciszewski</title><link>https://news.ycombinator.com/user?id=sarciszewski</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 11:46:41 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sarciszewski" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Show HN: CMS Airship – Secure Content Management for the Modern Web]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/paragonie/airship">https://github.com/paragonie/airship</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=12014011">https://news.ycombinator.com/item?id=12014011</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 01 Jul 2016 05:12:40 +0000</pubDate><link>https://github.com/paragonie/airship</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=12014011</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12014011</guid></item><item><title><![CDATA[Show HN: CMS Airship – Secure Content Management for the Modern Web]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/paragonie/airship">https://github.com/paragonie/airship</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11946083">https://news.ycombinator.com/item?id=11946083</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 21 Jun 2016 14:59:16 +0000</pubDate><link>https://github.com/paragonie/airship</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11946083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11946083</guid></item><item><title><![CDATA[Show HN: 13 Open Source Projects for June 13]]></title><description><![CDATA[
<p>Article URL: <a href="https://paragonie.com/projects">https://paragonie.com/projects</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11898411">https://news.ycombinator.com/item?id=11898411</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 13 Jun 2016 22:53:06 +0000</pubDate><link>https://paragonie.com/projects</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11898411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11898411</guid></item><item><title><![CDATA[Ask HN: How does your company handle application security?]]></title><description><![CDATA[
<p>How does your company ensure the code you produce (or consume) is secure?<p>Do you have in-house security controls? Third-party penetration tests? Independent code audits? Bug bounty programs?<p>Do you forsake security entirely in favor of <i>getting it shipped</i>?</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11754147">https://news.ycombinator.com/item?id=11754147</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 23 May 2016 14:44:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=11754147</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11754147</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11754147</guid></item><item><title><![CDATA[Solve All Your Cryptography Problems in 3 Easy Steps]]></title><description><![CDATA[
<p>Article URL: <a href="https://paragonie.com/blog/2016/05/solve-all-your-cryptography-problems-in-three-easy-steps-with-halite">https://paragonie.com/blog/2016/05/solve-all-your-cryptography-problems-in-three-easy-steps-with-halite</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11683175">https://news.ycombinator.com/item?id=11683175</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 12 May 2016 13:23:38 +0000</pubDate><link>https://paragonie.com/blog/2016/05/solve-all-your-cryptography-problems-in-three-easy-steps-with-halite</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11683175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11683175</guid></item><item><title><![CDATA[A Primer on the Cryptography Powering Our Upcoming Open Source CMS]]></title><description><![CDATA[
<p>Article URL: <a href="https://paragonie.com/blog/2016/05/keyggdrasil-continuum-cryptography-powering-cms-airship">https://paragonie.com/blog/2016/05/keyggdrasil-continuum-cryptography-powering-cms-airship</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11660015">https://news.ycombinator.com/item?id=11660015</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 09 May 2016 14:20:15 +0000</pubDate><link>https://paragonie.com/blog/2016/05/keyggdrasil-continuum-cryptography-powering-cms-airship</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11660015</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11660015</guid></item><item><title><![CDATA[New comment by sarciszewski in "On asking job candidates to code"]]></title><description><![CDATA[
<p>(Switching back to my old account because rate limits.)<p>I wouldn't ever use something like FizzBuzz to assess a candidate. It would be more of "here's a mostly finished sample application with a corresponding SQL file, add this feature (e.g. a search bar for a blog) and fix any (intentionally introduced) security bugs you find".<p>They would be evaluated based on how successfully they complete the main task, and if they have an eye for finding/patching vulnerabilities, that's a bonus that can be used as a secondary selector if a lot of candidates pass. If no one does, it won't be used against them.<p>That's how I'd approach it, personally. Something specific to the kind of work we're doing, but abstract enough to be approachable without a lot of insider knowledge.</p>
]]></description><pubDate>Tue, 15 Mar 2016 15:51:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=11290510</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11290510</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11290510</guid></item><item><title><![CDATA[New comment by sarciszewski in "On asking job candidates to code"]]></title><description><![CDATA[
<p>> All true but my observation is that the companies that put candidates through multi-day-out-of-town interview processes can afford to miss out on the candidates that can't do it.<p>All companies can <i>afford</i> to waste less money than they need too.</p>
]]></description><pubDate>Tue, 15 Mar 2016 14:58:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=11290088</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11290088</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11290088</guid></item><item><title><![CDATA[On the Design and Implementation of a Stealth Backdoor for Web Applications]]></title><description><![CDATA[
<p>Article URL: <a href="https://paragonie.com/blog/2016/01/on-design-and-implementation-stealth-backdoor-for-web-applications">https://paragonie.com/blog/2016/01/on-design-and-implementation-stealth-backdoor-for-web-applications</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11235744">https://news.ycombinator.com/item?id=11235744</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 06 Mar 2016 21:58:14 +0000</pubDate><link>https://paragonie.com/blog/2016/01/on-design-and-implementation-stealth-backdoor-for-web-applications</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11235744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11235744</guid></item><item><title><![CDATA[New comment by sarciszewski in "Million Dollar Curve"]]></title><description><![CDATA[
<p>> RSA security depends mostly on how you build your private keys and ECC security depends on what parameters and what curve was chosen.<p>No. RSA security depends on getting your parameters right and padding.<p><a href="http://www.cryptofails.com/post/70059600123/saltstack-rsa-e-d-1" rel="nofollow">http://www.cryptofails.com/post/70059600123/saltstack-rsa-e-...</a><p><a href="http://framework.zend.com/security/advisory/ZF2015-10" rel="nofollow">http://framework.zend.com/security/advisory/ZF2015-10</a><p>> Russians cryptoexperts doesn't fully trust DJB they found that at the last iteration of picking parameters by DJB for Curve25519 was a bit questionable.<p>Tell them to publish their findings and propose a better solution.<p>> Changes was done for "better performance" but no one found what exactly was speeded up.<p>What "changes" exactly? The word "changes" implies there was an early draft with vastly different parameters.<p>> I don't know details, but when curve parameters was tried to be being compromised by NSA was almost always was about adding such "performance optimizations".<p>If you don't know the details, try doing some research. Knowledge is healthy.</p>
]]></description><pubDate>Wed, 24 Feb 2016 13:56:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=11166698</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11166698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11166698</guid></item><item><title><![CDATA[New comment by sarciszewski in "Million Dollar Curve"]]></title><description><![CDATA[
<p>I really appreciate the level-headed discussion in this thread so far, especially the comment I'm replying to.<p>It's a stark contrast to the CFRG mailing list. (At least, so far, no one has tried to derail discussion here with "hey check out my custom cipher it's soooo secure but you need to compress the data before encrypting it or else you can observe a repeated structure out of it".)<p>I like 25519's school of thought. If you use the smallest possible value for a given performance/security goal, there's less room for conspiracy theory (provided the person making the theory understands what's even going on).</p>
]]></description><pubDate>Wed, 24 Feb 2016 02:21:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=11164063</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11164063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11164063</guid></item><item><title><![CDATA[New comment by sarciszewski in "In Colorado, a look at life after marijuana legalization"]]></title><description><![CDATA[
<p><a href="http://pastebin.com/AYW682BJ" rel="nofollow">http://pastebin.com/AYW682BJ</a><p><a href="https://archive.is/exvT2" rel="nofollow">https://archive.is/exvT2</a></p>
]]></description><pubDate>Tue, 23 Feb 2016 15:46:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=11159638</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11159638</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11159638</guid></item><item><title><![CDATA[New comment by sarciszewski in "Silicon Valley tech worker fired after blogging about starving"]]></title><description><![CDATA[
<p>Person: "I'm starving and barely able to get by working for Yelp in SF."<p>Yelp: "You're fired." (Good luck paying rent without a job.)<p>Yelp CEO: "The cost of living is too high here, so we're going to instead move offices to Arizona and pay the same wage."<p>Does this mean that Yelp is going to...<p><pre><code>    a. Help all of its employees move to AZ where they can enjoy
       a lower cost of living?
    b. Fire all of its employees and hire replacements in AZ?
    c. Something else?
</code></pre>
Because if they're going with option B, wow.<p>The cost of living in SF is one of the reasons I refuse to ever move there for work, but it seems like a scapegoat in this case. Why not just pay your employees a livable wage to begin with?</p>
]]></description><pubDate>Mon, 22 Feb 2016 15:43:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=11151528</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11151528</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11151528</guid></item><item><title><![CDATA[New comment by sarciszewski in "How to Safely Store Your Users' Passwords in 2016"]]></title><description><![CDATA[
<p>How would transforming it before sending it over the wire help here?</p>
]]></description><pubDate>Sun, 21 Feb 2016 06:02:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=11143520</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11143520</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11143520</guid></item><item><title><![CDATA[New comment by sarciszewski in "How to Safely Store Your Users' Passwords in 2016"]]></title><description><![CDATA[
<p>No, it's one-way cryptography, but it's not a form of encryption.<p><a href="https://paragonie.com/blog/2015/08/you-wouldnt-base64-a-password-cryptography-decoded" rel="nofollow">https://paragonie.com/blog/2015/08/you-wouldnt-base64-a-pass...</a></p>
]]></description><pubDate>Sun, 21 Feb 2016 05:56:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=11143500</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11143500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11143500</guid></item><item><title><![CDATA[New comment by sarciszewski in "Dear Cryptocat Users"]]></title><description><![CDATA[
<p>Cryptocat was not secure. <i>No argument there!</i> Decryptocat was the proof in the pudding.<p>If a secure product could be as user-friendly as Cryptocat was while still being secure, then most peoples' communications would be more secure.<p>That's all I was saying. I'm not trying at all to hand-wave the proven insecurity. I'm saying that the only thing they got right was the one thing that secure products have consistently gotten wrong. (Barring Signal.)</p>
]]></description><pubDate>Fri, 19 Feb 2016 22:59:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=11137412</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11137412</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11137412</guid></item><item><title><![CDATA[New comment by sarciszewski in "Dear Cryptocat Users"]]></title><description><![CDATA[
<p>See: "but the execution was flawed."<p>> Security at the expense of usability comes at the expense of security.<p>It got the usability part down, it just wasn't secure. And I wasn't claiming it was.</p>
]]></description><pubDate>Fri, 19 Feb 2016 21:08:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=11136632</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11136632</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11136632</guid></item><item><title><![CDATA[New comment by sarciszewski in "Dear Cryptocat Users"]]></title><description><![CDATA[
<p>Cryptocat was a good concept (i.e. it was USABLE!), but the execution was flawed. It grew a lot of criticism and Nadim made mistakes in handling some of his critics, creating a schism between him and the cryptographers who might have been able to help him. (Not all of this was his fault, of course.)<p>I hope that not only will this new product of his be developed with "A pure vision of democratized, pleasant secure messaging", but also that he has matured significantly. I hope that Cryptocat v3 will come out after it has been thoroughly audited by several reputable third parties.<p>Most importantly, I hope their crypto is boring.<p><a href="https://security.stackexchange.com/questions/6095/xkcd-936-short-complex-password-or-long-dictionary-passphrase/6116#6116" rel="nofollow">https://security.stackexchange.com/questions/6095/xkcd-936-s...</a><p><a href="http://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf" rel="nofollow">http://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf</a></p>
]]></description><pubDate>Fri, 19 Feb 2016 19:29:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=11135924</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11135924</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11135924</guid></item><item><title><![CDATA[New comment by sarciszewski in "Secret Memo Details U.S.’s Broader Strategy to Crack Phones"]]></title><description><![CDATA[
<p>Warning: Autoplay video.</p>
]]></description><pubDate>Fri, 19 Feb 2016 15:07:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=11133815</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11133815</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11133815</guid></item><item><title><![CDATA[New comment by sarciszewski in "How to Safely Store Your Users' Passwords in 2016"]]></title><description><![CDATA[
<p>"shoulder surf protection"?</p>
]]></description><pubDate>Fri, 19 Feb 2016 05:28:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=11131773</link><dc:creator>sarciszewski</dc:creator><comments>https://news.ycombinator.com/item?id=11131773</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11131773</guid></item></channel></rss>