<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sexmonad</title><link>https://news.ycombinator.com/user?id=sexmonad</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 10:36:19 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sexmonad" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by sexmonad in "George Orwell's review of Mein Kampf (1940)"]]></title><description><![CDATA[
<p>I don't see the parallel as intended to put Napoleon down, but instead to attribute the same force of personality to Hitler. As someone who never met either man (perhaps that's obvious :), I'm not sure the connection works with me.</p>
]]></description><pubDate>Sun, 17 Aug 2014 02:26:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=8188357</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=8188357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8188357</guid></item><item><title><![CDATA[New comment by sexmonad in "Lattice's $24.99 FPGA Evaluation Kit"]]></title><description><![CDATA[
<p>Can you list some of the boards that are both cheaper and more capable?</p>
]]></description><pubDate>Tue, 17 Jun 2014 02:50:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=7902636</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7902636</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7902636</guid></item><item><title><![CDATA[New comment by sexmonad in "It's Time For a Hard Bitcoin Fork"]]></title><description><![CDATA[
<p>Why do BitFury and Petamine use a pool at all? At their scale, wouldn't they have low enough variance through solo mining? Or perhaps P2Pool?</p>
]]></description><pubDate>Sat, 14 Jun 2014 00:02:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=7891470</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7891470</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7891470</guid></item><item><title><![CDATA[New comment by sexmonad in "5 Tiles Keyboard"]]></title><description><![CDATA[
<p>That video is just auto-complete after the first letter...</p>
]]></description><pubDate>Sun, 25 May 2014 15:49:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=7796596</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7796596</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7796596</guid></item><item><title><![CDATA[New comment by sexmonad in "Poll: What OS do you use on your primary computer?"]]></title><description><![CDATA[
<p>I use Linux basically everywhere - Arch Linux on development machines, Ubuntu or Debian on servers. I use Windows for gaming maybe 5-10 hours a week.</p>
]]></description><pubDate>Mon, 19 May 2014 23:26:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=7770400</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7770400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7770400</guid></item><item><title><![CDATA[New comment by sexmonad in "US files criminal complaint against Credit Suisse"]]></title><description><![CDATA[
<p>Can someone explain to me how the US has jurisdiction over Credit Suisse? I see how they could have gone after the individual tax fraudsters (American citizens), but how can they police foreign banks?</p>
]]></description><pubDate>Mon, 19 May 2014 21:42:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=7769908</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7769908</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7769908</guid></item><item><title><![CDATA[New comment by sexmonad in "The pre-play vulnerability in Chip and PIN"]]></title><description><![CDATA[
<p>We really ought to completely skip over Chip and PIN to something like Google Wallet or another NFC system...</p>
]]></description><pubDate>Mon, 19 May 2014 18:58:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=7769124</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7769124</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7769124</guid></item><item><title><![CDATA[New comment by sexmonad in "The NSA Is Recording Every Cell Phone Call in the Bahamas"]]></title><description><![CDATA[
<p>Yes, this is the NSA's job - foreign SIGINT. If you don't like this, you need to use encrypted communications.</p>
]]></description><pubDate>Mon, 19 May 2014 17:43:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=7768698</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7768698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7768698</guid></item><item><title><![CDATA[New comment by sexmonad in "The shock of playing the Ouya, one year later"]]></title><description><![CDATA[
<p>I take this sentiment a bit further - unless it's throwaway-cheap, the reviews and word of mouth are stellar (they're usually not for any but the biggest hits), or the concept immediately clicks for me, I will pirate the game to try it out. If I like the pirated version, I _usually_ purchase the full game (but not always). Not having reasonable demos just increases game piracy.</p>
]]></description><pubDate>Sat, 17 May 2014 20:07:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=7760899</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7760899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7760899</guid></item><item><title><![CDATA[New comment by sexmonad in "The shock of playing the Ouya, one year later"]]></title><description><![CDATA[
<p>No. If I shut down my laptop, my hard drive is encrypted and keys are no longer in RAM (modulo a cold-boot attack, but that is only really useful for <30 minutes after shutdown without preparation).</p>
]]></description><pubDate>Sat, 17 May 2014 20:02:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=7760888</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7760888</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7760888</guid></item><item><title><![CDATA[New comment by sexmonad in "Quantum Random Number Generator Created Using A Smartphone Camera"]]></title><description><![CDATA[
<p>The obvious solution for this would be for Android to expose "derive random numbers from image frame" as a permission. But this is unnecessary, because they can just seed /dev/random from this source at boot (or if the device is unseeded).<p>That said, mobile devices really aren't lacking in entropy sources. With all the radios and sensors in a modern smartphone, why do they need additional methods to generate random numbers?<p>For information security purposes, a cryptographically secure PRNG is typically at least as secure as the encryption algorithms that it protects.</p>
]]></description><pubDate>Sun, 11 May 2014 19:58:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=7729738</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7729738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7729738</guid></item><item><title><![CDATA[New comment by sexmonad in "Quantum Random Number Generator Created Using A Smartphone Camera"]]></title><description><![CDATA[
<p><a href="https://www.tindie.com/products/ubldit/truerng-hardware-random-number-generator/" rel="nofollow">https://www.tindie.com/products/ubldit/truerng-hardware-rand...</a><p>But I'll give two cautions:<p>1. This device has received less auditing than linux's software crypto. And some HWRNGs are quite bad: <a href="https://news.ycombinator.com/item?id=6060636" rel="nofollow">https://news.ycombinator.com/item?id=6060636</a><p>2. You don't really need that much randomness. After your machine has been on for a while and has seeded correctly, /dev/urandom is just as secure as /dev/random. Entropy is not gasoline - it does not disappear as you use it.</p>
]]></description><pubDate>Sun, 11 May 2014 19:56:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=7729724</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7729724</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7729724</guid></item><item><title><![CDATA[New comment by sexmonad in "Using Dnsmasq for local development on OS X"]]></title><description><![CDATA[
<p>I use "lvh.me" - it has a wildcard DNS record to redirect any subdomain to localhost. So I'll use something like "example.com.lvh.me" to test.</p>
]]></description><pubDate>Tue, 22 Apr 2014 15:35:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=7628292</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7628292</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7628292</guid></item><item><title><![CDATA[New comment by sexmonad in "Distrusting StartSSL"]]></title><description><![CDATA[
<p>StartSSL's default usage mode is to generate private keys on their website. Yet another horribly insecure system.<p>I'd much rather that people used self-signed certs (and browsers had certificate pinning) by default, and could then step up to real CA certificates. Self-signed certs provide almost the same amount of trust that StartCom does.</p>
]]></description><pubDate>Sat, 12 Apr 2014 21:01:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=7579179</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7579179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7579179</guid></item><item><title><![CDATA[New comment by sexmonad in ""OpenSSL has exploit mitigation countermeasures to make sure it's exploitable""]]></title><description><![CDATA[
<p>That bug affected OpenSSL as well. Admittedly, it was caused by the Debian maintainer, but still, OpenSSL's poor design is partially to blame.</p>
]]></description><pubDate>Wed, 09 Apr 2014 18:43:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=7561383</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7561383</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7561383</guid></item><item><title><![CDATA[New comment by sexmonad in "The Heartbleed Bug"]]></title><description><![CDATA[
<p>Update to 1.0.1g, redo all crypto. That is, revoke certs and keys and regenerate.</p>
]]></description><pubDate>Mon, 07 Apr 2014 21:18:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=7549589</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7549589</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7549589</guid></item><item><title><![CDATA[New comment by sexmonad in "Note the commit hash"]]></title><description><![CDATA[
<p>Each hex character represents 4 bits. That means that a 7 character string is 28 bits. That's about 268 million possibilities. On average, it would take around 134 million commits to get one that started with "badc0de".</p>
]]></description><pubDate>Sun, 06 Apr 2014 22:44:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=7543512</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7543512</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7543512</guid></item><item><title><![CDATA[New comment by sexmonad in "How I Hacked a Router"]]></title><description><![CDATA[
<p>>sha1sum putty.exe<p>>google "44ac2504a02af84ee142adaa3ea70b868185906f"<p>>see results are mostly "putty.exe"<p>Three steps, all relatively painless.</p>
]]></description><pubDate>Sun, 06 Apr 2014 16:51:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=7541515</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7541515</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7541515</guid></item><item><title><![CDATA[New comment by sexmonad in "What I Would Do If I Ran Tarsnap"]]></title><description><![CDATA[
<p>My favorite thing about tarsnap is how damn reliable and trustworthy Colin is. If I see tarsnap start to move towards whatever fad all the other SaaS platforms are following today, I'll probably assume that they're trying to be the next Dropbox. That might be the right decision for tarsnap, but I'd move my backups.</p>
]]></description><pubDate>Thu, 03 Apr 2014 18:36:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=7525014</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7525014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7525014</guid></item><item><title><![CDATA[New comment by sexmonad in "What I Would Do If I Ran Tarsnap"]]></title><description><![CDATA[
<p>Deduplication. And like any other SaaS or cloud model, not hosting it yourself.</p>
]]></description><pubDate>Thu, 03 Apr 2014 18:24:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=7524909</link><dc:creator>sexmonad</dc:creator><comments>https://news.ycombinator.com/item?id=7524909</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7524909</guid></item></channel></rss>