<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: shorden</title><link>https://news.ycombinator.com/user?id=shorden</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 18:25:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=shorden" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by shorden in "You gave me a u32. I gave you root. (io_uring ZCRX freelist LPE)"]]></title><description><![CDATA[
<p>Interesting, I haven't tested this myself but intuitively I think that a 4 byte OOB write is plenty for a data-only attack like [PageJack](<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Qian-PageJack-A-Powerful-Exploit-Technique-With-Page-Level-UAF-Thursday.pdf" rel="nofollow">https://i.blackhat.com/BH-US-24/Presentations/US24-Qian-Page...</a>), so I don't think hardening against the KASLR leaks discussed in OP would necessarily save you from this attack.</p>
]]></description><pubDate>Fri, 08 May 2026 22:38:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=48069623</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=48069623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48069623</guid></item><item><title><![CDATA[Impressive Claude Code Features]]></title><description><![CDATA[
<p>Article URL: <a href="https://glitch.land/blog/impressive-claude-code-features/">https://glitch.land/blog/impressive-claude-code-features/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47601643">https://news.ycombinator.com/item?id=47601643</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 01 Apr 2026 14:43:01 +0000</pubDate><link>https://glitch.land/blog/impressive-claude-code-features/</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=47601643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47601643</guid></item><item><title><![CDATA[New comment by shorden in "2025 Turing award given for quantum information science"]]></title><description><![CDATA[
<p>Worth noting that this is a bound on arbitrary search, but there exist some problems with structure (e.g. integer factorization) for which quantum algorithms are exponentially faster than known classical algorithms (a problem believed to be in NP and BQP but not P).</p>
]]></description><pubDate>Wed, 18 Mar 2026 19:50:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47430582</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=47430582</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47430582</guid></item><item><title><![CDATA[New comment by shorden in "eBPF on Hard Mode"]]></title><description><![CDATA[
<p>Repost of <a href="https://news.ycombinator.com/item?id=47088212">https://news.ycombinator.com/item?id=47088212</a> due to the page changing its title</p>
]]></description><pubDate>Sat, 21 Feb 2026 14:25:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47101121</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=47101121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47101121</guid></item><item><title><![CDATA[New comment by shorden in "A list of fun destinations for telnet"]]></title><description><![CDATA[
<p>nethack.alt.org is conspicuously absent...</p>
]]></description><pubDate>Tue, 27 Jan 2026 06:01:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46776075</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=46776075</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46776075</guid></item><item><title><![CDATA[New comment by shorden in "Interactive eBPF"]]></title><description><![CDATA[
<p>Also worth noting that the verifier is under active development not only to verify more legitimate programs, but also to reject programs with exploits and side channels (and there are runtime defenses too, like dead code elimination and ALU sanitation).</p>
]]></description><pubDate>Fri, 16 Jan 2026 22:10:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46652882</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=46652882</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46652882</guid></item><item><title><![CDATA[New comment by shorden in "Seaque Live Bell Test"]]></title><description><![CDATA[
<p>I worked a tiny bit on this experiment so I'm a bit biased, but it really is quite an impressive demonstration. I don't know if the methodology has changed since I was on the project, but in the past there was a whole process of sneakernet-ing the data from the game across an air gap and onto the ISS.</p>
]]></description><pubDate>Wed, 12 Nov 2025 16:24:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=45902079</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=45902079</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45902079</guid></item><item><title><![CDATA[New comment by shorden in "Reviving Classic Unix Games: A 20-Year Journey Through Software Archaeology"]]></title><description><![CDATA[
<p>The discussion of Richard Caley was warming, reminded me of Izchak Miller a little bit.</p>
]]></description><pubDate>Sun, 09 Nov 2025 16:48:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45866895</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=45866895</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45866895</guid></item><item><title><![CDATA[New comment by shorden in "Show HN: A Lisp Interpreter for Shell Scripting"]]></title><description><![CDATA[
<p>For a blend between Lisp and a more traditional POSIX shell, I enjoy Emacs' [eshell](<a href="https://www.masteringemacs.org/article/complete-guide-mastering-eshell" rel="nofollow">https://www.masteringemacs.org/article/complete-guide-master...</a>).</p>
]]></description><pubDate>Sun, 12 Oct 2025 10:28:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45557052</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=45557052</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45557052</guid></item><item><title><![CDATA[A brief history of Apple content caching services]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclecticlight.co/2025/09/27/a-brief-history-of-content-caching-services/">https://eclecticlight.co/2025/09/27/a-brief-history-of-content-caching-services/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45394802">https://news.ycombinator.com/item?id=45394802</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 27 Sep 2025 11:14:53 +0000</pubDate><link>https://eclecticlight.co/2025/09/27/a-brief-history-of-content-caching-services/</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=45394802</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45394802</guid></item><item><title><![CDATA[How to check if your Apple Silicon Mac is booting securely]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclecticlight.co/2025/08/21/how-to-check-if-your-apple-silicon-mac-is-booting-securely/">https://eclecticlight.co/2025/08/21/how-to-check-if-your-apple-silicon-mac-is-booting-securely/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45008832">https://news.ycombinator.com/item?id=45008832</a></p>
<p>Points: 101</p>
<p># Comments: 22</p>
]]></description><pubDate>Sun, 24 Aug 2025 23:44:47 +0000</pubDate><link>https://eclecticlight.co/2025/08/21/how-to-check-if-your-apple-silicon-mac-is-booting-securely/</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=45008832</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45008832</guid></item><item><title><![CDATA[New comment by shorden in "My other email client is a daemon"]]></title><description><![CDATA[
<p>That's an excellent question, I thought the exact same thing when I wrote this article. From what I can tell [child](<a href="https://github.com/NetHack/NetHack/blob/ed600d9f0f3c37677418f0150f59363ca641f3dc/sys/unix/unixunix.c#L306-L312" rel="nofollow">https://github.com/NetHack/NetHack/blob/ed600d9f0f3c37677418...</a>) properly spawns a child process with the real uid/gid instead of the effective uid/gid.
And to your point, there are actually a decent number of [CVEs](<a href="https://www.nethack.org/security/" rel="nofollow">https://www.nethack.org/security/</a>) due to NetHack being set[ug]id.</p>
]]></description><pubDate>Fri, 22 Aug 2025 14:42:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=44985274</link><dc:creator>shorden</dc:creator><comments>https://news.ycombinator.com/item?id=44985274</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44985274</guid></item></channel></rss>