<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: streetfighter64</title><link>https://news.ycombinator.com/user?id=streetfighter64</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 10:33:32 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=streetfighter64" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by streetfighter64 in "Samsung Magician disk utility takes 18 steps and two reboots to uninstall"]]></title><description><![CDATA[
<p>Not to enter another OS ** measuring contest, but on linux systems you can both install and remove programs with a single command line. No need to search the web for the installer, no need to install the MSVC runtime (dependencies are handled automatically), no reboots needed pretty much ever, etc.<p>And no, on windows not "everything" is removed by most uninstallers. At least it wasn't back when I was using windows 7. Though I doubt it's really changed, unless you count those "windows store apps", but that's also equivalently available on mac. Both are a poor imitation of a proper linux package manager.</p>
]]></description><pubDate>Sat, 04 Apr 2026 00:13:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47634065</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47634065</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47634065</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton Meet isn't what they told you it was"]]></title><description><![CDATA[
<p>Please quote where in that document the answer to my question is:<p>> Is there anything preventing Proton from disclosing the email content or metadata?<p>Also please link me to the source code of Proton's server-side code, so I can audit their scanning of all incoming and outgoing mail, to verify it's not logging them. What you linked above is just the clients.</p>
]]></description><pubDate>Fri, 03 Apr 2026 20:29:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47631841</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47631841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47631841</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton meet isn't what they told you it was"]]></title><description><![CDATA[
<p>Yeah, if you trust that they will never push a backdoor to your client on the request of Swiss law enforcement. It's a web app "fgs".<p>They also admit to scanning all mail to and from non-Proton accounts "for spam". So what's stopping them from one day adding a small if statement that just writes that data to disk, for specific "interesting" users?<p>Regarding metadata, I sure hope you have nothing to hide in the below emphasized:<p>> Account Activity: Due to limitations of the SMTP protocol, we have access to the following email metadata: *sender and recipient email addresses, the IP address incoming messages originated from, attachment name, message subject, and message sent and received times*. We do NOT have access to encrypted message content, but unencrypted messages sent from external providers to your Account, or from Proton Mail to external unencrypted email services, are scanned for spam and viruses to pursue the legitimate interest of protecting the integrity of our Services and users. Such inbound messages are scanned for spam in memory, and then encrypted and written to disk. We do not possess the technical ability to scan the content of the messages after they have been encrypted. We also have access to the following records of Account activity: number of messages sent, amount of storage space used, total number of messages, last login time. User data is never used for advertising purposes.</p>
]]></description><pubDate>Fri, 03 Apr 2026 17:36:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47629611</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47629611</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47629611</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton meet isn't what they told you it was"]]></title><description><![CDATA[
<p>Yes they do (the storage of your emails on their servers, that is). See this comment for a summary of their claims and reality <a href="https://news.ycombinator.com/item?id=47625229">https://news.ycombinator.com/item?id=47625229</a><p>Edit: A reply to your misunderstanding and accusation below:<p>What do you mean? By "provide your emails to others" I obviously mean the email *contents*, not the email *address*. (Which I also clarified with "the storage of your emails on their servers"). You know, the very thing that is almost the whole selling point of Proton: that they keep the contents of your emails encrypted so "only you" can access them.<p>> Proton Mail protects the contents of all your messages with zero-access encryption, meaning no one can read them except you and your recipients. Messages you send to other Proton Mail accounts are always end-to-end encrypted, as are emails sent to non-Proton Mail accounts when you use Password-protected Emails.<p><a href="https://proton.me/security/end-to-end-encryption" rel="nofollow">https://proton.me/security/end-to-end-encryption</a><p>Also, what in the SMTP protocol requires Proton to *store* that metadata? Could they not simply delete it after using it (or, crazy idea, encrypt it in the same way the message contents are encrypted in storage), so they would be unable to respond to law enforcement requests the next week, say? They did also previously claim that they didn't log user's IP addresses. Why would they claim something like that, if it's "obvious to anyone who knows" that it's a false claim? Marketing aimed towards their not so technically savvy userbase?<p><a href="https://www.theregister.com/2021/09/07/protonmail_hands_user_ip_address_police/" rel="nofollow">https://www.theregister.com/2021/09/07/protonmail_hands_user...</a><p>Let me also remind you that I was replying to a question about "how would it technically even be possible" to "offer loads of your private data when ordered". My reply was, it's easily possible for them to offer your metadata, and you still need to trust their claims about heir implementation of E2EE to believe they won't offer your message contents.<p>You're very quick to accuse people of spreading misinformation. Let me hit back with an accusation of my own, which is that Proton's PR team have a habit of regularly trying to discredit any critique as "misinformation". Perhaps you've just read too many of their rebuttals?</p>
]]></description><pubDate>Fri, 03 Apr 2026 11:00:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47625260</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47625260</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47625260</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton Meet Isn't What They Told You It Was"]]></title><description><![CDATA[
<p>Well, Proton themselves say they will provide information about who has contacted a randsomware attacker to law enforcement. <a href="https://proton.me/legal/law-enforcement" rel="nofollow">https://proton.me/legal/law-enforcement</a><p>So that probably has happened. Whether they've even provided other private data I don't know, but<p>> how would it technically even be possible<p>Well, it's not possible if you trust their claims about E2EE, but that is just a <i>claim</i>. How's that any different from a non-encrypted email provider saying they won't provide your emails to others? It all comes down to trust in the end.</p>
]]></description><pubDate>Fri, 03 Apr 2026 10:57:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47625235</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47625235</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47625235</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton meet isn't what they told you it was"]]></title><description><![CDATA[
<p>Sorry, perhaps the takeaway is clearer when you see the full quote [0]. I omitted it for space, here's the relevant part<p>> Third, let's talk about what was actually disclosed. No emails were handed over. No message content. No metadata about who the user communicated with. The only information Proton could provide [...]<p>Yes, paying by crypto prevents Proton from disclosing your identity that way. Is there anything preventing Proton from disclosing the email content or metadata? Do they claim they won't disclose that? Clearly they do allow themselves to disclose metadata [1]<p>> For example, in ransomware cases, we can preserve information about which victims contacted the suspect, so that victims can be notified.<p>So, "just don't pay with a credit card" comes with the additional caveat of "don't email somebody you don't want the FBI to know you emailed". Whether you also need to "don't write anything you don't want the FBI to know", I haven't investigated further, but you could perhaps look that up yourself. I will just assume that to be the case based on what I've seen.<p>[0] <a href="https://www.reddit.com/r/privacy/comments/1rltej7/comment/o8xwdcj/" rel="nofollow">https://www.reddit.com/r/privacy/comments/1rltej7/comment/o8...</a>
[1] <a href="https://proton.me/legal/law-enforcement" rel="nofollow">https://proton.me/legal/law-enforcement</a></p>
]]></description><pubDate>Fri, 03 Apr 2026 10:47:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47625166</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47625166</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47625166</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton meet isn't what they told you it was"]]></title><description><![CDATA[
<p>"Controlled" is a bit hyperbolic, but there's a collaboration agreement between the USA government and the Swiss government, so Proton has to comply with requests from for example the FBI. Quoting a comment by Proton staff on Reddit<p>> First, let's correct the headline: Proton did not provide information to the FBI. What happened is that the FBI submitted a Mutual Legal Assistance Treaty (MLAT) request, which was processed by the Swiss Federal Department of Justice and Police. Proton operates exclusively under Swiss law, and we only respond to legally binding orders from Swiss authorities, after all Swiss legal checks have been passed. This is an important distinction.<p>> [...]<p>> The only information Proton could provide was a payment identifier because the user chose to pay with a credit card. This is information the user themselves provided to us through their choice of payment method. Proton also accepts cryptocurrency and cash payments, which would not have been linkable to an identity.<p>So basically, don't trust Proton with information unless you want the FBI to know it.</p>
]]></description><pubDate>Fri, 03 Apr 2026 10:18:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47624967</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47624967</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47624967</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Proton meet isn't what they told you it was"]]></title><description><![CDATA[
<p>I mean, is it really a conspiracy theory to want or believe that there are services (based in Europe) that don't hand over any and all user data to the USA government when asked? It's probably wrong to believe it to be the case, but just because it's wrong doesn't make it "conspiratorial".<p>It's quite hypocritical of Proton to claim that they protect against government surveillance when they do things like this though [0]. Their legal team has probably ensured they don't claim anything strictly false, but the implication and the reality are wildly different.<p>[0] <a href="https://freedom.press/digisec/blog/proton-mail-is-not-for-anonymity/" rel="nofollow">https://freedom.press/digisec/blog/proton-mail-is-not-for-an...</a></p>
]]></description><pubDate>Fri, 03 Apr 2026 10:14:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47624944</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47624944</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47624944</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Inside Nepal's Fake Rescue Racket"]]></title><description><![CDATA[
<p>"You" don't take antacid after eating unless "you" have problems with your stomach acid or something. Neutralizing your stomach acid isn't generally a smart thing to do, because it's acidic for a reason (digesting food). Some people even recommend not drinking to much water with your meals because it dilutes your stomach acid, though that might be overly cautious. Whether adding baking soda to food makes you feel fuller I wouldn't know, but it certainly won't make you "feel better", unless you have some medical condition.</p>
]]></description><pubDate>Thu, 02 Apr 2026 22:54:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47621236</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47621236</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47621236</guid></item><item><title><![CDATA[New comment by streetfighter64 in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>> the EFF isn't storing your fingerprint for later analysis and tracking<p>Yes they are, quoting that very page:<p>> Your browser fingerprint appears to be unique among the 312,935 tested in the past 45 days<p>So clearly they store the information for at least 45 days. This raises the question what they actually mean by unique. If I change my IP and re-test, I get the same<p>> Your browser fingerprint appears to be unique among the 312,941 tested in the past 45 days<p>So does that mean that my fingerprint changed, and they can't track me anymore? Or do they mean to tell me that they still track me and I'm still as uniquely identified.<p>Their methodology and linked articles does not seem to answer this [0] [1]<p>It's all very complicated, because the fingerprinting needs to be unique enough to identify you while still being "persistent" enough not to identify you as somebody else if you change just one bit of it.<p>[0] <a href="https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy" rel="nofollow">https://www.eff.org/deeplinks/2010/01/primer-information-the...</a><p>[1] <a href="https://coveryourtracks.eff.org/about" rel="nofollow">https://coveryourtracks.eff.org/about</a></p>
]]></description><pubDate>Thu, 02 Apr 2026 22:45:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47621164</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47621164</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47621164</guid></item><item><title><![CDATA[New comment by streetfighter64 in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>Well, the developers of Chrome aren't exactly incentivized to prevent tracking (though perhaps tracking done by their competitors). But anyway, you can try to prevent it with a technical solution while also being outraged that they did it. If someone has their home broken into, perhaps they should have better locks, but the burglar is still responsible for their actions.</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:53:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47615310</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47615310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615310</guid></item><item><title><![CDATA[New comment by streetfighter64 in "LinkedIn is searching your browser extensions"]]></title><description><![CDATA[
<p>fingerprint.com seems to be some fingerprinting vendor, they don't even offer a demo without logging in. <a href="https://coveryourtracks.eff.org" rel="nofollow">https://coveryourtracks.eff.org</a> is EFFs demo site is non-profit and doesn't require login</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:50:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47615267</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47615267</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615267</guid></item><item><title><![CDATA[New comment by streetfighter64 in "LinkedIn Is Illegally Searching Your Computer"]]></title><description><![CDATA[
<p>Not anymore. You can just find one on the app store and install it, almost exactly the same as you do in a browser's extension "store". It won't be as good as uBlock but it certainly works fine even in Safari.</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:46:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47615228</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47615228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615228</guid></item><item><title><![CDATA[New comment by streetfighter64 in "[dead]"]]></title><description><![CDATA[
<p>In the immortal words of Hbomberguy<p>> It may be a lie, but the fact I believed it speaks volumes about my enemies, and not me</p>
]]></description><pubDate>Thu, 02 Apr 2026 02:43:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47609391</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47609391</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47609391</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Chess in SQL"]]></title><description><![CDATA[
<p>Yeah, I wish this would have just been a short human-written post of a few paragraphs. The emdashes, bulletpoints and unnecessary dramatic flourishes really detract from it.<p>> Not "store chess moves in a database." Not "track game state in a table." Actually render a chess board. With pieces. That you can move around. In your browser. Using nothing but SELECT, UPDATE, and a bit of creative thinking.<p>Please, just write like a person.</p>
]]></description><pubDate>Wed, 01 Apr 2026 12:37:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47600015</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47600015</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47600015</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Why the US Navy won't blast the Iranians and 'open' Strait of Hormuz"]]></title><description><![CDATA[
<p>Typically american to argue that "blasting" people is bad because of tactics or economics or whatever. How about it's bad to kill random people that haven't done you anything just because it's evil to do so?<p>I guess that would involve admitting something about the morality of what the USA has been doing since the end of WWII though...</p>
]]></description><pubDate>Wed, 01 Apr 2026 00:08:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47595143</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47595143</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47595143</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>> Prospective customers get back to us after a demo and tell us about the exploits it found on their services that are so vague and technical that they wouldn't think to look for them.<p>Um, have you actually verified that those are actual exploits then? Vague and technical sounds exactly like a description of AI slop...</p>
]]></description><pubDate>Tue, 31 Mar 2026 09:05:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47584582</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47584582</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47584582</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>> Not a POC. An exploit.<p>What's the distinction? A proof of concept is just something that demonstrates that a bug is possible to exploit, by doing so.</p>
]]></description><pubDate>Tue, 31 Mar 2026 09:03:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47584566</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47584566</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47584566</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>Hm, kind of a strange question then, no? Is a car's engine connected to the fuel tank, the wheels or the accelerator pedal?</p>
]]></description><pubDate>Mon, 30 Mar 2026 20:53:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579585</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47579585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579585</guid></item><item><title><![CDATA[New comment by streetfighter64 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>> Is the Linux KVM hypervisor connected to the hrtimer subsystem, workqueue, or perf_event? The model knows.<p>I asked ChatGPT and it claimed "all three". Any linux wizards who can confirm or deny?<p>Anyway, in my experience using mainly the Claude chat to do some basic (not security) bug hunting, it usually fixates on one specific hypothesis, and it takes some effort to get it off that wrong track, even when I already know it's barking up the wrong tree.</p>
]]></description><pubDate>Mon, 30 Mar 2026 20:47:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579521</link><dc:creator>streetfighter64</dc:creator><comments>https://news.ycombinator.com/item?id=47579521</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579521</guid></item></channel></rss>