<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: stringlytyped</title><link>https://news.ycombinator.com/user?id=stringlytyped</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 10 Apr 2026 09:24:10 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=stringlytyped" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by stringlytyped in "Show HN: A search engine for your personal network of high-quality websites"]]></title><description><![CDATA[
<p>This looks like an amazing tool. I've always thought it would be great if I could curate my own search index. And the way results are summarized with citations is really cool.<p>However, I am not sure the free plan is generous enough to properly evaluate the search engine and see if I can incorporate it into my workflow. And the pricing feels steep. I would have a look at Kagi's pricing model.</p>
]]></description><pubDate>Fri, 05 May 2023 10:56:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=35827624</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=35827624</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35827624</guid></item><item><title><![CDATA[New comment by stringlytyped in "Show HN: Search Engine for Blogs"]]></title><description><![CDATA[
<p>You might want consider using OpenSearch [1] to make it easier to add Blog Surf to browsers as a search engine that can be accessed from the location bar. I added it manually in Firefox but it would have been handy to just be able to right-click the search field and choose "Add a Keyword for this Search".<p>[1] <a href="https://developer.mozilla.org/en-US/docs/Web/OpenSearch" rel="nofollow">https://developer.mozilla.org/en-US/docs/Web/OpenSearch</a></p>
]]></description><pubDate>Tue, 29 Mar 2022 22:25:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=30849149</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=30849149</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30849149</guid></item><item><title><![CDATA[New comment by stringlytyped in "Turning my obsession in the stock market into a side project"]]></title><description><![CDATA[
<p>I'm getting an error when trying to subscribe: "Error submitting the request. Please try again later."</p>
]]></description><pubDate>Wed, 15 Apr 2020 12:04:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=22876734</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=22876734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22876734</guid></item><item><title><![CDATA[New comment by stringlytyped in "Show HN: Feed of current articles for science lovers shortened to bullet points"]]></title><description><![CDATA[
<p>A browser extension that shows the Bullets.tech summary when you browse to an article that has been summarized would be very useful.</p>
]]></description><pubDate>Mon, 11 Mar 2019 11:04:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=19358019</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=19358019</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19358019</guid></item><item><title><![CDATA[Chrome and Firefox Pull Stylish Add-On After Report It Logged Browser History]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.bleepingcomputer.com/news/software/chrome-and-firefox-pull-stylish-add-on-after-report-it-logged-browser-history/">https://www.bleepingcomputer.com/news/software/chrome-and-firefox-pull-stylish-add-on-after-report-it-logged-browser-history/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=17461364">https://news.ycombinator.com/item?id=17461364</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 05 Jul 2018 07:02:13 +0000</pubDate><link>https://www.bleepingcomputer.com/news/software/chrome-and-firefox-pull-stylish-add-on-after-report-it-logged-browser-history/</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=17461364</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17461364</guid></item><item><title><![CDATA[New comment by stringlytyped in "New autoplay policy in Chrome"]]></title><description><![CDATA[
<p>Yes! Spotlight does the exact same thing. Drives me crazy.</p>
]]></description><pubDate>Mon, 07 May 2018 05:19:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=17010559</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=17010559</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17010559</guid></item><item><title><![CDATA[The end of id_rsa]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.krypt.co/the-end-of-id-rsa-d8fd2951d406">https://blog.krypt.co/the-end-of-id-rsa-d8fd2951d406</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14199092">https://news.ycombinator.com/item?id=14199092</a></p>
<p>Points: 6</p>
<p># Comments: 5</p>
]]></description><pubDate>Tue, 25 Apr 2017 23:16:25 +0000</pubDate><link>https://blog.krypt.co/the-end-of-id-rsa-d8fd2951d406</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=14199092</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14199092</guid></item><item><title><![CDATA[New comment by stringlytyped in "Secure Account Recovery Made Simple"]]></title><description><![CDATA[
<p>I been doing some reading about this in an attempt to answer my own question. It turns out, there is potential for a timing attack during the verification stage. Provided you store the plain text token in the database, an attacker can deduce a valid token by submitting various guesses to the server.<p>Hashing the token protects against this.<p>For more detail: <a href="http://blog.ircmaxell.com/2014/11/its-all-about-time.html" rel="nofollow">http://blog.ircmaxell.com/2014/11/its-all-about-time.html</a></p>
]]></description><pubDate>Sat, 24 Sep 2016 18:57:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=12572074</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=12572074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12572074</guid></item><item><title><![CDATA[New comment by stringlytyped in "Secure Account Recovery Made Simple"]]></title><description><![CDATA[
<p>I am probably missing something obvious, but I am not sure how a timing attack would work during the verification stage (when the emailed token is compared against the database to ensure that it is valid).<p>If an attacker provides an invalid token, the record wouldn't be found in the database, and the web app would return an error indicating an invalid token. When a valid token is provided, the user is authenticated. You would immediately know whether a token is valid or not—no timing requiring.<p>However, perhaps there is potential for a timing attack during the initial stage of the reset process, when the user is asking to enter their email address? If the email address provided exists in the database, the server has to 1) generate a token, 2) save the token in the database and 3) send out an email with the generated token. If the email address doesn't exist in the database, the server doesn't have to perform any of these functions.<p>Potentially, couldn't this allow an attacker to enumerate the email addresses in the web app's database? Of course, in and of itself, this wouldn't allow an attacker to access any of those accounts. And the split-token method suggested by the article wouldn't prevent this enumeration issue.<p>Is there further potential for a timing attack that I am missing?<p>EDIT: fixed a typo</p>
]]></description><pubDate>Sat, 24 Sep 2016 18:02:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=12571870</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=12571870</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12571870</guid></item><item><title><![CDATA[New comment by stringlytyped in "USCIS Proposes Rule to Welcome International Entrepreneurs"]]></title><description><![CDATA[
<p>The problem with the E-2 visa is that you never become eligible to apply for a green card.</p>
]]></description><pubDate>Sat, 27 Aug 2016 06:44:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=12371307</link><dc:creator>stringlytyped</dc:creator><comments>https://news.ycombinator.com/item?id=12371307</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12371307</guid></item></channel></rss>