<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: supernetworks_</title><link>https://news.ycombinator.com/user?id=supernetworks_</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 16:55:30 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=supernetworks_" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by supernetworks_ in "SpaceX says it has agreement to acquire Cursor for $60B"]]></title><description><![CDATA[
<p>“ Cursor has also given SpaceX the right to acquire Cursor later this year for $60 billion”<p>That isn’t an agreement to buy</p>
]]></description><pubDate>Wed, 22 Apr 2026 03:01:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47858345</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=47858345</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47858345</guid></item><item><title><![CDATA[New comment by supernetworks_ in "Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys"]]></title><description><![CDATA[
<p>WPA3 moved from PBKDF to ECDH. AES CCMP and GCMP are still the underlying block ciphers in WPA3 with some other extensions for China</p>
]]></description><pubDate>Mon, 20 Apr 2026 19:13:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47839154</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=47839154</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47839154</guid></item><item><title><![CDATA[New comment by supernetworks_ in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>I wasn’t talking about P curves, I was talking about NSA having acted as a malicious actor in general so I misunderstood their comment</p>
]]></description><pubDate>Tue, 25 Nov 2025 03:15:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46041986</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=46041986</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46041986</guid></item><item><title><![CDATA[New comment by supernetworks_ in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>Ah now I see what the question was as it seemed like a non sequitur. I misunderstood the comment by foxboron to be concerns about any backdoors not that P256 is backdoored, I hold no such view of that, surely bitcoin should be good evidence.<p>Instead I was stating that weaknesses in cryptography have been historically put there with some NSA involvement at times.<p>For DB: The brain pool curves do have a worse leak, but as stated in the dragon blood paper “we believe that these sidechannels are inherent to Dragonfly”. The first attack submission did hit P-256 setups before the minimal iteration count was increased and afterward was more applicable to same-system cache/ micro architectural bugs. These attacks were more generally correctly mitigated when H2C deterministic algorithms rolled out. There’s many bad choices that were selected of course to make the PAKE more exploitable, putting the client MAC in the pre commits, having that downgrade, including brain pool curves. but to my point on committees— cryptographers warned strongly when standardizing that this could be an attack and no course correction was taken.</p>
]]></description><pubDate>Mon, 24 Nov 2025 23:18:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46040579</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=46040579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46040579</guid></item><item><title><![CDATA[New comment by supernetworks_ in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>yes dragon blood. I’m not speaking of the downgrade but the timing sidechannels 
 — which were called out very loudly and then ignored during standardization. and then the PAKE showed up in wpa3 of all places, that was the key issue and was extended further in a brain pool curve specific attack for the proposed initial mitigation. It’s a good example of error by committee I do not address that article and don’t know why the NSA advised migration that early.<p>The riddle paper I’ve not read in a long time if ever, though I don’t understand the question. As Scott Aaronson recently blogged it’s difficult to predict human progress with technology and it’s possible we’ll see shors algorithm running publicly sooner than consensus. It could be that in 2035 the NSA’s call 20 years prior looks like it was the right one in that ECC is insecure but that wouldn’t make the replacements secure by default ofc</p>
]]></description><pubDate>Mon, 24 Nov 2025 20:39:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46039016</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=46039016</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46039016</guid></item><item><title><![CDATA[New comment by supernetworks_ in "NSA and IETF, part 3: Dodging the issues at hand"]]></title><description><![CDATA[
<p>It would be wise for people to remember that it’s worth doing basic sanity checks before making claims like no backdoors from the NSA. strong encryption has been restricted historically so we had things like DES and 3DES and Crypto AG.  In the modern internet age juniper has a bad time with this one <a href="https://www.wired.com/2013/09/nsa-backdoor/" rel="nofollow">https://www.wired.com/2013/09/nsa-backdoor/</a>.<p>Usually it’s really hard to distinguish intent, and so it’s possible to develop plausible deniability with committees. Their track record isn’t perfect.<p>With WPA3 cryptographers warned about the known pitfall of standardizing a timing sensitive PAKE, and Harkin got it through anyway. Since it was a standard, the WiFi committee gladly selected it anyway, and then resulted in dragonbleed among other bugs. The techniques for hash2curve have patched that</p>
]]></description><pubDate>Mon, 24 Nov 2025 15:07:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46034912</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=46034912</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46034912</guid></item><item><title><![CDATA[New comment by supernetworks_ in "Willow quantum chip demonstrates verifiable quantum advantage on hardware"]]></title><description><![CDATA[
<p><a href="https://arxiv.org/abs/2509.07255" rel="nofollow">https://arxiv.org/abs/2509.07255</a><p>This paper on verifiable advantage is a lot more compelling. With Scott Aaronson and Quantinuum among other great researchers</p>
]]></description><pubDate>Wed, 22 Oct 2025 17:02:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=45672034</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=45672034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45672034</guid></item><item><title><![CDATA[New comment by supernetworks_ in "A quiet change to RSA"]]></title><description><![CDATA[
<p>The task for teaching is much harder now as these need to be combined into hybrid PQC protocols</p>
]]></description><pubDate>Sat, 11 Oct 2025 17:43:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=45551088</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=45551088</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45551088</guid></item><item><title><![CDATA[New comment by supernetworks_ in "Breaking the sorting barrier for directed single-source shortest paths"]]></title><description><![CDATA[
<p><a href="https://arxiv.org/abs/2504.17033" rel="nofollow">https://arxiv.org/abs/2504.17033</a><p>We give a deterministic O(mlog2/3n)-time algorithm for single-source shortest paths (SSSP) on directed graphs with real non-negative edge weights in the comparison-addition model. This is the first result to break the O(m+nlogn) time bound of Dijkstra's algorithm on sparse graphs, showing that Dijkstra's algorithm is not optimal for SSSP.</p>
]]></description><pubDate>Wed, 06 Aug 2025 16:29:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=44814242</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=44814242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44814242</guid></item><item><title><![CDATA[Identity Is A Bitchat Challenge (MITM Flaw)]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.supernetworks.org/pages/blog/agentic-insecurity-vibes-on-bitchat">https://www.supernetworks.org/pages/blog/agentic-insecurity-vibes-on-bitchat</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44500408">https://news.ycombinator.com/item?id=44500408</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 08 Jul 2025 14:38:25 +0000</pubDate><link>https://www.supernetworks.org/pages/blog/agentic-insecurity-vibes-on-bitchat</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=44500408</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44500408</guid></item><item><title><![CDATA[New comment by supernetworks_ in "Integrated photonic source of Gottesman–Kitaev–Preskill qubits"]]></title><description><![CDATA[
<p>How are we doing on loss for fiber coupling these days and have we gotten the tech to the point where photonic QC will definitely scale</p>
]]></description><pubDate>Tue, 08 Jul 2025 07:27:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=44497871</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=44497871</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44497871</guid></item><item><title><![CDATA[New comment by supernetworks_ in "The time bomb in the tax code that's fueling mass tech layoffs"]]></title><description><![CDATA[
<p>Manufacturing is affected also it’s not just software. Best way around it is deficit spending for growth</p>
]]></description><pubDate>Sat, 07 Jun 2025 06:24:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=44207818</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=44207818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44207818</guid></item><item><title><![CDATA[New comment by supernetworks_ in "US lawmakers tell Apple, Google to be ready to remove TikTok from stores Jan. 19"]]></title><description><![CDATA[
<p>That’s a good clarification as not all companies are tech related and there are companies eligible for trading. However northbound trading still follows all applicable laws and there’s no access to direct ownership  in some amazing companies</p>
]]></description><pubDate>Mon, 16 Dec 2024 10:11:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=42429662</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=42429662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42429662</guid></item><item><title><![CDATA[New comment by supernetworks_ in "US lawmakers tell Apple, Google to be ready to remove TikTok from stores Jan. 19"]]></title><description><![CDATA[
<p>This is what I meant by direct investment. Owning true controlling shares versus the cayman economic proxy</p>
]]></description><pubDate>Mon, 16 Dec 2024 10:09:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=42429649</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=42429649</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42429649</guid></item><item><title><![CDATA[New comment by supernetworks_ in "US lawmakers tell Apple, Google to be ready to remove TikTok from stores Jan. 19"]]></title><description><![CDATA[
<p>Your second sentence is a gross misunderstanding and you might benefit from some therapy to be kinder to others. Regarding the first do you realize TikTok is not allowed in China and Byte Dance runs Douyin with a government safety system for content ?  And secondly would you consider any government modifying a virality algorithm to still be a free speech platform?</p>
]]></description><pubDate>Mon, 16 Dec 2024 10:07:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=42429641</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=42429641</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42429641</guid></item><item><title><![CDATA[New comment by supernetworks_ in "US lawmakers tell Apple, Google to be ready to remove TikTok from stores Jan. 19"]]></title><description><![CDATA[
<p>I have been assuming that the ownership is in the Cayman company and it is analogous to the situation with VIEs.<p>The ownership would have no votes on controlling the company but only ownership for hypothetical dividends on profit from the cayman shell. If anybody knows otherwise please elucidate us.<p>Oddly enough Snapchat IPOd with stocks with zero control as well.</p>
]]></description><pubDate>Mon, 16 Dec 2024 09:56:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=42429573</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=42429573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42429573</guid></item><item><title><![CDATA[New comment by supernetworks_ in "US lawmakers tell Apple, Google to be ready to remove TikTok from stores Jan. 19"]]></title><description><![CDATA[
<p>Americans can’t invest directly in Chinese companies and shouldn’t be obligated to host Chinese companies in their markets or be surprised when political whims ban them, since the lack of shared investment is political too. People clearly enjoy the content on there so the outcome is sad but it’s a complicated economic dynamic that is hard to grasp</p>
]]></description><pubDate>Mon, 16 Dec 2024 02:45:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=42427557</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=42427557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42427557</guid></item><item><title><![CDATA[New comment by supernetworks_ in "4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways"]]></title><description><![CDATA[
<p>Luckily recent openwrt releases, mainline Linux don’t use the proprietary driver that powers this daemon nor the vulnerable daemon. Since 2023 except for xiaomi routers they shouldn’t be affected I want to add</p>
]]></description><pubDate>Sun, 22 Sep 2024 00:24:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=41613664</link><dc:creator>supernetworks_</dc:creator><comments>https://news.ycombinator.com/item?id=41613664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41613664</guid></item></channel></rss>