<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tennysont</title><link>https://news.ycombinator.com/user?id=tennysont</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 07:40:48 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tennysont" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tennysont in "Signing data structures the wrong way"]]></title><description><![CDATA[
<p>They use a magic number, rather than a digest derived from the schema[1], but otherwise they do as you suggest. The magic number is given to the signing function (sender side) and the validation function (receiver side) but does not increase the size of the transmitted message.<p>[1]<p>I think that's what you mean by digest, but maybe you just mean `type` = `magic number`</p>
]]></description><pubDate>Wed, 01 Apr 2026 21:48:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47606955</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47606955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47606955</guid></item><item><title><![CDATA[New comment by tennysont in "Signing data structures the wrong way"]]></title><description><![CDATA[
<p>I asked about this on the PGP mailing list at one point, and I think I was told that the best solution is to start emails with "Hi <recipient>," which seems like a funny low-tech solution to a (sad) problem.</p>
]]></description><pubDate>Wed, 01 Apr 2026 21:37:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47606851</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47606851</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47606851</guid></item><item><title><![CDATA[New comment by tennysont in "Signing data structures the wrong way"]]></title><description><![CDATA[
<p>You are, of course, right. And this distinction is important for this chain of comments.<p>Though, in fairness, that is /kind of/ like transmitting it---in the sense that it impacts the message that is returned. It's more akin to sending a checksum of the magic number, rather than the magic number itself. But conceptually, that is just an optimization. The desire is for the client to ensure the server is using the same magic number, we just so happen to be able to overload the signature to encode this data without increasing the message size.</p>
]]></description><pubDate>Wed, 01 Apr 2026 21:33:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47606814</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47606814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47606814</guid></item><item><title><![CDATA[New comment by tennysont in "Signing data structures the wrong way"]]></title><description><![CDATA[
<p>Hmmmm. I agree that an ad-hoc implementation with protobufs can go wrong. But presumably, 1 canonical encoding for the private key constitutes the Horton principle?<p>It seems like Horton Principle just says "all messages have ≤1 meaning". If a message signed by key X must be parsed using the canonical encoding, then aren't we done?<p>There is still room for danger. e.g., You send `GetUserPermissionLevel(user:"Alice")` and server responds with `UserNicknameIs(user:"Alice", value:"admin")`. If you fail to check the message type, you might get tricked.<p>Maybe it's nice if it was mathematically impossible to validate the signature without first providing your assumptions. e.g., The subroutine to validate message `UserNicknameIs(user:"Alice", value:"admin")` requires `ServerKey × ExpectedMessageType`. But "ExpectedMessageType" isn't the only assumption being made, is it?<p>You might get back `UserPermissionLevel(user:"Bob", value:"admin")` or `UserPermissionLevel(user:"Alice", value:"admin", timestamp:"<3d old>")`. Will we expect the MAC to somehow accept a "user" value? And then what do we do about "timestamp"?<p>Maybe we implement `ClientMessage(msgUuid: UUID, requestData:...)` and `ServerResponse(clientMsgUuid: UUID, responseData:...)`, but now the UUID is a secret, vulnerable to MITM attack unless data is encrypted.<p>It seems like you simply must write validation code to ensure that you don't misinterpret the message that is signed. There simply isn't any magic bullet. Having multiple interpretations for a sequence of bytes is a non-starter (addressed in the post). But once you have a single interpretation for a sequence of bytes, isn't it up to the developer to define a schema + validation logic that supports their use case? Maybe there are good off-the-shelf patterns, but--again--no magic bullets?</p>
]]></description><pubDate>Wed, 01 Apr 2026 21:23:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47606735</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47606735</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47606735</guid></item><item><title><![CDATA[New comment by tennysont in "Stop Using Encrypted Email"]]></title><description><![CDATA[
<p>Despite my prior bias to agree with article, it includes this extraordinary line:<p>> So, for example, it recently turned out to be possible for eavesdroppers to decrypt messages without a key, simply by tampering with encrypted messages. Most technologists who work with PGP don’t understand it at a low enough level to see what’s wrong with it.<p>without citation. Such a writing choice makes me pause.</p>
]]></description><pubDate>Wed, 01 Apr 2026 10:19:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47598987</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47598987</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47598987</guid></item><item><title><![CDATA[New comment by tennysont in "Artemis II is not safe to fly"]]></title><description><![CDATA[
<p>While I appreciate independent bloggers, I think that the HackerNews community should expect big claims, like a NASA cover up:<p>> NASA’s initial instinct was to cover up the problem.<p>to at least warrant a link.</p>
]]></description><pubDate>Tue, 31 Mar 2026 05:49:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47583216</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47583216</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47583216</guid></item><item><title><![CDATA[New comment by tennysont in "Founder of GitLab battles cancer by founding companies"]]></title><description><![CDATA[
<p>He invested in one company that fights cancer. That company later helped him fight his cancer. Afterwards, he founded new companies that fight cancer. The headline refers to the new companies (but most of the comments here are about his cancer battle).<p>It makes sense after you understand, but I had to read the headline several times before it parsed.</p>
]]></description><pubDate>Tue, 31 Mar 2026 02:49:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47582192</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47582192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47582192</guid></item><item><title><![CDATA[New comment by tennysont in "Founder of GitLab battles cancer by founding companies"]]></title><description><![CDATA[
<p>Love how you approached and presented this. The data vis on <a href="https://osteosarc.com/" rel="nofollow">https://osteosarc.com/</a> is outstanding; such good explorability (is this some open source framework?)<p>I do have concerns regarding the proposals for scaling personalized medicine. They mostly boil down to "how do you scale the skill set required to operate in high-noise-low-signal domains". In my experience, these are places where poor data/incentives/critical-thinking can easily overshadow the signal; e.g., compelling stories outnumber correct stories.<p>There seems to be a trade-off: you can walk a bit further than others by keeping the probability distributions for low-quality results in your head, but go too far and everything starts getting overwhelmed by noise. It seems like the FDA's heavy gatekeeping is one way to solve this problem. If you forgo that gatekeeping, then you probably need to deal with the cascading quality issues that result.<p>Personalized treatments will probably be much harder to evaluate. At least a black-box algorithm that maps `situation → suggested treatment` can have statistics applied to it. But how do you evaluate "individuals made their own decision; here's the list of `situation × outcome`"? Or is the idea that there's currently a wealth of good-solutions, and that we should be relaxing regulations for a while?<p>Or perhaps we just want to push the regulator burden from "before small trials" to "before medium trials"? Then, these will be treated as case studies: good for experts to pull ideas from, but not high quality evidence for proving anything the third parties? I notice that your diagnostics were numerous, but the treatments were sparse and more sequential than parallel. If that's the norm, then maybe fairly usable data will emerge.<p>Or do people just have a moral right to seek out their own treatment, regardless of footguns that may be lying in wait? For myself and my loved ones battling cancer, I deeply agree with these:<p>> Maximize survival instead of the current practice of minimizing liability to the practitioner<p>> Parallel treatments wherever reasonable, we don't need to know what cured you<p>But I'm also glad that daily medical decisions are highly standardized and quality-controlled. It makes it easier to trust my doctor (or my loved ones' doctors) without independently investigating each recommendation.</p>
]]></description><pubDate>Mon, 30 Mar 2026 22:41:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47580614</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47580614</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47580614</guid></item><item><title><![CDATA[New comment by tennysont in "The Big List of Naughty Strings"]]></title><description><![CDATA[
<p>In university, a team member on a final project swore he fixed an input injection issue. I playfully typed `rm -rf /` on his machine and challenged him to press `RET` if he was confident. He hit enter, but protested that "I just don't believe those characters should ever be typed into a computer on principle."<p>I'm a fan of PR #2 "be less evil"<p>> If we were using this in some kind of automation, the last thing I want is it to blow everything away by accident. Probably should fixup the sql injection one too...<p><pre><code>  -  "/dev/null; rm -rf /\*; echo",
  +  "/dev/null; touch /tmp/blns.fail ; echo",</code></pre></p>
]]></description><pubDate>Sun, 22 Feb 2026 04:39:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47108222</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=47108222</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47108222</guid></item><item><title><![CDATA[New comment by tennysont in "The Kimwolf botnet is stalking your local network"]]></title><description><![CDATA[
<p>So, purely for example:<p>When you run VS Code, it spins up a local language server that is capable of making code changes. That is how refactoring python works in many editors (including VS Code).<p>A website that you're browsing could potentially send requests to this server asking for code to be inserted that fully compromises your device. What keeps us safe?<p>- maybe the website is only allowed to send GET requests, not PUT requests, and maybe the language servers that you're using are all "hardened" so that they will never permit mutations via any get requests, and never have a misconfigured CORS header<p>- the website has to guess the correct port and the correct language server with a known vulnerability<p>- any website doing this on a large scale would likely get the language server patched and the website on a block list<p>- there might be other safeguards that I'm not familiar with. For example, I believe that Chrome disallows this by default<p>So now, here's my frustration: these two statements seem hugely at odds with each other:<p>> I'm ok getting pwned every few decades if the tradeoff is never worrying about this shit.<p>> (i will say putting a device not running open source software/firmware or something very locked down like a phone on your LAN is insanity, i could never)<p>I'm ok with a person who makes either statement. I'm also ok with a person who makes the first statement, and also wants their LAN locked down. However, I do not feel as though the a LAN ever needs to be locked down unless a person in running a server on the LAN network. Personal devices (like laptops and phones) are plenty capable of resisting malicious networks by default (coffee shops, university wifi, etc). What else is on a LAN?<p>> mind virus it's the paranoia all security people get<p>I generally agree with you, but I feel as though I am the one who has accepted that personal laptops need to handle malicious networks, and I'm generally comfortable with that. I don't worry too much about putting IoT devices on the same network as my personal laptop, nor about connecting to coffee shop wifis.</p>
]]></description><pubDate>Sat, 10 Jan 2026 20:49:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46569792</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46569792</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46569792</guid></item><item><title><![CDATA[New comment by tennysont in "The Kimwolf botnet is stalking your local network"]]></title><description><![CDATA[
<p>Based on the :/ emoticon, I now understand that you were asking this question for yourself. In that case, I will express anger at the article. I believe that it was vague and leaned into fear mongering. This explains the vagueness of your question (emphasis mind):<p>> I know this may seem trivial for many here but how can regular people easily check and debug their network <i>for stuff like this?</i><p>"Stuff like this" is very vague.<p>- If there is a device on your network that is occasionally sending requests to the internet, then it generally isn't hurting you. That's why security is weak here, because the person buying the device is not harmed.<p>- If you're worried about the device sniffing your local network, then "normal people" are typically safe. Computers that you use are typically safe from malicious devices on the network, and you're in no more danger than working at a coffee shop, hotel, or university network.<p>- If you're knowledgeable enough to be a danger to yourself, and need the local network to be safe to protect yourself, then there is definitely a longer conversation to be had.<p>Responding point by point (before I realized that you were asking for yourself, and not the average person):<p>> Regular people download shit all the time though?<p>This is fair, though on macOS, most people download apps from the App Store (macOS makes it difficult to run apps downloaded from the internet and not signed by a registered developer).<p>> Especially now with GPT, everyone is a programmer pasting code into command line.<p>I am trying to reference a group of "regular people" who definitely do not fit this description---something like "the average citizen in the developed world". My parents definitely are not writing code with AI and pasting it into the command line. Although this was not crystal clear in this comment chain.<p>> And how many people have IoT devices that they have to connect to WiFi? That’s total blind trust.<p>My point was these devices do not endanger things that regular people care about. Their computers are still just as secure as when they visit a coffee shop or connect to their university wifi.<p>> Every time I ask this question nobody is able to give me a solid answer :/<p>for stuff like this?</p>
]]></description><pubDate>Sat, 10 Jan 2026 20:33:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46569654</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46569654</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46569654</guid></item><item><title><![CDATA[New comment by tennysont in "Show HN: I visualized the entire history of Citi Bike in the browser"]]></title><description><![CDATA[
<p>This data is mandated by NYC law: <a href="https://intro.nyc/local-laws/2015-99" rel="nofollow">https://intro.nyc/local-laws/2015-99</a><p>I've heard that releasing these sorts of data sets help competitors do market research, and thus mitigates "winner takes all" forces. NYC also tends to be fairly pro-public-datasets: <a href="https://data.cityofnewyork.us/browse?%3BsortBy=most_accessed&sortBy=relevance&pageSize=20&page=1" rel="nofollow">https://data.cityofnewyork.us/browse?%3BsortBy=most_accessed...</a></p>
]]></description><pubDate>Thu, 08 Jan 2026 04:10:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46537094</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46537094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46537094</guid></item><item><title><![CDATA[New comment by tennysont in "The Kimwolf botnet is stalking your local network"]]></title><description><![CDATA[
<p>I couldn't really follow the technical details of the malware from the article, so I found what seems to be the first major report on the topic:<p><a href="https://blog.xlab.qianxin.com/kimwolf-botnet-en/#network-protocol" rel="nofollow">https://blog.xlab.qianxin.com/kimwolf-botnet-en/#network-pro...</a><p>That article has a more technical lens. It focuses primarily on the size and detection evasion methods of Kimwolf, rather than some notable (and definitely not unique) method of spreading.<p>Without looking too deeply, I'm going to assume that this is a successful botnet because it managed to get into product supply lines at big box stores and in app store games, rather than some clever virus that is spreading across the world.<p>I hope someone will correct me if I am mistaken!</p>
]]></description><pubDate>Tue, 06 Jan 2026 04:58:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46508911</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46508911</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46508911</guid></item><item><title><![CDATA[New comment by tennysont in "The Kimwolf botnet is stalking your local network"]]></title><description><![CDATA[
<p>Regular people don't need a "secure network". Phones and computers are, by default, secure against malicious networks.<p>Just don't run code you download from the internet or put your passwords to important accounts into cheap devices and you'll be fine. Normally people don't the the former, but sometimes do the latter.<p>edit: To be clear: the bitterness in this comment comes from how many developers assume loopback is secure. However, most website are allowed to send requests to local ports on your computer (IIRC) so that assumption is basically completely false. This is forgivable, except in a world where every developer runs tons of extensions/scripts/open-source apps, and have next-to-zero blast-radius-reduction methods, it makes me sad.</p>
]]></description><pubDate>Tue, 06 Jan 2026 04:53:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46508881</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46508881</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46508881</guid></item><item><title><![CDATA[New comment by tennysont in "Texas app store age verification law blocked by federal judge"]]></title><description><![CDATA[
<p>That's such a strange interpretation that disagrees with my intuition.<p>If the Yankees hit a practice ball out of their stadium and into my house, causing bodily harm to a loved one, I wouldn't be satisfied with any of the reasoning in your comment.<p>More generally, people are allowed to take on risk as per their own appetite, but legal liability allows risk-hungry individuals to be incentive-aligned with everyone else.</p>
]]></description><pubDate>Wed, 24 Dec 2025 15:49:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46376562</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46376562</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46376562</guid></item><item><title><![CDATA[New comment by tennysont in "AIsbom – open-source CLI to detect "Pickle Bombs" in PyTorch models"]]></title><description><![CDATA[
<p>Pickle files are probably still useful saving exploratory work, collaborating inside a company, and use inside a pipeline.<p>Safetensors is supposed to be the successor for distribution. I believe that it's the "safe" subset of pickle's data format.</p>
]]></description><pubDate>Tue, 16 Dec 2025 18:27:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=46292292</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46292292</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46292292</guid></item><item><title><![CDATA[New comment by tennysont in "Deprecate like you mean it"]]></title><description><![CDATA[
<p>(Notwithstanding that this is a joke) Maybe it's just me, but I read this as a solution that would be implemented internally at a large company to distribute pain/accountability/tech-debt across time to a team which might have high turnover. i.e., a way to align incentives by punishing teams with bombs (via their metrics) in their code, before the bomb actually detonates.</p>
]]></description><pubDate>Thu, 11 Dec 2025 22:31:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46238215</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46238215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46238215</guid></item><item><title><![CDATA[New comment by tennysont in "Deprecate like you mean it"]]></title><description><![CDATA[
<p>I heard a second-hand story about some team at Google who did this, and named the variable something like:<p><pre><code>  I_ACKNOWLEDGE_THAT_THIS_CODE_WILL_PERMANENTLY_BREAK_ON_2022_09_20_WITHOUT_SUPPORT_FROM_TEAM_X=1
</code></pre>
a year before the deadline. I would be mildly amused by adding<p><pre><code>  _AND_MY_USER_ID_IS="<user_id>"</code></pre></p>
]]></description><pubDate>Thu, 11 Dec 2025 22:24:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46238121</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46238121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46238121</guid></item><item><title><![CDATA[New comment by tennysont in "Rivian Unveils Custom Silicon, R2 Lidar Roadmap, and Universal Hands Free"]]></title><description><![CDATA[
<p>Follow up question that you might know: would multiple LIDAR sensor actually be additive like that? If you can stand a foot away from a car's LIDAR sensor and be unharmed, then can't you have:<p><pre><code>  | Distance | # of Sensors |
  | 1        |            1 |
  | 3        |            9 |
  | 5        |           25 |
  | 10       |          100 |
  | 25       |          625 |
  | 50       |         2500 |
  | 100      |        10000 |
</code></pre>
x^2 sensors at x feet from you and have the same total energy delivered? If sensors are actually safe to look at from 6in or 3in, then multiple the above table by 4 or 16.<p>It seems like, due to the inverse square law, the main issue is how close you can get your eye to a LIDAR sensor under normal operation, not how many sensors are scattered across the environment. The one exception I can think of is a car that puts multiple LIDAR arrays next to each other (within a foot or two). But maybe I'm misunderstanding something!</p>
]]></description><pubDate>Thu, 11 Dec 2025 22:02:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46237838</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46237838</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46237838</guid></item><item><title><![CDATA[New comment by tennysont in "Australia begins enforcing world-first teen social media ban"]]></title><description><![CDATA[
<p>FYI “cope” is closer to “delusion used to help you <i>cope</i> with reality” rather than “superficial fix”<p>Also, I think that some strategies, such as “comfort asking a parent for help navigating a situation” are timeless defenses against strategies like blackmail. There are probably some street smarts that change and some that stay the same.</p>
]]></description><pubDate>Thu, 11 Dec 2025 19:16:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46235827</link><dc:creator>tennysont</dc:creator><comments>https://news.ycombinator.com/item?id=46235827</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46235827</guid></item></channel></rss>