<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tsujamin</title><link>https://news.ycombinator.com/user?id=tsujamin</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 03:15:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tsujamin" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tsujamin in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>For what it’s worth, Trusted Signing verification has been a moving target over the last 12 months. It was open for individuals, then it was closed to anyone except (iirc) US businesses with DUNS numbers, then it opened again to US based individuals (and a few other countries perhaps).<p>My completely uninformed guess was that <i>someone</i> had done something naughty with Trusted Signing-issued code signing certificates.<p>Anyway, when I first saw the VeraCrypt thing this morning my initial reaction was “I wonder if this is them pushing developers onto trusted signing the hard way?”</p>
]]></description><pubDate>Wed, 08 Apr 2026 18:09:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694045</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=47694045</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694045</guid></item><item><title><![CDATA[New comment by tsujamin in "Microsoft terminates VeraCrypt account, halting Windows updates"]]></title><description><![CDATA[
<p>They did, just further into the article:<p>> According to a post on Hacker News, the popular VPN client WireGuard is facing the same issue.</p>
]]></description><pubDate>Wed, 08 Apr 2026 17:08:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47693097</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=47693097</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47693097</guid></item><item><title><![CDATA[New comment by tsujamin in "Mobile carriers can get your GPS location"]]></title><description><![CDATA[
<p>It could be a flag in the per-network CarrierConfig bundle. I imagine that would help with jurisdictions that might require this protocol for legislative reasons</p>
]]></description><pubDate>Sun, 01 Feb 2026 01:18:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46842698</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46842698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46842698</guid></item><item><title><![CDATA[New comment by tsujamin in "Cloudflare claimed they implemented Matrix on Cloudflare workers. They didn't"]]></title><description><![CDATA[
<p>That the original post to HN linked in the blog was done on a throwaway kind of implies a level of awareness (on the part of the dev) that the code/claims were rubbish :)<p><a href="https://news.ycombinator.com/item?id=46780837">https://news.ycombinator.com/item?id=46780837</a></p>
]]></description><pubDate>Tue, 27 Jan 2026 17:28:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46783205</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46783205</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46783205</guid></item><item><title><![CDATA[Azul 9.0 is Open Sourced (Australian Cyber Security Centre)]]></title><description><![CDATA[
<p>Article URL: <a href="https://australiancybersecuritycentre.github.io/azul/">https://australiancybersecuritycentre.github.io/azul/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46586537">https://news.ycombinator.com/item?id=46586537</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 12 Jan 2026 10:29:49 +0000</pubDate><link>https://australiancybersecuritycentre.github.io/azul/</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46586537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46586537</guid></item><item><title><![CDATA[New comment by tsujamin in "Microsoft kills official way to activate Windows 11/10 without internet"]]></title><description><![CDATA[
<p>To name a few (presumably): drivers, proprietary protocols, vendor warranties/support, licensing/relicensing, paying you to do the work, waiting for the work to be done/tested, paying for workforce re-training, justifying this to management etc.<p>All these reasons suck, but they’re all reality in one industry or another sadly.</p>
]]></description><pubDate>Sat, 03 Jan 2026 04:46:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46472885</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46472885</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46472885</guid></item><item><title><![CDATA[New comment by tsujamin in "Loss32: Let's Build a Win32/Linux"]]></title><description><![CDATA[
<p>There’s also API Sets: where DLLs like api-win-blah-1.dll acts as a proxy for another DLL both literally, with forwarder exports, and figuratively, with a system-wide in-memory hashmap between api set and actual DLL.<p>Iirc this is both for versioning, but also so some software can target windows and Xbox OS’s whilst “importing” the same api-set DLL? Caused me a lot of grief writing a PE dynamic linker once.<p><a href="https://bookkity.com/article/api-sets" rel="nofollow">https://bookkity.com/article/api-sets</a></p>
]]></description><pubDate>Wed, 31 Dec 2025 17:21:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46446126</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46446126</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46446126</guid></item><item><title><![CDATA[New comment by tsujamin in "Ask HN: What did you read in 2025?"]]></title><description><![CDATA[
<p>Strong recommendation for Alistair Reynold’s Century Rain if you want another of his. It’s part 20th century alternate history, part hard boiled crime noir, and part hard space opera.</p>
]]></description><pubDate>Sat, 27 Dec 2025 05:06:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46399305</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46399305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46399305</guid></item><item><title><![CDATA[New comment by tsujamin in "Ask HN: What did you read in 2025?"]]></title><description><![CDATA[
<p>Cutting a long list short, the _best_ thing I read this year was W. Somerset Maugham’s Of Human Bondage.<p>It’s not a book where the world changes greatly or great things are done, but honestly that’s kind of nice: It’s a compelling story of a life, the characters were engrossing (one in particular stands out for how strongly _dislikeable_ they are) and the I loved the prose.<p>Also shoutout to Standard EBook’s excellent, public domain edition (and all their volunteers other work!): <a href="https://standardebooks.org/ebooks/w-somerset-maugham/of-human-bondage" rel="nofollow">https://standardebooks.org/ebooks/w-somerset-maugham/of-huma...</a></p>
]]></description><pubDate>Sat, 27 Dec 2025 04:58:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46399280</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46399280</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46399280</guid></item><item><title><![CDATA[New comment by tsujamin in "Microsoft please get your tab to autocomplete shit together"]]></title><description><![CDATA[
<p>I thought I was going crazy, but it started feeling materially worse sometime in last few weeks.</p>
]]></description><pubDate>Thu, 25 Dec 2025 00:49:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46381023</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46381023</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46381023</guid></item><item><title><![CDATA[New comment by tsujamin in "Recovering Anthony Bourdain's Li.st's"]]></title><description><![CDATA[
<p>> Great Dead Bars of New York:<p>> 1. SIBERIA in any of its iterations. The one on the subway being the best.<p>Timely, as the latest reincarnation of SIBERIA just re-opened in 59th Street/Columbus Circle station</p>
]]></description><pubDate>Sat, 13 Dec 2025 23:55:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46259427</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=46259427</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46259427</guid></item><item><title><![CDATA[Simple trick to increase coverage: Lying to users about signal strength]]></title><description><![CDATA[
<p>Article URL: <a href="https://nickvsnetworking.com/simple-trick-to-increase-coverage-lying-to-users-about-signal-strength/">https://nickvsnetworking.com/simple-trick-to-increase-coverage-lying-to-users-about-signal-strength/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45795036">https://news.ycombinator.com/item?id=45795036</a></p>
<p>Points: 439</p>
<p># Comments: 181</p>
]]></description><pubDate>Mon, 03 Nov 2025 01:27:48 +0000</pubDate><link>https://nickvsnetworking.com/simple-trick-to-increase-coverage-lying-to-users-about-signal-strength/</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=45795036</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45795036</guid></item><item><title><![CDATA[New comment by tsujamin in "Compiler Bug Causes Compiler Bug: How a 12-Year-Old G++ Bug Took Down Solidity"]]></title><description><![CDATA[
<p>So long as you’re writing your smart contracts with a chisel, into a stone tablet, with no compilers or assemblers in sight!</p>
]]></description><pubDate>Fri, 15 Aug 2025 19:08:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=44916311</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=44916311</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44916311</guid></item><item><title><![CDATA[New comment by tsujamin in "When DEF CON partners with the U.S. Army"]]></title><description><![CDATA[
<p>A Pwnie for "unilaterally shutting down a counterterrorism operation”</p>
]]></description><pubDate>Thu, 14 Aug 2025 01:14:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=44895741</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=44895741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44895741</guid></item><item><title><![CDATA[New comment by tsujamin in "New adaptive optics shows details of our star's atmosphere"]]></title><description><![CDATA[
<p>You say beautiful, I say existentially terrifying, let’s split the difference</p>
]]></description><pubDate>Sun, 01 Jun 2025 02:42:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=44148333</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=44148333</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44148333</guid></item><item><title><![CDATA[New comment by tsujamin in "Google AI Ultra"]]></title><description><![CDATA[
<p>Obviously not speaking for others experience, but it all makes me feel pretty fatigued, and as if this growing expectation of "AI-enhanced productivity" is coming at the expense of a craft and process (writing software) that I enjoy.</p>
]]></description><pubDate>Tue, 20 May 2025 20:05:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=44045362</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=44045362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44045362</guid></item><item><title><![CDATA[Using AI to Create an Exploit for CVE-2025-32433 Before Public PoCs Existed]]></title><description><![CDATA[
<p>Article URL: <a href="https://platformsecurity.com/blog/CVE-2025-32433-poc">https://platformsecurity.com/blog/CVE-2025-32433-poc</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43785870">https://news.ycombinator.com/item?id=43785870</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 24 Apr 2025 18:26:54 +0000</pubDate><link>https://platformsecurity.com/blog/CVE-2025-32433-poc</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=43785870</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43785870</guid></item><item><title><![CDATA[New comment by tsujamin in "Cross-Platform P2P Wi-Fi: How the EU Killed AWDL"]]></title><description><![CDATA[
<p>> wireless file transfers between Android and iOS being completely impossible at the moment<p>P2P proximal wireless transfer, sure, but there's half a dozen apps on your phone that'll let you punt a document, a photo, an invite to someone on the other phone OS platform.<p>Maybe I'm an edge case, but probably 90% of my Airdrop usage is between my own devices, so the platform taking care of the authentication story is of more utility than cross-platform transfers. If someone isn't on iOS I'll just send them the  file on Signal since, if the source is my phone in the first place, it's probably not a huge transfer anyway.</p>
]]></description><pubDate>Fri, 28 Mar 2025 16:46:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=43507488</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=43507488</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43507488</guid></item><item><title><![CDATA[New comment by tsujamin in "Leaked Apple meeting shows how dire the Siri situation is"]]></title><description><![CDATA[
<p>They already have a compostable automation api with 3rd party integrations: Shortcuts!<p>It’s not perfect, but surely you could natural language -> llm -> temporary shortcut script and that gets you a decent part of the way to a smarter Siri</p>
]]></description><pubDate>Sun, 16 Mar 2025 22:07:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=43382930</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=43382930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43382930</guid></item><item><title><![CDATA[New comment by tsujamin in "Tj-actions/changed-files GitHub Action Compromised – used by over 23K repos"]]></title><description><![CDATA[
<p>How does SBOM and such account for this? If you’re a package maintainer, do you need to include CI pipeline plugins, their dependencies, going down as far as the pipeline host, in your security-relevant dependencies? Hard problems :/</p>
]]></description><pubDate>Sat, 15 Mar 2025 02:06:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=43369285</link><dc:creator>tsujamin</dc:creator><comments>https://news.ycombinator.com/item?id=43369285</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43369285</guid></item></channel></rss>