<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: viralpoetry</title><link>https://news.ycombinator.com/user?id=viralpoetry</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 28 Apr 2026 22:59:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=viralpoetry" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[The Google Pixel 3 Is a Good Phone. But Maybe Phones Have Gone Too Far. (2018)]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.buzzfeednews.com/article/mathonan/google-pixel-3-review-android">https://www.buzzfeednews.com/article/mathonan/google-pixel-3-review-android</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46677472">https://news.ycombinator.com/item?id=46677472</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 19 Jan 2026 10:51:38 +0000</pubDate><link>https://www.buzzfeednews.com/article/mathonan/google-pixel-3-review-android</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=46677472</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46677472</guid></item><item><title><![CDATA[New comment by viralpoetry in "Ask HN: Share your personal website"]]></title><description><![CDATA[
<p>My personal blog posts a few times a year, with a focus on security<p><a href="https://www.malgregator.com/" rel="nofollow">https://www.malgregator.com/</a></p>
]]></description><pubDate>Wed, 14 Jan 2026 22:58:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46625148</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=46625148</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46625148</guid></item><item><title><![CDATA[New comment by viralpoetry in "If AI replaces workers, should it also pay taxes?"]]></title><description><![CDATA[
<p>"The gains in technics are never registered automatically in society: they require equally adroid inventions and adaptations in politics; and the careless habit of attributiong to mechanical improvements a direct role as instruments of culture and civilization puts a demand upon the machine to which it cannot respond."<p>- Lewis Mumford, Technics and Civilization</p>
]]></description><pubDate>Mon, 15 Dec 2025 14:14:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46274799</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=46274799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46274799</guid></item><item><title><![CDATA[New comment by viralpoetry in "A Technical Look at BitMessage: Learning From a Dead Project"]]></title><description><![CDATA[
<p>This was actually solved by another address protocol version. I believe v3 solved this by using pubkey instead of hash. Similar to late btc addresses</p>
]]></description><pubDate>Mon, 26 Aug 2024 18:22:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=41360085</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=41360085</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41360085</guid></item><item><title><![CDATA[Making identical U2F hardware security keys]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.malgregator.com/post/u2f/">https://www.malgregator.com/post/u2f/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41259253">https://news.ycombinator.com/item?id=41259253</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 15 Aug 2024 18:58:46 +0000</pubDate><link>https://www.malgregator.com/post/u2f/</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=41259253</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41259253</guid></item><item><title><![CDATA[New comment by viralpoetry in "Building an e-ink picture frame that displays an iCloud photo album"]]></title><description><![CDATA[
<p>I have tried to build one out of the PocketBook Basic Touch e-reader last October.
It has way less functionality tought...<p><a href="https://www.malgregator.com/post/pocketframe/" rel="nofollow">https://www.malgregator.com/post/pocketframe/</a><p><a href="https://hackaday.com/2023/11/13/obsolete-e-reader-gets-new-life/" rel="nofollow">https://hackaday.com/2023/11/13/obsolete-e-reader-gets-new-l...</a></p>
]]></description><pubDate>Tue, 09 Jan 2024 19:43:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=38930946</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=38930946</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38930946</guid></item><item><title><![CDATA[New comment by viralpoetry in "Compromised Microsoft key: More impactful than we thought"]]></title><description><![CDATA[
<p>> copying keys between HSMs inherently exposes the master keys anyway<p>that's not true, even with their BYOK you export the key from one HSM under a shared key and then import it to another device</p>
]]></description><pubDate>Mon, 24 Jul 2023 07:32:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=36844222</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=36844222</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36844222</guid></item><item><title><![CDATA[New comment by viralpoetry in "Ask HN: Could you share your personal blog here?"]]></title><description><![CDATA[
<p><a href="https://www.malgregator.com/" rel="nofollow noreferrer">https://www.malgregator.com/</a><p>I write mostly about the security and things I work on, to keep memories somewhere.<p>One of my posts about the google bug bounty for the Waze navigation bug went viral and was shared by Schneier, Threat Post and others
<a href="https://www.malgregator.com/post/waze-how-i-tracked-your-mother/" rel="nofollow noreferrer">https://www.malgregator.com/post/waze-how-i-tracked-your-mot...</a></p>
]]></description><pubDate>Wed, 05 Jul 2023 07:20:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=36596791</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=36596791</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36596791</guid></item><item><title><![CDATA[New comment by viralpoetry in "Why have a blog? (2020)"]]></title><description><![CDATA[
<p>The simplest I saw, install Standard Notes (<a href="https://standardnotes.com/" rel="nofollow">https://standardnotes.com/</a> - open source, free) encrypted notes app, write something, then publish it via the interface.
It will create you a blog on their <a href="https://listed.to/" rel="nofollow">https://listed.to/</a> webpage</p>
]]></description><pubDate>Wed, 08 Jun 2022 11:42:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=31665895</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=31665895</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31665895</guid></item><item><title><![CDATA[New comment by viralpoetry in "Encrypted CRDTs for building privacy focused collaborative software"]]></title><description><![CDATA[
<p>Thanks for an interesting article and nice simple webpage</p>
]]></description><pubDate>Wed, 30 Sep 2020 05:40:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=24635994</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=24635994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24635994</guid></item><item><title><![CDATA[New comment by viralpoetry in "BitTorrent v2"]]></title><description><![CDATA[
<p>Fearing return to drachma, some Greeks use bitcoin to dodge capital controls
<a href="https://www.reuters.com/article/uk-eurozone-greece-bitcoin/fearing-return-to-drachma-some-greeks-use-bitcoin-to-dodge-capital-controls-idUKKCN0PD19S20150703" rel="nofollow">https://www.reuters.com/article/uk-eurozone-greece-bitcoin/f...</a><p>WikiLeaks may have amassed more than $46 million in Bitcoin based on the number of coins held by its known wallet address.
<a href="https://bitcoinist.com/wikileaks-has-received-more-than-46-million-in-bitcoin/" rel="nofollow">https://bitcoinist.com/wikileaks-has-received-more-than-46-m...</a></p>
]]></description><pubDate>Tue, 08 Sep 2020 07:04:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=24405883</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=24405883</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24405883</guid></item><item><title><![CDATA[New comment by viralpoetry in "Celebrate Woz's 70th"]]></title><description><![CDATA[
<p>When I was university student (~ 2012), Woz was traveling Europe visiting Macdonald's (:D) in lots of countries including Slovakia. Shared it on the internet, probably Twitter.<p>One of my classmates tracked him and successfully asked for a photo with him. nice guy</p>
]]></description><pubDate>Tue, 11 Aug 2020 11:03:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=24119090</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=24119090</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24119090</guid></item><item><title><![CDATA[New comment by viralpoetry in "Using the NFC Chip of the Passport to Do Proof-of-Work"]]></title><description><![CDATA[
<p>A Hammer in Search of a Nail<p>Proof of Work require no secret information as an input and have to be easy to verify. But most importantly, why would anyone do this?<p>Passport issuer can act like certification authority, this is not a trustless system where PoW can be used for something. Public key infrastructure is a solved thing with it's own problems, but verification is not one of them if authority is working as it should.<p>EDIT: Let's not even mention that smartcards have effective lifetime and efficiency.</p>
]]></description><pubDate>Mon, 04 May 2020 20:10:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=23072691</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=23072691</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23072691</guid></item><item><title><![CDATA[New comment by viralpoetry in "What Happened to Lee"]]></title><description><![CDATA[
<p>What an ignorant I was.
March last year (2019), I wrote an email to Lee Holloway asking him how he could bootstrap such a great company. Now I know why I haven’t received the answer.<p>EDIT: I found an email:<p><i>Dear Lee Holloway,<p>Excuse my curiosity, as an Engineer I am not writing this kind of emails a lot, but I have read the blog series by  John Graham-Cumming about the company, and it would really help me if you can answer my question about the constant flow of engineering innovations from your company.<p>I am a security engineer from Europe and would like to know how is it possible, that security team will start producing such a stream of innovative things like Keyless SSL, CFSSL, SIDH implementation, Red October key management server and many more your company already published?<p>When the "lift and shift" from the open source or vendor stops and internal building start to happen within an organization? Is it a cultural thing where only a small startup can succeed and scale later? Is it about the budget or is it a cultural shift that is non forcible upon them?
Is a prerequisite to the innovation, that almost everything is developed in house? That came to me as a contra productive strategy. I have read Skunk Works and other books, but I am still impressed how that happens regarding to the modern leading IT/infra companies.<p>Thank you for your time,<p>...</i></p>
]]></description><pubDate>Wed, 15 Apr 2020 15:12:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=22878637</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22878637</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22878637</guid></item><item><title><![CDATA[New comment by viralpoetry in "Ask HN: What is your blog and why should I read it?"]]></title><description><![CDATA[
<p>I occasionally write about security, mostly about applied cryptography from non-math perspective.<p>If you are interested on day to day work in financial cryptography and hardware encryption modules, check:<p><a href="https://www.malgregator.com/post/key-management/" rel="nofollow">https://www.malgregator.com/post/key-management/</a><p>Some predictions on future malware development (some of them confirmed by now):<p><a href="https://www.malgregator.com/post/the-future-of-malware/the-future-of-malware/" rel="nofollow">https://www.malgregator.com/post/the-future-of-malware/the-f...</a><p>Or using modern smartcards like Yubikey with DevOps tools (Vault) by leveraging ancient technologies like pkcs11:<p><a href="https://www.malgregator.com/post/vault-authentication-with-yubikey/" rel="nofollow">https://www.malgregator.com/post/vault-authentication-with-y...</a></p>
]]></description><pubDate>Tue, 07 Apr 2020 09:46:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=22801754</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22801754</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22801754</guid></item><item><title><![CDATA[New comment by viralpoetry in "ACM Prize in Computing Awarded to AlphaGo Developer"]]></title><description><![CDATA[
<p>How you ended up implement it in the code? Is it just a heuristic implemented as a series of if/else/case statements?
Minimax? Thank you<p>EDIT: sorry, I found out that source code is available, I will try to find it<p>EDIT2: Looks like it's up for sale, not open</p>
]]></description><pubDate>Thu, 02 Apr 2020 13:20:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=22758604</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22758604</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22758604</guid></item><item><title><![CDATA[New comment by viralpoetry in "Orca: 2D esoteric programming language where every alphabet is an operator"]]></title><description><![CDATA[
<p>I just want to say that ORCA author, Devine Lu Linvega[1], is such a talented and creative person. He build complete ecosystem with it's own language, drag & drop theme support[2] and human readable DB format[3].
He and his girlfriend (cartoonist) Rekka Bell are sailing the ocean and working from their sailboat Pino[4].<p>[1] <a href="https://wiki.xxiivv.com/" rel="nofollow">https://wiki.xxiivv.com/</a><p>[2] <a href="https://github.com/hundredrabbits/Themes" rel="nofollow">https://github.com/hundredrabbits/Themes</a><p>[3] <a href="https://wiki.xxiivv.com/site/indental.html" rel="nofollow">https://wiki.xxiivv.com/site/indental.html</a><p>[4] <a href="https://100r.co/site/about_us.html" rel="nofollow">https://100r.co/site/about_us.html</a></p>
]]></description><pubDate>Mon, 23 Mar 2020 14:54:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=22664652</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22664652</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22664652</guid></item><item><title><![CDATA[New comment by viralpoetry in "Ask HN: What projects are you working on now?"]]></title><description><![CDATA[
<p>Hi, thanks for sharing your website. You are doing interesting research.</p>
]]></description><pubDate>Sun, 22 Mar 2020 12:05:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=22654366</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22654366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22654366</guid></item><item><title><![CDATA[Show HN: Acmedns Authenticator Plugin for Certbot]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/pan-net-security/certbot-dns-acmedns">https://github.com/pan-net-security/certbot-dns-acmedns</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=22363826">https://news.ycombinator.com/item?id=22363826</a></p>
<p>Points: 36</p>
<p># Comments: 2</p>
]]></description><pubDate>Wed, 19 Feb 2020 08:01:04 +0000</pubDate><link>https://github.com/pan-net-security/certbot-dns-acmedns</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22363826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22363826</guid></item><item><title><![CDATA[New comment by viralpoetry in "Twitter locks WikiLeaks account days before Assange's extradition hearing"]]></title><description><![CDATA[
<p>Worth to mention that Brazil charged Intercept co-founder Glenn Greenwald with cybercrime charges similar to Assange. 
The guy who first met Snowden in HK with Laura Poitras.<p>Even if it looks like they have "postponed" prosecution for now.<p><a href="https://theintercept.com/2020/02/06/glenn-greenwald-intercept-brazil-charges/" rel="nofollow">https://theintercept.com/2020/02/06/glenn-greenwald-intercep...</a></p>
]]></description><pubDate>Tue, 18 Feb 2020 14:06:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=22356120</link><dc:creator>viralpoetry</dc:creator><comments>https://news.ycombinator.com/item?id=22356120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22356120</guid></item></channel></rss>