<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: woodman</title><link>https://news.ycombinator.com/user?id=woodman</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 15:52:18 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=woodman" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by woodman in "NSA’s top policy advisor: It’s time to start putting teeth in cyber deterrence"]]></title><description><![CDATA[
<p>> Evidence of the NSAKEY being a backdoor includes some description of how the backdoor might work...<p>It would only work one way with an API relying on a PKI with a single CA, zero transparency, and trusted keys named after spy agencies suddenly appearing out of nowhere.  I'm gonna bail here, because I'm now not sure if you honestly don't know what the CAPI was in relation to the NSAKEY - or if you're trying to waste my time by getting me to explain the most basic principles of public key infrastructure.</p>
]]></description><pubDate>Fri, 08 Mar 2019 12:07:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=19336835</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19336835</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19336835</guid></item><item><title><![CDATA[New comment by woodman in "NSA’s top policy advisor: It’s time to start putting teeth in cyber deterrence"]]></title><description><![CDATA[
<p>> The entirety of the NSAKEY evidence is "it has NSA in the name."<p>Your comparison is out of line because of ridiculous characterizations like this.  Microsoft said that it was a backup key, which either means that they have the most poorly implemented scheme for backing up cryptographic materials ever devised, or they don't mean what most people think when they hear the word "backup".  Microsoft then claimed that the backup was necessary for passing the export control review, which is a bold lie to tell since the Export Administration Regulations are available for review to everybody.  One thing not included in the EAR that might influence Microsoft's conduct in trying to get permission from the USG to reach global customers: executive orders.  The government had a hard limit at 56-bits and was proposing that anybody wanting to export crypto beyond that needed to participate in their push for private-key escrow, which they were calling "key-recovery".  Recovery... sounds kind of like a backup plan...<p>I provided links in my response to the parent comment.</p>
]]></description><pubDate>Fri, 08 Mar 2019 02:04:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=19334527</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19334527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19334527</guid></item><item><title><![CDATA[New comment by woodman in "NSA’s top policy advisor: It’s time to start putting teeth in cyber deterrence"]]></title><description><![CDATA[
<p>The demand for evidence in the wake of all the NSA leaks is laughable.[0]  What does evidence of the NSAKEY being a backdoor look like to you, a provably malicious CSA shim, signed by the key, hand delivered by James Clapper?<p>I'll tell you what it looks like to me:<p>After the debug symbol is found, Microsoft gives a seemingly very stupid explanation for it[1]: "It is a backup key.  Yeah, uhhhh... during the export control review - the NSA said that we had to have a backup key, so we named it after them..."  After being challenged on the plausibility of their backup scheme they refuse to provide any further explanation.<p>Here is the funny part: Microsoft might be technically telling the truth about it being a "backup".  Consider what else was going on around this period: ridiculous export controls on key-length, the clipper chip... and finally: government managed private-key escrow[2].  At that time the export regulations did not specify a backup requirement, and yet Microsoft claims otherwise.  You know who else was talking a lot about backups?  The Whitehouse, in its proposal for allowing the export of key-lengths above 56-bits - so long as applicants implement "key-recovery".[3]  Somehow I don't think that we share the same definition of the word "backup".<p>Also, ECI Sentry Raven[4], have fun with that.<p>[0] <a href="https://assets.documentcloud.org/documents/784280/sigint-enabling-project.pdf" rel="nofollow">https://assets.documentcloud.org/documents/784280/sigint-ena...</a><p>[1] <a href="https://cryptome.org/nsakey-ms-dc.htm" rel="nofollow">https://cryptome.org/nsakey-ms-dc.htm</a><p>[2] <a href="https://web.archive.org/web/20000818204903/https://csrc.nist.gov/keyrecovery/admin.txt" rel="nofollow">https://web.archive.org/web/20000818204903/https://csrc.nist...</a><p>[3] <a href="https://epic.org/crypto/key_escrow/key_recovery.html" rel="nofollow">https://epic.org/crypto/key_escrow/key_recovery.html</a><p>[4] <a href="https://archive.org/details/nsa-sentry-eagle-the-intercept-14-1010/page/n8" rel="nofollow">https://archive.org/details/nsa-sentry-eagle-the-intercept-1...</a></p>
]]></description><pubDate>Fri, 08 Mar 2019 01:28:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=19334373</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19334373</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19334373</guid></item><item><title><![CDATA[New comment by woodman in "NSA’s top policy advisor: It’s time to start putting teeth in cyber deterrence"]]></title><description><![CDATA[
<p>It was a debugging symbol that a Microsoft developer either negligently or heroically included in a public release... so that explains away the "nobody would be so stupid" argument.  You are aware of how the Intel ME killswitch was located right?  A commented xml file included with the flashing software helpfully informed anybody willing to look that a field was related to the NSA's High Assurance Platform program.  This was after ten years of security researchers pointing at the fact that this was a backdoor.  For whatever reason both Intel and the NSA were happy to let the public remain needlessly vulnerable all that time... But yeah, I'm just like one of those water fluoridation loons.  The NSA wasn't at all hamfisted in the intentional weakening of elliptic curves and blatant RSA bribery, this isn't an obvious pattern emerging.</p>
]]></description><pubDate>Wed, 06 Mar 2019 21:15:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=19322865</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19322865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19322865</guid></item><item><title><![CDATA[New comment by woodman in "NSA’s top policy advisor: It’s time to start putting teeth in cyber deterrence"]]></title><description><![CDATA[
<p>> I'm sorry, but this seems a little naive.<p><a href="https://en.wikipedia.org/wiki/NSAKEY" rel="nofollow">https://en.wikipedia.org/wiki/NSAKEY</a>.<p>I thought everybody already knew that US corporations serve as an extension to the surveillance apparatus.  Remember all the corporations fighting against the government's mandate at an artificially crippled maximum keysize of 40 bits, in order to allow continued surveillance in the 90s?  Yeah, neither do I.</p>
]]></description><pubDate>Wed, 06 Mar 2019 20:12:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=19322296</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19322296</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19322296</guid></item><item><title><![CDATA[New comment by woodman in "NSA’s top policy advisor: It’s time to start putting teeth in cyber deterrence"]]></title><description><![CDATA[
<p>This is one of those situations that makes me wonder at how obvious the right way to go is, and how unlikely that is to happen.  Offense/defense costs are not even close to being symmetrical, it is insane that the USG would advance the state of the art in electronic warfare - while not even pretending to try and match the effort in defense.  This is why we abandoned our biological weapons program, we were effectively developing the technology for incredibly cheap weapons of mass destruction that any banana republic could mimic... not unlike the rootkit leaks.</p>
]]></description><pubDate>Wed, 06 Mar 2019 19:59:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=19322170</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19322170</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19322170</guid></item><item><title><![CDATA[New comment by woodman in "Ghidra, NSA's reverse-engineering tool"]]></title><description><![CDATA[
<p>This, unfortunately, occurs so infrequently that it can safely be ignored by 99.9% of the economy.  Businesses have really enjoyed having their cake and eating it too with the transition away from a highly involved acquisition process that generally resulted in a tailored solution that the USG owned, to the present COTS policy that allows them to then go on to sell software to people that have already effectively paid for it through taxes.  While there was an impressive amount of bureaucracy and an infinitely self referential system of standards in the old method, it did lead to some pretty interesting side effects: Ada[0], IDEF[1], MIL-STD-498[2], etc.<p>The most recent liberation of useful taxpayer funded software that I can think of was over ten years ago, when NIST released NFIS2 - the fingerprint software that the FBI relied on.  They of course had to be crappy about it and wrap it in export controls that limited its utility, but it was interesting to see all the work that internal development had done - very polished, with man pages going back to '97.  Ah the memories: software classified as munitions, the clipper chip...<p>[0] <a href="http://archive.adaic.com/pol-hist/policy/naig94-1.txt" rel="nofollow">http://archive.adaic.com/pol-hist/policy/naig94-1.txt</a><p>[1] <a href="https://en.wikipedia.org/wiki/IDEF#The_IDEF_modeling_languages" rel="nofollow">https://en.wikipedia.org/wiki/IDEF#The_IDEF_modeling_languag...</a><p>[2] <a href="https://en.wikipedia.org/wiki/MIL-STD-498" rel="nofollow">https://en.wikipedia.org/wiki/MIL-STD-498</a><p>[3] <a href="https://web.archive.org/web/20041206072946/http://fingerprint.nist.gov/NFIS/index.html" rel="nofollow">https://web.archive.org/web/20041206072946/http://fingerprin...</a></p>
]]></description><pubDate>Wed, 06 Mar 2019 19:14:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=19321690</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19321690</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19321690</guid></item><item><title><![CDATA[New comment by woodman in "Diversity Should Be #1 for Good Reason"]]></title><description><![CDATA[
<p>> > "If every investor..."<p>This is already a thing, and it is starting to look like an incredibly bad idea.  Well over a year ago I had lunch with my financial advisor and he tried to sell me on a portfolio balanced on some kind of social responsibility metric (female board member ratio, carbon credits, etc).  At the time I thought it was just a new way to separate morons from their money, but now I'm starting to think that the US markets are setting themselves up for a fungibility attack.  I remember, many years ago, the debate on bitcoin tainting - keeping a register of illegally obtained coins (and leaf transactions) and refusing to accept them.  That is obviously an attack on the utility of the currency - a unit of value.<p>So what is the metric here, what is the new unit of value?  The best case outcome is a Tower of Babel pandemonium, worst case is an irreversible further consolidation of kingmaking power.</p>
]]></description><pubDate>Mon, 25 Feb 2019 00:50:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=19241788</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19241788</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19241788</guid></item><item><title><![CDATA[New comment by woodman in "Twitter Thread Compiler Apps and Copyright Ethics"]]></title><description><![CDATA[
<p>Google "Richard Prince copyright".  This is not a new issue, not even close.<p>BTW... She is using a still[0] from a video that CNN owns the copyright to, and section 3 of their tos[1] explicitly forbids doing what she is doing - with the unnecessarily stated exception "as otherwise expressly permitted under copyright law".  You really want to take that exception away from her?  I can pretty easily argue that her use is transformative, can you?  How does this differ from what she is complaining about?<p>[0] <a href="http://www.erynnbrook.com/white-feelings-for-charlottesville/" rel="nofollow">http://www.erynnbrook.com/white-feelings-for-charlottesville...</a>
[1] <a href="https://www.cnn.com/terms" rel="nofollow">https://www.cnn.com/terms</a></p>
]]></description><pubDate>Sun, 24 Feb 2019 10:06:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=19237981</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19237981</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19237981</guid></item><item><title><![CDATA[New comment by woodman in "Twitter Thread Compiler Apps and Copyright Ethics"]]></title><description><![CDATA[
<p>ctrl+f 'transformative'... No matches.<p>I'm surprised by the sympathy I'm seeing for this position.  You people know that she is effectively complaining about fair use, right?  This is not something that can be budged on, even in deference to the feelings of a "writer/feminist/educator".  Fair use is the only thing that stands between us and massive intellectual property cartels guiding the public consciousness through selective enforcement.  Wanna go back to network television?  Because this is how you do it.</p>
]]></description><pubDate>Sun, 24 Feb 2019 09:31:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=19237894</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=19237894</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19237894</guid></item><item><title><![CDATA[New comment by woodman in "Libc on macOS invokes Perl as a subprocess for string processing (2017)"]]></title><description><![CDATA[
<p>There is a good chance they subscribe to a blocklist, so you could be blocked by anyone of a thousand people.  Image the old PGP web of trust, but for crafting perfect echo chambers.  I wonder if anybody has ever done the math on that.</p>
]]></description><pubDate>Wed, 16 Jan 2019 17:59:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=18923139</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18923139</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18923139</guid></item><item><title><![CDATA[New comment by woodman in "Rise and Demise of RSS"]]></title><description><![CDATA[
<p>The insane spike is for low traffic sites, so I'm guessing a blog platform defaulted RSS.</p>
]]></description><pubDate>Mon, 14 Jan 2019 07:02:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=18901197</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18901197</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18901197</guid></item><item><title><![CDATA[New comment by woodman in "Rise and Demise of RSS"]]></title><description><![CDATA[
<p>Wow, to base such a lengthy article on a google trend search of "rss"...<p>Queue rekt.webm: <a href="https://trends.builtwith.com/feeds/RSS" rel="nofollow">https://trends.builtwith.com/feeds/RSS</a></p>
]]></description><pubDate>Mon, 14 Jan 2019 06:50:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=18901159</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18901159</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18901159</guid></item><item><title><![CDATA[New comment by woodman in "BitPatron – A Bitcoin Censorship-Free Patreon Alternative"]]></title><description><![CDATA[
<p>I'm curious, how are you defining "the like"?  The list of people denied service looks a lot more like those you wouldn't want preceding your Coca-Cola ad buy.  Why would Patreon care?  Because payment networks care.<p><pre><code>   8chan
   Encyclopedia Dramatica
   BitChute
</code></pre>
If you expand the scope beyond Patreon and include Paypal then you can throw in:<p><pre><code>   Wikileaks
   Numerous Antifa chapters
   World Socialist Web Site
</code></pre>
As somebody who has been involved with bitcoin since 2012, I can tell you from first hand experience that when Visa declares you a persona non grata - a large number of businesses quickly do the same.  Yes, the full list of Patreon service denials includes a lot of unsympathetic figures - but you'd be a fool to think that this behavior doesn't shift with the Overton window (welcome back to the world of crypto currency, Dwolla, betcha feel silly for screwing up that perfect opportunity Paypal gave you).</p>
]]></description><pubDate>Sun, 13 Jan 2019 07:48:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=18895628</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18895628</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18895628</guid></item><item><title><![CDATA[New comment by woodman in "BitPatron – A Bitcoin Censorship-Free Patreon Alternative"]]></title><description><![CDATA[
<p>I'd say the former, but it really doesn't matter - the point is the subjectivity of collective "good" and "correctness".  Also, a lot of people are under the impression that these things are numerically based - the democratic tyranny of the majority... this is not the case.  We see the same thing play out in the slow failure of competing interest to guard against lobbyist abuse, it is an issue of motivation - not quantity or legitimacy.</p>
]]></description><pubDate>Sat, 12 Jan 2019 04:07:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=18889574</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18889574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18889574</guid></item><item><title><![CDATA[New comment by woodman in "BitPatron – A Bitcoin Censorship-Free Patreon Alternative"]]></title><description><![CDATA[
<p>One literally defines the other, so no.  Unless you are speaking from a universal perspective, which unfortunately isn't really part of the collective consciousness - and therefor inconsequential to daily life and the issue at hand.</p>
]]></description><pubDate>Sat, 12 Jan 2019 03:33:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=18889438</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18889438</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18889438</guid></item><item><title><![CDATA[New comment by woodman in "BitPatron – A Bitcoin Censorship-Free Patreon Alternative"]]></title><description><![CDATA[
<p>Wallstreet.  My financial advisor tried to sell me on this new socially conscious index, years ago.  Political correctness is great for business - very predictable, very manageable.<p><a href="https://www.institutionalinvestor.com/article/b14z9vvlscsnp2/european-pensions-go-green-for-social-and-bottomline-benefits" rel="nofollow">https://www.institutionalinvestor.com/article/b14z9vvlscsnp2...</a></p>
]]></description><pubDate>Sat, 12 Jan 2019 03:23:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=18889397</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18889397</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18889397</guid></item><item><title><![CDATA[New comment by woodman in "NLP for Fake News Detection (2018)"]]></title><description><![CDATA[
<p>Ouch, feeding probabilistic models training data scored with a gradient of truthfulness tags generated by humans and all their biases... surely this won't end horribly and simply serve as a method to algorithmically institute the tyranny of the majority.<p>If you really want to do this (You really don't, I assure you - you'll hate the end result), you've got to reach back through the AI winter and drag the granddaddy of NLP, propositional logic, into modern AI development.  We'll see this employed by lawyers long before journalists.<p><a href="https://en.wikipedia.org/wiki/Attempto_Controlled_English" rel="nofollow">https://en.wikipedia.org/wiki/Attempto_Controlled_English</a></p>
]]></description><pubDate>Fri, 11 Jan 2019 07:00:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=18881542</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18881542</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18881542</guid></item><item><title><![CDATA[New comment by woodman in "The Overloaded Soldier: Why U.S. Infantry Now Carry More Weight Than Ever"]]></title><description><![CDATA[
<p>I think you're right about the lack of power being the biggest contributor to the problems we had - which remained even after they tried to reduce the feature set (emergency magazine-well, user selectable gas tube aperture).<p>I think it was a poor idea in the first place to push a beltfed machinegun down to the fireteam level.  People generally have a misconception about what machineguns are for - while volume of fire certainly figures into effective suppression, accuracy is more important.  An effectively employed machinegun should be treated like some kind of sniper shotgun, where you can put 50% of your shots into a vehicle sized target a mile away.  You aren't going to be doing that while playing the I'm-up-he-sees-me-I'm-down game.</p>
]]></description><pubDate>Mon, 07 Jan 2019 18:57:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=18848659</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18848659</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18848659</guid></item><item><title><![CDATA[New comment by woodman in "The Overloaded Soldier: Why U.S. Infantry Now Carry More Weight Than Ever"]]></title><description><![CDATA[
<p>Hopefully it gets better with time for you.  My complaint wasn't with pain, but numbness.  I developed this problem very early on, in SOI, and kept it to myself because I knew that it would get me medically discharged.  Thankfully I never had to explain to anyone why I'd go to the lengths I did in order to avoid handling grenades.  After 2 years of civilian life my knees and lower back stopped bothering me, but 15 years later: my hands still feel like they're falling asleep.</p>
]]></description><pubDate>Mon, 07 Jan 2019 18:25:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=18848238</link><dc:creator>woodman</dc:creator><comments>https://news.ycombinator.com/item?id=18848238</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18848238</guid></item></channel></rss>