<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: xorbyte</title><link>https://news.ycombinator.com/user?id=xorbyte</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 10 May 2026 08:43:04 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=xorbyte" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by xorbyte in "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China"]]></title><description><![CDATA[
<p>Wallbleed, a buffer over-read vulnerability that existed in the DNS injection subsystem of the Great Firewall of China. Wallbleed caused certain nation-wide censorship middleboxes to reveal up to 125 bytes of their memory when censoring a crafted DNS query. It afforded a rare insight into one of the Great Firewall’s well-known network attacks, namely DNS injection, in terms of its internal architecture and the censor’s operational behaviors.</p>
]]></description><pubDate>Fri, 28 Feb 2025 17:12:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=43207937</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=43207937</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43207937</guid></item><item><title><![CDATA[Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China]]></title><description><![CDATA[
<p>Article URL: <a href="https://gfw.report/publications/ndss25/en/">https://gfw.report/publications/ndss25/en/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43207936">https://news.ycombinator.com/item?id=43207936</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 28 Feb 2025 17:12:10 +0000</pubDate><link>https://gfw.report/publications/ndss25/en/</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=43207936</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43207936</guid></item><item><title><![CDATA[New comment by xorbyte in "Why We Terminated Daily Stormer"]]></title><description><![CDATA[
<p>If he doesn't like your site, he may not allow you to use his service, which is something the TOS already cover.<p>Over time, such capricious terminations could lead to the Board seeking action against the CEO, depending on the impact to the business.</p>
]]></description><pubDate>Thu, 17 Aug 2017 00:56:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=15032772</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=15032772</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15032772</guid></item><item><title><![CDATA[New comment by xorbyte in "TunnelBear Publishes Security Audit"]]></title><description><![CDATA[
<p>macOS and iOS don't support OpenVPN with the built-in client. You can use strongSwan-based VPNs (e.g., as would be deployed through Algo) or Cisco, but for OpenVPN you'll need a custom client which, unfortunately, very likely brings along its own .kext.</p>
]]></description><pubDate>Wed, 16 Aug 2017 19:05:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=15030197</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=15030197</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15030197</guid></item><item><title><![CDATA[New comment by xorbyte in "“Packages should be reproducible” added to Debian Policy"]]></title><description><![CDATA[
<p>I think you may be confusing deterministic reproducible
builds (that remove randomness and ensure binaries
have the same content hash regardless of who builds
them (so you can reproduce what the maintainers did
and verify the source and binaries) to merely a repro'd
environment where everything still works because deps
are included, which seems to be all that Nix promises
(and in fact there is at least one open issue to add full
deterministic builds to Nix 
<a href="https://github.com/NixOS/nixpkgs/issues/9731" rel="nofollow">https://github.com/NixOS/nixpkgs/issues/9731</a> )</p>
]]></description><pubDate>Mon, 14 Aug 2017 22:05:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=15013440</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=15013440</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15013440</guid></item><item><title><![CDATA[New comment by xorbyte in "Quitting Caffeine"]]></title><description><![CDATA[
<p>Not all tonic water is low cal, a 350 mL bottle can be 100 calories from the 30g of sugar added.</p>
]]></description><pubDate>Mon, 14 Aug 2017 21:13:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=15012968</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=15012968</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15012968</guid></item><item><title><![CDATA[New comment by xorbyte in "Salesforce fires red team staffers who gave Defcon talk"]]></title><description><![CDATA[
<p>Any comparatively large corporation very likely has a release process for these sorts of things where a bunch of groups (like PR, maybe Legal etc) would take a look. Releasing company IP as open source outside of such a process would be a gross violation of any number of non-disclosure agreements between employer and employee.</p>
]]></description><pubDate>Thu, 10 Aug 2017 08:40:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=14977666</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=14977666</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14977666</guid></item><item><title><![CDATA[New comment by xorbyte in "PoC or GTFO 15 [pdf]"]]></title><description><![CDATA[
<p>Back issues are always included in the current issue, hence the zip. Keep recursing that way (or use binwalk)</p>
]]></description><pubDate>Sun, 25 Jun 2017 07:33:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=14629033</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=14629033</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14629033</guid></item><item><title><![CDATA[New comment by xorbyte in "Ask HN: Anonymous person sent proof of SSH access to our production server"]]></title><description><![CDATA[
<p>There's nothing in the OPs post suggesting SSH was exposed to the public, or that the breach happened over SSH. So it's important to secure that, but it's also important to think holistically about the attack surface.</p>
]]></description><pubDate>Wed, 27 Jul 2016 14:33:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=12173082</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=12173082</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12173082</guid></item><item><title><![CDATA[New comment by xorbyte in "Ask HN: Anonymous person sent proof of SSH access to our production server"]]></title><description><![CDATA[
<p>You assume the breach happened over SSH. This is valuable information to securing SSH, but it's entirely possible the original breach happened over some other service, and there were some other steps involved in the breach before the SSH screenshot was taken.</p>
]]></description><pubDate>Wed, 27 Jul 2016 14:30:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=12173053</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=12173053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12173053</guid></item><item><title><![CDATA[New comment by xorbyte in "Simple Ways to Protect an API"]]></title><description><![CDATA[
<p>The article makes no mention of TLS anywhere, and the example endpoints are all HTTP. So, this is a thoroughly insecure implementation, relying on very weak security mechanisms, prone to straightforward interception and tampering, replay etc.</p>
]]></description><pubDate>Wed, 25 Jun 2014 16:36:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=7945050</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=7945050</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7945050</guid></item><item><title><![CDATA[New comment by xorbyte in "The Operating System That Can Protect You Even if You Get Hacked"]]></title><description><![CDATA[
<p>Wouldn't that just be regular Xen?</p>
]]></description><pubDate>Mon, 14 Apr 2014 05:21:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=7584660</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=7584660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7584660</guid></item><item><title><![CDATA[New comment by xorbyte in "Why systemd is winning the init wars and other things aren't"]]></title><description><![CDATA[
<p>Not sure how you see progress and innovation otherwise. Much of what is good in Linux comes from experimentation and people/distros 'doing their own thing' which sometime improved the ecosystem, and sometimes resulted in abandoned projects. But things have not stagnated.<p>As for UNIX, perhaps you're familiar with Plan 9? Some of the principal UNIX designers were unhappy with the result, so they went and worked on improving it. Nothing is good enough the first time around.</p>
]]></description><pubDate>Wed, 12 Feb 2014 08:04:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=7223138</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=7223138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7223138</guid></item><item><title><![CDATA[New comment by xorbyte in "Asusgate: A story about thousands of crimeless victims"]]></title><description><![CDATA[
<p>Similarly echoed in the OpenWRT talk from 30C3 <a href="https://www.youtube.com/watch?v=Y-OlUxeS57E" rel="nofollow">https://www.youtube.com/watch?v=Y-OlUxeS57E</a></p>
]]></description><pubDate>Wed, 05 Feb 2014 01:15:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=7181332</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=7181332</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7181332</guid></item><item><title><![CDATA[New comment by xorbyte in "Square thinks I don’t exist"]]></title><description><![CDATA[
<p>No, I think this means PayPal recognizes tptacek's CCs and forces a log in. Even with a new card, perhaps they'll just base it on the name and refuse to process it without an account login.</p>
]]></description><pubDate>Tue, 28 Jan 2014 01:55:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=7134807</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=7134807</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7134807</guid></item><item><title><![CDATA[New comment by xorbyte in "Cryptocat Considered Harmful: The Root Cause"]]></title><description><![CDATA[
<p>OTR is only used in one-on-one communications in CC; group chat mechanisms are custom, and may now converge towards the mpOTR draft but that's still a pretty big risk.</p>
]]></description><pubDate>Thu, 02 Jan 2014 03:00:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=6997949</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=6997949</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6997949</guid></item><item><title><![CDATA[Internet-Wide Scan Data Repository]]></title><description><![CDATA[
<p>Article URL: <a href="https://scans.io/">https://scans.io/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=6997494">https://news.ycombinator.com/item?id=6997494</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 02 Jan 2014 00:28:38 +0000</pubDate><link>https://scans.io/</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=6997494</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6997494</guid></item><item><title><![CDATA[New comment by xorbyte in "The NSA Reportedly Has Total Access To The Apple iPhone"]]></title><description><![CDATA[
<p>Much of Jacob's presentation echoes many of the articles he (and others) had published in Der Spiegel earlier that day, going into a little more into the technical aspects (to the extent they are known and/or can be inferred.) While you may skip out the talk, at least look over the articles. While Jacob's style may rub you wrong, the issues are there regardless, and impatience is hardly a justifiable excuse.<p>On another note, if you are aware of Jacob misleading on any matter, it would be nice pointing that out directly. He is an activist that has done everything from helping with on-the-ground infrastructure deployments in war-torn areas, working on and advocating for Tor, speaking in front of the EU council… Casting doubt on his integrity without highlighting relevant facts is a way of distracting from the actual issues under discussion.</p>
]]></description><pubDate>Tue, 31 Dec 2013 08:16:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=6989603</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=6989603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6989603</guid></item><item><title><![CDATA[New comment by xorbyte in "Ask HN: MS Word alternatives for writing academic reports"]]></title><description><![CDATA[
<p>Look if anyone in your institution has created a dissertation template for LaTeX, or if you can use one [from elsewhere](<a href="https://github.com/briandealwis/ubcdiss" rel="nofollow">https://github.com/briandealwis/ubcdiss</a>). I personally found the formatting to be the hardest part, not the actual writing, especially since you can find helpers for various text editors, like LaTeXTools for Sublime etc.<p>As pointed out elsewhere in this thread, don't make your hammer solve all of the problems.</p>
]]></description><pubDate>Fri, 27 Dec 2013 15:59:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=6971087</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=6971087</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6971087</guid></item><item><title><![CDATA[New comment by xorbyte in "Ask HN: MS Word alternatives for writing academic reports"]]></title><description><![CDATA[
<p>MultiMarkdown might be more suitable for large documents, as it allows the inclusion of files between documents, cross-references etc.</p>
]]></description><pubDate>Fri, 27 Dec 2013 15:53:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=6971063</link><dc:creator>xorbyte</dc:creator><comments>https://news.ycombinator.com/item?id=6971063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6971063</guid></item></channel></rss>