<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: xx_ns</title><link>https://news.ycombinator.com/user?id=xx_ns</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 13 Apr 2026 11:18:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=xx_ns" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by xx_ns in "Škoda DuoBell: A bicycle bell that penetrates noise-cancelling headphones"]]></title><description><![CDATA[
<p>I wish my city only had a single case like that. Unfortunately, in Tallinn, it is extremely common that a bike path is suddenly routed onto the curb, and that's when you're lucky. For some paths, the path just... ends, and you suddenly find yourself right in the middle of car traffic. Unfortunately, the city leadership is anti-bike and pro-car, and it shows in the infrastructure.<p>Paths where pedestrians and bikers (and other light transportation vehicles) are mixed are overwhelmingly common.</p>
]]></description><pubDate>Wed, 08 Apr 2026 11:17:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47688642</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=47688642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47688642</guid></item><item><title><![CDATA[New comment by xx_ns in "Log File Viewer for the Terminal"]]></title><description><![CDATA[
<p>According to the linked homepage, the memory usage seems decent (few hundred megs for most use cases when working with a 3.3G logfile). There's a screenshot with various tasks and what the peak memory usage is.<p>At some point you need to keep quite a large context in memory to have both decent performance and useful features (that aren't unbearably slow to use). lnav seems to land at a reasonable middle ground.</p>
]]></description><pubDate>Tue, 24 Mar 2026 08:14:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47499843</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=47499843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47499843</guid></item><item><title><![CDATA[Reverse engineering the Creative V2X soundbar to be able to control it on Linux]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.nns.ee/2026/02/20/katana-v2x-re/">https://blog.nns.ee/2026/02/20/katana-v2x-re/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47090276">https://news.ycombinator.com/item?id=47090276</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 20 Feb 2026 16:39:06 +0000</pubDate><link>https://blog.nns.ee/2026/02/20/katana-v2x-re/</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=47090276</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47090276</guid></item><item><title><![CDATA[Solving Fossil's ASCII art CAPTCHA in 171 characters]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.nns.ee/2026/01/29/fossil-captcha-solver">https://blog.nns.ee/2026/01/29/fossil-captcha-solver</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46809836">https://news.ycombinator.com/item?id=46809836</a></p>
<p>Points: 6</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 29 Jan 2026 13:18:53 +0000</pubDate><link>https://blog.nns.ee/2026/01/29/fossil-captcha-solver</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46809836</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46809836</guid></item><item><title><![CDATA[Reverse engineering my e-scooter and finding the master key to unlock them all]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.nns.ee/2026/01/06/aike-ble">https://blog.nns.ee/2026/01/06/aike-ble</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46512674">https://news.ycombinator.com/item?id=46512674</a></p>
<p>Points: 39</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 06 Jan 2026 14:27:52 +0000</pubDate><link>https://blog.nns.ee/2026/01/06/aike-ble</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46512674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46512674</guid></item><item><title><![CDATA[New comment by xx_ns in "Turning an old Amazon Kindle into a eInk development platform (2021)"]]></title><description><![CDATA[
<p>Usable enough to run a Linux DE on it! I did so on my blog: <a href="https://nns.ee/kindle" rel="nofollow">https://nns.ee/kindle</a></p>
]]></description><pubDate>Tue, 30 Dec 2025 21:22:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46438161</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46438161</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46438161</guid></item><item><title><![CDATA[New comment by xx_ns in "Cloudflare was down"]]></title><description><![CDATA[
<p>At least it's still right in spite of being down.</p>
]]></description><pubDate>Fri, 05 Dec 2025 08:56:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46158278</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46158278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46158278</guid></item><item><title><![CDATA[New comment by xx_ns in "This blog is now hosted on a GPS/LTE modem (2021)"]]></title><description><![CDATA[
<p>Good question! I wasn't too concerned about this, because the only way you could even interact with the OS where the server was running was via HTTP requests, which are fairly limited in nature. The OS or kernel itself wasn't directly exposed per se.</p>
]]></description><pubDate>Tue, 25 Nov 2025 21:27:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46051008</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46051008</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46051008</guid></item><item><title><![CDATA[New comment by xx_ns in "This blog is now hosted on a GPS/LTE modem (2021)"]]></title><description><![CDATA[
<p>Just a little play on the recent HN post: <a href="https://news.ycombinator.com/item?id=46016902">https://news.ycombinator.com/item?id=46016902</a><p>Project that I did a few years ago. You might also be interested in the retrospective where I detail what all went wrong: <a href="https://blog.nns.ee/2025/04/01/modem-blog-retrospective/" rel="nofollow">https://blog.nns.ee/2025/04/01/modem-blog-retrospective/</a></p>
]]></description><pubDate>Tue, 25 Nov 2025 19:58:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46049982</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46049982</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46049982</guid></item><item><title><![CDATA[This blog is now hosted on a GPS/LTE modem (2021)]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.nns.ee/2021/04/01/modem-blog">https://blog.nns.ee/2021/04/01/modem-blog</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46049981">https://news.ycombinator.com/item?id=46049981</a></p>
<p>Points: 68</p>
<p># Comments: 7</p>
]]></description><pubDate>Tue, 25 Nov 2025 19:58:10 +0000</pubDate><link>https://blog.nns.ee/2021/04/01/modem-blog</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=46049981</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46049981</guid></item><item><title><![CDATA[New comment by xx_ns in "Why Castrol Honda Superbike crashes on (most) modern systems"]]></title><description><![CDATA[
<p>Apologies, that's what I meant to say. I blame that on my lack of coffee today, my bad.</p>
]]></description><pubDate>Mon, 17 Nov 2025 11:45:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=45952783</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45952783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45952783</guid></item><item><title><![CDATA[New comment by xx_ns in "Why Castrol Honda Superbike crashes on (most) modern systems"]]></title><description><![CDATA[
<p>The author linked to the repo and the code is at <a href="https://github.com/seritools/castrol-honda-dinput-fix/blob/main/src/lib.rs" rel="nofollow">https://github.com/seritools/castrol-honda-dinput-fix/blob/m...</a><p>Seems pretty straightforward. They hook DirectInputCreateA() and pass their own device enumeration wrapper with the offending flag removed.</p>
]]></description><pubDate>Mon, 17 Nov 2025 11:25:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=45952673</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45952673</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45952673</guid></item><item><title><![CDATA[New comment by xx_ns in "Why Castrol Honda Superbike crashes on (most) modern systems"]]></title><description><![CDATA[
<p>I appreciated the footnote on filesize optimization as someone who's constantly trying to compulsively generate the smallest binaries possible.<p>Interesting article, thank you.</p>
]]></description><pubDate>Mon, 17 Nov 2025 10:16:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=45952314</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45952314</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45952314</guid></item><item><title><![CDATA[New comment by xx_ns in "A new Google model is nearly perfect on automated handwriting recognition"]]></title><description><![CDATA[
<p>Am I missing something here? Colonial merchant ledgers and 18th-century accounting practices have been extensively digitized and discussed in academic literature. The model has almost certainly seen examples where these calculations are broken down or explained. It could be interpolating from similar training examples rather than "reasoning."</p>
]]></description><pubDate>Fri, 14 Nov 2025 23:47:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=45933551</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45933551</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45933551</guid></item><item><title><![CDATA[New comment by xx_ns in "Hack Club: A story in three acts (a.k.a., the shit sandwich)"]]></title><description><![CDATA[
<p>Their other blog post[1] shares some more information which seems like it's relevant.<p>From the post:<p>> then i found this one:<p>> <a href="https://juice.hackclub.com/api/get-roommate-data?email=dont@kys.llc" rel="nofollow">https://juice.hackclub.com/api/get-roommate-data?email=dont@...</a><p>> yep. no auth. just an email parameter. and what did it return?<p>> full names. emails. phone numbers. flight receipts. all just by passing an email address in a URL.<p>> i reported it through their security bounty program, made a bug fix pr (because apparently that's how you get things done around here), and maybe made the slight mistake of sharing the vulnerable endpoint in that group chat - which less than 10 people saw, for what that's worth.<p>The author then proceeds:<p>> their security bounty program states minimum payouts for this kind of thing start around $150. but exposing passport numbers (which are classed as government documents) should bump it up significantly. apparently "responsible disclosure" means "don't tell anyone, even in a private chat" so they docked the entire payout.<p>I'm not sure why they're being seemingly sarcastic about responsible disclosure. Yes, responsible disclosure absolutely means that you disclose this to the vendor before disclosing it to anyone else. As someone who works as a penetration tester and security researcher (both at work and in my free time), in my opinion, there should be no confusion about what responsible disclosure is. You disclosing the vulnerability in public before the vendor has had the chance to fix or apparently even triage it is not "responsible disclosure" or a "slight mistake".<p>[1] - <a href="https://kys.llc/blog/oops-leaked-your-passport" rel="nofollow">https://kys.llc/blog/oops-leaked-your-passport</a></p>
]]></description><pubDate>Thu, 13 Nov 2025 15:16:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=45915865</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45915865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45915865</guid></item><item><title><![CDATA[Nimony v0.2 – early preview of Nim 3.0's compiler]]></title><description><![CDATA[
<p>Article URL: <a href="https://nim-lang.github.io/nimony-website/version0_2.html">https://nim-lang.github.io/nimony-website/version0_2.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45797984">https://news.ycombinator.com/item?id=45797984</a></p>
<p>Points: 8</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 03 Nov 2025 11:32:33 +0000</pubDate><link>https://nim-lang.github.io/nimony-website/version0_2.html</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45797984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45797984</guid></item><item><title><![CDATA[New comment by xx_ns in "Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files"]]></title><description><![CDATA[
<p>I pentest network devices (amongst other things) for a living, and the way these usually work is that they have dnsmasq running in the background and to accept user config values, templating is used to generate dnsmasq-specific configuration files which are then fed into dnsmasq. I cannot overstate how common this method is.<p>Some devices do this more securely than others. If you're able to inject newlines, it's highly likely that you can already achieve command execution by injecting directives. I wrote a bit about this technique here: <a href="https://blog.nns.ee/2025/07/24/dnsmasq-injection-trick/" rel="nofollow">https://blog.nns.ee/2025/07/24/dnsmasq-injection-trick/</a> (sorry for the self-plug). I think it's up to the device vendor to do this securely and not a concern for dnsmasq.<p>However, in this case, I feel like the concern is elsewhere and not the sole responsibility of the device vendors. Even if the vendor does templating securely, the vulnerable config options could still trigger the bug in dnsmasq itself and give some advantage to the attacker. Assuming the vulnerabilities themselves are legit, I'm finding it difficult to classify these issues as "bogus".</p>
]]></description><pubDate>Tue, 28 Oct 2025 09:34:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=45730806</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45730806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45730806</guid></item><item><title><![CDATA[New comment by xx_ns in "A 3D-Printed Business Card Embosser"]]></title><description><![CDATA[
<p>Not that I know of. We're a pretty tech-forward country, so it's hard to imagine anyone making physical carbon copies these days.</p>
]]></description><pubDate>Sat, 20 Sep 2025 21:27:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45317714</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45317714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45317714</guid></item><item><title><![CDATA[New comment by xx_ns in "A 3D-Printed Business Card Embosser"]]></title><description><![CDATA[
<p>I'm in Estonia, and my bank issues debit and credit cards that are definitely embossed.</p>
]]></description><pubDate>Sat, 20 Sep 2025 08:45:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=45311591</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45311591</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45311591</guid></item><item><title><![CDATA[New comment by xx_ns in "DuckDB NPM packages 1.3.3 and 1.29.2 compromised with malware"]]></title><description><![CDATA[
<p>It acted as a proxy for the real npm site, which was the one to send the request, intercepting the code when the user inserted it.</p>
]]></description><pubDate>Tue, 09 Sep 2025 13:49:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45181881</link><dc:creator>xx_ns</dc:creator><comments>https://news.ycombinator.com/item?id=45181881</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45181881</guid></item></channel></rss>