<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: yup_sto</title><link>https://news.ycombinator.com/user?id=yup_sto</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 00:20:16 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=yup_sto" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by yup_sto in "Certificate Authorities and the Fragility of Internet Safety"]]></title><description><![CDATA[
<p>You're likely right here, combining two trust systems does add complexity without solving the core problem. While browsers requiring CT was a great step forward, it's surprisingly under-utilized by orgs. I wonder if this is due to limited tooling for log interaction, or just general lack of awareness?</p>
]]></description><pubDate>Thu, 05 Dec 2024 04:48:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=42325067</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=42325067</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42325067</guid></item><item><title><![CDATA[New comment by yup_sto in "Certificate Authorities and the Fragility of Internet Safety"]]></title><description><![CDATA[
<p>I know this is an oversimplification, but if the main issue is the single point of failure (centralized trust), wouldn’t a potential solution be to layer independent verification mechanisms on top of the current system?<p>For example, a secondary DNS-based verification layer where a site’s public key is published as a DNS record (though that would likely need DNSSEC to be effective). It seems like it could complement the existing CA structure without replacing it entirely.</p>
]]></description><pubDate>Thu, 05 Dec 2024 03:45:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=42324750</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=42324750</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42324750</guid></item><item><title><![CDATA[New comment by yup_sto in "IMG_0001"]]></title><description><![CDATA[
<p>Baader-Meinhof strikes again - checked this out in the morning and just caught your Citibike tweet. You're on a roll today!</p>
]]></description><pubDate>Wed, 04 Dec 2024 21:36:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42322291</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=42322291</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42322291</guid></item><item><title><![CDATA[New comment by yup_sto in "Enumerate all the subdomains for a domain name"]]></title><description><![CDATA[
<p>Ahhhh, that tracks, cheers mate.</p>
]]></description><pubDate>Sun, 08 Sep 2024 07:53:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=41478883</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=41478883</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41478883</guid></item><item><title><![CDATA[New comment by yup_sto in "Enumerate all the subdomains for a domain name"]]></title><description><![CDATA[
<p>Exhaustive/Robust is the way for sure.<p>Minimizing storage was a priority for me since it's just a small side-project/automation.<p>I've looked for information on what the hell the `flowers-to-the-world` entries are that pop and have found nothing, curious what's going on there.</p>
]]></description><pubDate>Sun, 08 Sep 2024 07:35:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=41478812</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=41478812</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41478812</guid></item><item><title><![CDATA[New comment by yup_sto in "Enumerate all the subdomains for a domain name"]]></title><description><![CDATA[
<p>I also noticed you are ingesting/storing flowers-to-the-world.com certs, not sure what stage of optimization you are at but blacklisting/ignoring these certs in my ingestion pipeline helped with avoiding storing unnecessary data<p>I'm not sure but I believe that's used by Google internally for testing purposes.<p>For example if you search google, it returns 120k+ results, and these useless results are at the front.</p>
]]></description><pubDate>Sun, 08 Sep 2024 07:11:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=41478741</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=41478741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41478741</guid></item><item><title><![CDATA[New comment by yup_sto in "Enumerate all the subdomains for a domain name"]]></title><description><![CDATA[
<p>Awesome, I will keep my eye on this for sure, I've spent the past few months tinkering with ingesting CT logs for bug bounty automation.<p>Curious if you're running your own CertStream server, or just continuously polling known CT logs with your own implementation.</p>
]]></description><pubDate>Sun, 08 Sep 2024 06:51:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=41478660</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=41478660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41478660</guid></item><item><title><![CDATA[New comment by yup_sto in "Enumerate all the subdomains for a domain name"]]></title><description><![CDATA[
<p>Have you considered adding a monitoring feature where a user can enter a domain to be monitored and then be notified if a "similar" domain comes across the ingestion pipeline.<p>This would be useful for early detection of potential impersonations/typo-squatting domains typically used for phishing/scams.<p>Something as simple as a configurable levenshtein distance/jaro-winkler similarity check across CN and SAN of all new certs maybe? (user can configure with threshold to control how "noisy" they want their feed).</p>
]]></description><pubDate>Sun, 08 Sep 2024 04:44:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=41478255</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=41478255</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41478255</guid></item><item><title><![CDATA[New comment by yup_sto in "Enumerate all the subdomains for a domain name"]]></title><description><![CDATA[
<p>I'd imagine it's a combination of<p>- CT log monitoring (<a href="https://github.com/CaliDog/CertStream-Server">https://github.com/CaliDog/CertStream-Server</a>)<p>- Mass-Scanning across ipv4 on 80/443 at the least?<p>- Brute-forcing subdomains on wildcards with large DNS wordlist (like something from assetnote: <a href="https://wordlists-cdn.assetnote.io/data/manual/best-dns-wordlist.txt" rel="nofollow">https://wordlists-cdn.assetnote.io/data/manual/best-dns-word...</a>)<p>- Scraping/extracting subdomains/domains from JS<p>But I've never attempted to enumerate subdomains on this scale before, so I could be missing something obvious</p>
]]></description><pubDate>Sun, 08 Sep 2024 04:26:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=41478199</link><dc:creator>yup_sto</dc:creator><comments>https://news.ycombinator.com/item?id=41478199</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41478199</guid></item></channel></rss>