Hacker Newsnew | past | comments | ask | show | jobs | submit | spr-alex's commentslogin

Thanks for the post!


we've happily running on routers on the pi5/cm5 since last year (https://www.supernetworks.org) and openwrt support is there as well.


We're adding support to gvisor for container plugins, it's a reasonable approach for limiting the rich attack surface on linux


Who is "we"? What are "container plugins"?


on a related note the search space for https://www.qdayprize.org/curves seems far too small to be a meaningful contest and the rules dont seem to address how they judge the validity of the "quantumness" when sifting such small groups.


there's been advances, at least for RSA work from håstad, ekerå, gidney has brought this to O(N) qubits, on the runtime the papers are a little bit harder to read as they differ in notation but O(log(N)^3) runtime is what i recall. its possible i am wrong on the runtime and its O(log(N)^2)


blog author mentioned in the article here, previously submitted to hn at https://news.ycombinator.com/item?id=44497622

blog post here, https://www.supernetworks.org/pages/blog/agentic-insecurity-...


bitchat has a trivial MITM flaw with the favorite's identity system. i wrote up my thoughts around vibe coding cryptographic security and rolling a new protocol


Are there any tell-tale signs of vibecoding in the code base? Or are we at the point where we're using it as a pejorative for bad code?


i am not using it as a pejorative here, I am pretty sure that is the case for this code base, as every block has a comment describing the code that immediately follows

also i do not doubt jack's cryptography and encryption understanding, so this particular MitM flaw is almost certainly not what human steering would put together. x25519 APIs makes it both easy and simple to do identity persistence correctly, the code simply doesn't use the identity key cryptographically.


Very good


I made a CTF challenge 3 years ago that proves why local devices are not so protected. exploitv99 bypasses PNA with timing as the other commentor points out.

https://github.com/adc/ctf-midnightsun2022quals-writeups/tre...


The existing PNA is easily defeated for bugs that can be triggered with standard cross origin requests. For example PNA does nothing to stop a website from exploiting some EOL devices I have with POST requests and img tags.

This is a much better approach.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: