Hacker Newsnew | past | comments | ask | show | jobs | submit | farnulfo's commentslogin

Is there a common pattern for "Is language X faster than language Y" ? Like what is your definition of faster : faster to developer, to start, to execute, to handle different workload with the same binaries (like JIT).


Yes. "Is language X faster than language Y?" means "Is language X better than language Y?", which means "Do you like language X more than you like language Y?", which means "Do you have more experience with language X than language Y?" (well, good experiences, I guess).

So "Is language X faster than language Y?" is totally answerable, but the answer depends on the answerer.


For java, Johannes Bechberger has made a lot of articles about writing eBPF in java : https://mostlynerdless.de/blog/2023/12/31/hello-ebpf-develop... https://mostlynerdless.de/blog/category/computer-science/ebp...


I missed these last year. Finding them now is truly very useful in my work.


eBPF TLS tracing: The Past, Present and Future https://blog.px.dev/ebpf-tls-tracing-past-present-future/


Author here :). Happy to answer any questions on this TLS tracing stuff.


Chrome's console : Refused to frame 'https://player.vimeo.com/' because it violates the following Content Security Policy directive: "frame-src 'self'".


Until the CSP is fixed, you can view it here: https://player.vimeo.com/video/116207678


that chrome - erm - chrome is such a throwback


It seems that with ebpf you can read data before TLS encryption : Debugging with eBPF Part 3: Tracing SSL/TLS connections https://blog.px.dev/ebpf-openssl-tracing/


That's handy, and you can almost certainly hook the TLS send/receive functions in other ways, like with Frida, but being able to bypass pinning instead means that the researcher can route the traffic through existing tools like Burp Suite or mitmproxy.

Routing real app traffic through an intercepting proxy can be a real time-saver depending on what the researcher is trying to do. E.g. if they want to automatically tamper with a parameter in a request that doesn't happen until after some kind of authentication/session setup, it's much faster to let the app do all of that and configure the proxy to just make the one change, versus having to write a whole client that does all of the initial steps and then makes the modified request, or writing an eBPF filter that makes the changes the researcher is interested in.


Side note: this wouldn't work with Rust programs that statically link to `rustls`, the most popular Rust TLS library.


The expert : seven perpendicular red lines https://youtu.be/BKorP55Aqvg?si=dzXY9hRaVkoU3p7z



To read with the recent https://cpu.land/


« WPA2 provides strong encryption for data frames (as long as you choose a good password). However, “management” frames, like deauthentication frames (which tell clients to disconnect) are not encrypted. 802.11w and WPA3 support encrypted management frames, but the Google Home Mini doesn’t support either of these. »


Another article about eBPF and TLS : "Debugging with eBPF Part 3: Tracing SSL/TLS connections" https://blog.px.dev/ebpf-openssl-tracing


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: