Hacker Newsnew | past | comments | ask | show | jobs | submit | viralpoetry's commentslogin

This was actually solved by another address protocol version. I believe v3 solved this by using pubkey instead of hash. Similar to late btc addresses


I have tried to build one out of the PocketBook Basic Touch e-reader last October. It has way less functionality tought...

https://www.malgregator.com/post/pocketframe/

https://hackaday.com/2023/11/13/obsolete-e-reader-gets-new-l...


> copying keys between HSMs inherently exposes the master keys anyway

that's not true, even with their BYOK you export the key from one HSM under a shared key and then import it to another device


https://www.malgregator.com/

I write mostly about the security and things I work on, to keep memories somewhere.

One of my posts about the google bug bounty for the Waze navigation bug went viral and was shared by Schneier, Threat Post and others https://www.malgregator.com/post/waze-how-i-tracked-your-mot...


The simplest I saw, install Standard Notes (https://standardnotes.com/ - open source, free) encrypted notes app, write something, then publish it via the interface. It will create you a blog on their https://listed.to/ webpage


Thanks for an interesting article and nice simple webpage


Fearing return to drachma, some Greeks use bitcoin to dodge capital controls https://www.reuters.com/article/uk-eurozone-greece-bitcoin/f...

WikiLeaks may have amassed more than $46 million in Bitcoin based on the number of coins held by its known wallet address. https://bitcoinist.com/wikileaks-has-received-more-than-46-m...


When I was university student (~ 2012), Woz was traveling Europe visiting Macdonald's (:D) in lots of countries including Slovakia. Shared it on the internet, probably Twitter.

One of my classmates tracked him and successfully asked for a photo with him. nice guy


A Hammer in Search of a Nail

Proof of Work require no secret information as an input and have to be easy to verify. But most importantly, why would anyone do this?

Passport issuer can act like certification authority, this is not a trustless system where PoW can be used for something. Public key infrastructure is a solved thing with it's own problems, but verification is not one of them if authority is working as it should.

EDIT: Let's not even mention that smartcards have effective lifetime and efficiency.


Hacking is not always about useful solutions. It’s about experiments that may work out or not work out.


What an ignorant I was. March last year (2019), I wrote an email to Lee Holloway asking him how he could bootstrap such a great company. Now I know why I haven’t received the answer.

EDIT: I found an email:

Dear Lee Holloway,

Excuse my curiosity, as an Engineer I am not writing this kind of emails a lot, but I have read the blog series by John Graham-Cumming about the company, and it would really help me if you can answer my question about the constant flow of engineering innovations from your company.

I am a security engineer from Europe and would like to know how is it possible, that security team will start producing such a stream of innovative things like Keyless SSL, CFSSL, SIDH implementation, Red October key management server and many more your company already published?

When the "lift and shift" from the open source or vendor stops and internal building start to happen within an organization? Is it a cultural thing where only a small startup can succeed and scale later? Is it about the budget or is it a cultural shift that is non forcible upon them? Is a prerequisite to the innovation, that almost everything is developed in house? That came to me as a contra productive strategy. I have read Skunk Works and other books, but I am still impressed how that happens regarding to the modern leading IT/infra companies.

Thank you for your time,

...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: