Hacker Newsnew | past | comments | ask | show | jobs | submit | xx_ns's commentslogin

Usable enough to run a Linux DE on it! I did so on my blog: https://nns.ee/kindle

At least it's still right in spite of being down.


Good question! I wasn't too concerned about this, because the only way you could even interact with the OS where the server was running was via HTTP requests, which are fairly limited in nature. The OS or kernel itself wasn't directly exposed per se.


ISTR Linux has had RCEs in IPv6 related stuff in recent years.

https://security-tracker.debian.org/tracker/CVE-2023-6200


Just a little play on the recent HN post: https://news.ycombinator.com/item?id=46016902

Project that I did a few years ago. You might also be interested in the retrospective where I detail what all went wrong: https://blog.nns.ee/2025/04/01/modem-blog-retrospective/


The author linked to the repo and the code is at https://github.com/seritools/castrol-honda-dinput-fix/blob/m...

Seems pretty straightforward. They hook DirectInputCreateA() and pass their own device enumeration wrapper with the offending flag removed.


The flag DIDEVTYPE_JOYSTICK was added by this fix not removed.

The idea is, rather than handle up to 8 devices, otherwise UB and usually crash, handle up to 8 "joysticks" and disregard any beyond that.


I'd just use WineD3D in this case; I'm sure there's dinput.dll too ported to Wine for Windows.


Apologies, that's what I meant to say. I blame that on my lack of coffee today, my bad.


I appreciated the footnote on filesize optimization as someone who's constantly trying to compulsively generate the smallest binaries possible.

Interesting article, thank you.


Am I missing something here? Colonial merchant ledgers and 18th-century accounting practices have been extensively digitized and discussed in academic literature. The model has almost certainly seen examples where these calculations are broken down or explained. It could be interpolating from similar training examples rather than "reasoning."


The author claims that they tried to avoid that: "[. . .] we had to choose them carefully and experiment to ensure that these documents were not already in the LLM training data (full disclosure: we can’t know for sure, but we took every reasonable precaution)."


Even if that specific document wasn't in the training data, there could be many similar documents from others at the time.


Their other blog post[1] shares some more information which seems like it's relevant.

From the post:

> then i found this one:

> https://juice.hackclub.com/api/get-roommate-data?email=dont@...

> yep. no auth. just an email parameter. and what did it return?

> full names. emails. phone numbers. flight receipts. all just by passing an email address in a URL.

> i reported it through their security bounty program, made a bug fix pr (because apparently that's how you get things done around here), and maybe made the slight mistake of sharing the vulnerable endpoint in that group chat - which less than 10 people saw, for what that's worth.

The author then proceeds:

> their security bounty program states minimum payouts for this kind of thing start around $150. but exposing passport numbers (which are classed as government documents) should bump it up significantly. apparently "responsible disclosure" means "don't tell anyone, even in a private chat" so they docked the entire payout.

I'm not sure why they're being seemingly sarcastic about responsible disclosure. Yes, responsible disclosure absolutely means that you disclose this to the vendor before disclosing it to anyone else. As someone who works as a penetration tester and security researcher (both at work and in my free time), in my opinion, there should be no confusion about what responsible disclosure is. You disclosing the vulnerability in public before the vendor has had the chance to fix or apparently even triage it is not "responsible disclosure" or a "slight mistake".

[1] - https://kys.llc/blog/oops-leaked-your-passport


I pentest network devices (amongst other things) for a living, and the way these usually work is that they have dnsmasq running in the background and to accept user config values, templating is used to generate dnsmasq-specific configuration files which are then fed into dnsmasq. I cannot overstate how common this method is.

Some devices do this more securely than others. If you're able to inject newlines, it's highly likely that you can already achieve command execution by injecting directives. I wrote a bit about this technique here: https://blog.nns.ee/2025/07/24/dnsmasq-injection-trick/ (sorry for the self-plug). I think it's up to the device vendor to do this securely and not a concern for dnsmasq.

However, in this case, I feel like the concern is elsewhere and not the sole responsibility of the device vendors. Even if the vendor does templating securely, the vulnerable config options could still trigger the bug in dnsmasq itself and give some advantage to the attacker. Assuming the vulnerabilities themselves are legit, I'm finding it difficult to classify these issues as "bogus".


Kubernetes do that as well


I'm in Estonia, and my bank issues debit and credit cards that are definitely embossed.


unrelated, but that's almost surprising. austrian banks stopped issuing embossed cards years ago. is anyone in estonia still using that feature?


Not that I know of. We're a pretty tech-forward country, so it's hard to imagine anyone making physical carbon copies these days.


exactly, that's what i thought. must be one of those: it was always done that way, or maybe just, the banks bought machines to print the cards from the US or where they still do that (do they actually?) or simply those machines were cheaper, or who cares, its not like there is a downside to embossing the numbers. it could also be estonians who fled to the US in the previous century returning and bringing back their idea of how it should be done.

i was visiting the baltics in the early 90s and i head that people were desperate to get anything from the west after being cut of for so long.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: