Hacker Newsnew | past | comments | ask | show | jobs | submit | captn3m0's commentslogin

You should split your controller - it is running in both the control and data planes. Idea is good though, wish you luck.

Thank you! Not really, the controller is not doing dataplane per-say, it only pushes eBPF programs to the kernel for the relevant apps/cgroups so that could be considered control-plane. The full data-plane run in eBPF.

Aiui the controller is only running in the control plane, and the ebpf programs are in the data plane?

yes, that's right!

Does anyone know what is the "iCloud security code" mentioned? Is it just the 6 digit code that Apple sends to verify iCloud access?

> Is it just the 6 digit code that Apple sends to verify iCloud access?

No. It is unrelated to Apple ID 2FA.

If its what I'm thinking of, it used to be a user-visible thing[1] back in the day.

But now with the need for increased security posture in the modern environment it is now not user visible but held locally and encrypted using the local device secure enclave key. So you would typically now see a prompt for the device password so the enclave can be accessed to access the key to setup/renew iCloud access tokens.

As far as I am aware the only user-visible string still available in the Apple world is (for obvious reasons) the FileVault recovery key on macOS devices. Which is only visible once ... shown to you when you first enable FileVault.

[1] https://support.apple.com/en-us/101265


If its what I'm thinking of, it used to be a user-visible thing[1] back in the day.

It used to be user-visible, yes, but I wonder if TFA isn’t a little out-of-date, as the UI flow that used to work in order to see this (settings/icloud/keychain/advanced) isn’t there anymore on Mac or iOS. And random poking around indicates that they didn’t move it.

When one would be prompted to create a new code, the dialog said something about “changes to the servers” or something similar. Now, having read TFA, I wonder if that doesn’t mean an HSM got compromised somehow.


> I wonder if that doesn’t mean an HSM got compromised somehow.

I think the point is there are multiple HSMs in multiple locations under the control of different groups of people and a majority of HSMs have to agree...


First time I enabled iCloud keychain when it was released in iOS 7, it asked for both user defined security code (4-pin at the time) and a verification phone number.

When you switch to a new device and want to pull iCloud keychain to a new device you need to provide your security code (pin) and additionally a verification code that they send to the phone number.

Nowdays I’m not sure what my security code even is, because it stopped asking for it on a new devices, since you can approve pulling iCloud keychain from another device.


I think it's longer then 6 digits. Long ago I did this and I remember it being a long code with dashes.

> long code with dashes

That sounds more like the FileVault recovery key ?


May have been, but I thought it was recovery key for lost iPhone pass code.

Took me 5 minutes to find more: https://github.com/tanaylab/Mendelson_et_al_2023/blob/9c5a65... (Uses Date of Birth column).

And some information on how they were distributing it to researchers: https://github.com/broadinstitute/ml4h/blob/master/ingest/uk...

> The following steps require the ukbunpack and ukbconv utilities from the UK Biobank website. The file decrypt_all.sh will run through the following steps on one of the on-prem servers.

> Once the data is downloaded, it needs to be "ukbunpacked" which decrypts it, and then converts it to a file format of choice. Both ukbunpack and ukbconv are available from the UK Biobank's website. The decryption has to happen on a linux system if you download the linux tools, e.g. the Broad's on-prem servers. Note that you need plenty of space to decrypt/unpack, and the programs may fail silently if disk space runs out during the middle.

https://biobank.ctsu.ox.ac.uk/crystal/download.cgi


Good catch! The data is everywhere, re-uploaded every week.

I am aware of ~30 repositories that UK Biobank has asked GitHub to delete, and can still be found elsewhere online. They know the site, they have managed to delete data from that site before, and yet the files are still there.


I don't think either of those links contain actual PII (or anonymised PII).

(The first is a GitHub repo for https://www.weizmann.ac.il/math/tanay/home )


These are all made up and likely hallucinated.

It seems you're correct - the post has been modified.

> This entry was updated on April 21 to correct the incident timeline and scope characterization based on post-publication reporting from Context.ai's security bulletin.

> Key corrections: the initial compromise occurred in February 2026 (not June 2024), the initial access vector was Lumma Stealer malware (not an unknown mechanism), the dwell time was approximately two months (not 22 months),


Link to the API Client is incorrect at the bottom: https://github.com/nhl-stats-api-client instead of https://github.com/liahimratman/nhl-api-client

Thanks, fixed!

https://platform.claude.com/docs/en/about-claude/model-depre...

Retirement date for Opus 4.6 is marked as "Not sooner than February 5, 2027"


Firefox on iOS still doesn't support extensions or adblocking - something Safari (and other browsers as well) do.

Firefox on iOS isn't really a Firefox because Apple doesn't allow alternative browsers. It's a Safari skin.

Orion on iOS is also a Safari skin and supports extensions

And Brave on iOS has blocking built in to the browser itself instead of like Firefox on Android where you have to trust a 3rd party dev.

To be quite clear, I trust gorhill more than I trust mozilla.

LMFAO. Brave uses uBO's lists and filters, including trusted filters which have much more capabilities with much more risks to your sites' data and they allow that on all other lists too (even uBO only allows their own lists as trusted by default, other lists need to have permissions from users manually). That's how they can block youtube ads, and no they don't code their own filters for youtube ads either. And be assure that they can't check 100% all commits from uBO and other lists either.

If you want to play "no trust to a 3rd party dev", you should not use Brave's adblocker either. Or at least turn off all the lists inside it, and use your own lists. Your security risk is in those stock lists.


Mollie itself is hosted on GCP: https://cloud.google.com/customers/mollie

Also, TFA says:

> If you have used Stripe before, Mollie is the closest thing to that experience in the EU.

But Mollie does not even properly support recurring payments, a pretty important feature for SaaS. It does not track subscription state and does not retry failed payments.


This is actually important to understand. What are the dependencies of your dependencies? I.e. if your goal is to be sovereign than knowing how far the turtles go, and who the turtles are, is quite important.

Aside: Loved your bit talking about money and varnish in Gift Community[1]. And thanks for the Beerware License, I've started using it!

[1]: https://www.youtube.com/watch?v=tOn-L3tGKw0


This is helpful, but it is yet to be seen how downstream picks it up. Wikidata[0] has renamed it and marked the Vinyl repo as the preferred one. Gentoo[1] renamed the package and switched to Vinyl. Homebrew[2] is now tracking Varnish Software (downstream of Vinyl). Fedora[3] has switched to Varnish Software as well. At endoflife.date[5], we renamed to vinyl and switched tracking as well. Wikipedia[6] has renamed Varnish (Software) -> Vinyl Cache.

[0]: https://www.wikidata.org/wiki/Q1602447

[1]: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=679937b...

[2]: https://github.com/Homebrew/homebrew-core/pull/273280

[3]: https://src.fedoraproject.org/rpms/varnish/c/59f403810b746e0...

[4]: https://repology.org/project/varnish/packages

[5]: https://github.com/endoflife-date/endoflife.date/pull/9792

[6]: https://en.wikipedia.org/wiki/Vinyl_Cache


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: