Hacker Newsnew | past | comments | ask | show | jobs | submit | Thaxll's commentslogin

Well Trump said it: "why it is we only take people from s**hole countries," and "why can't we have some people from Norway, Sweden, just a few? Let's have a few from Denmark."

Probably because people from Norway and Sweden aren't interested in moving to a sh...less-developed country.

I guess Denmark is going to be out of the question now.

People from Denmark, Norway, Sweden are smart enough not to come to Trump's America, that'd be the reason, if you're still wondering.

[flagged]


No, it's not. Come visit whenever you want to see :)

Highly unlikely that PSN runs Gentoo. They're using AWS.

I've no idea if Sony uses Gentoo or not, but you can definitely run Gentoo on AWS

Not PSN. Sony's Cloud Gaming service. Where they stream an entire PlayStation console to you

OP's statement matches my understanding; parts were gentoo-based at one point.

Ho no, XML.

Did you rely on the Google go tpm lib for that?

Yes, we use github.com/google/go-tpm/tpm2

TPM is really badly implemented. When you upgrade your firmware, OS, everything can go south.

Just upgrading your firmware with bitlocker enabled can brick your PC.


Windows uses full disk encryption with keys from the TPM by default.

Nobody says "disable disk encryption right away incase the tom forgets the keys". The vast majority of TPM's manage to not forget the keys.


They may not say "turn off bitlocker", but people definitely recommend backing up the recovery keys, and windows allows you to back up the key to microsoft because they know people won't actually back them up. Not sure if that happens by default, but they provide a variety of options for the recovery keys because there is definitely a non-zero chance you need them. There were several stories of this happening with the windows 10->11 upgrade push, where people were auto-updated and then scrambling to decrypt their hard drives.

If windows is encrypted with keys from the TPM anyways, then tailscale doesn't need to encrypt a second time.

Windows also bit me in the ass with this feature, but tailscale not enabling encryption wouldn't have helped one iota.


Local software could be stealing plaintext secrets from your encrypted disk. Physical access is not the only attack vector.

The only way to protect against that is if a secure application boundary is enforced by the operating system. You can make it harder for other programs to uncover secrets by encrypting them, but any other application can reverse the encryption. I don't believe using the tpm meaningfully changes that situation.

I'm curious. If the motherboard with the TPM dies, you're basically locked out of your data right? Keys backed up on MS server or not.

No, the backed up keys (MS server, file, printed) give you full access, they contain the full encryption key.

I suspect that they do not actually contain the encryption key. It is more convenient if the disk encryption key is stored on the disk, but separately encrypted. You actually want to store the key multiple times, one for each unlock method. If the disk can be unlocked with a password, then you store the key encrypted using the password (or encrypted using the output of a key derivation function run on the typed password). If it can be unlocked with a smartcard, then you store a copy that is encrypted using a key stored in the card. When Bitlocker uses the TPM, it no doubt asks the TPM to encrypt the key and then stores that on the disk. To decrypt the disk it can ask the TPM to decrypt the stored key, which will only succeed if the TPM is in the same state that it was in when the key was encrypted.

The reason it's done this way is to allow multiple methods of accessing the disk, to allow the encryption password to be changed without having to rewrite every single sector of the disk, etc, etc. You can even “erase” the disk in one swift operation by simply erasing all copies of the key.


That is also required for any kind of key rotation to work, you're getting new key for a key, because alternative of using key directly would mean re-encrypting the whole drive when it changes and of course only having single one instead of multiple

So if you’re using the TPM based encryption you’d better have a working backup system.

How many home users have that? How many stories of personal data loss are we going to hear as windows 11 ready PCs start to die?


Working backups are important regardless, but if you use a TPM then you’d better have your recovery keys somewhere convenient. I’m sure you can print them out and keep them in your wallet or something.

don't worry, ms pushes users to just put data on onedrive, they will start losing data far before machines actually die. We already had plenty of stories of that mess.

https://boingboing.net/2026/01/05/everyone-hates-onedrive-mi...


> TPM is really badly implemented. When you upgrade your firmware, OS, everything can go south.

Could you elaborate ? Firmware/OS should not affect TPM contents ? Otherwise e.g. TPM-reliant Windows installs would break ?

In addition there are cloud scenarios where your VM has a TPM and you want to e.g .stop a malicious actor poaching your VM and running it elsewhere.

Having the tailscale TPM tied to your cloud hypervisor prevents the "lift and shift" attack.


Everytime I have to upgrade my MB firmware it breaks bitlocker and I have to either use restoring keys from microsoft website or disable bitlocker encryption before the upgrade.

https://www.reddit.com/r/MSI_Gaming/comments/15w8wgj/psa_tpm...


You cant reliably store secrets in tpm and expect it to work after an os update. Windows is using workarounds during windows update to avoid breaking bitlocker.

https://learn.microsoft.com/en-us/windows/security/hardware-...


You are correct. Updating the firmware or the OS does not actually erase the TPM. What is really going on is that the TPM register holds a value that is like a hash. Each time you measure the system state you update the register with a hash of the previous value and the measurement. When you ask the TPM to hold a key you specify which register value is used to encrypt the key. Later when you use the key it will fail if the TPM cannot decrypt the key. This can only happen if the TPM register has the wrong value, which can only happen if someone has tampered with the system. But voluntarily upgrading the BIOS or the OS looks exactly like tampering.

The correct procedure is to unlock the keys, copy them out of the TPM, perform the upgrade, reboot to remeasure the system state, then finally store the keys back into the TPM.


Wouldn't you want TPM to brick the machine if the firmware was modified? If something or someone modified your firmware, do you want the TPM key to remain intact? Its something you need to be aware of when upgrading firmware, disable encryption that relies on TPM or make a backup copy of the key.

BGP is so unsecure that almost anyone can create chaos.

Even by accident!

or even by normal load from someone deciding to split a /8 prefix into /24's

>or even by normal load from someone deciding to split a /8 prefix into /24's

If that kind of happening directly from load of added 25 routes it's quite hard to believe it.

  # 10/8 prefix here only to show how to get number of new routes added.

  $ sipcalc -n 24 10.0.0.0/8 | grep -c Network   
  25
  $
BGP peering routing policies have then been for the good reason constructed in way that they expect advertisements "exact accept" with a prefix-list with that /8 prefix, because that's is expected when peering is agreed even when not explicitly stated by many. This expected best practice following goal to manage and prevent internet routing table being filled with superfluous routes.

But anyway, sudden change from /8 to 25 x /24 without first noticing your peers and giving them time to change that "exact accept;" to "orlonger accept;" is quite sure footgun if you don't know common principles of network management. But usually that kind of screwup blast radius is local mostly local only to that /8 prefix.

Not sure though how that could be technically avoided in BGP protocol or router control-plane (router OS config) design. Policy filters and best practices how to use them have been set for good reason. Not just to irritate and make things harder than they need to be. We certainly did not do that while I was still working.

Right, something else what could happen with that kind of sudden change is. If that peered had also other peers which had instead "orlonger" in place traffic would then switch to that, what could have some side effects like saturated links, slowness or even increased costs. Too bad, and may happen. But principle is that communicate your routing changes in good time before you actually make the changes. That will prevent most of this kind of problems ever happening to you.


Oh, my bad. How didn't I notice my mistake right away. That 25 is grossly wrong, I should have checked before using that. The correct line to get subnets is

  $ sipcalc -s 24 10.0.0.0/8 | grep -c Network
  65536
Which increases significantly global routing table size of course. I apologise my mistake on that matter that I should have noticed before posting.

Anything else I wrote about changing prefix advertisement is correct. You should and need to communicate your advertisement changes in good time to your peers and let them time to make changes.


Most BGP peers have router filters in place. It's not 1996 anymore. I remember the days of logging into a Cisco connected to a Sprint T1 and seeing a coworker had fat fingered a spammer's route, sending it to null0. Oops. How did that happen?

Also RPKI has been available long time already.

Considering the routing table size has been increasing and IPv6 need anyone shouldn't be running global routing with gear not supporting RPKI any more, the routing polices and announcing those RIR they operate.

https://en.wikipedia.org/wiki/Resource_Public_Key_Infrastruc...


Many v4 prefixes in the ARIN region are legacy and don't support RPKI unless you sign the registration agreement. I have a legacy prefix and may eventually be forced to sign up.

I worked as a contractor for a IoT gig that sold sim cards services for buses, trains et cetera.

The radio towers we used to access to obtain the accounting data (CDRs) all had the same very weak password.


It already exists.

"Impossible to Cheat"

Let me tell you that there is cheating in cloud rendering solution ( Stadia, AWS Luna ect ... )

So 100% there is cheating in your solution.

It's trivial to read the screen.


You're right

Especially with today's computer vision

The cheating I'm more protected (just as stadia, etc..) is regarded to client/code exploitation

which we don't have to worry about in this approach


In many code base you have custom errors that implement the error interface ( for http code and the like ), it's very common.

Looks very similar to what Upspin ( Go ) errors look like:

https://github.com/upspin/upspin/blob/master/errors/errors.g...

    type Error struct {
        // Path is the Upspin path name of the item being accessed.
        Path upspin.PathName
        // User is the Upspin name of the user attempting the operation.
        User upspin.UserName
        // Op is the operation being performed, usually the name of the method
        // being invoked (Get, Put, etc.). It should not contain an at sign @.
        Op Op
        // Kind is the class of error, such as permission failure,
        // or "Other" if its class is unknown or irrelevant.
        Kind Kind
        // The underlying error that triggered this one, if any.
        Err error

        // Stack information; used only when the 'debug' build tag is set.
        stack
    }

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: