Hacker Newsnew | past | comments | ask | show | jobs | submit | allset_'s commentslogin

No.


DNS literally would not work if they did that.


I can only comment about the one I work for, but yes. It's also discussed publicly to some degree.

https://cloud.google.com/blog/products/storage-data-transfer...



Any examples of Cloudflare client websites that have enabled ECH


China blocks ECH.


do you have a reliable source for this claim?


China's use of SNI-based censorship is well-documented

For example, see

https://censorbib.nymity.ch/pdf/Niere2025a.pdf


China has blocked ESNI

https://gfw.report/blog/gfw_esni_blocking/en/

But SNI is not CH and ESNI is not ECH

Will China block ECH

ECH blocking has been detected in Russia

https://github.com/net4people/bbs/issues/417

According to Niere et al. (2025)

"Additionally, with the ECH extension not yet being widely used [17], [71] and focusing on privacy protection rather than censorship circumvention [60], it can be censored easily by blocking it entirely [14], [76]."

The paper describes various GFW bypass methods that currently work, including removing the SNI extension entirely

It does not mention anyone using ECH to bypass GFW

Perhaps it is too early to conclude "China blocks ECH" because ECH is not in widespread use


Yes, but SNI is not ECH.


> AFAIK the proprietary server can glean your IP, your phone number, who you talk to, and when you talk to them. This type of metadata is valuable information.

To the best of my knowledge, so can matrix.org or whatever servers you connect and federate to. This is required to route messages between users. What is your point?


OK now do a small hatchback.


No.


And every tutorial you could find on how to use PHP with a database was a tutorial on how to add SQL injection to your site.


That was the bigger problem, IMO, in that even once PDO existed and the MySQL extension was "fixed" to have prepared statements, so much of the documentation still did it wrong.

And yet similar classes of bugs still pops up today, even with what I would've assumed to be safe defaults? I'm guessing its non-standard databases or DB clients or something?

This case is more just a pure lack of sanitisation, but it's fascinating to see in 2025 still :)


The underlying library that does most of the work is MIT.

https://github.com/landlock-lsm/go-landlock


Which you should absolutely do when the company storing your seed phrase gets hacked.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: