Hacker Newsnew | past | comments | ask | show | jobs | submit | yoloshii's commentslogin

You're probably right lol. It does have that connotation. I'll change it.


Was this AI-generated?


I’m curious why you’re asking this. Are you concerned the author didn’t review what was generated?

If (I’m speculating here) that’s the real question you wanted to ask, it’s perfectly okay to ask that.


I asked that because I suspected it was AI-generated, but didn't want to assume.


No worries - still curious why you would care if it’s AI generated?

Eg. Are you concerned about licensing?


Not being generated implies some intent behind what's and how's being written that you can read into. Being generated means it's just driven by random chance and the poster may or may not have cared to redact it, making attempts at interpretation futile.

This applies to code just as much as it does to prose.


Where it comes to AI generated output, that mostly depends on the input. If you prompt with specifics of what you want and go into detail, you are much more in control of the output.


But wouldn’t you just expect people to review the result?


I'd like to give them the benefit of the doubt, but prior experience tells me not to.


Here's a hint. Look at the number of commits on the repo.


But again, couldn’t you just ask?


Some, yes.


You're right that iptables rules execute in kernel space, not dedicated hardware. "Hardware kill switch" in VPN contexts typically means the protection is implemented at the network appliance level (router) rather than a software client on each device. The distinction matters because a) client-side kill switch: App crashes → traffic leaks until you notice, and b) router-level kill switch :Default DROP policy persists regardless of client state. Also, the project is for non-techies and vibe coders, so simple explanations help. For their agents, there's the juice in other docs.


But this isn't a simple explanation, it's just... wrong? Could you share where else it's referred to as such.


I mean if you want to be anal about it, its just semantics, right? You know, how something is one way relative to something else, but relative to the other thing its not. Certainly not something to get bothered about.


I've not seen it called this before. I'd say something like 'fail-safe' instead.


No, it does not. Please stop responding with AI slop. A hardware kill switch always means a hardware (i.e. physical) mechanism. ALWAYS.

You might have something interesting here, but arguing this point is burying anything else of value you might have. Just take the feedback and remove it.


Its done, but too late to edit the title of this submission. One of the unfortunate things about churning out AI slop is that the AI doesn't always catch all of its turds in one go.


The human in the loop should be acting as an editor of the slop before it gets posted.


Some humans also put out slop.


That's where VPN obfuscation is the play, imo. A lot of people nowadays are leaving streaming platforms or watch YT on smart TVs, so it does have a place. You can always exclude a device from the VPN coverage too.


Obfuscation only protects you from your own ISP messing with VPN connections. Streaming services (etc.) can't see what protocol you're using between yourself and the VPN in any case, they just see the VPN's exit IP address. Which is likely on their list of known VPN IPs.


If you start countering geolocation blocking with vps rental and VLESS vray etc then its still good to obfuscate at the endpoint. Passing VPN traffic off as something else is good policy wherever your tunnel goes.


It prompts the user's agent to audit their network devices and topology first, and research online if it gets stuck. The configs need to be agnostic and contain placeholders. The whole idea is that the agent helps the user vibe code this, which is very doable, and probably the norm when there are so many people looking for solutions like this given the current climate. And netns is for single-host isolation. This is a router forwarding LAN→WAN. Different problem.


> And netns is for single-host isolation. This is a router forwarding LAN→WAN. Different problem

Not at all. Put the LAN interface in a network namespace that is different to the host (ip link set ... netns ...).

This gives you your "kill switch" without even needing firewall rules, it happens on a lower level.


In this setup the "kill switch" works in tandem with the VPN server failover logic. Maybe a netns would be good for redundancy.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: