Hacker Newsnew | past | comments | ask | show | jobs | submit | hackernudes's commentslogin

RTA = restricted to adults

LPE = local privilege escalation

Too many darn acronyms. This one wasn't too hard to figure out from context but I wish people would define acronyms before using them!


LPE is a very well-known acronym within the security community, it's not purely academic or obscure or anything.

I agree that it would be a good idea to define it explicitly when writing for a broader audience, but I don't think it's particularly egregious that they didn't. It's certainly something I could see myself forgetting.

Then again, the whole writeup appears to be AI-generated, so...


It is nowhere near this. There are very few acronyms in the IT world that are actually well-known outside of it. LPE is less well-known than LVAD or MCU.

https://www.acronymfinder.com/Information-Technology/MCU.htm...

https://www.acronymfinder.com/LVAD.html

https://www.acronymfinder.com/Information-Technology/LPE.htm...


> LPE is less well-known than LVAD or MCU.

I knew what LPE stands for but not the others. (I've seen MCU mentioned and kinda had a vague feeling for what it is. Never even seen LVAD.)


Sure, but the target audience of copy.fail is surely not the security community but regular sysadmins who probably don't otherwise follow as closely.

I would absolutely expect a sysadmin in particular to know and understand the term and acronym.

It's still just courteous to define acronyms on first use, it doesn't take any real effort to do that.

Good writing for a broad audience requires it. Unfortunately the LLMs don't tend to adopt this guideline.

it’s a CVE write up; the audience for these knows what an LPE is.

That’s very optimistic. I’d bet there are an order of magnitude more people wondering how exposed they are than security researchers reading this.


Sure, nobody’s saying it’s an inscrutable mystery but if your goal is to inform a wide audience it’s considered good form to expand all but the most common acronyms. It’ll even get you more internet points than petty smugness.

I think sysadmins should learn the term LPE tbh

I've read many CVEs (somehow that acronym is ok... heh) but have never seen LPE despite being familiar with the concept.

That seems literally borderline impossible.

I think they've almost certainly seen it written out, just not as an acronym. I figured out what it stood for based on context and knowing the full phrase, but I don't recall actually seeing the LPE acronym in recent memory. Whereas with CVE it's the opposite: I almost never see it written out, and even now find it non-obvious what the E stands for, bizarrely enough.

You should re-evaluate your probabilities, I too have heard frequently of CVEs, but never of an LPE.

I'm sure lots of people have heard of CVEs, but have you actually read many? LPE is an extremely common term. It's like not knowing RCE. These are the terms used.

I'll raise my hand here and risk downvotes from very smart people who are smarter than me, but I've heard of CVE but not LPE or RCE. I know what the latter two terms are but am not used to seeing them in acronyms.

So what's missing is that keeping up-to-date with CVEs is important and some CVEs are Internet-nerd famous. Remember Heartbleed? Even some casual gamers I know had heard of it. And everyone who's mildly serious about sysadmin knows you want to defensively keep systems patched against important CVEs. The second layer of that, what the exploits actually are or do, is a second-layer term of art, one that one might miss the jargon for even if one has familiarity with the concepts.

To me, the fact that the page is obviously AI-assisted is way more upsetting than some guy not knowing what an acronym means. There's something about AI prose that is just so fucking tedious. It makes the mind glaze over.


To be clear, I'm not suggesting that you if have heard of CVEs therefor you must have heard of LPE. I'm saying if you have read many of them you would have seen these terms.

I obviously do not expect someone who has merely heard of various CVEs before to know anything about the contents of those CVEs. The other poster said they had "read many CVEs", which I took to mean they have read many CVE disclosures, where the term is extremely common. Perhaps they meant that they've read about CVEs, in which case I can see why the term would not be on their radar.


I'm as stunned as you are. I have to read CVEs on a weekly cadence (like contractually required to) and LPE/RCE are kind of the main keywords we look for in them. Also increasingly TOCTOU. If anyone who actually has to respond to CVEs told me they had never seen these terms before I would judge them as being unserious.

I could see it for someone who is only somewhat in tune with security work today.

Back in the day those of us breaking into shitty php sites didn't use LPE, we used "privesc", IIRC.


Content at the OP link http://copy.fail seems fairly different from any normal CVE I’ve seen.

To be fair, I just consulted 3 cybersecurity glossaries (SANS.org, NIST CSRC, Huntress), and none of them list "LPE" nor "Local Privilege Escalation".

If you type "LPE" into English Wikipedia's search bar, and press "Enter", you'll be sent to a disambiguation page which contains a link to the relevant article.

https://en.wikipedia.org/wiki/LPE


I don't know why, but newer writers have never been taught to expand their acronyms on first use. I blame the US education system.

XCursor (Linux nerds know)

Oh man, not sure if it's a good or bad memory... but that was the first linux bug I experienced as a newbie. Not so much a bug, but an unknown config I had to change so my first monitor would stop turning off when I moved the cursor to the second monitor.

Circa 2003


I may be missing something, but isn't the focus on calories about weight gain, not feeling full?


Yes, “all calories are the same” is a statement about thermodynamics, not the subjective experience of eating.

People who value other things higher than how it feels to eat and be full, like athletes and actors, can accurately manage their weight with calorie counting. It’s often not a pleasurable experience, but they subject themselves to it to meet their professional goals.


Feeling full matter a lot. It drives when you stop eating, fetch something else to eat and also is related to how active you are. It drives whether your thoughts are turning back to figuring out where to get food or whether they happily go elsewhere with no effort.


You left off the critically important part of the quote, IMO...

> ... according to Checkonchain's difficulty regression model

It's a guess based on oil costs (as a proxy for energy costs). Personally I think it is completely worthless.


CRQC = cryptographically relevant quantum computer



It was a traditional plugin (NPAPI), not NaCl (Native Client). Honestly a total gimmick. I still play Quake Live, though!


I see some comments about soft lockups during memory pressure. I have struggled with this immensely over the years. I wrote a userspace memory reclaimer daemon and have not had a lockup since: https://gist.github.com/EBADBEEF/f168458028f684a91148f4d3e79... .

The hangs usually happened when I was stressing VFS (the computer was a samba server) along with other workloads. To trigger a hang manually I would read in large files (bigger than available ram) in parallel while running a game. I could get it to hang even with 128GB ram. I tweaked all the vfs settings (swappiness, etc...) to no avail. I tried with and without swap.

In the end it looked like memory was not getting reclaimed fast enough, like linux would wait too long to start reclaiming memory and some critical process would get stuck waiting for some memory. The system would hang for minutes or hours at a time only making the tiniest of progress between reclaims.

If I caught the problem early enough (just as everything started stuttering) I could trigger a reclaim manually by writing to '/sys/fs/cgroup/memory.reclaim' and the system would recover. I wonder if it was specific to btrfs or some specific workload pattern but I was never able to figure it out.


I want to express my gratitude for not falling for greedy marketers' lies and using correct base-2 for KB/MB/GB


Just tune the kernel watermarks - vm.min_free_kbytes and vm.watermark_scale_factor


I do wish I had documented what I tried better! There might be a magic combo that could have helped but I tried tweaking a lot of the vm settings.

One day I will probably see if I can still reproduce the original problem and be more methodical about it. More likely on list of things I might not ever get around to.


Doesn't that show physical cash in bank vaults? Am I misunderstanding? That number would be utterly meaningless for this discussion.

Edit: I see this was covered in other replies


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: