frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Annual Production of 1/72 (22mm) scale plastic soldiers, 1958-2025

https://plasticsoldierreview.com/ShowFeature.aspx?id=27
1•YeGoblynQueenne•1m ago•0 comments

Error-Handling and Locality

https://www.natemeyvis.com/error-handling-and-locality/
1•Theaetetus•2m ago•0 comments

Petition for David Sacks to Self-Deport

https://form.jotform.com/253464131055147
1•resters•2m ago•0 comments

Get found where people search today

https://kleonotus.com/
1•makenotesfast•4m ago•1 comments

Show HN: An early-warning system for SaaS churn (not another dashboard)

https://firstdistro.com
1•Jide_Lambo•5m ago•1 comments

Tell HN: Musk has never *tweeted* a guess for real identity of Satoshi Nakamoto

1•tokenmemory•6m ago•1 comments

A Practical Approach to Verifying Code at Scale

https://alignment.openai.com/scaling-code-verification/
1•gmays•7m ago•0 comments

Show HN: macOS tool to restore window layouts

https://github.com/zembutsu/tsubame
1•zembutsu•10m ago•0 comments

30 Years of <Br> Tags

https://www.artmann.co/articles/30-years-of-br-tags
1•FragrantRiver•17m ago•0 comments

Kyoto

https://github.com/stevepeak/kyoto
2•handfuloflight•17m ago•0 comments

Decision Support System for Wind Farm Maintenance Using Robotic Agents

https://www.mdpi.com/2571-5577/8/6/190
1•PaulHoule•18m ago•0 comments

Show HN: X-AnyLabeling – An open-source multimodal annotation ecosystem for CV

https://github.com/CVHub520/X-AnyLabeling
1•CVHub520•21m ago•0 comments

Penpot Docker Extension

https://www.ajeetraina.com/introducing-the-penpot-docker-extension-one-click-deployment-for-self-...
1•rainasajeet•21m ago•0 comments

Company Thinks It Can Power AI Data Centers with Supersonic Jet Engines

https://www.extremetech.com/science/this-company-thinks-it-can-power-ai-data-centers-with-superso...
1•vanburen•24m ago•0 comments

If AIs can feel pain, what is our responsibility towards them?

https://aeon.co/essays/if-ais-can-feel-pain-what-is-our-responsibility-towards-them
3•rwmj•29m ago•5 comments

Elon Musk's xAI Sues Apple and OpenAI over App Store Drama

https://mashable.com/article/elon-musk-xai-lawsuit-apple-openai
1•paulatreides•32m ago•1 comments

Ask HN: Build it yourself SWE blogs?

1•bawis•32m ago•1 comments

Original Apollo 11 Guidance Computer source code

https://github.com/chrislgarry/Apollo-11
3•Fiveplus•38m ago•0 comments

How Did the CIA Lose Nuclear Device?

https://www.nytimes.com/interactive/2025/12/13/world/asia/cia-nuclear-device-himalayas-nanda-devi...
1•Wonnk13•38m ago•0 comments

Is vibe coding the new gateway to technical debt?

https://www.infoworld.com/article/4098925/is-vibe-coding-the-new-gateway-to-technical-debt.html
1•birdculture•42m ago•1 comments

Why Rust for Embedded Systems? (and Why I'm Teaching Robotics with It)

https://blog.ravven.dev/blog/why-rust-for-embedded-systems/
2•aeyonblack•43m ago•0 comments

EU: Protecting children without the privacy nightmare of Digital IDs

https://democrats.eu/en/protecting-minors-online-without-violating-privacy-is-possible/
3•valkrieco•43m ago•0 comments

Using E2E Tests as Documentation

https://www.vaslabs.io/post/using-e2e-tests-as-documentation
1•lihaoyi•44m ago•0 comments

Apple Welcome Screen: iWeb

https://www.apple.com/welcomescreen/ilife/iweb-3/
1•hackerbeat•45m ago•1 comments

Accessible Perceptual Contrast Algorithm (APCA) in a Nutshell

https://git.apcacontrast.com/documentation/APCA_in_a_Nutshell.html
1•Kerrick•46m ago•0 comments

AI agent finds more security flaws than human hackers at Stanford

https://scienceclock.com/ai-agent-beats-human-hackers-in-stanford-cybersecurity-experiment/
3•ashishgupta2209•48m ago•2 comments

Nano banana prompts, updates everyday

https://github.com/fionalee1412/bestnanobananaprompt-github
4•AI_kid1412•51m ago•0 comments

Skills vs. Dynamic MCP Loadouts

https://lucumr.pocoo.org/2025/12/13/skills-vs-mcp/
3•cube2222•56m ago•0 comments

Top validated AI-SaaS Ideas are available here

1•peterbricks•59m ago•0 comments

UnmaskIP: A Clean, Ad-Free IP and Deep Packet Leak Checker

https://unmaskip.net
1•kfwkwefwef•1h ago•0 comments
Open in hackernews

Windows 11 users losing data due to Microsoft's forced BitLocker encryption

https://www.neowin.net/news/windows-11-users-reportedly-losing-data-due-to-microsofts-forced-bitlocker-encryption/
24•josephcsible•7mo ago

Comments

josephcsible•7mo ago
tl;dr: if you ever lose access to the Microsoft account you use to sign in to Windows 11 24H2, you have no way to recover any of your locally-stored data.
Terr_•7mo ago
My desktop has been on Windows for a long time due to games. I think this is going to be the last straw, as Microsoft continues to harass users into sharing all their secrets into the cloud in a way that also causes painful lock-in.

I literally bought another SSD a couple weeks ago to start the "never boot to Windows unless I really need to" process.

TowerTall•7mo ago
Backing up the Bitlocker encryption key to OneDrive* has been the default since bitlocker was introduced in Windows Vista in 2007.

The dialog has for this has always offered the option to back it up to a USB drive and the dialogs function is largely unchanged the past 18 years providing access to backup up the decryption key to a local target or online.

*Back then OneDrive was called Windows Live Folders

TowerTall•7mo ago
Should be: If you ever loose your decryption key to your encryptet data, regardless of OS, you have no way to recover any of your encryptet data.

When installing windows and configure bitlocker you do get presented with the option to create an offline backup of said key eg to a USB drive. The same dialog also give you an option to back it up to OneDrive in addition to an offline backup.

This is a non-story

whatevaa•7mo ago
Except this is being forced everybody, including non-techies.
TowerTall•7mo ago
The first version of Windows that started to encrypt the drive by default using Bitlocker was Windows RT 8 for ARM (Release 2012). The first x86/x64 version that did same was windows 8.1 (Release 2013)
josephcsible•7mo ago
This is a story because Microsoft is automatically enabling encryption for everyone without making sure they're aware of that first.
gnabgib•7mo ago
Original source: https://www.reddit.com/r/Windows11/comments/1k90piu/microsof...
mubou•7mo ago
If you haven't already:

1. Win+R

2. control /name Microsoft.BitLockerDriveEncryption

3. "Back up your recovery key"

p_ing•7mo ago
Next comes the post of "All my data was stolen and my SSN is being used to order CC in my name because my laptop was stolen and unencrypted".

Damned if you do...

But it would be helpful for Microsoft to provide a notice on first login about how to get to your backed up key in your MSFT account as well as how to make a print out of the recovery key.

Rzor•7mo ago
I'm not a Windows user anymore, but these days it feels like either Microsoft is fucking shit up every week or the tech media is just out to get them. Possibly a combination of both, to be fair.
grg0•7mo ago
I have suffered Windows at work until recently. It's not just media coverage; MS is simultaneously pouring billions into AI and, for some strange reason, also "modernizing" and pushing frequent updates to their office tools, but in a completely botched way. Kind of how they fucked XP with SP3 to make you buy Vista, except that the end game is not even clear this time around.
fithisux•7mo ago
I haven't used their office tools since 2002, except a case of a paper some brain...ed colleague forced me to contribute in 2015.
not_a_bot_4sho•7mo ago
This is a case of media out to get them. The premise is: if you lose your local backup recovery keys, and you lose access to the account you used to login and create your recovery keys, you cannot get a recovery key.

I dare say this is expected behavior. Any mitigation requires a backdoor.

That's not to say MS isn't fucking other shit up though ..

josephcsible•7mo ago
> if you lose your local backup recovery keys

It sounds to me like with this change, Microsoft is automatically turning on BitLocker without giving the user local backup recovery keys first.

numpad0•7mo ago
BitLocker keys should be automatically backed up to OneDrive. I don't remember this mentioned in the scary "Enter BitLocker key to continue" screen that appear when TPM auto-unlock didn't work, though.
watermelon0•7mo ago
I think the main issue with the default BitLocker configuration is that you must have recovery key saved somewhere (either on OneDrive, printed out, or on some other storage).

If something changes with the hardware/software configuration, and TPM unlock doesn't work, your data is lost, unless you have access to the recovery key.

This is completely different compared to other platforms, where you use a separate password (Linux LUKS), account password (macOS), or PIN (iOS, Android) to unlock the drive.

TowerTall•7mo ago
How is a recovery key different from a a password or pin? They are both just a string you need to enter during the recovery process and if you have lost that string you cannot unlock the drive
nly•7mo ago
They are randomly generated and therefore high entropy.
manwe150•7mo ago
You have to enter them on every boot before the OS will be able to decrypt the drive. On windows, the key is loaded into memory automatically almost all of the time, and only if it thinks something goes wrong does it suddenly stop working. Or in the case of my colleague, because windows changed his recovery key without notifying him that his backup key was no longer valid. (It deleted it because it thought his key escrow policy had changed, and since that requires generating a new key, it has to delete the old key. Unfortunately escrow policy hadn’t actually changed, so all backup unlocking sources all still had the old key)
josephcsible•7mo ago
The difference is that it's neither expected nor practical to memorize your recovery key.
bigfatkitten•7mo ago
It’s no different at all to LUKS if you use TPM unlock.
josephcsible•7mo ago
That's true, but LUKS with TPM unlock is something that you have to go out of your way to set up, not something that gets enabled on your system automatically even if you have no idea what it is or how it works.
7bit•7mo ago
Your understanding of BitLocker is off.

1. There always is a recovery key, not only in the default configuration. And you should always have a copy of it stored somewhere else than on the same computer.

2. Your software configuration does not influence BitLocker, unless of course you manually wipe TPM or reset your BitLocker PIN. Your hardware configuration also does not influence BitLocker, unless you swap the TPM chip, of course. I'm also not counting changes to the boot order etc that could break TPM mode (no PIN) because messing with the PC on that level can cause damage to any Computer, not only BitLocker protected ones.

3. BitLocker also can use a separate password (or PIN) to unlock the drive, which also protects against certain attacks that are possible with TPM mode (no PIN)

j1elo•7mo ago
Most problems caused by the introduction of new(ish) and modern protections (like 2FA in services, encryption for the layperson's computer, etc) is a matter of BAD UI and badly thought out processes.

"You have the choice of making a backup when the system is set up" is NOT a solution. Do you know how many steps, things to care about, and dialogs are there to click through, when one is setting up a system? yes, we all do know. Crucial stuff is mixed with irrelevant cruft and the whole experience naturally drives the person to activate a mindless clicking mode.

All these security things should be accompanies with proper UX. See WhatsApp as an example: you set an account unlocking code? Ok you'll have to re-enter it every other month, to ensure you still have access to it.

In case of Windows, I wouldn't require entering a recovery key. But I would think a nagging screen every few months would be a good choice unless either a OneDrive backup can be verified to exist, or the user goes out of their way to enter some kind of Advanced Settings to disabe the nagging.