frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Cutenews 2.0

https://github.com/CuteNews/cutenews-2.0
1•indigodaddy•3m ago•0 comments

Burrito Now, Pay Later

https://enterprisevalue.substack.com/p/burrito-now-pay-later
2•gwintrob•4m ago•0 comments

Built to Stay Small: Inside the Org Charts of AI-Native Startups

https://www.bloomberg.com/news/articles/2025-05-08/org-charts-of-ai-startups-are-built-to-stay-small-flexible
1•JumpCrisscross•6m ago•0 comments

Thiophene-Fused Aromatic Belts

https://www.nature.com/articles/s41467-025-55896-w
1•bookofjoe•7m ago•0 comments

Why is AI not in your productivity statistics?

https://arnoldkling.substack.com/p/why-is-ai-not-in-your-productivity
1•paulpauper•7m ago•0 comments

The Myth of the Genius Hacker

https://www.ft.com/content/55221f2d-00b3-4856-9158-dfdd0263bd0c
2•droideqa•8m ago•2 comments

Advisory Futarchy

https://www.overcomingbias.com/p/advisory-futarchy
1•paulpauper•8m ago•0 comments

New computer chips do math with light

https://www.sciencenews.org/article/computer-chips-math-light-photonic
1•Anumbia•9m ago•0 comments

I built YouTubeGO – an offline GUI downloader with batch and scheduler (PyQt5)

https://youtubego.org/
1•toxi360•14m ago•0 comments

Germany's Car Labor Costs Make America Look Like a Bargain Factory

https://www.carscoops.com/2025/05/germanys-car-production-labor-costs-are-double-the-usas-and-5-times-chinas/
2•rustoo•15m ago•0 comments

Stellar Cartography: SPHEREx Begins Capturing the Entire Sky

https://astrobiology.com/2025/05/stellar-cartography-spherex-begins-capturing-the-entire-sky.html
2•bryanrasmussen•15m ago•0 comments

The Paradoxes of Feminine Muscle

https://www.newyorker.com/culture/critics-notebook/the-paradoxes-of-feminine-muscle
2•Munksgaard•16m ago•0 comments

Study of Spatial Distribution of Burned Areas in Amazon 1986-2023 [pdf]

https://www.researchgate.net/journal/Fire-2571-6255/publication/385774872_Spatial_Distribution_of_Burned_Areas_from_1986_to_2023_Using_Cloud_Computing_A_Case_Study_in_Amazonas_Peru/links/681ca4bdded433155743bde8/Spatial-Distribution-of-Burned-Areas-from-1986-to-2023-Using-Cloud-Computing-A-Case-Study-in-Amazonas-Peru.pdf
1•bryanrasmussen•17m ago•2 comments

MCP/ Agent user API key management

https://agentpiper.com/
2•eugenekaliisa•23m ago•1 comments

ToyDB rewritten: a distributed SQL database in Rust, for education

https://github.com/erikgrinaker/toydb
2•erikgrinaker•24m ago•0 comments

Removing "Annoying" Windows 10 Features Is DMCA Violation, Microsoft Says(2020)

4•rolph•24m ago•1 comments

One shotted with replit: HN post Scheduler

https://hn-schedule.rnikhil.com/
2•whoami_nr•25m ago•0 comments

Show HN: Developer-First Monitoring for Docker

https://log-forge.github.io/logforgeweb/
2•madanb13•26m ago•0 comments

U.S. Announces China Trade Deal in Geneva

https://www.whitehouse.gov/articles/2025/05/u-s-announces-china-trade-deal-in-geneva/
3•misja111•29m ago•1 comments

Cursor's Security

https://www.cursor.com/en/security
1•goranmoomin•29m ago•0 comments

I built Final Interview – a browser-based AI that helps you in real interviews

https://www.finalinterview.ai
1•oleks_a•31m ago•1 comments

Why the St. Francis Dam Collapsed (1928) [pdf]

https://cawaterlibrary.net/wp-content/uploads/2020/10/Binder2.pdf
2•jruohonen•31m ago•1 comments

OpenSSH Config Tags How To

https://mrod.space/2023/09/04/using-tags-in-ssh-config
1•mritzmann•33m ago•0 comments

StrangeGraph – From Salesforce DevOps to Context-First Computing

https://www.strangegraph.com
1•jasonlantz•34m ago•1 comments

Monero Garden

https://monero.garden
6•vlugorilla•38m ago•0 comments

GitHub CEO on why we'll still need human programmers

https://thenewstack.io/github-ceo-on-why-well-still-need-human-programmers/
3•MilnerRoute•40m ago•0 comments

Volonaut Airbike

https://volonaut.com/airbike
1•matthewsinclair•40m ago•0 comments

Rerum Novarum ("The thirst for innovation") (1891)

https://www.vatican.va/content/leo-xiii/en/encyclicals/documents/hf_l-xiii_enc_15051891_rerum-novarum.html
7•mdp2021•40m ago•2 comments

Top 5 New Artificial Intelligence Innovations in 2025

https://medium.com/@wilnickmagazine/top-5-new-artificial-intelligence-innovations-in-2025-2d759ac823a6
1•Wilnick•45m ago•0 comments

Warren Buffett versus American Capitalism

https://www.bloomberg.com/opinion/articles/2025-05-09/warren-buffett-versus-american-capitalism
2•scripper•46m ago•0 comments
Open in hackernews

Why Intel Deprecated SGX?

https://hardenedvault.net/blog/2022-01-15-sgx-deprecated/
22•ricecat•3d ago

Comments

walterbell•3d ago
SGX may be a record holder for exploits, https://hn.algolia.com/?query=sgx
sublimefire•3d ago
Most of them require physical access so it is not the same as some log4j vuln.
walterbell•3d ago
Per article, physical access is within SGX threat model.
anonymousDan•2d ago
About 2 of those are actual exploits?
walterbell•2d ago
For some definition of 2?

  Intel SGX Fuse Key0, a.k.a. Root Provisioning Key Extracted by Researchers
  Plundervolt: Software-Based Fault Injection Attacks Against Intel SGX 
  SGX-Bomb: Locking Down the Processor via Rowhammer Attack
  Foreshadow: Extracting the Keys to the Intel SGX Kingdom
  ÆPIC Leak: SGX, Intel’s data fortress, has been breached yet again
  Intel SGX defeated yet again–this time thanks to on-chip power meter
  SGAxe and Crosstalk: Plundering of crypto keys from ultrasecure SGX 
  Spectre Attack on SGX PoC
anonymousDan•2d ago
Thanks - many of those didn't show up on your original link.
anonymousDan•3d ago
Pretty incoherent article. Not sure what point they are trying to make about the threat model of SGX. SGX was/is a groundbreaking attempt to solve a very difficult problem IMO. TEEs are still an active area of research that has benefited massively from the availability of an actual implementation in mainstream processors. And most other CPU manufacturers are also offering their own flavour of TEE, many of which have learned lessons from SGX.
AstralStorm•3d ago
The point about the threat model of SGX is that insulating an enclave with it does nothing to protect the code actually handling the data from the enclave. It really does not even protect against firmware side attacks. For that, TPM attestation is just as good.

At some point, somewhere, data processed by the SGX enclave has to pass through the usual VTd or such. Unless SGX enclave is used to feed data directly into hardware, in which case the weak point is the firmware and bus instead.

If it ensured no side channel attacks, it would be useful for some operations. But it does not therefore it isn't.

iforgotpassword•3d ago
It was touted as making cloud computing secure. How anyone could actually believe this is beyond me. The cloud provider has physical access to the host machine. For all I know it could all be smokes and mirrors, emulated on a C64, while all my data is getting exfiltrated. The only people who ever bought into this is cryptobro crackheads and government contractors doing it for compliance bullshit. Up to 0% of cloud customers went as far as to even try to verify the thing does what it says it does.

Case in point: TeleMessage. Supposedly E2E-Encrypted message archival turns out to be a plain text database on some servers. Surprised Pikachu face.

sublimefire•3d ago
This is some tinfoilhat stuff. An extreme suggestion that a cloud provider would physically open up machines and exfiltrate the keys so that they could then read the memory of a customer workload, for what reason? Remember that hardware is virtualised and makes it difficult to pin point which server is running what. Not using such tech makes it easier for the cloud provider to inspect memory so that is not a better approach.
iforgotpassword•3d ago
If you argue that you can trust the cloud provider not to be malicious, you also just argued that you don't need SGX at all. No tinfoil hat required.

And yes, not using that tech is not a better approach then, but not worse either. But better in the way that Intel doesn't need to build convoluted shit into their cpus that might actually worsen security through exploits.

mike_hearn•3d ago
SGX is very useful. Source: I built a product that made it easier to use and we explored a lot of use cases as part of that.

Firstly yes SGX is designed to block firmware attacks. That's a part of the threat model indeed.

Secondly, you can't feed data from SGX enclaves directly to hardware devices. It's encrypted data in, encrypted data out. Of course, data must pass through the untrusted host OS and hypervisor, but that is no problem, it's how it's designed to work. That's why the clients of the enclave handshake with it using remote attestation.

You can block side channel attacks with SGX if you are careful. The enclave transitions do clear uarch state in the ways needed, the rest is app-level stuff (but it has to be).

I used to see a lot of confusion about stuff like SGX because some people don't realize it's only intended to be used with remote attestation. If you don't have a smart client that's remotely attesting the enclave over a network, it isn't going to get you anything. That requires changes to app architectures.

underdeserver•3d ago
Should be (2022).
everfrustrated•3d ago
Headline is missing important context:

Intel is keeping SGX on servers and no longer offering it on non-server chips like workstations and laptops.

noname120•3d ago
From Wikipedia[1]:

> A pivot by Intel in 2021 resulted in the deprecation of SGX from the 11th and 12th generation Intel Core processors, but development continues on Intel Xeon for cloud and enterprise use.

[1] https://en.wikipedia.org/wiki/Software_Guard_Extensions#cite...

bjackman•3d ago
This never made any sense to me for consumers.

Enclaves and confidential compute are about the owner of the physical device giving up power and handing it to a remote entity.

In the case of SGX on consumer hardware that usually meant consumers giving up power to Netflix or whoever via DRM bullshit.

On the other hand, TDX on server devices is mostly about cloud providers giving up power to their users. This is a fundamentally better use case for TEEs. So overall this makes sense to me.

Kinda annoying that this stuff is so complicated that they have to leave it out of cheaper parts but that also makes sense, this must be incredibly invasive stuff that increases the cost in so many areas.

lostmsu•3d ago
It could have been used for a distributed cloud over consumer hardware.
bjackman•1d ago
That would be a neat usecase but it's not a slam dunk.

TEEs in theory eliminate the need for the user to trust the owner of the hardware. But for a cloud you need to eliminate the other direction too.

Cloud companies achieve this by... Spending a LOT of money on it. And the technical project of doing that is easier, because they control the whole host stack. I'm not sure it's technically feasible to achieve that in an environment where the host also needs to also support stuff like running Steam!

But still, maybe if you constrained the requirements enough it could be possible, it would have been a really cool thing to try!

bananapub•3d ago
because it kept getting owned, then fixed, then owned again
2bluesc•2d ago
> Chipworks offers $50-250k to fully extract the eFUSE of one Intel i5 processor, so the eFUSE content is encrypted by a master key (called “global wrapping logic key” in the patent).

I wonder how readily things like this are known within the HW security community?

rstuart4133•2d ago
Warning: the article is full of acronyms. Despite having section titles like "SGX Basics" unless you are familiar with terms like EPID, e-Fuse, iclsClient and many more, you aren't going to get much from it beyond "Intel dropped SGX for non-server CPU's in 2022".