frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Recipe for Finding Clean Hydrogen

https://www.livescience.com/planet-earth/geology/scientists-think-a-hidden-source-of-clean-energy-could-power-earth-for-170-000-years-and-theyve-figured-out-the-recipe-to-find-it
2•LAsteNERD•2m ago•0 comments

Republicans push for a decadelong ban on states regulating AI

https://www.theverge.com/news/666288/republican-ai-state-regulation-ban-10-years
2•flornt•4m ago•0 comments

Mexico and China didn't take manufacturing jobs from the Rust Belt

https://www.washingtonpost.com/opinions/2025/05/14/sun-belt-rust-belt-manufacturing-jobs-myth/
1•gok•5m ago•0 comments

Japan's bet on stem-cell therapies might soon pay off with medical breakthroughs

https://www.nature.com/articles/d41586-025-01143-7
1•e12e•5m ago•0 comments

Redwood SDK – A React Framework for Cloudflare

https://rwsdk.com
1•blackhaj7•8m ago•0 comments

Pg_parquet v0.4.0: Google Cloud Storage and HTTPS storage

https://www.crunchydata.com/blog/announcing-pg_parquet-v-0-4-google-cloud-storage-https-storage-and-more
2•winslett•9m ago•0 comments

Debunking HDR

https://www.yedlin.net/DebunkingHDR/
1•kranke155•9m ago•0 comments

Product Market Fit Collapse

https://www.reforge.com/blog/product-market-fit-collapse
2•tosh•10m ago•0 comments

Developers as Suppliers

https://daringfireball.net/linked/2025/05/10/benedict-evans-apple-developers-as-suppliers
2•tosh•10m ago•0 comments

Smalltalk-78 Xerox NoteTaker in-browser emulator

https://smalltalkzoo.thechm.org/users/bert/Smalltalk-78.html
1•todsacerdoti•12m ago•0 comments

PFAS: The Biggest Chemical Cover-Up in History [video]

https://www.youtube.com/watch?v=SC2eSujzrUY
1•rini17•12m ago•0 comments

Show HN: Tako, a Knowledge Search API

https://trytako.com/playground/
5•ttobbaybbob•12m ago•0 comments

Bang for the Buck: Vector Search on Cloud CPUs

https://arxiv.org/abs/2505.07621
2•ashvardanian•12m ago•0 comments

Mice grow bigger brains when given this stretch of human DNA

https://www.nature.com/articles/d41586-025-01515-z
5•pavel_lishin•13m ago•3 comments

How AI Is Changing Art for Creatives [video]

https://www.youtube.com/watch?v=HKN9FMBFn8U
1•handfuloflight•15m ago•0 comments

Trump tariffs have little impact on prices so far, defying grim forecasts

https://www.politico.com/news/2025/05/13/trump-tariffs-inflation-trade-economy-fed-powell-00344184
5•TheFreim•17m ago•2 comments

The Ceiling: How OCR Quality Limits RAG Performance

https://www.mixedbread.com/blog/the-hidden-ceiling
1•breadislove•19m ago•0 comments

Over 250 CEOs sign open letter supporting K-12 AI and computer science education

https://techcrunch.com/2025/05/05/over-250-ceos-sign-open-letter-supporting-k-12-ai-and-computer-science-education/
1•sy0430•20m ago•0 comments

Show HN: I made instant in-page translation and personal vocabulary builder

https://phraseclip.com/en
2•kielak2•20m ago•1 comments

X's Grok AI is suddenly hyper-fixated on South African farmers

https://bsky.app/profile/jimpjorps.bsky.social/post/3lp5gfi3g4c2z
10•jsheard•20m ago•5 comments

iPhone Shipments Crash 50% in China as Local Brands Dominate

https://www.macrumors.com/2025/05/13/iphone-shipments-down-china-local-brands/
1•buyucu•21m ago•0 comments

How to use Python t-strings

https://www.infoworld.com/article/3977626/how-to-use-template-strings-in-python-3-14.html
1•MarcoDewey•22m ago•0 comments

We Built an In-Memory-Class Architecture on Top of S3 – and Made It Work

https://risingwave.com/blog/how-we-built-risingwave-on-s3-a-deep-dive-into-s3-as-primary-storage-architecture/
1•Sheldon_fun•23m ago•1 comments

Top donors to Trump's $239M inauguration fund

https://www.washingtonpost.com/politics/interactive/2025/trump-inauguration-donors-list/
2•perihelions•24m ago•0 comments

Brain tissues, assemble! Inside the push to build better brain models

https://www.nature.com/articles/d41586-025-01468-3
2•rolph•24m ago•0 comments

Apple Readies Feature That Lets Vision Pro Users Scroll with Their Eyes

https://www.bloomberg.com/news/articles/2025-05-14/apple-readies-feature-that-lets-vision-pro-users-scroll-with-their-eyes
1•mfiguiere•26m ago•0 comments

Police investigating crypto kidnappings with execs tied up and fingers cut off

https://news.sky.com/story/french-police-investigating-series-of-crypto-kidnappings-with-executives-tied-up-and-their-fingers-cut-off-13367737
2•austinallegro•26m ago•1 comments

Using the skin's electrical conductance to track sweat loss during activities

https://techxplore.com/news/2025-04-skin-electrical-track-loss-physical.html
1•PaulHoule•31m ago•0 comments

I spot a bad remote employee

https://latypoff.com/how-i-spot-a-bad-remote-employee/
1•nlitened•33m ago•4 comments

Waymo recall: software may cause the vehicles to collide with roadway barriers

https://www.nhtsa.gov/recalls?nhtsaId=25E034
1•lopkeny12ko•33m ago•0 comments
Open in hackernews

The Cryptography Behind Passkeys

https://blog.trailofbits.com/2025/05/14/the-cryptography-behind-passkeys/
63•tatersolid•5h ago

Comments

labadal•1h ago
I love passkeys. I love them being on my phone, requiring biometric authentication before unlocking. I just hate the vendor lock in that comes with it.

Does anyone know the state of the standard wrt this? I know that they planned on doing something about it, just haven't kept up.

hiatus•1h ago
Can you expand on the vendor lock aspect? I have stored passkeys in my password manager, so they feel pretty portable to me. Is it that each service requires a unique passkey? That seems comparable to how each service would require its own TOTP seed.
supportengineer•1h ago
Your password manager came from a vendor. As a thought exercise, switch vendors.
EnPissant•1h ago
Bitwarden exports include passkeys.
dboreham•38m ago
Have you actually tried exporting a passkey and importing it into another manager, then successfully authenticate with it?
Steltek•1m ago
From the article:

> But how can websites know whether its users are using secure authenticators? Authenticators can cryptographically prove certain facts about their origins, like who manufactured it, by generating an attestation statement when the user creates a passkey; this statement is backed by a certificate chain signed by the manufacturer.

How many scummy companies trot out "Let me protect you from yourself" to justify taking away their users' freedoms?

yladiz•1h ago
Unfortunately I don’t think there’s much to help with vendor lock in directly (like, you may or may not be able to export the private key(s) depending on the tool, and in some cases it’s definitely not possible like with a hardware key), but any website that supports passkeys supports WebAuthn in general so you shouldn’t have difficulty migrating to another tool if desired, although you would need to register again.
reginald78•32m ago
Passkeys support an attestation anti-feature, enshrined in the spec. This feature can be abused (and will be IMO, why put it in the spec otherwise?) to limit which providers can access a service. Lock-in is built into the design.

One of the developers already threatened to use it against keepass when they built an export feature he didn't agree with.

parliament32•16m ago
Attestation is probably the best feature of passkeys.

From a corporate compliance perspective, I need to ensure that employee keys are stored in a FIPS-compliant TPM and unexportable. Key loss is not an issue because we have, ya know, an IT department. The only way I can ensure this happens is by whitelisting AAGUIDs and enforcing attestation.

With these factors I can also get out of the MFA hellhole (because I can prove that whitelisted vendor X already performs MFA on-device without me having to manage it: for example, WHFB requires something you have (keys in your TPM) and either something you are (face scan / fingerprint) or something you know (PIN), without me having to store/verify any of those factors or otherwise manage them). Same goes for passkeys stored in MS Authenticator on iOS/Android.

supportengineer•1h ago
For me, the only thing that makes passkeys viable is backing them up in the cloud and automatically syncing them across devices. Otherwise, I do not trust them.
TechDebtDevin•1h ago
What do you use?
dboreham•36m ago
Not the parent, but the obvious answer is: a hard token (e.g. Yubikey). After all passkeys are just a software emulation of the smart card / FIDO2 mechanism that's been around for many years.
johnisgood•55m ago
I'm not sure if this is satire. You trust the "cloud" and whatever does the syncing to the cloud? I definitely don't trust anything that "syncs to the cloud".
paulryanrogers•43m ago
> I definitely don't trust anything that "syncs to the cloud".

What if you lose your device? Do you install alternate passkeys in a second device? Do you have to do that for every site and service?

taeric•56m ago
I always ask how you expect to defeat the vendor lock in?

Effectively you have a secret that you are using to authenticate yourself. With pass keys managed by a vendor, you are trusting that vendor to manage your secret. If they are able to give your secret to someone else, then they can no longer confirm who all knows your secret.

I'm sure you can come up with a protocol where you can fan out access to the secret in a way that requires fanning back messages to you. But I don't see any clear way to do so that doesn't increase the communication burden on everyone.

I'm also sure smarter people than me can surprise me with something, here. But secrets that can be shared historically tend to not be secrets for long.

blibble•51m ago
> I'm sure you can come up with a protocol where you can fan out access to the secret in a way that requires fanning back messages to you. But I don't see any clear way to do so that doesn't increase the communication burden on everyone.

the spec actually supports this, it's called caBLE

taeric•25m ago
Right, that flow seems somewhat straight forward and is roughly what I had in mind with my sentence. It doesn't really break you out of vendor involvement, though? You both still have to be fully in on the whole flow. Right?

Asked differently, how does this get a vendor out of the picture?

jp191919•54m ago
I use KeepassXC on my PC. Not sure of an app for mobile though.
vngzs•35m ago
I can register my Yubikeys on account.google.com (and around the web, e.g., fastmail.com) as passkeys. If you visit the account security page[0] and enable "skip password when possible", then you can log in to Google with only a Yubikey-backed passkey.

If you have old Google creds on your Yubikey, you may have to first remove those creds from your account (because there are older and newer protocol choices, and with the old protocols enabled Google will not support passwordless login).

Multiple yubikeys are required if you would like to have backups; there is no syncing between keys.

For support matrices, see [1].

[0]: https://myaccount.google.com/security

[1]: https://passkeys.dev/device-support/

zikduruqe•20m ago
I just use a Trezor One (yes, a bitcoin hardware wallet).

I back up my 12 word seed phrase, and then I can restore any and all my TOTP/FIDO/passkeys with another one if needed.

namro•15m ago
On Android, Keepass2Android developer is working on supporting passkeys in the near future (https://github.com/PhilippC/keepass2android/issues/2099) but I'll be honest, I haven't dedicated enough time learning about passkeys to be sure the app will be able to support all implementations of passkeys and avoid vendor locking completely.
supportengineer•1h ago
As the digital world becomes more sophisticated, and also a more integral part of everyone’s life, it behooves everyone to maintain a larger part of their wealth in a non-digital format. For example, equity in real estate or physical gold bars in a safe.
01HNNWZ0MV43FF•59m ago
Or an investment, like VTSAX
joelthelion•38m ago
Are passkeys seeing any traction?
andrewmcwatters•25m ago
Passwords and password managers seem good enough to me, and TOTP support is everywhere now.

Passkeys just feel like a standard written by large tech companies as a flywheel technology to keep me locked into whatever hardware and software ecosystem I'm already in since seemingly no one besides maybe Bitwarden supports exporting them. Which seems pointless, because I don't know of any platform that supports importing them.

I am also getting tired of corporate white knight nerds defending trillion dollar companies telling me that portability isn't a concern.

solarkraft•9m ago
Challenge-response with asymmetric encryption is pretty much perfect. I wish all auth worked like SSH.

Passkeys kind of take that concept, but make it suck. No backups. Terrible interoperability.

The other day I attempted to create one on my Mac with Firefox. The system passkey popup came up and made me scan a QR code with my iPhone that had to be connected to the internet. Bitwarden (my iOS passkey manager, that part works well) did open, but after selecting the profile to create the passkey in, it errored out. No passkey for me.