frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

You Can Choose Tools That Make You Happy

https://borretti.me/article/you-can-choose-tools-that-make-you-happy
1•imadj•50s ago•0 comments

Pdeathsig is almost never what you want

https://www.recall.ai/blog/pdeathsig-is-almost-never-what-you-want
1•benshumaker•2m ago•0 comments

Where the cloud goes from here: 8 trends to follow and what it could all cost

https://www.zdnet.com/article/where-the-cloud-goes-from-here-8-trends-to-follow-and-what-it-could-all-cost/
1•CrankyBear•2m ago•0 comments

Red Hat and AMD Collaborating to Further Enhance Open-Source GPU Stack for AI

https://www.phoronix.com/news/Red-Hat-AMD-Collaborating-2025
1•freedomben•4m ago•0 comments

AI and Work (Some Predictions)

https://calnewport.com/ai-and-work-some-predictions/
1•tevrede•7m ago•0 comments

I won $500 vibe coding at a hackathon

https://handyai.substack.com/p/i-won-500-vibe-coding-at-a-hackathon
2•surprisetalk•12m ago•0 comments

Show HN: Plot lines of code over time in Git repositories

https://github.com/emanueldonalds/git-loc-plot
2•genericspammer•12m ago•0 comments

Hit hardest in Microsoft layoffs? Developers, product managers, morale

https://www.seattletimes.com/business/hit-hardest-in-microsoft-layoffs-developers-product-managers-morale/
1•mooreds•13m ago•1 comments

FDA to limit access to Covid-19 shots

https://arstechnica.com/health/2025/05/under-anti-vaccine-advocate-rfk-jr-fda-to-limit-access-to-covid-19-shots/
2•AdmiralAsshat•14m ago•0 comments

Super Creepy Laptop Ad

https://jetgirl.art/super-creepy-laptop-ad/
2•nivethan•15m ago•1 comments

Samsung Back to Working on Upstreaming Tesla FSD SoC Support in the Linux Kernel

https://www.phoronix.com/news/Samsung-Tesla-FSD-PCIe-SoC-2025
1•Bender•15m ago•0 comments

Together Code Sandbox

https://www.together.ai/blog/code-sandbox
1•handfuloflight•15m ago•0 comments

The Lost Decade of Small Data?

https://duckdb.org/2025/05/19/the-lost-decade-of-small-data.html
3•oli200110•16m ago•0 comments

What If Every Picture You've Ever Seen Already Exists?

2•cin4ed•16m ago•0 comments

The Tech Industry Is Huge–and Europe's Share of It Is Small

https://www.wsj.com/tech/europe-big-tech-ai-1f3f862c
1•danielcampos93•17m ago•0 comments

Is "Specification Repair" the AI Endgame?

https://aboard.com/is-specification-repair-the-ai-endgame/
1•gbseventeen3331•18m ago•0 comments

Alone and Adrift in the Pacific

https://www.theatlantic.com/magazine/archive/2025/06/commercial-fisherman-shipwreck/682580/
1•anarbadalov•19m ago•0 comments

The Evolution of the Alpha Male Aesthetic

https://www.bloomberg.com/features/2025-maga-man-style-history/
1•mooreds•20m ago•1 comments

Behind Netflix's UK launch: Why now, why no DVDs, and what's next? (2012)

https://www.wired.com/story/netflix-reed-hastings-feature/
1•microsoftedging•21m ago•1 comments

Show HN: AI Agent for Documentation and other apps

https://sitegui.com/agent/platform_assistant
1•ciaovietnam•22m ago•0 comments

Nonprofit news media leaders are struggling to stop leaning on foundations

https://theconversation.com/nonprofit-news-media-leaders-are-struggling-to-stop-leaning-on-the-foundations-that-say-they-should-branch-out-more-255821
3•rntn•24m ago•0 comments

Why figuring out what's behind a big gender paradox won't be easy (2018)

https://arstechnica.com/science/2018/10/gender-differences-in-personality-are-bigger-in-egalitarian-countries/
1•Tomte•24m ago•0 comments

Why does Taylor Swift write so many one-note melodies? (2017)

https://www.bbc.com/news/entertainment-arts-41886475
1•Tomte•25m ago•0 comments

Why Windows 11’s most important new feature is post-quantum cryptography

https://arstechnica.com/security/2025/05/heres-how-windows-11-aims-to-make-the-world-safe-in-the-post-quantum-era/
1•Ivan92•25m ago•0 comments

Show HN: Bricks – One Click Dashboards from Your Data Using AI

https://app.thebricks.com/sign-up
4•manpreetsgarha•25m ago•0 comments

Financial Datasets: Connect your LLM to the stock market

https://www.financialdatasets.ai/
1•handfuloflight•27m ago•0 comments

Enter the maze of Hong Kong's tech wonderland

https://restofworld.org/2022/tech-markets-hong-kong/
2•outrunner•28m ago•0 comments

Show HN: A Social Media Feed for Busy B2B SaaS Founders

https://getmentio.com/
3•Mredfox•29m ago•1 comments

Starfish Space announces plans for first commercial satellite docking

https://www.nasaspaceflight.com/2025/05/starfish-plans-first-commercial-satellite-docking/
1•LorenDB•30m ago•0 comments

Computational Public Space [video]

https://www.youtube.com/watch?v=PixPSNRDNMU
1•coloneltcb•31m ago•0 comments
Open in hackernews

Authy corrupted my 2FA backup and all I got was this lousy blogpost

https://cmb.weblog.lol/2025/05/authy-corrupted-my-2fa-backup-and-all-i-got-was-this-lousy-blogpost
20•CameronBanga•5h ago

Comments

jiveturkey•4h ago
buried lede IMO

> Authy was sold to Twillo in 2015

codalan•3h ago
Just got off Authy. They've done everything to trap customers into their broken platform, primarily by never allowing the user to export their tokens, either to file, or to another MFA application.

They also stopped supporting their desktop app, forcing users back onto a single point of failure: the mobile app.

If Twilio isn't going to support Authy in good faith, they should stop holding their remaining users hostage.

CameronBanga•3h ago
I should have been smarter and thought about looking at export sooner, it wasn't until I had this issue that I dug in and realized how bad it was.
foxyv•1h ago
Most 2FA apps don't allow export for security reasons. I usually just re-generate all my TOTP keys manually. It's terribly painful, but I used to do it with every phone upgrade.
ValentineC•1h ago
"Security reasons" is pretty insane, considering how easy it is to lose access to a good number of accounts if any 2FA app breaks from a bad update.

Google Authenticator has done this before too, way back in 2013: https://news.ycombinator.com/item?id=6325760

AStonesThrow•1h ago
It is indeed the very epitome of sanity, if you simply consider that the codes are secrets, and this entire practice is derived from having hardware dongles with secure enclaves, where secrets go in but never come out. It is the utmost in security when this one-way relationship is observed.

The ability to export secrets is an unfortunate compromise which vendors make for consumer markets. The MFA apps were not designed for exportability. If you own any Yubikeys you will know this. The whole idea is that this factor is "something you have", in other words, possession of the item containing your secret. An exported secret is no longer a secret, no longer something you have; it's just another password you're shuffling around.

The reason that you don't lose access to accounts when losing your MFA apps is that you took down the emergency backup codes and you committed them to paper, or some other durable medium, in a place where they can easily be accessed during a crisis. You did this scrupulously with each MFA activation, didn't you? Didn't you?

codalan•36m ago
In an ideal world, I'd just use Yubikeys for everything. The problem is that it's not universally supported (or only supports a limited number of keys), so now I have a hodgepodge of 2FA app or Yubikeys or, even worse, phone/email 2FA.

The great thing about Yubikeys is that I can associate backup keys for accounts (when they are supported), so if I lose one key, I can deactivate the lost key and use a backup key in its place.

With heavily locked-down 2FA apps, I have to hope I can do a full recovery on a new device, or go through the recovery code process, or start all over again w/ new 2FA codes. If I'm lucky, the app allowed me to have it installed onto a backup device.

It's way more complicated that just swapping in a new Yubikey.

foxyv•36m ago
Typically the way these codes are compromised is when they are stored in a non-HSM location like Google drive or transferred somehow. Then again, if you are just trying to keep people out of your Facebook account it's not a big deal. But if you are trying to keep people from financial accounts I wouldn't recommend transferring TOTP keys. Instead using a backup method like a printed out one time use sheet would be better.

Unfortunately most such websites use KBA or Text based authentication as a backup for TOTP so you may as well just stick it in Google drive.

codalan•21m ago
It sucks Yubikey (or other hardware based auth) isn't more prevalent in the financial/banking world. It helps mitigate a lot of types of attacks:

- No tokens to exfiltrate off a computer

- Avoids keylogger style attacks

- More durable than cell phones

That said, for people that have high amounts of money in certain accounts (> 1m), it might also present physical dangers (e.g. kidnapping, home invasion) for thieves attempting to get access to the hardware key.

foxyv•9m ago
The rubber hose attack is always the most reliable and most dangerous method of breaching high value targets like this.

https://xkcd.com/538/

codalan•47m ago
It's only a security issue if you don't secure the cloud storage that's used for backups.

Google Authenticator and some other 2FA apps allow the user to export their tokens to other apps so you don't need to redo TOTP on every website.

The most secure method is to only have tokens on the 2FA device and to avoid using TOTP backup/restore altogether (or manually copy the tokens on a secondary 2FA device). It's a tradeoff between security vs. convenience.

foxyv•41m ago
Yeah, the iron triangle of security, convenience, and privacy rears it's ugly head again.
WorldMaker•14m ago
I think Microsoft Authenticator is the smartest right now because it's a "two-cloud" solution partly out of necessity, but also that seems a trustworthy architecture more generally. Since almost no one's phone runs Windows anymore, the raw app data backups "naturally" go to either iCloud or Google Drive. Then Microsoft keeps other (HSM) decryption keys in OneDrive. The threat model requires compromises of two clouds, so Microsoft Authenticator can be way more generous on how often and easily it backs up. It's an interesting point in the security vs. convenience tradeoff.
nikolay•3h ago
Authy did this with me years ago, too, destroyed my tokens, I had different lists of tokens on different devices, too - that's why I kept an old phone as it had some of my accounts in there. Do not touch that steamy pile even with a 10-foot pole! It's unfortunately that some providers recognized by your phone number that you have Authy and for you to use it!
rubatuga•3h ago
It's pretty obvious that you should be backing up the actual TOTP secrets not relying on an app to manage it. I use 2FAS Auth which allows export. The other alternative is to use multiple devices for each 2FA account (the original intent?)
dehrmann•3h ago
I thought we all moved to Bitwarden a decade ago?
ChrisArchitect•1h ago
tl;dr

> Much to my surprise, when checking the App Store page, I saw that an update to the app had been approved by Apple only 14 minutes prior. I downloaded the update, tapped upon one of the previously "locked" items, and entered my backup password. Boom, the previously locked 2FA codes were now unlocked and restored, ready for use.

ValentineC•1h ago
Google Authenticator did this to me once before, way back in 2013 [1].

After that, it was vaults that were easily exportable and backed up all the way (like most password managers).

[1] https://news.ycombinator.com/item?id=6325760

bonki•58m ago
I use KeePass as main TOTP app but migrated from Authy to Aegis (open source, great app) years ago which I use as sort of secondary backup, which also allows you to create backups and import/export data. I sync those off my phone using Syncthing. There is absolutely zero reason to use Authy for standard TOTP these days.