frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Bitcoin wallet on NXP SE050 secure element, Tor-only open source

https://github.com/0xdeadbeefnetwork/sigil-web
1•sickthecat•34s ago•0 comments

White House Explores Opening Antitrust Probe on Homebuilders

https://www.bloomberg.com/news/articles/2026-02-06/white-house-explores-opening-antitrust-probe-i...
1•petethomas•50s ago•0 comments

Show HN: MindDraft – AI task app with smart actions and auto expense tracking

https://minddraft.ai
1•imthepk•5m ago•0 comments

How do you estimate AI app development costs accurately?

1•insights123•6m ago•0 comments

Going Through Snowden Documents, Part 5

https://libroot.org/posts/going-through-snowden-documents-part-5/
1•goto1•7m ago•0 comments

Show HN: MCP Server for TradeStation

https://github.com/theelderwand/tradestation-mcp
1•theelderwand•10m ago•0 comments

Canada unveils auto industry plan in latest pivot away from US

https://www.bbc.com/news/articles/cvgd2j80klmo
1•breve•11m ago•0 comments

The essential Reinhold Niebuhr: selected essays and addresses

https://archive.org/details/essentialreinhol0000nieb
1•baxtr•13m ago•0 comments

Rentahuman.ai Turns Humans into On-Demand Labor for AI Agents

https://www.forbes.com/sites/ronschmelzer/2026/02/05/when-ai-agents-start-hiring-humans-rentahuma...
1•tempodox•15m ago•0 comments

StovexGlobal – Compliance Gaps to Note

1•ReviewShield•18m ago•1 comments

Show HN: Afelyon – Turns Jira tickets into production-ready PRs (multi-repo)

https://afelyon.com/
1•AbduNebu•19m ago•0 comments

Trump says America should move on from Epstein – it may not be that easy

https://www.bbc.com/news/articles/cy4gj71z0m0o
5•tempodox•19m ago•1 comments

Tiny Clippy – A native Office Assistant built in Rust and egui

https://github.com/salva-imm/tiny-clippy
1•salvadorda656•24m ago•0 comments

LegalArgumentException: From Courtrooms to Clojure – Sen [video]

https://www.youtube.com/watch?v=cmMQbsOTX-o
1•adityaathalye•27m ago•0 comments

US moves to deport 5-year-old detained in Minnesota

https://www.reuters.com/legal/government/us-moves-deport-5-year-old-detained-minnesota-2026-02-06/
3•petethomas•30m ago•1 comments

If you lose your passport in Austria, head for McDonald's Golden Arches

https://www.cbsnews.com/news/us-embassy-mcdonalds-restaurants-austria-hotline-americans-consular-...
1•thunderbong•35m ago•0 comments

Show HN: Mermaid Formatter – CLI and library to auto-format Mermaid diagrams

https://github.com/chenyanchen/mermaid-formatter
1•astm•50m ago•0 comments

RFCs vs. READMEs: The Evolution of Protocols

https://h3manth.com/scribe/rfcs-vs-readmes/
2•init0•57m ago•1 comments

Kanchipuram Saris and Thinking Machines

https://altermag.com/articles/kanchipuram-saris-and-thinking-machines
1•trojanalert•57m ago•0 comments

Chinese chemical supplier causes global baby formula recall

https://www.reuters.com/business/healthcare-pharmaceuticals/nestle-widens-french-infant-formula-r...
2•fkdk•1h ago•0 comments

I've used AI to write 100% of my code for a year as an engineer

https://old.reddit.com/r/ClaudeCode/comments/1qxvobt/ive_used_ai_to_write_100_of_my_code_for_1_ye...
2•ukuina•1h ago•1 comments

Looking for 4 Autistic Co-Founders for AI Startup (Equity-Based)

1•au-ai-aisl•1h ago•1 comments

AI-native capabilities, a new API Catalog, and updated plans and pricing

https://blog.postman.com/new-capabilities-march-2026/
1•thunderbong•1h ago•0 comments

What changed in tech from 2010 to 2020?

https://www.tedsanders.com/what-changed-in-tech-from-2010-to-2020/
3•endorphine•1h ago•0 comments

From Human Ergonomics to Agent Ergonomics

https://wesmckinney.com/blog/agent-ergonomics/
1•Anon84•1h ago•0 comments

Advanced Inertial Reference Sphere

https://en.wikipedia.org/wiki/Advanced_Inertial_Reference_Sphere
1•cyanf•1h ago•0 comments

Toyota Developing a Console-Grade, Open-Source Game Engine with Flutter and Dart

https://www.phoronix.com/news/Fluorite-Toyota-Game-Engine
2•computer23•1h ago•0 comments

Typing for Love or Money: The Hidden Labor Behind Modern Literary Masterpieces

https://publicdomainreview.org/essay/typing-for-love-or-money/
1•prismatic•1h ago•0 comments

Show HN: A longitudinal health record built from fragmented medical data

https://myaether.live
1•takmak007•1h ago•0 comments

CoreWeave's $30B Bet on GPU Market Infrastructure

https://davefriedman.substack.com/p/coreweaves-30-billion-bet-on-gpu
1•gmays•1h ago•0 comments
Open in hackernews

Oniux: Kernel-level Tor isolation for any Linux app

https://blog.torproject.org/introducing-oniux-tor-isolation-using-linux-namespaces/
199•marcodiego•8mo ago

Comments

ericfrederich•8mo ago
They use hexchat as an example but do these processes run with the users configuration? Wouldn't this leak IRC usernames if you forget to change it. ... Or leak cookies if you launch a browser?
charcircuit•8mo ago
What do you mean by leak usernames? It would leaks that a username uses tor. It would still leak that all of the usernames connecting to the same IRC host would be the same person.

IRC seems pretty dangerous if you want to remaining anonymous considering how many people are logging disconnection times allowing them to be correlated with other network disruption events.

01HNNWZ0MV43FF•8mo ago
Irssi iirc used to default your username to your system username, so noobs would leak their given name by accident. After seeing that I changed my username in Linux to always be the most common username
SV_BubbleTime•8mo ago
What is the most common Linux username though? Obviously you don’t want to do your regular work as root. And guest has its own issues.

Is there a “common name”?

tbrownaw•8mo ago
Not sure about "most common", but I have some vms that use `user` as the username.
Xevion•8mo ago
admin
romnon•8mo ago
ubuntu
Fnoord•8mo ago
root
user32489318•8mo ago
Robert'); DROP TABLE Students;-- Roberts
PaulDavisThe1st•8mo ago
root?
ericfrederich•8mo ago
I was talking more about you using HexChat with your preferred username "FooBar", but then when on Tor you want to be "SpamEggs". If you launch HexChat through oniux and it reads your config file, you might hit the login button before changing your name from FooBar to SpamEggs.
47282847•8mo ago
Tor is anonymizing you primarily from the network. There are many use cases where you do want to be authenticated/known to whoever you are talking to. You just want observers to not know.

In your example of correlation of connection times, it may not be your goal to remain anonymous from the network and its participants, you may be interested in the location-hiding properties, and/or adversarial networks (like local government or corporate networks) and firewalls.

alfiedotwtf•8mo ago
Separation of concerns - although Tor goes to great lengths to prevent fingerprinting, Tor and Oniux’s main aim IMHO is to make the source IP untraceable.

Same thing could have been said about using Tor to login to Gmail (if it were not HTTPS).

alfiedotwtf•8mo ago
The DevEx is beautifully done here i.e it’s idiot-proof! Nice work to the people behind this <3
brians•8mo ago
It’s really, really not. Idiots are ingenious. The operational care to use this in ways that preserve anonymity is beyond most users.
ahmedfromtunis•8mo ago
Does this mean one can now access tor websites using chrome?
acheong08•8mo ago
You always could by just setting the proxy environment variables (or in settings). The standard port for the tor daemon is 9050.

In fact, it's relatively easy to write a socks proxy that lets you route traffic through a arbitrary protocols. For example, I can serve/visit websites on syncthing with a socks5 proxy as a translation layer: https://github.com/acheong08/syndicate

stepupmakeup•8mo ago
Chrome has zero user-facing proxy controls of its own on Windows, nor PAC support. But the --proxy-server command line argument works.
kyguy23•8mo ago
You can, but please don’t do this, you’ll stick out even more! Tor browser has a series of anti fingerprinting strategies that chrome doesn’t
OsrsNeedsf2P•8mo ago
Does Brave attempt to mimic any of these anti fingerprinting strategies? Asking because it has a "Private tab with Tor" feature
fatchan•8mo ago
No. First of all, just check for `navigator.brave`. If it exists, it's Brave. When I ran a .onion site I added a JavaScript check and if navigator.brave was present, it redirected users to a specific page saying:

> Hey, there's something funny about your Tor Browser. When browsing Tor hidden services (.onion), you should be using Tor Browser. Are you using an outdated version, or perhaps something else entirely?

Brave is chrome. Tor browser is firefox, has a bunch of tweaks, different default settings, and a different fingerprint. Also when browsing on Tor, you should disable JavaScript as it's a source of many vulnerabilities.

orbital-decay•8mo ago
The main strategy is that most people on Tor are using Tor Browser. This creates a cluster big enough to blend in. If you're using anything else, you're sticking out.
jeroenhd•8mo ago
I don't think anonimity is a concern for people who still use Chrome at this point.

It does allow accessing onion sites, though, even though anyone running an onion site will probably tell you that it's a terrible idea to use plain Chrome to access them.

mjg59•8mo ago
Huh. I had a conversation with a Tor developer on this topic about a decade ago, when network namespaces were still kind of a new hotness - the feedback I got was that it would be an easy way for people to think they were being secure while still leaking a bunch of identifiable information, so I didn't push that any further.
computerfriend•8mo ago
Strange, because torsock and torify do the same thing, but less robustly.
gobip•8mo ago
When you have torsocks or torify for everything, you're gonna leave your footprint through tor, whereas something like Tor Browser is designed specifically not to leave any print on the web.

Using tor directly on the kernel level means that your DNS is gonna leak. Your OS telemetry is gonna leak etc.

It's still a good idea but it should be implemented top to bottom and nothing left in between, otherwise you're de-anonymized quickly.

ajb•8mo ago
I think the tor folks made a fundamental strategic error by pushing that line. Yes, people who face a serious threat need to use tor browser and still pay attention to other ways to leak etc. But if we'd got 'tor everywhere' it would still make mass surveillance a lot harder. For one thing, today mass surveillance can detect who is using tor. If everyone was using it that wouldn't matter.
natmaka•8mo ago
Isn't all this reserved to TCP, in other words in which way may it protect non-TCP activity?
charcircuit•8mo ago
Non-TCP activity wouldn't route and will fail to send.
izhak•8mo ago
UDP wouldn't route?..
charcircuit•8mo ago
Yes.
c0balt•8mo ago
The TOR protocol does not natively support UDP, though there are workarounds[0]

[0]: https://www.whonix.org/wiki/Tunnel_UDP_over_Tor

natmaka•8mo ago
Thank you, therefore my first impression seems right: without any provision for UDP this isn't an easy-to-setup and transparent way for any user to preserve his/her privacy.
HappMacDonald•8mo ago
As always this will depend on your definition for "any user".

Users who try to do a lot of UDP traffic will have to change their habits, yes. But a majority of users who don't know a lot about computers rarely do anything on a PC that isn't driven by the browser anyway.

But at least the users who try to use UDP won't wind up specifically leaking info, just wind up slightly confused why certain things aren't working.

heavyset_go•8mo ago
Note that you can use the Tor daemon as a normal DNS via UDP server and it will resolve your DNS requests over the network for you.

Maybe I'm wrong, but it seems similar to I2P where if you want "UDP", you'd need bespoke plugins/transports/whatever for each application.

mmooss•8mo ago
What do Tor Browser users do for YouTube or DNS? Also, what about HTTP/3?
FrostKiwi•8mo ago
DNS is already done by Tor. In fact, if you feed it a raw IP, it will warn in tor's output that it received an IP, which may indicate that the user has accidentally setup browsing via Tor, but DNS resolution via a normal, unsecured way.

YouTube mainly throttles TOR hard and it's a bit of a fight uphill against a never ending avalanche of Captchas or a straight up service refusal. Bridges solve this, by going through exit nodes that are not publicly listed to be TOR exist nodes. Even with bridges it's still a high chance to trip Google's bot detection.

HTTP/3 is unsupported.

mmooss•8mo ago
Thanks.

> YouTube mainly throttles TOR

What I mean is, streaming media usually uses UDP (I don't know about YouTube, but I'd guess that's the case) and according to this thread, Tor routes only TCP and not UDP. So is YouTube and other streaming media being routed around Tor?

LegionMammal978•8mo ago
> (I don't know about YouTube, but I'd guess that's the case)

YouTube delivers video in chunks over the standard HTTPS port 443, as does Twitch. YouTube supports HTTP/3, so it will use UDP via QUIC if your browser and network also support it, but otherwise it will simply go over TCP.

mmooss•8mo ago
Thanks!
yencabulator•8mo ago
I don't know the details, but https://gitlab.torproject.org/tpo/core/onionmasq says

> This project is an attempt to implement a simple user-space network stack that can handle TCP *and UDP* state such that it is possible to forward the traffic into the Tor network.

tobias2014•8mo ago
Oniux seems like an "officially" supported tool similar to orjail (which hasn't received a commit in four years, but still works great as a shell script with iptables/iproute tools [1]). Orjail has also an option to run with firejail for further isolation, which seems to be still a feature that Oniux doesn't have.

[1] https://github.com/orjail/orjail/blob/master/usr/sbin/orjail

1vuio0pswjnm7•8mo ago
No Javascript URL:

https://raw.githubusercontent.com/orjail/orjail/master/usr/s...

hexo•8mo ago
Nice, now please rewrite the prototype in C and will happily use it.
jsiepkes•8mo ago
It's written in Rust. What would you need a C version for?
matt3210•8mo ago
So I can read it to make sure it's not doing bad things.
saagarjha•8mo ago
Consider learning Rust.
jsiepkes•8mo ago
"make sure it's not doing bad things" is never going to happen. Just look at the XZ attack (which is written in C) or the "The International Obfuscated C Code Contest" [1].

Also you might want to read "Reflections on Trusting Trust" [2].

[1] https://www.ioccc.org/

[2] https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_Ref...

mike-cardwell•8mo ago
Instructions on front page for install don't work. Need to change the version number from 0.4.0 to 0.5.0

  cargo install --git https://gitlab.torproject.org/tpo/core/oniux oniux@0.5.0
mike-cardwell•8mo ago
Hmm. I assumed this worked like torsocks in that it would direct traffic through the locally running tor daemon. However, I've noticed that if I stop the locally running tor daemon, oniux still works whilst torify and torsocks do not. [edit] The documentation does actually say this. Pretty neat.

It works inside docker as well, but I needed to use --privileged. Just copied the binary into a debian:12 container and it works there:

  docker run -it --rm --privileged -v "$PWD/oniux:/usr/bin/oniux" debian:12
yencabulator•8mo ago
I would assume this uses the Rust rewrite as a library, not the older C daemon.

https://tpo.pages.torproject.net/core/arti/

Aissen•8mo ago
Fun fact, this has been broken with curl for 5 years (and so are the blog examples), because Tor developers previously insisted that apps shouldn't attempt to resolve .onion domain names: https://daniel.haxx.se/blog/2025/05/16/leeks-and-leaks/

I hope they can find a resolution.