frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Show HN: Expose any web application to your Tailscale Tailnet

https://github.com/shayne/tsnet-serve
1•pcpuser•2m ago•0 comments

Hardware-Software Interface – what they did not teach you in architecture class

https://thevivekpandey.github.io/posts/2025-05-25-hardware-software-interface.html
1•thevivekpandey•3m ago•0 comments

Trump deploys 2k National Guard members after Los Angeles immigration protests

https://abc7.com/post/protests-erupt-immigration-customs-enforcement-raids-los-angeles-california/16690197/
1•tomrod•3m ago•1 comments

LayerPeeler: Autoregressive Peeling for Layer-Wise Image Vectorization

https://arxiv.org/abs/2505.23740
2•andybak•5m ago•0 comments

Ask HN: Share real complaints about outsourcing data annotation

1•yogoism•8m ago•0 comments

Whither Help Scout?

https://bitsplitting.org/2025/04/30/whither-help-scout/
1•tosh•10m ago•0 comments

Linux or Landfill? End of Windows 10 Leaves PC Charities with Tough Choice

https://www.tomshardware.com/software/operating-systems/linux-or-landfill-end-of-windows-10-leaves-pc-charities-with-tough-choice
2•Filligree•10m ago•0 comments

Swift 6 Productivity in the Sudden Age of LLM-Assisted Programming

https://daringfireball.net/linked/2025/06/07/swift-6-llms
1•tosh•15m ago•0 comments

Life in 2045

https://www.instagram.com/reel/DKkrY-Th2zN/
2•Kaibeezy•17m ago•0 comments

Dancing brainwaves: How sound reshapes your brain networks in real time

https://www.sciencedaily.com/releases/2025/06/250602155001.htm
1•lentoutcry•18m ago•0 comments

Nanobrowser: Open-Source Chrome extension for AI-powered web automation

https://github.com/nanobrowser/nanobrowser
1•simonpure•23m ago•0 comments

DejaGNU (2011)

https://www.airs.com/blog/archives/499
1•fanf2•24m ago•0 comments

Google Wins Copyright Claim Dismissal in Publishers' Textbook Piracy Lawsuit

https://torrentfreak.com/google-wins-copyright-claim-dismissal-in-publishers-textbook-piracy-lawsuit-250608/
2•Improvement•28m ago•1 comments

Top Vibe Coding Tools to Boost Your Productivity

https://medium.com/developersglobal/top-vibe-coding-tools-to-boost-your-productivity-c5644d2548f8
2•dhanushnehru•29m ago•0 comments

Show HN: AISheets: PDF-to-interactive worksheets (with LaTeX support)

https://www.aisheets.study/
1•pk97•31m ago•0 comments

The Secret Engine That Makes Go 10x Faster Than You Think

https://dhanushnehru.medium.com/the-secret-engine-that-makes-go-10x-faster-than-you-think-5d3317334a27
2•dhanushnehru•31m ago•0 comments

Show HN: A Minimal Productivity Dashboard on a Raspberry Pi

https://github.com/108charlotte/magic-mirror
1•108charlotte•32m ago•0 comments

Show HN: Merge Images

https://mergemyimages.com/
1•artiomyak•37m ago•0 comments

Show HN: I built a real-time dashboard to visualize my hourly earnings

https://www.bobo.wtf/
2•barisbll•46m ago•0 comments

No JS, No BS Ethical Web Analytics

http://trop.in/blog/no-js-no-bs-ethical-web-analytics
1•true_pk•50m ago•0 comments

Junited 2025

https://birming.com/2025/06/01/junited/
1•DamonHD•55m ago•1 comments

White House security staff warned Musk's Starlink is a security risk

https://www.washingtonpost.com/technology/2025/06/07/starlink-white-house-security-doge-musk/
6•doener•55m ago•2 comments

The Number of Satellites Launched into Space

https://twitter.com/MAstronomers/status/1931417310532645130
1•keepamovin•1h ago•1 comments

Stefan Zweig Followed His Europe into Suicide (2017)

https://www.theamericanconservative.com/stefan-zweig-followed-his-europe-into-suicide/
1•Michelangelo11•1h ago•0 comments

Ask HN: How to learn CUDA to professional level

28•upmind•1h ago•11 comments

I got a remote job for a EU company, I'd find it hard to go back to a US-based

https://www.businessinsider.com/remote-work-european-company-us-work-life-balance-2025-6
30•nixass•1h ago•38 comments

Apple Is on Defense at WWDC

https://www.theverge.com/apple/681739/wwdc-2025-epic-trial-apple-intelligence
18•pseudolus•1h ago•1 comments

Pen.el (A Holy OS)

https://github.com/semiosis/pen.el
3•qifzer•1h ago•0 comments

Keeping Ahead of Contagion

https://press.asimov.com/articles/contagion
1•mu0n•1h ago•0 comments

What I've Learned from 15 Years of Doing OKRs

https://eleganthack.com/what-ive-learned-from-15-years-of-doing-okrs/
1•adrianhoward•1h ago•0 comments
Open in hackernews

Why not use DNS over HTTPS (DoH)?

https://www.bsdhowto.ch/doh.html
39•Bogdanp•3h ago

Comments

ggm•3h ago
Eh. He doesn't discuss which public dns upstream supports dtls and in some sense it's just picking who snoops, ie he argues against cloudflare snooping but doesn't discuss who else might.

Run hyperlocal root, run your own dns.

His "don't move off 22 for ssh" is also just opinion. He argues "you will be found" but misses the experience of those of us running on shifted ssh is continuously validated by the visibly lower level of probes we see. He offers no mathematical analysis of how quickly a port knock sequence will be uncovered, and again dismisses it as infeasible and useless.

I've got nothing against strongly held opinions and these are his. But, form your own opinions too.

throwaway81523•2h ago
Yeah I get almost no login attempts on ports other than 22. Should I even care about attempts on 22 though? They bounce off, and fail2ban blocks the IP after a while.

I sometimes think of putting my private servers on completely random IP addresses drawn from /64 IPv6 ranges. It should be near-impossible to find those by address scanning, unless I'm overlooking something dumb. Am I? It wouldn't surprise me.

tialaramex•2h ago
An arbitrary IPv6 address is indeed not practical to find by scanning. However, unless you're willing to type in that 128-bit value each time you need it (which maybe you are) you'll advertise this address somehow and if you do that your advertisements can be read by others.

For example suppose you put my-private-server.vanity-domain.example in DNS with an AAAA pointing to your private server - "passive DNS" service means big DNS providers will sell the answers they saw when anybody (say, yourself, on somebody else's computer) asks AAAA? my-private-server.vanity-domain.example. They don't reveal who asked, so this isn't personal information, but they do reveal what the question was and its answer.

A long time ago we used this to build target portfolios, if we're going to sell your company our product X, this is way we can see that you already have products A, B and C, but not D, E or F so we look a bit smarter coming into the sale.

KwanEsq•2h ago
Couldn't you just make my-private-server.vanity-domain.example a manual /etc/hosts entry to prevent advertising it?
kvdveer•1h ago
You could. You'd only have the ability to log in from your own machine though. If that compromise works is very much dependent on your situation.
hk1337•1h ago
Just as easy, you could just set the Host in your ssh config. Then you don’t have to deal with dns
miyuru•1h ago
For a real world example, I use IPv6 only SSH+public DNS and my fail2ban has 2 fails for a uptime with 285 days.
j0057•1h ago
I agree that sooner or later your SSH port will end up on Shodan anyway. Putting SSH behind a Wireguard VPN solves this completely.
mhitza•1h ago
I'm going to mention again dns0.eu which does support DNS over TLS. I haven't looked in-depth but I'm pretty sure some corporate networks block it somehow because on some networks my Android phone fails to connect to it.
ignoramous•42m ago
If privacy is your concern then dns0.eu is not "no logs" (like BlahDNS or Mullvad DoH/DoT are, for example). They share "anonymized intelligence feeds" with their partners: https://docs.dns0.eu/threat-intelligence-partners/anonymized...
btasker•59m ago
> His "don't move off 22 for ssh" is also just opinion. He argues "you will be found"

Worse than that, that post misunderstands it's own statement:

"Sure, you will see fewer attacks than before, but most of the attackers are no longer just stupid bots"

That's a *good* thing, because the move has reduced the signal to noise ratio. By getting rid of most of the crufty noise of the internet, you now know that anything hitting your logs now is more likely to be an actual threat than the poorly automated dictionary attack bots.

Moving SSH to a different port doesn't make the system much more secure (and definitely shouldn't be the only thing you do), but it does generally enable you to be more responsive.

deknos•2h ago
is it possible to route DoH over generic HTTPS service when i only inspect a certain route? so i could have a generic https-server, where at some route, DNS requests are answered, other stuff just gives me a normal website?

because then we could use DoH for hiding our DNS requests..

crabique•1h ago
This is how it works already, the DoH endpoint is "/dns-query", both CloudFlare and Google route this endpoint to their resolver services, while the rest of the site (one.one.one.one or dns.google) is just a website.
btasker•1h ago
Yes.

DoH requests go to /dns-query so you only need that path to proxy onto your DoH handler.

Some DoH clients will also allow you to specify a custom path, so you can also obfuscate the path by configuring client and server to use /foobar instead.

But, re-using an existing site does come at the cost of generating a bunch of extra log noise (fine if it's just you, not so fine if it isn't). If you don't have some kind of auth in place, you might also find that you suddenly come under a lot of load (when I ran a public DoH service, I eventually started getting a lot of traffic from users in an authoritarian country)

creata•1h ago
The points here aren't technically wrong, but it still feels like disabling DoH would be a reduction in security. For example:

> Cloudflare gets all your DNS queries.

That's true, but Cloudflare is more trustworthy than my ISP, and probably most people's ISPs.

> Complexity is the enemy of security.

That's true, but that's no reason to go from an imperfect solution to a nonsolution.

> there is DNS over TLS

That doesn't solve most of the issues that the author brought up.

> How does a modern company in the IT business earn money? By selling data.

Maybe I'm naive, but I thought they made money by using all the data they collect for better threat prevention, and from their paid services.

archerx•1h ago
> That's true, but Cloudflare is more trustworthy than my ISP, and probably most people's ISPs.

Based on what?

ignoramous•1h ago
> Based on what?

The bar is real low, mostly for the fact that ISPs are mandated by law in most if not all countries to track traffic flowing through their pipes.

Cloudflare provides relatively better privacy guarantees for the public DNS resolvers it runs: https://developers.cloudflare.com/1.1.1.1/privacy/cloudflare...

pacifika•1h ago
In the UK you can typically pick from a dozen ISPs, some of which are more trustworthy
ortichic•1h ago
Can you also choose which company provides the physical infrastructure that connects to your home?
tialaramex•1h ago
If you live in a city or other urban area, typically you have the option of the decoupled telco (BT Openreach) that more or less everybody has, the entity which bought all the cable television companies (Virgin Media) and usually a fibre-for-purpose Internet company that decided to do your city or region.

If you live in a rural area where people are co-operative, there might be a community owned fibre operator plus Opeanreach, otherwise just Openreach.

If you live somewhere very silly, like up a mountain or on your own island, your only practical option will be paying Openreach to do the work.

Edited to add, Notably: Only Openreach is usable by an arbitrary service provider. So if you want to pick your service provider separately, the actual last mile delivery will always be Openreach. And if they're small it won't just be last mile, Openreach also sell backhaul to get your data from some distant city to the place where the ISP's hardware is, you're buying only the, like, actual service. Which is important - mine means no censorship, excellent live support and competent people running everything, but the copper under the ground is not something they're responsible for (though they are better than most at kicking Openreach when it needs kicking)

chaz6•50m ago
CityFibre is only available through wholesale ISP's. Other smaller alt-nets (such as the one I work for - Netomnia (including Brsk/YouFibre)) is gearing up to provide wholesale access.

In the UK there are even aggregators like Fibre Café [1] that makes it easier for ISP's to connect through multiple networks.

[1] https://fibrecafe.co.uk/

chaz6•52m ago
If you are lucky, yes. For example, I have a choice between CityFibre (XGS-PON), Openreach (GPON) and Virgin Media (DOCSIS) as well as 2 different 5G networks. It is rare for a property to only be covered by a single wired network these days in the UK.
chgs•1h ago
CF certainly less trustworthy than my isp which is shibboleth compliant.

CF issues are dealt with “hope to get a post on HN trending”.

Or my vpn provider.

bigfatkitten•1h ago
My ISP is bound by robust privacy, telecommunications interception and other legislation.

Cloudflare, on the other hand is based in a foreign jurisdiction that offers none of these protections.

zinekeller•1h ago
> My ISP is bound by robust privacy, telecommunications interception and other legislation.

It really depends on which jurisdiction are you in, unfortunately. US ISPs are selling everything they can hover (including DNS information) to advertisers, and it is impossible to switch to another one unless you're lucky (because the monopoly is essentially maintained).

waynesonfire•44m ago
And until TLS is made secure they'll continue to rape privacy by scraping your https traffic.
drykiss•1h ago
They don't really say if DoT is safer. I'm more confused than informed by this article. Would've been nicer if they provided some proofs or data to back up their claims.

Also, does anyone know what's the safest option? And how to configure it for all our home devices?

jedisct1•1h ago
Anonymized DNSCrypt and Oblivious DoH are designed to keep your IP address hidden from resolvers, and there are DNS relays located all over the world. If you truly care about privacy, use anonymized DNS, not DoH.
sudahtigabulan•1h ago
His proposed alternative, DoT, still has one known peeper, and is easier to block. DoH, OTOH, looks like regular HTTPS traffic and is on port 443. So the abuse of HTTP is not "unnecessary", you get something in return.

In some situations, DoT is fine. In others, it won't work, but DoH will.

xrmagnum•1h ago
I find it problematic that this article recommends disabling DoH, which leaves users with unencrypted DNS — still centralized (e.g. to Google’s 8.8.8.8 or an ISP) and now vulnerable to man-in-the-middle attacks. Replacing one form of centralization with another while giving up encryption doesn’t improve privacy — it worsens it.

If the goal is to reduce centralization, a better approach would be to use encrypted DNS (DoH or DoT) with resolver rotation or randomization. That way, users retain privacy from local networks and ISPs without concentrating all DNS traffic in a single provider’s hands.

WhyNotHugo•1h ago
Disabling DoH in your browser’s settings should make it fall back to you system’s resolver.

You’ll only be vulnerable to a MitM attack if your system’s resolver is insecure and also vulnerable to a MitM attack.

sammy2255•1h ago
(which all are by default)
exiguus•39m ago
If you're looking to implement encrypted DNS with multiple servers or providers, consider using unbound, which supports TLS resolvers and can operate in recursive mode. Alternatively, you might opt for AdGuard DNSProxy or dnscrypt-proxy, both of which support DNS over HTTPS (DoH), DNS over TLS (DoT), and DNSCrypt. You can run these tools on your local network or computer and configure your resolve.conf to point to them.
om8•1h ago
I trust cloudflare more than my ISP, since I live in a place where internet is very state controlled.

Some of the websites just don't open without DoH.

elashri•1h ago
I think one way or another you will have to trust some entity with your DNS. Unless you are willing to use tor all the way on OS level. Even running your own recursive DNS resolver will leak your IP to root servers. Put VPN in front of it and know you trust this VPN company (kudos Mullvad).

And abusing https is for a good reasons. Blocking ports 53 and 853 is easy and many ISPs will do that.

The author also make it feel like the only option is to use cloudflare DoH on Firefox while that's the first option, there is also nextdns and custom field. There are many providers I would trust more like quad9 and Mullvad DoH.

I think the reasons why not to use DoH is the same for why not using public dns from providers you don't trust anyway.

Most of the people are happily using 8.8.8.8 and handing all their dns information to the biggest advertisement company in the world. Or wosre, using their ISP provided DNS.

btasker•1h ago
> The author also make it feel like the only option is to use cloudflare DoH on Firefox

In fairness, the date on the post is 2018 - when Firefox first launched this, Cloudflare was the only option

elashri•1h ago
Now that makes more sense regarding this point. I missed the date. I think the submission title needs (2018).
mercora•1h ago
its funny you call out Mullvad in this specific case because its the one thing i really dislike about their VPN service. It wont route DNS to the root server, or any designated server really. They redirect DNS queries to their cache indiscriminately. which actually will harm the success of setting up a recursive resolver. I get this is done to prevent leaks, i would just like the option to opt out of it. been customer for many years now though. I use unbound semi recursively resolving using a forwarder with DNS over TLS. So Mullvad is not burdened with what i resolve and the forwarder not with information on who.
tester756•1h ago
wtf is this?

>Is there an alternative way?

What about just using different provider that you trust?

What if I trust Cloudflare more than I do trust my ISP?

spiffyk•1h ago
Alright so the article's tl;dr says to not use DoH as it merely reduces the number of peepers to one (which firstly is a good thing and secondly also offers protection against UDP spoofing attacks)... then goes on to recommending DoT, which would suffer from the exact same (non-)issue, but also actually gets to the actual problem with DoH, which is that the HTTP part has no business being there and increases complexity, which I as a former DNS resolver implementor wholeheartedly agree with!

Why discredit the whole post by adding an irrelevant tl;dr?

arbll•1h ago
Ah yes I'm going to disable DoH and go from trusting a central entity to trusting another central entity and everyone else on the wire.

Article is a bunch of strong opinion with nothing to back them.

exiguus•49m ago
I concur and generally advise against using large corporate DNS providers. Instead, consider setting up your own DNS infrastructure, such as your own recursive servers, or opt for a trustworthy DNS provider like Freifunk or CCC, rather than Google, Cloudflare, or Quad9.

The advantages of self-hosting recursive servers include complete configurability, absence of censorship, tracking, and rate limits. However, like any self-hosting solution, it requires an investment of time and money. It's also important to note that DNS lacks an authentication layer, so for access restrictions, it should be placed within a private network or VPN.

The issue of pre-configured DNS over HTTPS (DoH) in many browsers and mobile devices can be addressed through firewall rules on your router.

For creating your own DNS infrastructure, I recommend dnsdist if you have ample time, though bind and unbound are also viable options.

For the past three years, I have been running dnsdist with recursive servers on two ARM VPS instances, costing around 14 EUR per month. This setup provides me with DNS over TLS (DoT), DoH, and other features. I use them with unbound (TLS) or dnsproxy and dnscrypt-proxy across routers, servers, and other machines. For mobile devices, I utilize DoH directly.

Previously, I used bind in recursive mode without any encryption beyond SSH tunneling or VPN.

Alternatively, I can recommend ffmuc as a DNS provider.

c0l0•45m ago
I also run my own recursive DNS server on a VPS I rent, but I freely share it with other users of the Internet. This causes my "personal" signal of queries to authoritative servers to effectively disappear, and I also (marginally) benefit from caching effects of other users' lookups.
victorbjorklund•32m ago
Are there any security risks with sharing it wiyh others?
c0l0•23m ago
Well, concerning technical risks, DNS Cache Poisoning[0] is a thing - but I keep the software implementing my recursive DNS service up to date very eagerly, so I guess the risk of falling victim to such an attack is rather low.

[0]: https://en.wikipedia.org/wiki/DNS_spoofing#Cache_poisoning_a...

exiguus•32m ago
I haven't taken this step yet, but I have considered it. Could you recommend whether I should share the service on a list such as dnscrypt.info/public-servers?
c0l0•21m ago
I was not aware of such a directory existing in the first place :) I only advertise "my" service (it only implements DNS and DoT) through word of mouth in communities I participate in.
creatonez•43m ago
DNSCrypt has a list of DoH and ODoH resolvers other than Cloudflare: https://github.com/DNSCrypt/dnscrypt-resolvers