frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

How do SO_REUSEADDR and SO_REUSEPORT differ?

https://stackoverflow.com/questions/14388706/how-do-so-reuseaddr-and-so-reuseport-differ
1•turrini•1m ago•0 comments

Elon Musk says he'll form the 'America Party' if 'insane' spending bill passes

https://www.businessinsider.com/elon-musk-vows-create-america-party-trump-spending-bill-passes-2025-6
3•MilnerRoute•2m ago•0 comments

The Decline and Fall of Our So-Called Degreed Experts

https://web.archive.org/web/20250630212253/https://www.zerohedge.com/geopolitical/decline-and-fall-our-so-called-degreed-experts
1•maga_2020•2m ago•0 comments

MTPNet: Multi-Grained Target Perception for Unified Activity Cliff Prediction

https://github.com/ZishanShu/MTPNet
1•PaulHoule•3m ago•0 comments

Trump officials create searchable national citizenship database

https://www.theguardian.com/us-news/2025/jun/30/trump-citizenship-database
2•monkaiju•4m ago•0 comments

After nine years, Ninja has merged support for the GNU Make jobserver

https://thebrokenrail.com/2025/06/30/ninja-jobserver.html
1•signa11•5m ago•0 comments

Killer whales groom each other–with pieces of kelp

https://www.science.org/content/article/killer-whales-groom-each-other-pieces-kelp
1•noleary•5m ago•0 comments

UN says infants face death as formula milk runs out

https://www.youtube.com/watch?v=9ZFfUIuFMso
1•NomDePlum•5m ago•0 comments

The Unseen Fury of Solar Storms

https://www.noemamag.com/the-unseen-fury-of-solar-storms/
2•gmays•8m ago•0 comments

Saturated Fat and Cardiovascular Disease: Systematic Review (2025)

https://www.jmaj.jp/detail.php?id=10.31662%2Fjmaj.2024-0324
1•felixbraun•9m ago•0 comments

How to use AspireUpdate to update WordPress and plugins

https://wp-expert.ch/en/2025/06/30/how-to-use-aspireupdate-to-update-wordpress-and-plugins-through-the-repository-of-your-choice/
1•swissgeek•13m ago•1 comments

On-Demand GPU Clusters – Spin up TCP clusters across cloud providers easily

https://gpus.exla.ai/
2•viraatdas•17m ago•1 comments

If you're using Microsoft Authenticator to store your passwords, don't

https://www.engadget.com/cybersecurity/if-youre-using-microsoft-authenticator-to-store-your-passwords-dont-225842265.html
4•mikece•18m ago•0 comments

The Talk Show: 'The Cutting Edge Latest Supermodel'

https://daringfireball.net/thetalkshow/2025/06/30/ep-426
1•Bogdanp•18m ago•0 comments

Honda launches its own reusable rocket

https://www.msn.com/en-us/money/other/honda-launches-and-lands-experimental-reusable-rocket-in-test/vi-AA1HEdER
1•nothrowaways•20m ago•0 comments

Show HN: Cursor for Fitness

https://apps.apple.com/us/app/forceai-ai-workout-generator/id6745457470
1•asdev•21m ago•0 comments

Canon selphy cp1500 privacy concerns

1•azca•22m ago•0 comments

Public release of W3C's 2025-2028 strategic objectives initiatives

https://www.w3.org/blog/2025/public-release-of-w3cs-2025-2028-strategic-objectives-initiatives/
1•pentagrama•25m ago•0 comments

Supreme Court rebuffs bid to protect Coinbase user data from IRS

https://www.bloomberg.com/news/articles/2025-06-30/supreme-court-rebuffs-bid-to-protect-coinbase-user-data-from-irs
5•1vuio0pswjnm7•26m ago•0 comments

Elon Musk Amicus Brief to US Supreme Court in Harper vs. IRS [pdf]

https://www.supremecourt.gov/DocketPDF/24/24-922/354291/20250328152757690_Harper%20-%20AC%20Brief_final.pdf
2•1vuio0pswjnm7•29m ago•0 comments

Unix Programmer's Manual (1971)

http://cm.bell-labs.co/who/dmr/1stEdman.html
2•xk3•34m ago•0 comments

Ask HN: Which skill do you believe will take the longest to be replaced by AI?

2•atleastoptimal•37m ago•1 comments

Accounting maneuver hides $3.8T in red ink from Trump's 'big, beautiful bill'

https://finance.yahoo.com/news/how-a-gop-accounting-maneuver-hides-38-trillion-in-red-ink-from-trumps-big-beautiful-bill-160900268.html
4•tzs•39m ago•0 comments

Pixelmator Pro Gets First Big Update Since Apple Bought It

https://petapixel.com/2025/06/30/pixelmator-pro-gets-first-big-update-since-apple-bought-it/
1•mikece•40m ago•0 comments

There's Always a Third Way

https://ironicreality.bearblog.dev/theres-always-a-third-way/
1•gabrycina•42m ago•0 comments

The Novelty of the Arpanet

https://twobithistory.org/2021/02/07/arpanet.html
1•xk3•43m ago•0 comments

IRS defends mass summons of Coinbase financial records at First Circuit (2024)

https://www.courthousenews.com/irs-defends-mass-summons-of-coinbase-financial-records-at-first-circuit/
1•1vuio0pswjnm7•43m ago•0 comments

Neocambria

https://www.aleksagordic.com/blog/neocambria
2•ai-epiphany•45m ago•0 comments

AI is Anti-Human (and assorted qualifications)

https://njump.me/naddr1qqxnzde58yerxv3exycrsdpjqgsf03c2gsmx5ef4c9zmxvlew04gdh7u94afnknp33qvv3c94kvwxgsrqsqqqa28nmz2vk
22•fiatjaf•45m ago•2 comments

Show HN: Built a simple colour palette generator – would love feedback

https://colorpal-sage.vercel.app/
1•mazahermuraj•45m ago•0 comments
Open in hackernews

The hidden JTAG in a Qualcomm/Snapdragon device’s USB port

https://www.linaro.org/blog/hidden-jtag-qualcomm-snapdragon-usb/
98•denysvitali•4h ago

Comments

mmastrac•4h ago
This is a much better experience than the previous Qualcomm debug experience, which was a hand-rolled set of read/write/execute primitives exposed over USB. It was hilariously undersecured, allowing a few of us to continually get root on various Qualcomm models.

In seriousness, these debug ports are seriously lacking in most mobile chipsets. MediaTek still has the old-style approach in many of their devices, requiring some incantations which expose serial over USB, but not in the way you think -- it's serial over USB pins!

I've done tonnes of work with mobile chipsets and security and this seems like they've finally started down the road to making this functionality accessible. Don't be surprised if you don't see this supported out of the box in most places, though. Most OEMs will certainly disable this once they've adapted their bootloaders to it. The big G doesn't like debuggability in end user devices.

Veserv•4h ago
Most of those boards have a separate physical JTAG connector (at least in development kits, this article indicates JTAG over USB is disabled in production systems anyways so no difference there) which is what they are expecting you to use for low-level debugging. It only costs like 1,000 $ for a JTAG probe which is like 1 fully-burdened engineer-day of cost. Even fully featured probes enabling hardware trace and time-travel debugging only cost like 1 engineer-week.
bri3d•3h ago
> Most of those boards have a separate physical JTAG connector (at least in development kits, this article indicates JTAG over USB is disabled in production systems anyways so no difference there

There's generally an entire phase of prototyping where engineers will be using production boards but still need JTAG, which is why it's fused and why these kinds of features exist. It's a lot easier to have your lower-level software team (drivers/BSP, perf, etc.) sitting with production-ready units provisioned with engineering keys and debug enabled than to have them having to use some kind of case-off JTAG header setup, cost aside.

Hizonner•3h ago
> this article indicates JTAG over USB is disabled in production systems anyways

Well, should be. I bet there've been screwups now and then...

AlotOfReading•2h ago
The probes cost enough to exceed individual purchasing limits at hardware companies, which means you need to go through the requisition process. That takes long enough that you have to plan ahead and you don't order more as your needs increase. Then everyone's fighting for the limited probes right before a ship date and they get jealously guarded like priceless jewels.

JTAG also isn't usually exposed through enclosures, so using the probe on a field unit might require destructive entry depending on the application.

Veserv•2h ago
Well the problem there is companies who are too stupid to invest in cheap tooling with massive ROI for their developers. A pretty constant problem in software development.

And I am not knocking JTAG over USB. It is certainly convenient and beneficial since you can enable it in production or deployed units. I was commenting on how the GP (and even article) was making it out to be missing capability. They just do not have the cheap tools that are the intended way to access that capability.

edit: The article even mentions how the "Qualcomm Landing Team at Linaro", which seems to be the team that works with pre-production hardware to get them working on launch day, has a development process where "debuggers have never been a staple of our work for all the typical reasons you'd expect (cost and complexity being the main ones)". That is literally the team that should have pre-production units in the lab which will have debug connectors and where JTAG probes should be par for the course, yet they are apparently hardly using them partly because of "cost".

IAmLiterallyAB•3h ago
Google exposes serial Serial over the SBU pins on all the Pixel devices
twojacobtwo•2h ago
What are the effective implications of this?
bri3d•2h ago
It's just a UART; you can use the UART to debug the device in various ways.

On Pixel devices, the UART is not configured or brought up by default in locked production mode (as things should be), but by unlocking the device and then using `fastboot oem uart enable` you can flip the bits to turn it on. On early Pixel devices it was on the headphone jack and on newer ones it's on the SBU pins.

By default I think it's still configured as the kernel console in the kernel command line, so once it's enabled it will show the kernel debug output and present a TTY. But of course you can subsequently configure it to do whatever you'd want a UART for: kgdb for kernel-debugging, earlier stuff in the bootloader, and so on.

So, the implications are just: there's a convenient debugging interface available to you that turns on if you unlock the device and ask for it.

On Chromebook devices there's a more complicated and fancy debugging system where the SBU pins can be muxed to the security processor's USB host interface by presenting a debug cable called a SuzyQ, which presents a whole suite of debugging facilities. This used to be used quite frequently for unbricking purposes.

Tharre•55m ago
On the newer pixel phones (starting with the ones containing the titan chip) you can also mux the SBU pins to the security chip USB interface with "fastboot oem citadel suzyq".

And BTW, the SuzyQ cable is nothing more then two pull up resistors and a USB hub connected to the normal usb D+/D- pins on one port and the SBU pins on the 2nd port. Nothing fancy about it, people have even made their own (minus the hub) by soldering some wires and resistors to a usb-c breakout board. Google has also published the schematics for it:

https://www.chromium.org/chromium-os/ccd/951-00273-01_201806...

tripdout•3h ago
It will be really interesting to see what production devices this is enabled on - It mentions the OnePlus 6 at least which has it fused out but is still accessible.

Edit: How are they reading the eFuses on a production OnePlus 6? Do they have a Qualcomm-signed EL3 EDL loader?

It seems to exist as qcom,msm-eud in the device tree of a (unfortunately production) SM4350 device I have along with an eud_enable_reg. Time to recompile the kernel with `/dev/mem`.

zorgmonkey•2h ago
yeah EDL loaders for a bunch of production devices exist here [0] also more on various XDA Forum posts for stuff like unbricking guides. It is worth noting for people who don't

[0]: https://github.com/bkerler/Loaders

tripdout•1h ago
But reading QFUSES specifically requires an EL3 loader "edl qfp qfp.bin -> To dump qfprom fuses (only on EL3 loaders)" and I don't believe most devices programmers (especially as relatively new as the OnePlus 6) run under that privilege level.
tripdout•1h ago
Well, no luck.

In the device tree I see (snippet):

  qcom,msm-eud@1628000 {
   compatible = "qcom,msm-eud";
   interrupt-names = "eud_irq";
   interrupts = <0x00 0xbd 0x04>;
   reg = <0x1628000 0x2000 0x162a000 0x1000 0x3e5018 0x04>;
   reg-names = "eud_base", "eud_mode_mgr2", "eud_tcsr_check_reg";
   qcom,secure-eud-en;
   qcom,eud-tcsr-check-enable;
   status = "ok";
  };

  qusb@162b000 {
   compatible = "qcom,qusb2phy-v2";
   reg = <0x162b000 0x400 0x1b40268 0x04 0x162f014 0x04 0x162a000 0x04>;
   reg-names = "qusb_phy_base", "efuse_addr", "refgen_north_bg_reg_addr", "eud_enable_reg";
   qcom,efuse-bit-pos = <0x19>;
   qcom,efuse-num-bits = <0x03>;
but `devmem 0x162A000 4 0x1` causes the system to lock up and I see the following in ramoops: ``` [ 433.720232] msm_watchdog f410000.qcom,wdt: Causing a QCOM Apps Watchdog bite! [ 433.727381] msm_watchdog f410000.qcom,wdt: Wdog - STS: 0xb01a6, CTL: 0x3, BARK TIME: 0x57fdf, BITE TIME: 0x6ffd6 ```

I'm not at all sure on the interpretation of this, but the reading at the efuse_addr (so I guess certain ones can be read from EL0?) is 0x0e000000 which has bits 25-27 set and QFPROM fuses seem to have a blown value of 1 according to Qualcomm docs, so it might be fused out?

dazhbog•3h ago
So just to get this straight, Qualcomm has a piece of custom silicon, as a peripheral controlled by registers, that when enabled reroutes the ARMs USB pins through it (adding a USB hub in the middle), and on that hub it adds a SWD programmer and a serial port that connect back to the ARM core's IOs? Amazing!
indrora•2h ago
Just wait until you find out about Apple's magical USB shenanigans like the Chimp Cable https://www.theiphonewiki.com/wiki/Chimp_Cable