frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Beloved 27-Year-Old Gaming Site Wipes Forums, Relaunches as Gambling Cash-Grab

https://kotaku.com/adventure-gamers-forums-gambling-ads-jack-allin-1851784764
1•jankydev•43s ago•0 comments

Is there a no-AI audience?

https://thatshubham.com/blog/ai
1•DorkyPup•54s ago•0 comments

How to hire force multipliers (not 10x engineers)

https://leaddev.com/hiring/how-hire-force-multipliers-10x-engineers
1•gpi•1m ago•0 comments

Best ways to make money from my ideas for startup of others

1•JohnSmith098096•2m ago•0 comments

Izzzzi – Slow Social Media

https://nnnnnnnn.co/izzzzi.html
1•UltimateEdge•3m ago•0 comments

EU businesses want a pause on AI regs to cope with unregulated Big Tech players

https://www.theregister.com/2025/07/04/eu_businesses_push_for_freedom/
2•rntn•5m ago•0 comments

Hide and seek: Uncovering new ways to detect vault apps on smartphones

https://techxplore.com/news/2025-06-uncovering-ways-vault-apps-smartphones.html
1•PaulHoule•7m ago•0 comments

India bars Jane Street from its securities market, citing manipulation

https://www.reuters.com/sustainability/boards-policy-regulation/india-regulator-bars-jane-street-accessing-its-securities-market-2025-07-04/
3•Bootvis•7m ago•0 comments

How to host web apps on a Mac Mini

https://www.contraption.co/how-to-host-web-apps-on-a-mac-mini/
1•chmaynard•8m ago•0 comments

Catching Prompt Regressions Before They Ship: Semantic Diffing for LLM Workflows

https://medium.com/@aatakansalar/catching-prompt-regressions-before-they-ship-semantic-diffing-for-llm-workflows-feb3014ccac3
1•aatakansalar•9m ago•0 comments

Rust and WASM for Form Validation

https://sebastian.lauwe.rs/blog/rust-wasm-form-validation/
2•slau•9m ago•0 comments

SimpleX: New experience of connecting with people in SimpleX Chat v6.4-beta.4

https://simplex.chat/blog/20250703-simplex-network-protocol-extension-for-securely-connecting-people.html
2•jaufmann•9m ago•0 comments

Show HN:FounderMatch – Lightweight dev/sales cofounder matching tool

https://foundermatch.mancerai.com/
1•Banquo•14m ago•0 comments

Windows 11 overtakes Windows 10

https://www.theregister.com/2025/07/04/windows_11_market_share/
1•olyellybelly•14m ago•0 comments

Dear Social Media

https://github.com/avivkeller/dear-social-media
2•avivkeller•17m ago•0 comments

Over 50% of Girls Failed Nepal's 10th Grade Exam in 2024–25

1•firstgenwriter•17m ago•0 comments

AI Openness Update: From Agentic to Public Good in 2025 [pdf]

https://openuk.uk/wp-content/uploads/2025/07/OpenUK-AI-Openness-update-report.pdf
1•mooreds•18m ago•0 comments

Pir Sadardin

https://en.wikipedia.org/wiki/Pir_Sadardin
1•mooreds•19m ago•0 comments

Show HN: Taurin. Local-First Email Client with Personal AI Agent

https://www.taurin.io/
1•ashbrother•19m ago•0 comments

Effective TikTok Content Strategies for Entrepreneurs

1•emmanol•23m ago•0 comments

Cowboy: An Agile Programming Methodology for a Solo Programmer (2006)

https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1740&context=etd
1•mooreds•24m ago•0 comments

Is an Intel N100 or N150 a better value than a Raspberry Pi?

https://www.jeffgeerling.com/blog/2025/intel-n100-better-value-raspberry-pi
3•transpute•25m ago•0 comments

My open source project was stolen and relicensed by a YC company

https://www.reddit.com/r/opensource/s/9fB5G4rhff
5•js4ever•25m ago•1 comments

Demicrosofted and simplified UEFI Secure Boot (RC1 demo) [video]

https://www.youtube.com/watch?v=sCohCVvcp7E
7•pietrushnic•29m ago•0 comments

Microsoft suspends 3k Outlook and Hotmail accounts created by NK IT workers

https://fortune.com/2025/07/04/microsoft-suspends-accounts-north-korean-it-worker-conspiracy/
2•Bluestein•30m ago•0 comments

Show HN: BunkerWeb – the open-source and cloud-native WAF

https://docs.bunkerweb.io/latest/
5•bnkty•38m ago•0 comments

Varoufakis: In age of failing economies and populist backlash we need Marxism

https://www.theguardian.com/commentisfree/2025/jul/03/marxism-economy-populism-tech-karl-marx
3•Anon84•44m ago•0 comments

Show HN: Fast Thermodynamic Calculations in Python

https://dlr-institute-of-future-fuels.github.io/gaspype/
7•Saloc•45m ago•0 comments

Must-install update for the Pixel 6a aims to tackle overheating issues

https://www.androidcentral.com/phones/google-pixel/this-must-install-update-for-the-pixel-6a-aims-to-tackle-overheating-issues
1•Bluestein•47m ago•0 comments

Type safe web stack with Rust and TypeScript

https://github.com/beeeeep54/rust-typescript
4•wreedtyt•51m ago•0 comments
Open in hackernews

Google says "not a security vulnerability", quickly fixes without attribution

https://groups.google.com/g/certificate-transparency/c/u8SsXgSFbz4/m/CThyzj-QBAAJ
42•Eikon•7h ago

Comments

ggm•5h ago
Judge Jury and Executioner, no appeal path, and no transparency on process.

Really Google, this isn't good. Yes, a breach of your code of conduct but no, not abusive, and you appear to have taken the input and acted on it without credit. That's Intellectually dishonest.

I don't know Pierre from a bar of soap. He could be a complete asshat. Does it alter the power imbalance here?

neptuneios•5h ago
Was the right outcome achieved in the end? Move on.
Etheryte•5h ago
If this is the way you treat people who report vulnerabilities, next time they're going to report them to the black market, not you. It's incredibly short sighted.
perbu•5h ago
The black market isn't going to care about it. It isn't really exploitable.
potatoproduct•5h ago
Very dishonest. Dismissing reports based on 'technical gotchas', but acting on them happens way too regularly and just kills responsible disclosure.
NaOH•5h ago
Dupe of a dupe of a dupe:

Tell HN: Google banned me for reporting CT vulns they fixed hours later - https://news.ycombinator.com/item?id=44454141 - 3 July 2025 (1 comment)

Tell HN: Google says "not vuln", fixes hours later without attribution - https://news.ycombinator.com/item?id=44456382 - 3 July 2025 (3 comments)

arp242•5h ago
"This is not a security issue" and "we can improve things here" are entirely compatible.

Also doesn't seem like a Google project?

perbu•5h ago
It isn't. Filippo is a x-googler that used to work on Go crypto for Google, so assumptions are easy to make.

The project seems to be sponsored by Let's Encrypt, fwiw.

eran-•5h ago
Exactly, the two statements aren’t contradictory. The fix was super simple, and Filippo (whom I don’t know personally) just went ahead and did it.

Also, bringing up Project Zero’s 30-day disclosure policy while complaining about someone sharing what they thought was a vulnerability report for visibility feels off. If it’s not a security issue, then there’s no reason it needs to be kept quiet. Grow up.

Let’s not turn harmless fixes into drama.

Calwestjobs•5h ago
Chill. It is just NSA backdoor. (joke)

BTW most common "self made crypto" misconfiguration is not discarding 0 byte data .... so just scanning for that you can get at least 10 000 sites in just US.

dodomodo•5h ago
The fact that something was fixed doesn't make it a security vulnerability, the "security vulnerability" here is equivalent to a command line tool not accepting weak passwords, defenetly something worth having, but not a vulnerability.
Eikon•5h ago
This is not true,

1. Operator correctly runs: cat /dev/urandom > seed.bin

2. Filesystem corruption fills seed with nulls/spaces (happens in production)

3. Sunlight silently generates predictable keys from corrupted seed

4. CT log operates "normally" - valid signatures, no errors

5. Anyone knowing about corruption can recreate the private keys

What other "end-user" crypto-related app runs with a user-produced seed to generate key pairs on the fly?

dodomodo•3h ago
this is out of scope for the project, it is insane to expect every software project to deal with random file system corruptions. if this kind of thing was considered a security vulnerability we would have 100x the vulnerabilities we have now.
handsclean•5h ago
The actual issue seems to be that some tools ask the user to provide a random seed, then accept anything non-empty, even if it’s too short or otherwise obviously not random. The reporter argues this is a critical security vulnerability, Google argues this is just a usability issue. Google subsequently added additional validation to make sure it’s also the right length.

Personally, I think usability issues can have security implications. Taken to the extreme, look at RSA: technically possible to use securely, but widely considered insecure because everybody screws it up. Modern crypto libraries are all about achieving better security by fixing footguns. This issue isn’t RSA, but I bet fully fixing this issue would make a small but tangible number of insecure users secure. I think Google should have a clear and spelled out policy re usability issues with security implications, and should give this guy at least some reward, even if it’s not the “critical vulnerability” he makes it out to be.

Eikon•5h ago
I think "critical" is due to the context, it's supposed to be trusted software that participates in the trusted public key infrastructure.

If your seed is corrupted, the whole model collapses. There's not a ton of diversity in CT implementations.

Lockal•4h ago
(standing on the gallows awaiting his execution) First time? :)

I've run into this a few times (only more so with Meta, not Google): well, they're within their rights not to pay. Purely theoretically, in my case it would be a lawsuit for violating GDPR (not hacking), but they know that there is no one to sue.

Eikon•4h ago
I'm not even asking for money!
akagusu•2h ago
Why is this flagged?
agwa•1h ago
First of all, the project in question (Sunlight) is not a Google project and its author (Filippo) is not employed by Google.

Here's what actually happened:

2025-07-01 19:01 UTC: I suggest making some changes to Sunlight to improve usability of key generation and mitigate a potential misconfiguration risk with keys: https://github.com/FiloSottile/sunlight/issues/35#issue-3193...

2025-07-01 20:08 UTC: Filippo agrees with my suggestions: https://github.com/FiloSottile/sunlight/issues/35#issuecomme...

2025-07-02 12:20 UTC: OP emails Filippo claiming to have found a vulnerability in Sunlight

2025-07-02 13:03 UTC: Filippo replies to OP explaining why this is not a vulnerability (an assessment which I agree with entirely): https://groups.google.com/a/chromium.org/g/ct-policy/c/qboz9...

2025-07-02 16:41 UTC: Filippo implements my suggestions

I don't know if it's a coincidence that OP emailed Filippo in the 20 hours between Filippo agreeing with my suggestions and implementing my suggestions, or if OP saw my suggestions in the Sunlight issue tracker and decided to make a mountain out of a molehill. Either way - the changes were always going to happen regardless of OP.

Eikon•1h ago
This is not a strong take, the "fix" doesn't completely fixes the vulnerability. Passwords or private keys are not the same as a user-provided crypto-seed without checksums. This is supposed to be critical PKI software.

It's about corruption and bit rot, not about seed length.

My finding are unrelated and started from when I wanted to benchmark his software. I wanted to know which format it expected for the seed, turns out spaces will do.

It's not about a "corrupted password", it's about that the software generates private keys on the fly based on an unverified seed input. Anyone understanding crypto a tiny bit gets that. This is first-week-of-crypto-class material

Btw, this is a project of a ex-google employee, used in chromium, that google publicly endorses; that's definitely akin to a "google project". Is it damage control yet?

Pretty interesting that you are directly involved in this project yourself but feel the need to defend the same (wrong) narrative here.

You agreeing with the claim that this is not a vulnerability, and somehow being involved in developing CT software is deeply concerning.