frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

2-4 wire converters / hybrids (2009)

https://sound-au.com/appnotes/an010.htm
1•userbinator•2m ago•0 comments

What should I be aware of if I want to buy yachts for sale in dubai?

https://www.skywalker.ae/yacht-for-sale-in-dubai/
1•emeriezaiya•3m ago•1 comments

Opens sourcing my helpdesk software

https://www.krish.website/blog/open-sourcing-hilfedesk--a-web-based-helpdeskcustomer-support-system
1•krishani•4m ago•0 comments

Show HN: I made an online fan because the whether is hot

https://github.com/zkwokleung/fan
1•zkwokleung•4m ago•0 comments

Charles Lindbergh

https://airandspace.si.edu/explore/stories/charles-lindbergh
1•andsoitis•4m ago•0 comments

Assassination Politics

https://archive.org/details/ap_debate_02
1•andsoitis•7m ago•0 comments

A command-line interface for working with Google's Gemini AI

https://github.com/17twenty/gemma-cli
1•hactually•8m ago•1 comments

Show HN: Looking for feedback on my user feedback platform

https://featuresprout.com
1•QuestMo•15m ago•0 comments

Pleonasm

https://en.wikipedia.org/wiki/Pleonasm
1•petethomas•18m ago•0 comments

Haxe 5.0 preview.1 has been officially released

https://haxe.org/download/version/5.0.0-preview.1/
1•phplovesong•21m ago•0 comments

Understanding Rust's Memory Model

https://minami.bearblog.dev/rust-memory-model/
3•mfiguiere•24m ago•0 comments

Write and Compare: Anki add-on allowing users to write answers when studying

https://github.com/alexjdean/anki-write-and-compare
1•alexanderdean•27m ago•1 comments

Google Branding and Search Suggestions is now required in grounded Gemini models

https://cloud.google.com/vertex-ai/generative-ai/docs/grounding/grounding-search-suggestions
1•nikolayasdf123•27m ago•1 comments

Call on Sequoia Capital to Denounce VC Shaun Maguire's Mamdani Comments

https://www.cnbc.com/2025/07/07/founders-sign-letter-to-sequoia-on-shaun-maguires-mamdani-remarks.html
1•donsupreme•28m ago•0 comments

XAI updated Grok to be more 'politically incorrect'

https://www.theverge.com/ai-artificial-intelligence/699788/xai-updated-grok-to-be-more-politically-incorrect
5•labrador•43m ago•3 comments

A Class of Models with the Potential to Represent Fundamental Physics

https://arxiv.org/abs/2004.08210
1•tzury•44m ago•0 comments

Analyzing Database Trends Through 1.8M Hacker News Headlines

https://camelai.com/blog/hn-database-hype/
2•vercantez•45m ago•0 comments

Context, Memory, and Voice

https://randsinrepose.com/archives/context-memory-and-voice/
1•Garbage•45m ago•0 comments

Gemini CLI Update (2025-07-08) – Generated from commit logs using the CLI itself

https://gemini-cli.xyz/docs/en/update-2025-07-08
2•zhangchengzc•47m ago•0 comments

Chief Keef's Love Sosa and Michelangelo's David: A Comparison [video]

https://www.youtube.com/watch?v=1ktlcGhWW2A
1•lawrenceyan•53m ago•0 comments

Trying to find meaning in owning an old Mac

https://blog.decryption.net.au/posts/macse30.html
34•decryption•54m ago•15 comments

Personalized Book Recommendations by Lorekeep

https://www.lorekeep.io/
1•delta234•55m ago•0 comments

China used embassies to undermine Rafale sales after India-Pakistan clash

https://www.france24.com/en/france/20250706-china-used-embassies-to-undermine-rafale-sales-after-india-pakistan-clash-french-intel-says
2•mhga•56m ago•1 comments

Bing Translate vulnerable to prompt injection

https://alloc.dev/2025/07/07/bing_translate
1•Retro_Dev•57m ago•0 comments

Selfies could one day be stored on DNA strands

https://techxplore.com/news/2025-06-selfies-day-dna-strands.html
1•PaulHoule•57m ago•0 comments

A new species of rare pseudoscorpion has been named after the Slovak president

https://phys.org/news/2024-02-species-rare-pseudoscorpion-slovak.html
3•wglb•58m ago•1 comments

Holo: Suite of routing protocols designed to support high-scale networks

https://github.com/holo-routing/holo
4•thunderbong•59m ago•0 comments

Ask HN: Took a break after burnout – what now?

4•BugsBunny1991•1h ago•2 comments

Radiocarbon dating reveals Rapa Nui not as isolated as previously thought

https://phys.org/news/2025-06-radiocarbon-dating-reveals-rapa-nui.html
4•wglb•1h ago•0 comments

DOJ goes after US citizen for developing anti-ICE app

https://appleinsider.com/articles/25/07/07/doj-goes-after-us-citizen-for-developing-anti-ice-app
86•ProAm•1h ago•28 comments
Open in hackernews

You Should Run a Certificate Transparency Log

https://words.filippo.io/run-sunlight/
88•Metalnem•7h ago

Comments

agwa•6h ago
Sunlight and static-ct-api are a breath of fresh air in the CT log space. Traditional CT log implementations were built on databases (because that's the easiest way to implement the old API) and were over-complicated due to a misplaced desire for high write availability. This made operating a CT log difficult and expensive (some operators were spending upwards of $100k/year). Consequentially, there have been a rash of CT log failures and few organizations willing to run logs. I'm extremely excited by how Sunlight and static-ct-api are changing this.
eddythompson80•4h ago
I wonder if this is the solution something like SponsorBlock is looking for[1][2]. They have a similar-ish problem. How to replicate crowdsourced data that trickles in slowly, but ideally you want replicated quickly.

WAL replication, rsync, bittorrent, etc all things that don't quite work as needed.

[1] https://github.com/mchangrh/sb-mirror/blob/main/docs/breakdo...

[2] https://github.com/ajayyy/SponsorBlock/issues/1570

tonymet•6h ago
Is any amateur or professional auditing done on the CA system? Something akin to amateur radio auditing?

Consumers and publishers take certificates and certs for granted. I see many broken certs, or brands using the wrong certs and domains for their services.

SSL/TLS has done well to prevent eavesdropping, but it hasn't done well to establish trust and identity.

sleevi•5h ago
All the time. Many CA distrust events involved some degree of “amateurs” reporting issues. While I hesitate to call commenters like agwa an amateur, it certainly was not professionally sponsored work by root programs or CAs. This is a key thing that Certificate Transparency enables: amateurs, academics, and the public at large to report CA issues.

At the same time, it sounds like the issues you describe aren’t CA/issuance issues, but rather, simple misconfigurations. Those aren’t incidents for the ecosystem, although definitely can be disruptive to the site, but I also wouldn’t expect them to call trust or identity into disrepute. That’d be like arguing my drivers license is invalid if I handed you my passport; giving you the wrong doc doesn’t invalidate the claims of either, just doesn’t address your need.

Spivak•5h ago
I think over the years trust and identity have gone out of scope for TLS—I think for the better. Your identity is your domain and it's not TLS's problem to connect that identity to any real life person or legal entity. I'm sure you still can buy EV certs but no one really cares about them anymore. Certainly browsers no longer care about them. And TLS makes no claim on the trustworthiness of the site you're connecting to, just that the owner of the cert proved control of the domain and that your connection is encrypted.

I can't even imagine how much a pain it would be to try and moderate certs based on some consistent international notion of trustworthiness. I think the best you could hope to do is have 3rd parties like the BBB sign your cert as a way of them "vouching" for you.

NovemberWhiskey•4h ago
Meet the QWAC.

https://en.m.wikipedia.org/wiki/Qualified_website_authentica...

oasisbob•47m ago
Yup, it happens. There was a case I remember where a CA was issuing certs using the .int TLD for their own internal use, which it should not be doing.

Happened to see it in the CT logs, and when that CA next came up for discussion on the Mozilla dev security policy list, their failure to address and disclose the misissuance in a timely manner was enough to stop the process to approve their request for EV recognition, and it ended in a denial from Mozilla.

torbid•6h ago
These sound like good improvements but I still don't really get why the ct log server is responsible for storage at all (as a 3rd party entity)..

Couldn't it just be responsible for its own key and signing incremental advances to a log that all publishers are responsible for storing up to their latest submission to it?

If it needed to restart and some last publisher couldn't give it its latest entries, well they would deserve that rollback to the last publish from a good publisher..

michaelt•5h ago
The point of CT logging is to ensure a person can ask "What certificates were issued for example.com?" or "What certificates were issued by Example CA?" and get an answer that's correct - even if the website or CA fucked up or got hacked and certificates are in the hands of people who've tried to cover their tracks.

This requires the logs be held by independent parties, and retained forever.

torbid•5h ago
I understand that. But..

If 12 CAs send to the same log and all have to save up to their latest entry not to be declared incompetent to be CAs, how would all 12 possibly do a worse job of providing that log on demand than a random 3rd party who has no particular investment at risk?

(Every other CA in a log is a 3rd party with respect to any other, but they are one who can actually be told to keep something indefinitely because they would also need to return it for legitimizing their own issuance.)

michaelt•4h ago
As far as I know, CAs don't have to "save up to their latest entry"

The info they get back from the CT log may be a Merkle Hash that partly depends on the other entries in the log - but they don't have to store the entire log, just a short checksum.

torbid•3h ago
Right and this is what I am saying is backwards with the protocol. It is not in anyone's best interest that some random 3rd party takes responsibility to preserve data for CAs indefinitely to prove things. The CA should identify where it has its copy in the extension and looking at one CAs copy one would find every other CAs copy of the same CT log.
singron•5h ago
The publishers can't entirely do the storage themselves since the whole point of CT is that they can't retract anything. If they did their own storage, they could rollback any change. Even if the log forms a verification chain, they could do a rollback shortly after issuing a certificate without arousing too much suspicion.

Maybe there is an acceptable way to shift long-term storage to CAs while using CT verifiers only for short term storage? E.g. they keep track of their last 30 days of signatures for a CA, which can then get cross-verified by other verifiers in that timeframe.

The storage requirements don't seem that bad though and it might not be worth any reduced redundancy and increased complexity for a different storage scheme. E.g. what keeps me from doing this is the >1Gbps and >1 pager requirements.

torbid•5h ago
If CAs have to share CTs and have to save everything the CT would save to their last submission then no CA can destroy the log without colluding with other CAs.

(I.e. your log ends abruptly but polling any other CA that published to the same CT shows there is more including reasons to shut you down.)

I don't see how a scheme where the CT signer has this responsibility makes any sense. If they stop operating because they are sick of it, all the CAs involved have a somewhat suspicious looking CT history on things already issued that has to be explained instead of having always had the responsibility to provide the history up to anything they have signed whether or not some CT goes away.

johnklos•4h ago
> People: at least two. The Google policy requires two contacts, and generally who wants to carry a pager alone.

This is rich. Imagine a company that famously can't be contacted by humans wanting - no, expecting - to be able to reach someone at their leisure.

I'm sorry, but no. I'd consider running a CTL, but I'd never give contact information to the likes of Google unless I got the same in return.

johnklos•3h ago
I suppose we've got a lot of Google fans here! Do you like not being able to contact anyone there? You could be a Youtube creator with a million followers and you'll never correspond with anyone with any control over anything at Google ;)
danpalmer•3h ago
This just doesn't match my experience.

People love to say it, but when we had GSuite issues at my previous workplace we spoke to GSuite support and had a resolution quickly. When we had GCP queries we spoke to our account manager who gave us a technical contact who escalated internally and got us the advice we needed. When we asked about a particular feature we were added to the alpha stage of an in-development product and spoke with the team directly about that. I've got friends who have had various issues with Pixel phones over the years and they just contact support and get a replacement or fix or whatever.

Meanwhile I've seen colleagues go down the rabbit hole of AWS support and have a terrible time. For us it was fine but nothing special, I've never experienced the amazing support that I've heard some people talk about.

We were a <100 person company with a spend quite a bit less than many companies of our size. From what I've heard from YouTubers with a million followers, they have account managers and they always seem to encourage talking to account managers.

johnklos•3h ago
But you're giving Google money.

I should've qualified what I wrote, but what I mean is that no matter who you are, if you don't know someone there and aren't paying them money, there's no way to communicate with humans there.

It's like companies that won't let you sign up unless you give them a cell phone number, but not only do they not have a number themselves, they don't even have email. Or, for companies like Verizon, they don't have email, but they have phone numbers with countless layers of "voice assistants" you can't skip. It's a new way of "communicating" that's just crazymaking.

danpalmer•1h ago
That's true of most companies, unless you're a customer or they think they can sell you something, they're unlikely to give you much time even if you can theoretically call them up.

In this case, you point to the hypocrisy of being uncontactable but demanding your contact details, except that Google does provide support to customers, and in this relationship they are essentially a customer of your CT log, and given the criticality of that service they rightly expect the service provider to be held to a high standard. I don't think they're holding you to a standard that they themselves wouldn't agree to be held to for a service that critical. I've got to make it clear that this is my personal opinion though.

resize2996•1h ago
Just to add my own anecdata: My experience with Pixel/GoogleFi support has been some of the worst customer support I've ever experienced, and I have given them boatloads of money.

source: I used to do vendor relations for a large public org where contractors (medium tech companies) would routinely try to skirt the line on what they had to deliver. I would rather deal with them than GoogleFi, because in that situation there was a certain point where I could give up and hand it off to our lawyers.

toast0•1h ago
> People love to say it, but when we had GSuite issues at my previous workplace we spoke to GSuite support and had a resolution quickly.

That certainly wasn't my experience. Unless 'we're not going to help you' counts as a resolution. We did get a response quickly, but there was no path to resolving the issues I had other just ignoring the issues.

dboreham•3h ago
Add an incentive mechanism to motivate runn a server, and hey it's a blockchain. But those have no practical application so it must not be a blockchain..
schoen•2h ago
There is some historical connection between CT and blockchains.

http://www.aaronsw.com/weblog/squarezooko

Ben Laurie read this post by Aaron Swartz while thinking about how a certificate transparency mechanism could work. (I think Peter Eckersley may have told him about it!) The existence proof confirmed that we sort of knew how to make useful append-only data structures with anonymous writers.

CT dropped the incentive mechanism and the distributed log updates in favor of more centralized log operation, federated logging, and out-of-band audits of identified log operators' behavior. This mostly means that CT lacks the censorship resistance of a blockchain. It also means that someone has to directly pay to operate it, without recouping the expenses of maintaining the log via block rewards. And browser developers have to manually confirm logs' availability properties in order to decide which logs to trust (with -- returning to the censorship resistance property -- no theoretical guarantee that there will always be suitable logs available in the future).

This has worked really well so far, but everyone is clear on the trade-offs, I think.

Dylan16807•55m ago
Yes, that is correct. (Other than the word "must"? I'm not entirely sure your intent there.) This is close to a blockchain in some ways, but a blockchain-style incentive mechanism would be a net negative, so it doesn't have that.

If you figure out a good way to involve an incentive structure like that, let us know!

gslin•3h ago
The original article seems deleted, so https://archive.ph/TTXnK this.
FiloSottile•3h ago
My bad! This is what I get for doing a deploy to fix the layout while the post is on HN. Back up now.
gucci-on-fleek•3h ago
https://web.archive.org/web/20250707205158/https://words.fil...
gslin•3h ago
> You Should Run a Certificate Transparency Log

And:

> Bandwidth: 2 – 3 Gbps outbound.

I am not sure if this is correct, is 2-3Gbps really required for CT?