frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

NIH to crack down on excessive publisher fees for publicly funded research

https://www.nih.gov/news-events/news-releases/nih-crack-down-excessive-publisher-fees-publicly-funded-research
1•gadders•1m ago•0 comments

Sizing up the 5 companies selected for Europe's launcher challenge

https://arstechnica.com/civis/threads/sizing-up-the-5-companies-selected-for-europe%E2%80%99s-launcher-challenge.1508245/
1•Bluestein•2m ago•0 comments

Show HN: Live streaming for CUA models using WebRTC (OSS, Apache 2.0)

1•juecd•2m ago•0 comments

AI First Hiring, Teamwork and Org Structures, Staying Relevant in an an AI World

https://madhavajay.com/ai-first-hiring-teamwork-and-org-structures-staying-relevant-in-an-agentic-world/
1•williamtrask•3m ago•0 comments

Teachers urge parents not to buy children smartphones

https://www.bbc.com/news/articles/cwyxggv9j9zo
1•bishopsmother•3m ago•0 comments

X Chief Says She Is Leaving the Social Media Platform

https://www.nytimes.com/2025/07/09/technology/linda-yaccarino-x-steps-down.html
8•donohoe•6m ago•3 comments

Only on Nantucket: The Curious Case of the "Stolen" Mercedes

https://nantucketcurrent.com/news/only-on-nantucket-the-curious-case-of-the
1•brigham•8m ago•0 comments

Beacon API

https://developer.mozilla.org/en-US/docs/Web/API/Beacon_API
1•begoon•8m ago•0 comments

Nvidia becomes first company to reach $4T in market value

https://www.ft.com/content/23e2518b-db26-4091-888e-01438f3c89eb
3•cs702•9m ago•0 comments

X CEO Linda Yaccarino to step down

https://www.axios.com/2025/07/09/x-ceo-linda-yaccarino-resigns
4•jmsflknr•9m ago•1 comments

How AI is breaking traditional remuneration models

https://www.technollama.co.uk/how-ai-is-breaking-traditional-remuneration-models
1•AndrewDucker•9m ago•0 comments

Traction Then Taste

https://www.deepsouthventures.com/traction-then-taste/
1•eightturn•9m ago•0 comments

A practical handbook on Context Engineering

https://github.com/davidkimai/Context-Engineering
1•RecursiveLabs•10m ago•0 comments

I’ve decided to step down as CEO of X

https://twitter.com/lindayax/status/1942957094811951197
5•danso•10m ago•0 comments

Skia Graphite: Chrome's rasterization back end for the future

https://blog.chromium.org/2025/07/introducing-skia-graphite-chromes.html
2•brson•14m ago•0 comments

EU Product Liability Directive impacts software, digital products, cybersecurity

https://www.lexology.com/library/detail.aspx?g=bbef1939-2af0-465a-8b8f-c1ff3ebe9118
2•speckx•14m ago•0 comments

Redis Historical Versions from 2009

https://github.com/antirez/historical-redis-versions
1•philbo•15m ago•0 comments

Analyzing Grok's Latest Meltdown Through Public xAI System Prompts

https://theahura.substack.com/p/tech-things-what-on-earth-is-going
2•theahura•15m ago•0 comments

Show HN: Whispering – An open-source alternative to Superwhisper

https://github.com/braden-w/whispering
1•braden-w•16m ago•1 comments

Physics needs research software engineers

https://www.nature.com/articles/s42254-025-00852-2
3•bookofjoe•16m ago•2 comments

The Magic Theorem

https://aperiodical.com/2025/07/the-magic-theorem/
1•baruchel•16m ago•0 comments

Computer Scientists Figure Out How to Prove Lies

https://www.quantamagazine.org/computer-scientists-figure-out-how-to-prove-lies-20250709/
1•baruchel•17m ago•0 comments

Tree Borrows

https://plf.inf.ethz.ch/research/pldi25-tree-borrows.html
11•zdw•18m ago•1 comments

Florida is letting companies make it harder for highly paid workers to swap jobs

https://www.businessinsider.com/florida-made-it-harder-highly-paid-workers-to-swap-jobs-2025-7
8•pseudolus•19m ago•1 comments

Durable Agent Loops

https://restate.dev/blog/durable-ai-loops-fault-tolerance-across-frameworks-and-without-handcuffs/
1•gk1•21m ago•0 comments

DeCSS (2000)

https://decss.zoy.org/
1•JetSpiegel•23m ago•0 comments

Show HN: Remove metadata from images and documents online

1•Gravyt1•27m ago•0 comments

Show HN: Kinic – A Portable AI Memory Store You Own (Farewell AI Amnesia)

https://www.kinic.io/
2•wyattbenno777•28m ago•0 comments

RNode is an open, free and unrestricted digital radio transceiver

https://unsigned.io/rnode/
2•janandonly•28m ago•0 comments

Show HN: Chain-The-Words game that tests your vocab

https://www.chain-the-words.com/
2•martianmanhunt•28m ago•3 comments
Open in hackernews

ESIM Security

https://security-explorations.com/esim-security.html
71•todsacerdoti•5h ago

Comments

hhh•5h ago
$30k is a pittance for the quality of this work
yapyap•3h ago
I’ve been pretty disappointed with the seemingly small payouts some of the bug bounties I’ve seen submitted were / are getting.

It’s like the companies “forgot” [1] what happens when you don’t have a bug bounty program or what happens when people step to others with their bugs.

1. of course companies didnt forget, this is the benefit of the doubt I like to give but big companies like this aren’t stupid. Big companies are ruled by the business savvy but less technical and those see things like the bug bounty program as not important, until they get shook awake by a huge breach or anything of the sort that impacts the stock price ( their salary ) I doubt they will care much.

jeroenhd•3h ago
With Oracle claiming it's not their problem to fix, and with the mobile networking industry generally being slow and old-fashioned, I'm surprised they even offered a bounty and worked with them for public disclosure rather than threatening to sue.

$30k is a pittance for the work put in if you were to negotiate with them as contractors, but it's still a good chunk of change for essentially unprompted, free work. They didn't need to pay them a dime, after all.

petesergeant•4h ago
Whenever I read stuff about telecoms security, I realize the first few weeks of any serious war will just be complete loss of cell service.
Hojojo•3h ago
Depends. Ukraine, despite some service interruptions, still largely has cell service:

https://www.euronews.com/next/2024/03/25/ukraines-telecom-en...

I think these networks can be a lot more resilient than we think and they can be maintained even during a war.

grishka•2h ago
Meanwhile in Russia, mobile data shutdowns are becoming a routine. Especially in regions closer to the border/front line. They say it's to fight drone attacks, but no word on how effective that actually is.
ChocolateGod•3h ago
If things like Starlink Cellular work properly, will probably help prevent that.
jeroenhd•3h ago
Depends on who the invader is. If it's America going after yet another country in the Middle East, Starlink Cellular certainly won't help.
anonymars•2h ago
> Depends on who the invader is

And probably how Elon is feeling that day about the participants

lxgr•2h ago
Why would Starlink be more resilient against hacks than ground-based LTE?
dfox•1h ago
It is my understanding that Starlink does not do home-grown crypto of the 3GPP-kind. Also because it is closed ecosystem there is no need for SIMs and the associated deployment mechanisms.
lxgr•1h ago
Their "direct to cell" service is a regular LTE network, so it must be using all the same protocols in order to be compatible with existing devices.
dylan604•22m ago
Doesn't Starlink depend on ground stations? So toss a couple of missiles at those ground stations, and Starlink isn't as useful.
jeroenhd•3h ago
The cell network is one of the best surveillance tools we've ever built as humanity, as well as a network of location beacons when over friendly territory. Taking it down would strongly limit the amount of information that can be gathered both passively and actively. Modern 5G networks can even act as radar.

A technically capable terrorist could wreak havoc if they could get access to the control center of a telecoms network, but I don't think service will be down for extended periods of times unless it's part of a scorched earth strategy of some kind. Any military operation can be disrupted easily with cheap and widely available jammers anyway, attacking cellular infrastructure is mostly useful for attacking civilian targets and spreading panic.

dylan604•24m ago
And yet here I sit at my desk in my home with 1 bar of service, and I think that's only because 0 bars is not possible. It's not like they'd have to do much to disrupt cell service
exabrial•2h ago
And you won’t be able to drive your cell network connected car… making logistics impossible. It’s a big enough wartime issue there ought to be a regulation that the cell device should be able to be “pulled” and the car defaults to “fully enabled”.
frickinLasers•1h ago
Do you have examples of cars (that aren't Teslas, perhaps, since they don't play by normal car rules) having been disabled due to lack of cell service?
Fethbita•4h ago
This is completely irresponsible behavior from Oracle as they put the whole eSIM ecosystem in danger by not fixing the issue.
lxgr•1h ago
Without knowing the exact details, it seems to me like Oracle has a point here:

Java Card supports, broadly speaking, two types of bytecode verification: "On-card" and "off-card". On-card is secure against even malicious applets; off-card assumes that a trustworthy entity vets all applets before they are installed, and only signs them if they are deemed well-formed.

The off-card model just seems like a complete architectural mismatch for the eSIM use case, since there is no single trustworthy entity. SAT applets are not presented to the eUICC vendor for bytecode verification, so the entire security model breaks down if verification doesn't happen on-card.

Unfortunately, the GSMA eSIM specifications seem to be so generic that they don't even mandate Java as a bytecode technology, and accordingly don't impose any specific Java requirements, such as "all eUICC implementations supporting SAT via Java Card must not rely on off-card bytecode verification".

Fethbita•27m ago
In this case if you read the last few sections, they reported several issues to Oracle regarding their JavaCard Reference Implementation, but these have not been fixed stating that they are not supposed to be used in production. Oracle has the responsibility to fix these issues as they are the primary source for everything related to JavaCard’s and other vendors take their reference implementation as a reference.

Also see their previous reply[1] to the findings this company had from 2019 and I can’t help but agree with the article that if those issues were fixed back then, there is a chance that this wouldn’t have happened today.

[1]: https://www.securityweek.com/oracle-gemalto-downplay-java-ca...

lxgr•15m ago
Definitely, no reference implementation should have security bugs.

But do you know if Oracle's reference implementation for Java Card is one using on-card or off-card verification, or more generally is assuming installs from only trusted sources?

There are many Java Card applications where the assumption of all bytecode being trusted is reasonable, especially if all bytecode comes from the issuer and post-issuance application loading isn't possible. Of course, that would be a complete mismatch for an eUICC.

Fethbita•46s ago
It does not use on-card verification, because if it would have, the problem would not be present. You can check out their FAQ on the 2019 report[1].

[1]: https://security-explorations.com/java-card.html#faq

mathfailure•3h ago
That was a pleasure to read: I'm just a layman, I know basically jack-shit about GSM/eSIM technologies, yet the article is written so well and provides enough details that I could understand what they wrote.
exabrial•2h ago
> knowledge of the keys is a primary requirement for target card compromise

Not claiming to be an expert, but this seems like a very big qualification. Can someone put this into context for me?

If you stole my private key for my PGP key, you would absolutely be able to sign messages as me.

lxgr•2h ago
They were apparently able to extract an eUICC's private key:

> As a result of eUICC compromise, we were able to extract private ECC key for the certificate identifying target GSMA card.

This is supposed to be impossible, even with knowledge of SAT applet management keys. (In other words, individual eSIM profiles are still not supposed to be able to extract private eSIM provisioning keys from any eUICC.)

In the security architecture of eSIMs, compromising any eUICC's key means that an attacker can obtain the raw eSIM profile data from any SM-DP trusting it (which would be any, if it chains up to a CA part of the GSMA PKI) and do things that are supposed to be impossible, such as simultaneously installing one profile on multiple devices, or extract secret keys from a profile and then "put it back" to the SM-DP, let the legitimate user download it, and intercept their communications.

ImPostingOnHN•1h ago
Let's assume I have the following philosophy:

My phone, my sim or esim, and anything else which I have purchased and is in my possession, belongs to me. Being able to retrieve keys to things I own, and do whatever I want with them, seems fine. If the key to my car says "do not duplicate", I should be nonetheless able to duplicate it, because I own the car and the key. If I want to run my same profile or eSIM on multiple devices, I get that the cell company doesn't like that, but I do, so I wouldn't consider that a harm to me.

Given that assumption, this vulnerability/jailbreak/rooting of something I own seems less significant to me. I think, however, that I may be misunderstanding the attack. Is this possible to perform against somebody else for whom I will never have physical possession of the phone? Or for someone else to perform it against me, without ever having physical possession of my phone? It sounded like maybe a test profile was left enabled, which allows anyone to send an SMS-PP message to any phone, telling it to install an applet which compromises the phone/eUICC/eSIM's keys. Did I follow that right?

lxgr•1h ago
> Let's assume I have the philosophy that my phone, my sim or esim, and anything else which I have purchased and is in my possession, belongs to me.

Then you can't use eSIMs as specified. eUICCs are an implementation of trusted computing.

> I think I may be misunderstanding the attack, though. Is this possible to perform against somebody else for whom I will never have physical possession of the phone? Or for someone else to perform it against me, without ever having physical possession of my phone?

In a non-broken eSIM security architecture, eSIM profiles are singletons, i.e. they can only be installed on any given eUICC at one time. At install time, the SM-DP decrements the logical "remaining installs" counter from 1 to 0; at uninstall time, it goes back up to 1. This of course only works if the eUICC's assertion of "I deleted eSIM profile x" is trustworthy, hence it requires trusted computing.

A different security architecture not relying on trusted computing is of course possible to imagine, but that's not what current networks assume.

ImPostingOnHN•1h ago
> Then you can't use eSIMs as specified.

Could you elaborate here, please? I am kind of ignorant on this topic. Using an exploit to root my phone results in not using the phone "as specified", but it still works, and it's okay with me, because I own it.

It sounded like the concerns you had were ones the network operator should be concerned with. Suppose I don't care about their concerns unless they result in my stuff being compromised*.

Are you saying that it breaks the security in a way that someone who doesn't own my phone and doesn't have physical access to my phone can compromise my phone and/or my eSIM?

* - for the purposes of simplifying discussion, I'm dismissing the possibility that the network operator throws up their hands and entirely stops using/allowing eSIMs because they can't control everything

lxgr•49m ago
The eSIM lives in dedicated, tamper-proof hardware inside your phone, separate from the application processor OS (which would be the domain of rooting) or often even the baseband. Under the eSIM security model, it holds keys that the device owner is not supposed to be able to extract, not even when they're willing to physically dismantle the chip holding it.

> Are you saying that it breaks the security in a way that someone who doesn't own my phone and doesn't have physical access to my phone can compromise my phone and/or my eSIM?

Yes, it does: Currently, providers assume that any eSIM honors the "singleton contract" described above. One that does not, e.g. one simulated in software using keys extracted from a physical trusted eUICC, could be used to mount the following attack:

1. Intercept the eSIM setup QR code (which contains two things: the URL of the SM-DP and a secret profile identifier)

2. Install the eSIM profile on their "software eSIM".

3. Report the eSIM as successfully deleted to the SM-DP, which now considers it available for installs again.

4. You, the legitimate owner of the eSIM, now install it on your unmodified eUICC in your phone and go about your day.

5. One day, ideally when your legitimate SIM is offline, the attacker inserts their eSIM into a phone and intercepts phone calls and SMS to your number, initiates expensive toll calls etc.

One solution here would be to never allow re-installs of the same eSIM profile, which some providers already do, but I personally don't like eSIM profiles managed that way, as it requires me to interact with carrier support and often even pay money just to transfer an eSIM to a new device.

ImPostingOnHN•44m ago
Thank you for being patient with someone unfamiliar with this tech but nonetheless concerned with security.

> 1. Intercept the eSIM setup QR code (which contains two things: the URL of the SM-DP and a secret profile identifier)

1. How might this be done? Would this require a separate attack, or are the mechanics a part of the attack described in the article?

2. Is this possible with the eSIM already set up on my phone?

lxgr•40m ago
How to steal the QR code is of scope of the attack described and is dependent on the security profile of any given carrier, but the important point is this:

Currently, an attacker installing the eSIM profile themselves is very visible, as it breaks the QR code for the legitimate user due to the singleton property (or, if the user installs it first, locks the attacker out anyway). If it happens, the legitimate user will call in and complain, and the carrier will at least revoke the current profile, and possibly even realize that something's afoot.

That property going away probably changes the threat model of most carriers in a way not initially anticipated.

miki123211•1h ago
Theoretically, if one of the carriers you were using were to be hacked, the attackers could extract all your keys, including for other carrier profiles.

It's an interesting attack vector for intelligence agencies. Imagine you're going to China and install a Chinese eSim profile as secondary to get cheaper data. The Chinese govt, in collaboration with the carrier, could then use that profile to dump your American AT&T keys.

In the telecom world, there's no forward secrecy (there can't be with symmetric crypto, which is what it's all based on), so such an attack would let the Chinese intercept all your communications.

ImPostingOnHN•53m ago
Thank you, your explanation helped me understand that the profile can itself be an application (and thus can be an exploit), and that different profiles/applications are not isolated from each other. I will be careful installing profiles from untrusted sources on my phone*.

Is there a remote attack vector against my phone/eSIM which doesn't require first compromising the network service provider? Not that I'm dismissing other vectors as unimportant, just trying to learn more.

* - I do realize that a network operator viewed as "trusted" may be untrusted under the right circumstances, like sufficient pressure from sufficiently official or powerful actors.

lxgr•44m ago
That would indeed be catastrophic, but from the attack as demonstrated, I don't think we can conclude that that's possible.

As I understand it, the attack as demonstrated is extracting the eUICC provisioning private key from the context of a SAT applet, but what you're describing would be extracting the keys of eSIM profile A from the context of eSIM profile B of an unrelated carrier.

It would be great to know whether the researchers have looked into that, as it sounds like a much bigger problem if possible.

ACCount36•51m ago
Here's hoping for a public PoC for unpatched hardware. I've been looking for a way to dump eSIMs as plaintext for a long while now.