frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

California achieved significant groundwater recharge last year

https://www.latimes.com/environment/story/2025-06-24/california-2024-groundwater-report
1•PaulHoule•1m ago•0 comments

Show HN: Is there a way to market BL1NG – where people pay to flex?

https://www.bl1ng.com
1•eflay•2m ago•1 comments

What Trump's Big Beautiful Bill means for Wi-Fi 6E and 7 users: It's not pretty

https://www.zdnet.com/home-and-office/networking/what-trumps-big-beautiful-bill-means-for-wi-fi-6e-and-wi-fi-7-users-hint-its-not-pretty/
1•CrankyBear•3m ago•0 comments

I made a TikTok video downloader website with no ads.. yet

https://www.tdown.app/
1•henrymuddleton•4m ago•0 comments

Bezos-funded climate satellite is lost in space

https://www.theverge.com/news/703091/methane-satellite-methanesat-lost-bezos-edf
1•Bluestein•5m ago•0 comments

AI Agents ≠ Zapier–A Better Mental Model

1•chandan_maruthi•7m ago•0 comments

Building Proactive AI Agents

https://substack.com/home/post/p-164375851
1•Mernit•7m ago•0 comments

Inertia.js in Rails: a new era of effortless integration (2024)

https://evilmartians.com/chronicles/inertiajs-in-rails-a-new-era-of-effortless-integration
2•mooreds•8m ago•0 comments

Show HN: DBUF

https://github.com/bintoca/dbuf
1•pierogitus•9m ago•0 comments

Tsukudani and hot rice: Still a go-to meal in Japan centuries after its creation

https://apnews.com/article/tsukudani-japan-side-tokyo-traditional-food-fa63e1f3f59d2b9e177a327f7c814ffe
1•petethomas•11m ago•0 comments

Building a timberframe home from scratch

https://massiehouse.blogspot.com/
1•xdfg13345•13m ago•0 comments

Robot surgery on humans could be trialled within decade after success on pigs

https://www.theguardian.com/science/2025/jul/09/robot-surgery-on-humans-could-be-trialled-within-decade-after-success-on-pig-organs
2•Bluestein•14m ago•0 comments

Unpatchable Vulnerabilities in Windows 10/11: Security Report 2025

https://zenodo.org/records/15850090
1•vinhatson•17m ago•1 comments

Show HN: A Nextflow ↔ Python Integration Plugin

https://github.com/royjacobson/nf-python
1•unddoch•17m ago•0 comments

TikTok Sans released under the OFL

https://fonts.google.com/specimen/TikTok+Sans
2•Tiberium•18m ago•0 comments

Managed Postgres Overview

https://fly.io/docs/mpg/overview/
1•sergiotapia•20m ago•0 comments

What are your dream companies to work at?

1•ssc23•20m ago•0 comments

A simple monthly injection allows mice to live 25% longer and free from diseases

https://english.elpais.com/science-tech/2024-07-17/a-simple-monthly-injection-allows-mice-to-live-25-longer-and-free-from-diseases.html
3•speckx•22m ago•0 comments

Symbolic 'science fair' showcases research cut by Trump team

https://www.nature.com/articles/d41586-025-02164-y
2•Bluestein•22m ago•0 comments

Scientists 3D print tumors for cancer research

https://www.tomshardware.com/3d-printing/scientists-3d-print-tumors-for-cancer-research-tissuetinker-using-3d-bioprinting-to-create-miniature-models-of-healthy-and-diseased-tissue-for-side-by-side-comparison-backed-by-mcgill
1•giuliomagnifico•23m ago•0 comments

Perplexity just launched Comet, an AI web browser

https://www.theverge.com/news/703037/perplexity-ai-web-browser-comet-launch
2•cpeterso•27m ago•0 comments

Ancient pathogen became deadlier when humans started wearing wool

https://www.nature.com/articles/d41586-025-01631-w
2•rntn•30m ago•0 comments

OpenAI to release web browser in challenge to Google Chrome

https://www.reuters.com/business/media-telecom/openai-release-web-browser-challenge-google-chrome-2025-07-09/
4•jmsflknr•32m ago•0 comments

LangChain is about to become a unicorn, sources say

https://techcrunch.com/2025/07/08/langchain-is-about-to-become-a-unicorn-sources-say/
3•clemo_ra•33m ago•0 comments

Finding PBHs Using the LSST Will Be a Statistical Challenge

https://www.universetoday.com/articles/finding-pbhs-using-the-lsst-will-be-a-statistical-challenge
1•rbanffy•34m ago•0 comments

<Now Go Bang > the REM-Arkable Misadventures of List

https://www.masswerk.at/nowgobang/2025/the-remarkable-misadventures-of-list
1•rbanffy•34m ago•0 comments

brotab: Control your browser's tabs from the command line

https://github.com/balta2ar/brotab
3•pseudalopex•34m ago•0 comments

Desktop Publishing Tools That Didn't Make It

https://tedium.co/2022/10/12/forgotten-desktop-publishing-tools-history/
2•rbanffy•34m ago•0 comments

The Hungry, Hungry AI Model

https://tomtunguz.com/input-output-ratio/
2•speckx•36m ago•0 comments

Show HN: Program for Framework 16 LED Matrix

https://boyne.dev/projects/fwmm.html
1•DedFishy•36m ago•1 comments
Open in hackernews

Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps

https://soatok.blog/2025/07/09/jurisdiction-is-nearly-irrelevant-to-the-security-of-encrypted-messaging-apps/
21•zdw•5h ago

Comments

mcherm•1h ago
I think this is missing one important issue: what if your encryption is highly reliable but the cypher test is hosted in a jurisdiction that has laws requiring the disclosure of the plaintext (perhaps with a court order or a "National Security Letter") and the ability to compel the system owners to obey.
some_furry•36m ago
> what if your encryption is highly reliable but the cypher test is hosted in a jurisdiction that has laws requiring the disclosure of the plaintext (perhaps with a court order or a "National Security Letter") and the ability to compel the system owners to obey.

This is a contradiction. If you have such a capability, then your encryption isn't sufficiently reliable. If it is sufficiently reliable, then this law cannot take effect.

If, for example, Australia wanted to compel me to backdoor something for their investigative purposes, there's nothing they can do. I live in America.

If I hosted ciphertext in Australia, the most they can hope is to terminate the service in their country. This is an availability concern, but the failure mode isn't "the government sees your nudes".

> (perhaps with a court order or a "National Security Letter")

National Security Letters don't do what you think they do. There are widespread misconceptions about their allowed scope, but they only allow the government to request "subscriber information" from a service provider. That doesn't include "we compel you to backdoor your app, and here's an automatic gag order". If they try to use non-NSL measures to accomplish this compulsion, talk to a lawyer not a cryptographer.

adrian_b•32m ago
The previous poster has not referred to a backdoor, but to the fact that in certain places, including USA, law enforcement can request from you the decryption key, and if you do not comply they can throw you in jail for an indefinite time, until you comply.

In my opinion, as someone who has been born and raised in a country occupied by external invaders, who had installed there a fake communist "democracy" and fake justice, the most fundamental human right is the right to refuse to answer to a question, regardless who asks the question.

If in a country such a refuse is sufficient for severe punishments, without the need of any other proof that the one refusing to answer has done anything wrong, then, regardless if such a refuse to answer is labeled "obstruction of justice", "contempt of court" or whatever, in that country any claims that human rights were respected are false.

It is a shame for the United Nations that this most important human right is not included in their declaration.

In order to be able to oppose an abusive government, the right to refuse to answer a question is much more important than the right to possess weapons (which will always be inferior to those of law enforcement and military, so they are not a solution).

some_furry•30m ago
The blog post makes it clear that, if the service operator ever even has access to the secret keys to surrender it in the first place, it doesn't qualify as "properly implemented cryptography". See: The Mud Puddle test.

The only way they would be able to acquire the key would be to push a backdoored update to the app. Reproducible builds (which implies open source to be meaningful) and binary transparency make that incompatible with gag orders, by design.

mananaysiempre•1h ago
> But What If The Host Country [...] Legally Compels the App Store to Ship Malware?

> This is an endemic risk to smartphones, but binary transparency makes this detectable.

> That said, at minimum, the developer should control their own signing keys.

So, don’t ship on the Play Store unless you’re grandfathered?

> If the developers for an app do not live in a liberal democracy with a robust legal system, they probably cannot tell their government, “No,” if they’re instructed to backdoor the app and cut a release (stealth be damned).

Or when the laws of said democracy make it illegal for them to say “no” (see: Australia, possibly the US per Lavabit, realistically every country in Europe if the government is willing to claim a grave enough threat per the German hoster of Jabber.ru attempting a MITM against them).

tabbott•23m ago
I think this is a dangerous view. As we've seen with the libxz attack, skilled developers are very capable of hiding backdoors/vulnerabilities in security software, even when it is open source. So it's very important whether the developers building the software are trustworthy.

Authoritarian jurisdictions with a modus operandi of compelling their businesses and citizens by force are thus much riskier than Western democracies, even flawed ones. I at least expect it's a lot harder to say no to demands to break your promises that come with credible threats of torturing your family.

I'll also say that it's quite hard to make a messaging app without the servers that run the service having a great deal of power in the protocol. Many types of flaws or bugs in a client or protocol go from "theoretical problem" to "major issue" in the presence of a malicious server.

So if end-to-end security is a goal, you must pay attention to not only the protocol/algorithms and client codebase. The software publisher's risks are important (E.g., Zoom has a lot of risk from a China-centric development team). As are those of the hosting provider (if different from the publisher).

And also less obvious risks, like the mobile OS, mobile keyboard app, or AI assistant that are processing your communications even though they're sent between clients with E2EE.

Reflections on Trusting Trust is still a great read for folks curious about these issues.

some_furry•14m ago
> I think this is a dangerous view.

I think you misinterpreted the most important nuance in this post. The rest of your comment is about jurisdiction in the context of who develops the client software.

The blog post is talking about jurisdiction in the context of where ciphertext is stored, and only calls that mostly irrelevant. The outro even acknowledges that when jurisdiction does matter at all, it's about the security of the software running on the end machine. (The topic at hand is end to end encryption, after all!)

So, no, this isn't a dangerous view. I don't think we even disagree at all.