frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenAI might pivot to the "most addictive digital friend" or face extinction

https://twitter.com/lebed2045/status/2020184853271167186
1•lebed2045•30s ago•1 comments

Show HN: Know how your SaaS is doing in 30 seconds

https://anypanel.io
1•dasfelix•48s ago•0 comments

ClawdBot Ordered Me Lunch

https://nickalexander.org/drafts/auto-sandwich.html
1•nick007•1m ago•0 comments

What the News media thinks about your Indian stock investments

https://stocktrends.numerical.works/
1•mindaslab•2m ago•0 comments

Running Lua on a tiny console from 2001

https://ivie.codes/page/pokemon-mini-lua
1•Charmunk•3m ago•0 comments

Google and Microsoft Paying Creators $500K+ to Promote AI Tools

https://www.cnbc.com/2026/02/06/google-microsoft-pay-creators-500000-and-more-to-promote-ai.html
2•belter•5m ago•0 comments

New filtration technology could be game-changer in removal of PFAS

https://www.theguardian.com/environment/2026/jan/23/pfas-forever-chemicals-filtration
1•PaulHoule•6m ago•0 comments

Show HN: I saw this cool navigation reveal, so I made a simple HTML+CSS version

https://github.com/Momciloo/fun-with-clip-path
1•momciloo•7m ago•0 comments

Kinda Surprised by Seadance2's Moderation

https://seedanceai.me/
1•ri-vai•7m ago•1 comments

I Write Games in C (yes, C)

https://jonathanwhiting.com/writing/blog/games_in_c/
2•valyala•7m ago•0 comments

Django scales. Stop blaming the framework (part 1 of 3)

https://medium.com/@tk512/django-scales-stop-blaming-the-framework-part-1-of-3-a2b5b0ff811f
1•sgt•7m ago•0 comments

Malwarebytes Is Now in ChatGPT

https://www.malwarebytes.com/blog/product/2026/02/scam-checking-just-got-easier-malwarebytes-is-n...
1•m-hodges•7m ago•0 comments

Thoughts on the job market in the age of LLMs

https://www.interconnects.ai/p/thoughts-on-the-hiring-market-in
1•gmays•8m ago•0 comments

Show HN: Stacky – certain block game clone

https://www.susmel.com/stacky/
2•Keyframe•11m ago•0 comments

AIII: A public benchmark for AI narrative and political independence

https://github.com/GRMPZQUIDOS/AIII
1•GRMPZ23•11m ago•0 comments

SectorC: A C Compiler in 512 bytes

https://xorvoid.com/sectorc.html
2•valyala•12m ago•0 comments

The API Is a Dead End; Machines Need a Labor Economy

1•bot_uid_life•13m ago•0 comments

Digital Iris [video]

https://www.youtube.com/watch?v=Kg_2MAgS_pE
1•Jyaif•14m ago•0 comments

New wave of GLP-1 drugs is coming–and they're stronger than Wegovy and Zepbound

https://www.scientificamerican.com/article/new-glp-1-weight-loss-drugs-are-coming-and-theyre-stro...
4•randycupertino•16m ago•0 comments

Convert tempo (BPM) to millisecond durations for musical note subdivisions

https://brylie.music/apps/bpm-calculator/
1•brylie•18m ago•0 comments

Show HN: Tasty A.F.

https://tastyaf.recipes/about
1•adammfrank•19m ago•0 comments

The Contagious Taste of Cancer

https://www.historytoday.com/archive/history-matters/contagious-taste-cancer
1•Thevet•20m ago•0 comments

U.S. Jobs Disappear at Fastest January Pace Since Great Recession

https://www.forbes.com/sites/mikestunson/2026/02/05/us-jobs-disappear-at-fastest-january-pace-sin...
1•alephnerd•21m ago•1 comments

Bithumb mistakenly hands out $195M in Bitcoin to users in 'Random Box' giveaway

https://koreajoongangdaily.joins.com/news/2026-02-07/business/finance/Crypto-exchange-Bithumb-mis...
1•giuliomagnifico•21m ago•0 comments

Beyond Agentic Coding

https://haskellforall.com/2026/02/beyond-agentic-coding
3•todsacerdoti•22m ago•0 comments

OpenClaw ClawHub Broken Windows Theory – If basic sorting isn't working what is?

https://www.loom.com/embed/e26a750c0c754312b032e2290630853d
1•kaicianflone•24m ago•0 comments

OpenBSD Copyright Policy

https://www.openbsd.org/policy.html
1•Panino•25m ago•0 comments

OpenClaw Creator: Why 80% of Apps Will Disappear

https://www.youtube.com/watch?v=4uzGDAoNOZc
2•schwentkerr•29m ago•0 comments

What Happens When Technical Debt Vanishes?

https://ieeexplore.ieee.org/document/11316905
2•blenderob•30m ago•0 comments

AI Is Finally Eating Software's Total Market: Here's What's Next

https://vinvashishta.substack.com/p/ai-is-finally-eating-softwares-total
3•gmays•30m ago•0 comments
Open in hackernews

Chrome's SSL Bypass Cheatcode

https://thomascountz.com/2025/07/17/chromes-ssl-bypass-cheatcode
64•thomascountz•6mo ago

Comments

eugenekolo•6mo ago
It's possible they changed it from "thisisunsafe" to the b64 version to avoid automatic scanners finding "unsafe" keyword usage.
_def•6mo ago
I wonder if this is for quicker testing that happens recurringly (either automated or a poor soul doing it manually) where letting the phrase type by script is just easier than doing the 2 mouse clicks
almostgotcaught•6mo ago
Jesus Christ thank god for this! Recently libgen ceased to be accessible because of this and I couldn't figure out any way to disable (on Firefox as well!). Bless you.
chatmasta•6mo ago
Well hopefully the blog doesn’t get too much visibility or they’ll change the string again :)

Sounds like the right place to look is the chromium commit log…

molticrystal•6mo ago
If an explicit keypress sequence becomes unavailable or changes, the script appears to call certificateErrorPageController.proceed(). So here is a bookmarklet that replicates this, add it to the URL field of a bookmark and click the bookmark to run it:

    javascript:(function(){if(window.certificateErrorPageController)window.certificateErrorPageController.proceed();})();
It should work as long as the proceed command remains functional and certificateErrorPageController hasn’t been renamed in non-developer builds.
miloignis•6mo ago
For Firefox, I can normally click Advanced -> Accept Risk and Continue, which I think is about the perfect amount of friction.
pyrolistical•6mo ago
Is this easier for screen readers to bypass?
Y_Y•6mo ago
If I want to load some unencrypted data my browser better fucking let me do it. I don't mind if I have to give a secret handshake, but I have no sympathy for lusers who type "thisisunsafe" and then make it someone else's problem when their expectations of "safety" are violated.
AnthonyMouse•6mo ago
We started off with SSL/TLS being used for payments systems and logins where its absence is very important to not ignore. Then we said we should use it for everything, which is good, but now it's showing up in different contexts.

If it says the certificate for your bank is expired, you need to stop. If it says the certificate for the 10 year old public blog post that was linked by a 5 year old Reddit post as describing the solution to your problem, that should not matter, and you just want to read the non-secret contents of whatever is on that page regardless of whether the site's maintainer turned on HTTP to HTTPS redirects and then neglected to renew the certificate.

And people understand this, and people are rightfully going to devise workarounds for the second case, and it's ridiculous to expect them to not.

seanwilson•6mo ago
> We started off with SSL/TLS being used for payments systems and logins ... If it says the certificate for your bank is expired, you need to stop. If it says the certificate for the 10 year old public blog post that was linked by a 5 year old Reddit post as describing the solution to your problem, that should not matter

Non-HTTPS pages can be tampered with to inject any content into them e.g. into a blog post page, you could inject a login form ("sign in via Google to unlock this post"), a donation payment form ("donate for more content like this!"), or malware installers ("your browser is out of date, click to update" banner).

I think pushing to protect non-tech savvy users makes sense here. I see even a lot of developers not understanding risks like the above, so it's a losing battle thinking non-techy users can be educated about it and be cautious enough.

snickerdoodle12•6mo ago
> Non-HTTPS pages can be tampered with to inject any content into them e.g. into a blog post page, you could inject a login form ("sign in via Google to unlock this post"), a donation payment form ("donate for more content like this!"), or malware installers.

Who cares? The blog author could be malicious. The blog might have been sold 5 years ago and now hosts malicious content.

Stop trying to nanny people, it's unbecoming.

krior•6mo ago
But you can atleast acknowledge that there is a difference between trusting a blog you are actively seeking out and all the entities between you and said blog, right?
snickerdoodle12•6mo ago
Not really. The context is some random reddit post from close to a decade ago linking it. Might as well have typed a random URL in your browser.
charcircuit•6mo ago
The people getting their money and accounts stolen care. The blog owner cares about the reputational hit. People who care about the success of the web care because it makes the web more risky than people using mobile apps.
snickerdoodle12•6mo ago
Yes and if you slit your wrists with a knife you will likely die. Do stupid things, bad things happen. Stop nannying people.
charcircuit•6mo ago
So visiting a website is doing a stupid thing? Your recommendation is essentially telling people to stop visiting websites or accept bad things will happen to them. This is not a healthy viewpoint for growing the web.
Dylan16807•6mo ago
The stupid behaviors listed above are putting your google password or payment info into a random blog, or running a program it gives you because it says you need to update.

Doing that is stupid whether it's http or valid https or broken https.

charcircuit•6mo ago
Okay, but if a user went to a http version of YouTube and put in your payment info to buy a movie, as opposed to remembering it should take him to an https Google page, I would find that a plausible situation that is hard to blame the user for. Attackers being able to hijack the reputation of sites is problematic.
Dylan16807•6mo ago
> Attackers being able to hijack the reputation of sites is problematic.

And the whole point of this thread is that some sites have 0 reputation to hijack.

charcircuit•6mo ago
Youtube does not have 0 reputation. The point of this thread is arguing the merits of requiring sites that don't handle sensitive informationfto use https.
Dylan16807•6mo ago
Nobody mentioned YouTube until your previous post. The example of 0 reputation was a ten year old blog post found via a comment.

And "logins" were explicitly listed as important to secure, in that same comment. So that double covers YouTube for just about everybody.

Dylan16807•6mo ago
> The people getting their money and accounts stolen care.

> People who care about the success of the web care because it makes the web more risky than people using mobile apps.

The main comparison here is whether a middleman injected it or the blog inserted it server-side. The level of risk is similar either way.

> The blog owner cares about the reputational hit.

If the blog hasn't been updated in ages, they probably don't.

charcircuit•6mo ago
>The level of risk is similar either way.

There is still risk, but this is a form of risk which is not neccessary and can be reduced.

>If the blog hasn't been updated in ages, they probably don't.

We are talking about blogs that don't use https because they don't sell things. Expired certificates are out of scope of this comment thread.

Dylan16807•6mo ago
> There is still risk, but this is a form of risk which is not neccessary and can be reduced.

It reduces it a little bit. But if you drop the risk of a random site being malicious by 25% that's not a very important change. The user still has to be wary. That reduction is not worth anything as drastic as blocking the site.

> We are talking about blogs that don't use https because they don't sell things. Expired certificates are out of scope of this comment thread.

I got the impression we were primarily talking about broken https. It's definitely not out of scope entirely:

"If it says the certificate for your bank is expired, you need to stop. If it says the certificate for the 10 year old public blog post that was linked by a 5 year old Reddit post as describing the solution to your problem, that should not matter, and you just want to read the non-secret contents of whatever is on that page regardless of whether the site's maintainer turned on HTTP to HTTPS redirects and then neglected to renew the certificate."

tptacek•6mo ago
The browser does not know what the web page is, and attacks on genuinely sensitive websites like banks wildly outnumber attacks on 10-year-old public blog posts. Browsers are doing exactly the right thing here.
AnthonyMouse•6mo ago
The certificate error on the 10 year old blog post isn't an attack, it's an old site that still exists but isn't actively maintained, which happens all the time.
tptacek•6mo ago
The browser cannot know that.
AnthonyMouse•6mo ago
That's why you need the human who can know that to make the decision.
akerl_•6mo ago
Isn’t that what’s happening? The browser shows a big warning with context and then the human makes a decision to click the “do this it’s fine” button.

The exception is cases where the site operator has opted in to HSTS or similar to indicate their decision to rather disable access than allow insecure access.

AnthonyMouse•6mo ago
The issue is that there shouldn't be a case where it's impossible to override it, because then the problem is unfixable when the misconfiguration occurs in that case.

It's also overloading what HSTS is supposed to be for. Normally if you go to a site via HTTP, it loads without comment, which is less secure than loading a site via HTTPS that has an expired or self-signed certificate. HSTS it to say, don't do that.

Allowing the site to tell the user agent to do something according to the wishes of the site owner in a way that can't be overridden by the user is not something that user agents should ever do.

akerl_•6mo ago
Your disagreement seems to be with the spec for HSTS, which does say it should prevent showing a site with HTTP or with an invalid cert.

https://datatracker.ietf.org/doc/html/rfc6797#section-12.1

tptacek•6mo ago
Literally the entire point of HSTS is to allow websites to communicate to browsers that they can only be loaded in a valid TLS session. It's a defense against TLS-stripping. If you turn that on for your blog, that's on you. Serious question: what could they be "overloading" about HSTS here? What other purpose do you think it had?
Dylan16807•6mo ago
> If it says the certificate for your bank is expired, you need to stop.

No I don't. At least not if it's recent. A certificate that expired in the last month is roughly equal in safety to a certificate that's valid for another month or two.

Expiration is a backup safety measure and the risk is mostly based on how long it's been since the certificate was issued.

Unless any banks are going around leaking keys right after they expire for some weird reason?

yarekt•6mo ago
Err what? That certificate may well have been leaked, but because it expired the bank doesn’t not consider it an issue, no need to revoke it.

Certificate validity is binary. either it all is, or it isn’t. this included “not before”

whydoyoucare•6mo ago
We scream at the expired certificate, yet happily let CloudFlare be an official MitM. How ironic is that? :)
AnthonyMouse•6mo ago
Not only that, banks are generally pretty diligent about that sort of thing and have enough customers and resources that if their website is misconfigured someone is going to report it immediately and they're going to fix it immediately. Which means that a certificate error on a bank site is suspicious.

Whereas a certificate error on a disused blog is pretty much what you'd expect from a disused blog.

Dylan16807•6mo ago
The chance that happened is pretty low. What kind of breach gets old keys but nothing else of note?
alt187•6mo ago
To be fair, you can click Advanced > Continue to something or other to bypass the SSL warning.

I think.

toast0•6mo ago
If your browser has information that the site enabled HSTS, the continue option isn't available ... that's what you need the cheat code for.
molticrystal•6mo ago
For several types of certificate and ssl issues(HSTS , blacklisted/revoked certificates) that option is hidden and thus unavailble. Chrome can be a stickler, which is understandable as the majority of its users are not prepared to deal with the possible downsides of going to an untrusted page.

So this is where the "cheat code" comes in handy:

https://revoked.badssl.com/

https://subdomain.preloaded-hsts.badssl.com/

https://pinning-test.badssl.com/

Then there are those which have no "cheat code" bypass, so you'd have to use some other method:

https://rc4.badssl.com/

mrkramer•6mo ago
I remember reading some blog post that badly configured SSL certificate will cause something like 90% of people bouncing off the website because they are scared of the big red Chrome warning. SSL certificate is actually an important UX factor.
anonymousiam•6mo ago
100%!

TLS is fragile, and working around it is often necessary. Certs can expire or be revoked (anywhere in the chain) and the renewal process can be bugged. The time on the client (required for confirmation of certificate validity window) could be wrong (either accidentally or deliberately).

Requiring TLS on an inter-LAN connection is mostly useless, and impossible if no Internet gateway is available.

sgjohnson•6mo ago
> Requiring TLS on an inter-LAN connection is mostly useless, and impossible if no Internet gateway is available.

what do you mean?

> Requiring TLS on an inter-LAN connection is mostly useless

there are many ways to intercept inter-LAN traffic, and:

> and impossible if no Internet gateway is available.

DNS validation? Run your own CA and trust it in your intranet?

anonymousiam•6mo ago
1: If no gateway to the WAN exists, the certificate chain cannot be validated.

2: I did say "mostly" useless. If your LAN is at risk of spoofing or MITM, then TLS probably will not solve all of your problems anyway.

3: Obviously you can create a local cert and add it to your trust chain. You'll still have problems with various embedded devices that don't have a RTC.

sigio•6mo ago
I've been using this a lot (when testing), but I wish firefox/mozilla had something equivalent, because with HSTS domains, it's hard to bypass cert issues in firefox.
zzo38computer•6mo ago
In Firefox, I used a hex editor to modify the files so that it does not recognize the headers to set HSTS, and then I changed the file permissions so that the HSTS file cannot be modified, and then I disabled the HSTS preload list.
pabs3•6mo ago
Which files/modifications? I would like to be able to do this too.
giingyui•6mo ago
Hey at least Chrome lets you can bypass SSL errors. Firefox makes it impossible to bypass SSL errors if the site uses HSTS. So much for the browser for power users.
wasmperson•6mo ago
An example for anyone who hasn't seen this before:

https://subdomain.preloaded-hsts.badssl.com/

jeroenhd•6mo ago
Firefox sticks to the spec, Chrome makes you type out base64 manually to ignore the spec.

The TLS errors that aren't unbypassible by specification (i.e. HSTS, see https://datatracker.ietf.org/doc/html/rfc6797) can be bypassed on Firefox just fine. It's only the ones where the spec says bypassing the error shouldn't be possible where Firefox takes a hard stance.

Chrome had to alter their bypass string several times because vendors documented the override rather than fixing their insecure crapware. It makes total sense to me that Firefox does the same.

Dylan16807•6mo ago
Being a user agent is more important than any spec.
giingyui•6mo ago
Software should do what I want it to, not stick to a spec.
giancarlostoro•6mo ago
Ah yes, software should leak everyone else's credentials to me because I want it to, forget keeping their information safe and secure, forget the GDRP.
yjftsjthsd-h•6mo ago
Nobody said that. If you tell your software on your machine to leak your credentials, then yes it should. And since it's your data and you're the one telling it to do it, I'm reasonably confident that gdpr says that's completely above board. (Like, I'm no lawyer so take with appropriate grain of salt, but it's generally described as saying that you have to have user permission to do things with data, which the user agent acting on your orders very much does have.)
zzo38computer•6mo ago
I agree that it should do what you entered. However, it would make sense for the default settings to match the specification, unless the specification is no good (which, in the case of HSTS (and many other things in WWW), I do think the specification is no good).
sugarpimpdorsey•6mo ago
My installation of Firefox defaults to plain HTTP when I type a URL into the address bar. No amount of about:config fiddling seems to turn it off.

It is rubbish software, the developers routinely ignore fixing actual bugs in favor of new features, and I wish we had a better alternative that wasn't married to Google.

seanhunter•6mo ago
This works fine for me, so I don’t know what’s causing it to be different for you. The key in about:config is dom.security.https_only_mode and I have that set to “true”.

If you want to set this without using about:config you can go to Settings and search “https” you’ll see “https-only Mode” there and you can turn it on for all windows, private windows oonly or none. There is also an exception list should you want that.

tech234a•6mo ago
I've found this useful periodically on desktop but I wonder how/if it would work on mobile if you don't have a physical keyboard attached.
pupppet•6mo ago
Hey Chrome, give us a cheat code to permanently hide the close buttons on tabs.
neurostimulant•6mo ago
They would change the code once it got popular enough so I bookmarked the source code to figure out the current code: https://chromium.googlesource.com/chromium/src/+/refs/heads/...
tgsovlerkhgsel•6mo ago
It really is unsafe though, even beyond what many who generally understand the web may realize. There are various ways (from caches to more obscure ones) in which loading a web site insecurely once, even if you aren't logged in at that time, can affect you much later when you think you are safe.

If you ever do this, use a separate browser profile or incognito window. Don't use this just to e.g. get to a captive portal (use example.com or neverssl.com for that).

You only need the "cheat code" if the site is using HSTS, which suggests it's the production web site of something that has a reason to try to be secure. If you're in a separate dev envrionment (different origin), you probably won't have HSTS set.

For local development or browser-to-local-app communication, localhost counts as a secure origin even without HTTPS.