frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Agents need good developer experience too

https://modal.com/blog/agents-devex
1•birdculture•43s ago•0 comments

The Dark Factory

https://twitter.com/i/status/2020161285376082326
1•Ozzie_osman•46s ago•0 comments

Free data transfer out to internet when moving out of AWS (2024)

https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/
1•tosh•1m ago•0 comments

Interop 2025: A Year of Convergence

https://webkit.org/blog/17808/interop-2025-review/
1•alwillis•3m ago•0 comments

Prejudice Against Leprosy

https://text.npr.org/g-s1-108321
1•hi41•3m ago•0 comments

Slint: Cross Platform UI Library

https://slint.dev/
1•Palmik•7m ago•0 comments

AI and Education: Generative AI and the Future of Critical Thinking

https://www.youtube.com/watch?v=k7PvscqGD24
1•nyc111•8m ago•0 comments

Maple Mono: Smooth your coding flow

https://font.subf.dev/en/
1•signa11•8m ago•0 comments

Moltbook isn't real but it can still hurt you

https://12gramsofcarbon.com/p/tech-things-moltbook-isnt-real-but
1•theahura•12m ago•0 comments

Take Back the Em Dash–and Your Voice

https://spin.atomicobject.com/take-back-em-dash/
1•ingve•13m ago•0 comments

Show HN: 289x speedup over MLP using Spectral Graphs

https://zenodo.org/login/?next=%2Fme%2Fuploads%3Fq%3D%26f%3Dshared_with_me%25253Afalse%26l%3Dlist...
1•andrespi•14m ago•0 comments

Teaching Mathematics

https://www.karlin.mff.cuni.cz/~spurny/doc/articles/arnold.htm
1•samuel246•16m ago•0 comments

3D Printed Microfluidic Multiplexing [video]

https://www.youtube.com/watch?v=VZ2ZcOzLnGg
2•downboots•16m ago•0 comments

Abstractions Are in the Eye of the Beholder

https://software.rajivprab.com/2019/08/29/abstractions-are-in-the-eye-of-the-beholder/
2•whack•17m ago•0 comments

Show HN: Routed Attention – 75-99% savings by routing between O(N) and O(N²)

https://zenodo.org/records/18518956
1•MikeBee•17m ago•0 comments

We didn't ask for this internet – Ezra Klein show [video]

https://www.youtube.com/shorts/ve02F0gyfjY
1•softwaredoug•18m ago•0 comments

The Real AI Talent War Is for Plumbers and Electricians

https://www.wired.com/story/why-there-arent-enough-electricians-and-plumbers-to-build-ai-data-cen...
2•geox•21m ago•0 comments

Show HN: MimiClaw, OpenClaw(Clawdbot)on $5 Chips

https://github.com/memovai/mimiclaw
1•ssslvky1•21m ago•0 comments

I Maintain My Blog in the Age of Agents

https://www.jerpint.io/blog/2026-02-07-how-i-maintain-my-blog-in-the-age-of-agents/
3•jerpint•21m ago•0 comments

The Fall of the Nerds

https://www.noahpinion.blog/p/the-fall-of-the-nerds
1•otoolep•23m ago•0 comments

I'm 15 and built a free tool for reading Greek/Latin texts. Would love feedback

https://the-lexicon-project.netlify.app/
2•breadwithjam•26m ago•1 comments

How close is AI to taking my job?

https://epoch.ai/gradient-updates/how-close-is-ai-to-taking-my-job
1•cjbarber•26m ago•0 comments

You are the reason I am not reviewing this PR

https://github.com/NixOS/nixpkgs/pull/479442
2•midzer•28m ago•1 comments

Show HN: FamilyMemories.video – Turn static old photos into 5s AI videos

https://familymemories.video
1•tareq_•29m ago•0 comments

How Meta Made Linux a Planet-Scale Load Balancer

https://softwarefrontier.substack.com/p/how-meta-turned-the-linux-kernel
1•CortexFlow•29m ago•0 comments

A Turing Test for AI Coding

https://t-cadet.github.io/programming-wisdom/#2026-02-06-a-turing-test-for-ai-coding
2•phi-system•30m ago•0 comments

How to Identify and Eliminate Unused AWS Resources

https://medium.com/@vkelk/how-to-identify-and-eliminate-unused-aws-resources-b0e2040b4de8
3•vkelk•30m ago•0 comments

A2CDVI – HDMI output from from the Apple IIc's digital video output connector

https://github.com/MrTechGadget/A2C_DVI_SMD
2•mmoogle•31m ago•0 comments

CLI for Common Playwright Actions

https://github.com/microsoft/playwright-cli
3•saikatsg•32m ago•0 comments

Would you use an e-commerce platform that shares transaction fees with users?

https://moondala.one/
1•HamoodBahzar•34m ago•1 comments
Open in hackernews

The X11 Security extension from the 1990s

https://www.uninformativ.de/blog/postings/2025-08-02/0/POSTING-en.html
55•zdw•6mo ago

Comments

rnhmjoj•6mo ago
> What does it protect against?

Unless you're doing SELinux or using some tool like firejail, absolutely nothing?

The average desktop is completely insecure, regardless of the display protocol. If a program is running as your user it's already game over: it can do whatever it likes. For example, I can simply change your shell profile to add an LD_PRELOAD shim, hook some libc syscall wrapper and run arbitrary code in any user process. There's no need to log key presses.

uecker•6mo ago
Indeed https://github.com/Aishou/wayland-keylogger
marcodiego•6mo ago
Hi Uecker!

I really don't know this is the best place to ask, but I don't know anywhere to ask you, so... Is C2Y getting any generic programming features? I'd really love the one with _Type as a new type that stores a type.

uecker•6mo ago
I hope so. WG14 seems to like it (but not everybody), but it is not existing practice. So it will mostly depend on me creating a prototype and doing a lot convincing.
bitwize•6mo ago
Wayland's security isolation is a necessary, but not sufficient, measure to prevent this kind of attack.
uecker•6mo ago
It is not an attack if there is no privilege boundary in the first place. One could argue that should be, but then X's security would have also worked which is the point of the article. The problem was that Wayland propaganda pretended actual users would benefit from improved security immediately because there was a gaping security hole. The point of the linked repo is that this is nonsense and typical Linux users do not benefit at all.
tialaramex•6mo ago
Keep in mind that X11 is a protocol, so the client might not be running as your user on your local machine, it could be a dedicated machine that's only running the client.

In this case, again it's not important because in our timeline X11 is old, you might proxy the clipboard feature, with a trusted and untrusted connection, the untrusted connection needs to be careful because it's exposed to arbitrary nastiness from potentially hostile untrusted clipboard-using software - the trusted one talks to everybody else. So an example is you might decide to sanitize text, strip out invisible control characters, and exclude "rich" text formats that might conceal attacks. Or you might allow some images but only after previewing them and constraining their properties, no 18GB GIFs please, yes it's technically possible to encode a huge truecolor image as a single GIF no I don't want that in my clipboard.

Is this something we should try to implement? Probably not, but in a world where people try to kite surf across the English channel it's nowhere close to the craziest hobby.

eqvinox•6mo ago
> Keep in mind that X11 is a protocol, so the client might not be running as your user on your local machine, it could be a dedicated machine that's only running the client.

For an X server to be network exposed, you first have to either SSH forward it or remove the nowadays-default "-nolisten TCP", and then either get the xauth secret or have the user do 'xhost +'.

At that point I'm gonna say the attacker earned their keylogger access.

And you or your distro might consider patching out the TCP variant.

bitwize•6mo ago
Saying 'xhost +menger' and being able to run graphical apps from my university's Sun server -- OPEN LOOK apps at that -- on my local Linux machine was peak 1990s computing.
rnhmjoj•6mo ago
> the client might not be running as your user on your local machine

True, this is probably the only real use case. X11 forwarding in OpenSSH (ssh -X) does in fact use this extension by default.

anthk•6mo ago
..... guix shell --container

it's great for this.

rlpb•6mo ago
This is why need need app sandboxing as the mobile platforms already do. Snaps and Flatpak both suuport this, but their critics resist without providing an alternative.
cxr•6mo ago
Are the mobile platforms using Snap and Flatpak?
account42•6mo ago
I'd rather hold software creators accountable for releasing malware. 100% protection against bad software is not free.
johnnyjeans•6mo ago
you're right, but sec is about threat profiles. there's a point where selinux, firejail, etc. aren't enough either. even a virtual machine may as well be wet rice paper to an alphabet soup agency. you should very much assume that even airgapping isn't enough, unless it's inside of a faraday cage.

xorg security measures are a different matter from stopping any random program from writing to your filesystem. broaden the conversation to be about all security across all attack surfaces under all conditions and nothing is safe. i'm still not gonna run everything as root.

porridgeraisin•6mo ago
There is no threat profile where the attacker can run an XNextEvent() loop and log your password, but somehow cannot alter the .desktop file for your browser, or your login profile and LD_PRELOAD something.

Edit: other than sandboxing, but I'm targeting this at the Great Wayland Security Theater.

farkin88•6mo ago
X11's SECURITY extension was its long-forgotten stab at sandboxing: flip a bit and every client is either trusted or untrusted. It does kill trivial key-logging, but it also breaks the clipboard, disables GLX and makes various apps fall over, leaving the desktop unusable while Firefox somehow works just fine. A cool reminder that X11 could've had proper sandboxing 25 years ago, but the UX cost sank it and Wayland is the lifeboat now.
rnhmjoj•6mo ago
It's worth mentioning that the X11Libre fork of X.org has recently added the Xnamespace extension [1], which is inspired by this. Instead of a single bit trusted/untrusted it allows to isolate clients into containers where interactions are restricted to be within the same container only.

[1]: https://github.com/X11Libre/xserver/blob/master/doc/Xnamespa...

farkin88•6mo ago
Thanks for sharing. That's really cool.
eqvinox•6mo ago
> It's widely known that X11 has a problem with, for example, keyloggers. The issue is not that keyloggers are possible through security holes -- but keyloggers are trivial on X11, as they are part of normal operation and don't require exploits. It is one of the reasons why people push for Wayland.

Sorry, but did I miss news about a keylogger epidemic? On Linux?

In all seriousness, is this solving an actual problem or an imagined one?

And even assuming a 'Yes': A problem that isn't better solved elsewhere? How did the keylogger get access to the system and its desktop session? What else does it have access to?

anthk•6mo ago
'xev'
yjftsjthsd-h•6mo ago
That's not an answer. Yes, I can run xev on my machine against my X session and see my keystrokes. It is not obvious that this is a problem. A more plausible angle would be that if an attacker compromises one application - say, a web browser - then they could keylog passwords. Of course, most people don't sandbox their browser so that's the least of their problems if it's compromised (ex. https://access.redhat.com/articles/1563163 let an attacker steal ssh keys).
anthk•6mo ago
The secure flag from xterm binds/locks kb and mouse and forbids snooping.
eqvinox•6mo ago
You're saying things, but not making an argument or even engaging the discussion really. What's the point you're trying to make, if any?
nextos•6mo ago
Firejail discusses this briefly in their X11 guide:

The sandbox replaces the regular X11 server with Xpra or Xephyr server. This prevents X11 keyboard loggers and screenshot utilities from accessing the main X11 server.

https://firejail.wordpress.com/documentation-2/x11-guide

It's not a common issue, but obviously a security concern to make it so easy for keyloggers to record your keypresses or screen. I currently prefer X11 to Wayland, and I'd love if this problem was possible to address without Firejail. I use Firejail for other sandboxing tasks, but sandboxing X11 is too impractical.

zzo38computer•6mo ago
I think a proxy server might be a better way to handle security, than the way it is done as described in this article. (On a computer, the security will need to consider more than only the X server, but that will be one part of it.)
themafia•6mo ago
> It is one of the reasons why people push for Wayland.

Really? You think they'd just push for a _firewall_. Wouldn't that just solve the actual problem? Oh, wait, yea, X11 disabled TCP networking by default more than a decade ago.

> it cannot use the active X11 connection to spy on your keyboard.

You understand what /dev/input/* is, right?

> I understand that this means this blog post lacks substance.

The whole undertaking lacks substance.

Too many projects drank the early 2000s kool-aid and thought they would get a second suck at the salve (a.k.a "start from scratch"). It never worked out and you just fraction an already annoyed userbase into an overtly warring userbase. I can't think of anything more wasteful of talent and energy.

naikrovek•6mo ago
you sound fun. and by "fun" I mean "challenging"
themafia•6mo ago
Oh, I didn't realize the ethos of "hacker news" was to "have fun" and "avoid challenge."

I personally think attitudes like yours have destroyed this site.

You shouldn't process this forum as a social club or a social opportunity.

naikrovek•6mo ago
> I personally think attitudes like yours have destroyed this site.

neat. I mean, the site seems fine to me. Seems to be working fine. I got downvoted for my observation but you'll be upvoted for saying I broke something, so maybe it was already broken when you got here.

ChocolateGod•6mo ago
To me it seems the security extension is more useful for protecting elevated prompts (such as running an application as admin) than actually sandboxing between applications.
ziml77•6mo ago
If that extension never caught on, then what mechanisms are being used now to protect elevated prompts/apps?
ChocolateGod•6mo ago
on Wayland? Flatpak and the fact that Wayland doesn't expose all windows to other windows.
wkat4242•6mo ago
I remember back then xauth didn't even exist. You could simply dump a window on anyone else's screen. It was heaven for practical jokers like me.
queenkjuul•6mo ago
I would've gone nuts with this in school
wkat4242•6mo ago
Yeah me too, though in college. There was even a program called "xbl" (or "blast" on some platforms) that would turn your mouse pointer into a crosshair and when you clicked somewhere it would make a round hole in the window. Which wouldn't go away until you killed the app. In fact they could even stay after it quit! It was so funny. https://man.freebsd.org/cgi/man.cgi?query=blast&sektion=1&ma...

Also running xfishtank on someone's root window. So many things you could do.

naikrovek•6mo ago
Plan 9 had this all sorted out, didn't it? It didn't use X11, it used something called 8½ which became the Plan 9 display server, and used 9p as the communication protocol.

What was clever about it was that each window got its own view of the keyboard and mouse. Literally their own virtual devices in /dev. Each window only saw what went on when that window was in focus, and for the mouse, it only saw what the mouse was doing when the mouse was within the boundaries of the window and that window was directly under the cursor (no windows between the cursor and the window in question.)

9P isn't encrypted, so these remote sessions weren't encrypted, but the Bell Labs folks knew that X11 security wasn't good and seem to have evolved it well. I wonder what things would be like if we didn't latch onto 40 year old operating systems like our lives depended on them.

If we can't get a useful Plan9 going (one that has a web browser and to which applications can easily be ported) maybe we can bring X11 forward a bit with inspiration from Plan 9. Wayland has been "2 years away" for about 15 years, and that shows no signs of changing.

I'm told that the entire source code for Plan 9 can be held in the mind of a single person, and that any skilled C developer can read what's going on with ease. I don't know if that's true, but if such a display server has semi-obvious improvements over X11, maybe we can come up with an X12 which adopts these improvements. We do not need to maintain backwards compatibility, we only need to support X11 and X12 at the same time, I imagine.