frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Tennessee school book bans include Calvin and Hobbes and The Magic Tree House

https://www.bklmy.com/archives/30187
1•caned•2m ago•0 comments

Will Future Civilizations Bother to Excavate Our Remains?

https://www.palladiummag.com/2025/07/08/will-future-civilizations-bother-to-excavate-our-remains/
1•MrBuddyCasino•3m ago•0 comments

Maruko: Write SwiftUI iOS Apps on Your Phone with No-Code Magic

https://apps.apple.com/us/app/maruko-craft-your-apps/id6470918527
1•anyinfa•5m ago•0 comments

Show HN: Don't settle for a waitlist. Create a VIP list that drives conversions

https://www.vipli.st/
1•doppelgunner•8m ago•0 comments

Show HN: Complexipy, calculate the cognitive complexity of Python

https://github.com/rohaquinlop/complexipy
1•rohaquinlop•9m ago•0 comments

GPT-5 model descriptions accidentally leaked on GitHub

https://twitter.com/ns123abc/status/1953318288286519676
4•codergautam•11m ago•1 comments

RIP to the Macintosh HD hard drive icon, 2000–2025

https://arstechnica.com/gadgets/2025/08/rip-to-the-macintosh-hd-hard-drive-icon-2000-2025/
2•xrayarx•19m ago•1 comments

Viral TikTok Challenge Leaves 9-Year-Old with Burns: Police

https://www.msn.com/en-us/news/crime/viral-tiktok-challenge-leaves-9-year-old-with-severe-burns-police/ar-AA1JYCIK
2•josephcsible•21m ago•0 comments

Writing Your Own Simple Tab-Completions for Bash and Zsh

https://mill-build.org/blog/14-bash-zsh-completion.html
3•lihaoyi•21m ago•0 comments

Waymos of Loving Grace

https://www.kvncnnlly.com/2025-08-02-waymos-of-loving-grace/
4•wintercarver•29m ago•0 comments

Bitfrost – LLM gateway 90x faster than Litellm at p99

https://github.com/maximhq/bifrost
4•havercosine•32m ago•1 comments

How ChatGPT spoiled my semester (2024)

https://benborgers.com/chatgpt-semester
31•edent•38m ago•4 comments

Tech company reaches gender quotas by replacing half workers with female AI bots

https://www.betootaadvocate.com/uncategorized/tech-company-reaches-gender-quotas-by-replacing-half-the-workforce-with-female-ai-assistants/
1•tjmc•41m ago•0 comments

Ask HN: What's the best career move you made in tech–and why?

2•karma_7•44m ago•4 comments

Wary of sticker shock, retailers clash with brands on price hikes

https://www.reuters.com/business/retail-consumer/wary-sticker-shock-retailers-clash-with-brands-price-hikes-2025-08-07/
1•petethomas•45m ago•0 comments

Elvis is alive How 'AI' stunts modern mythmaking

https://bsdly.blogspot.com/2025/08/elvis-is-alive-how-ai-stunts-modern.html
1•peter_hansteen•45m ago•0 comments

Onion-Lang

https://github.com/sjrsjz/onion-lang
2•todsacerdoti•46m ago•0 comments

Apple hit by string of departures in AI talent war

https://www.ft.com/content/6b9ce8ce-a327-40c1-a8a1-579c2727fc60
2•mfiguiere•47m ago•0 comments

The rise of couples location sharing

https://www.theguardian.com/lifeandstyle/2025/jul/24/inside-the-rise-of-couple-location-sharing
2•bryanrasmussen•59m ago•1 comments

Official Reserve Revaluations: The International Experience

https://www.federalreserve.gov/econres/notes/feds-notes/official-reserve-revaluations-the-international-experience-20250801.html
2•palmfacehn•59m ago•0 comments

Actual LLM agents are coming

https://pleias.fr/blog/blogactual-llm-agents-are-coming
5•whoami_nr•1h ago•1 comments

Fun Command-Line Tricks You Should Try

https://www.nxgntools.com/blog/5-fun-and-handy-curl-command-line-tricks-you-should-try
1•doppelgunner•1h ago•1 comments

New Gemini app tools to help students learn, understand and study better

https://blog.google/products/gemini/new-gemini-tools-students-august-2025/
4•from_neverland•1h ago•1 comments

Sleep Ledger

https://domofutu.substack.com/p/sleep-ledger
1•wjb3•1h ago•0 comments

Your LLM Does Not Care About MCP

https://hackteam.io/blog/your-llm-does-not-care-about-mcp/
2•gethackteam•1h ago•1 comments

AI in production: reflecting on one year, five projects and factories deployed

https://medium.com/oss-ventures/ai-in-production-reflecting-on-one-year-five-projects-and-dozens-of-factories-deployed-582e627d6cec
1•philberto•1h ago•0 comments

Run LLM's Locally on iPhone

https://github.com/Q2-Development/q2-edge-chat
4•Michaelgathara•1h ago•0 comments

Slab City, California

https://en.wikipedia.org/wiki/Slab_City,_California
3•benbreen•1h ago•0 comments

Anyone Bored at Work?

1•kake25•1h ago•4 comments

Terrence Tao Loses Funding

https://www.thebulwark.com/p/terence-tao-ucla-mathematician-mozart-of-math-trump-funding-nsf
7•colonCapitalDee•1h ago•1 comments
Open in hackernews

We replaced passwords with something worse

https://blog.danielh.cc/blog/passwords
57•max__dev•3h ago

Comments

malfist•2h ago
Whole heartedly agree. It's not more secure if you only use the second factor of two factor auth.
LoganDark•2h ago
Codes that are provided on demand by a service will always be far less secure than proper TOTP. Because in the case of proper TOTP, no secret ever leaves the service after initial configuration, but in the case of discount 2FA through email or especially SMS, a fresh secret has to be delivered to me each time, where it can easily be intercepted by all manner of attacks.
hooverd•2h ago
I thought this was going to be about Passkeys. Maybe if the FIDO Alliance can stop being obstinant and allow real backups, I'd be all in on them.
jjani•2h ago
Even with backups, the attestation issue makes them awful.
anonymars•2h ago
I'm not familiar with this issue and a quick search didn't turn up anything obvious. Would you mind elaborating?
Arrowmaster•1h ago
They are referring to the ability of a site you are logging into forcing you to use a client from a specific list or having a list of clients to deny.

It's copied over from FIDO hardware keys where each device type needed to be identifiable so higher tier ones could be required or unsecured development versions could be blocked.

jjani•1h ago
This is what I was referring to, and we already have seen this happen in the wild with PayPal at one point (possibly still) blocking passkeys from e.g. Firefox. For now the argument against this seems to be that "Apple zeroes this out so service providers can't do it without risking issues for their many users who use Apple to store their keys", but clearly this is so precarious of a situation it may as well not be a thing. You can't depend on one trillion-dollar company not changing their minds on that tomorrow.
pandorobo•1h ago
Specifically they are referring to synced passkeys (passkeys generated by services like Google password manager/1Password/Apple and are linked to that account).

Because these passkeys are stored in the Cloud and synced to your providers account (i.e. Google/Apple/1Password etc), they can't support attestation. It leads to a scenario where Relying Parties (the apps consuming the passkey), cannot react to incidents in passkey providers.

For example: If tomorrow, 1Password was breached and all their cloud-stored passkeys were leaked, RP's have no way to identify and revoke the passkeys associated with that leak. Additionally, if a passkey provider turns out to be malicious, there is no way to block them.

UltraSane•2h ago
Why?
Wowfunhappy•1h ago
But if you could back up a passkey, wouldn't the key just be a password?

(I do agree with you about backups being essential, but my conclusion was "the idea is fundamentally flawed," rather than "it's one tweak away from greatness.")

AgentME•1h ago
Passkeys on cryptocurrency wallets such as the Trezor and Ledger are tied to the device's seed phrase and can be backed up.
eddythompson80•1h ago
What do you mean by real backups? What's stopping you from backing up your keys? Its up to the passkey "provider" to allow passkeys backup/sync.
cyberax•26m ago
Erm... Passkeys _are_ backupable/syncable WebAuthn keys. You can get the clear-text Passkey private keys by just looking into your storage (Keychain on iOS).

What's missing is a standardized format for the export.

ripped_britches•2h ago
They aren’t ideal but are they actually worse than passwords? I’d bet that on net, more compromises happen with previously-leaked passwords
deathanatos•1h ago
I haven't actually seen these being used as passwords like TFA states; they're usually a form of 2FA.

If they actually are passwords, yes, my password manager is a better UX than having to fetch my phone, open SMS, wait for the SMS, like good grief it's all so slow.

(In the 2FA form, I'd prefer TOTP over SMS-OTP, but the difference is less there.)

wodenokoto•2h ago
Lot's of services realized that users would use the reset password form for login.
6510•1h ago
To state the obvious, there the code is part of the url they have to visit.
totallykvothe•2h ago
I'm having difficulty understanding what it means for an attacker to "send your email to a legitimate service"...
anonymars•2h ago
I assume it's a phishing scenario, given the note about password managers. Evil site spoofs the login page, and when you attempt to log in to the malicious site, it triggers an attempt from the real site, which will duly pass you a code, which you unwittingly put into the malicious site
LoganDark•2h ago
TOTP is vulnerable to the same attack, though. If you are fooled into providing the code, it doesn't matter whether it's a fresh one to your email or a fresh one from your authenticator.
eddythompson80•1h ago
They are, which is one major issue with TOTP and most current MFA methods. There is an implicit assumption that you only get the full benefit if your usi g a password manager.

1. A password manager shouldn't be vulnerable to putting your password in a phishing site.

2. If your password is leaked, an attacker can't use it without the TOTP.

Someone who doesn't use a password manager won't get the benefits of #1, so they can be phished even with a TOTP. But they will get the benefits of #2 (a leaked password isn't enough)

Passkeys assume/require the use of a password manager (called a "passkey provider")

tombds•2h ago
Man in the middle attack basically.
bobmcnamara•2h ago
Confused deputy is you?
tczMUFlmoNk•2h ago
I think this means:

1. You go to evil.example.com, which uses this flow.

2. It prompts you to enter your email. You do so, and you receive a code.

3. You enter the code at evil.example.com.

4. But actually what the evil backend did was automated a login attempt to, like, Shopify or some other site that also uses this pattern. You entered their code on evil.example.com. Now the evil backend has authenticated to Shopify or whatever as you.

charlesabarnes•2h ago
Wholeheartedly agree, however The Changelog Podcast helped shift my perspective on this. It's really about not having the responsibility of storing and maintaining passwords.
augunrik•1h ago
Kinda weird when they secure shop sites where you enter your payment information into. IKEA does this, for example.
DecoPerson•2h ago
The attack pattern is:

1) User goes to BAD website and signs up.

2) BAD website says “We’ve sent you an email, please enter the 6-digit code! The email will come from GOOD, as they are our sign-in partner.”

3) BAD’s bots start a “Sign in with email one-time code” flow on the GOOD website using the user’s email.

4) GOOD sends a one-time login code email to the user’s email address.

5) The user is very likely to trust this email, because it’s from GOOD, and why would GOOD send it if it’s not a proper login?

6) User enters code into BAD’s website.

7) BAD uses code to login to GOOD’s website as the user. BAD now has full access to the user’s GOOD account.

This is why “email me a one-time code” is one of the worst authentication flows for phishing. It’s just so hard to stop users from making this mistake.

“Click a link in the email” is a tiny bit better because it takes the user straight to the GOOD website, and passing that link to BAD is more tedious and therefore more suspicious. However, if some popular email service suddenly decides your login emails or the login link within should be blocked, then suddenly many of your users cannot login.

Passkeys is the way to go. Password manager support for passkeys is getting really good. And I assure you, all passkeys being lost when a user loses their phone is far, far better than what’s been happening with passwords. I’d rather granny needs to visit the bank to get access to her account again, than someone phishes her and steals all her money.

DougN7•1h ago
It sounds good, unless granny needs to visit Google or Microsoft to get a new password after losing her phone. Then what??
drozycki•1h ago
She follows same reset flow as before. Passkeys are identical in this respect to the passwords of yore.
sriku•1h ago
A while ago, I implemented a signin approach that looks similar to this "send a link/code" mode but (I believe) can't be exploited this way - https://sriku.org/blog/2017/04/29/forget-password/ - appreciate any thoughts on that.

Btw this predates passkeys which should perhaps be the way to go from now on.

dogpuncher•1h ago
I don't understand your example.

> 2) BAD website says “We’ve sent you an email, please enter the 6-digit code! The email will come from GOOD, as they are our sign-in partner.”

Does that mean that GOOD must be a 3rd party identity provider like Facebook, Apple, Google etc?

Philpax•54m ago
BAD is lying about GOOD and presenting GOOD's legitimate service as a mere IdP for BAD, such that the user provides their code for GOOD to BAD so that the latter can then automatically log into GOOD.
hombre_fatal•50m ago
No, BAD just inserts your email address on GOOD’s login page which sends you the login code, and they lie to prime you into thinking it’s not suspicious that the email came from someone other than BAD.

When you insert the login code on BAD, BAD uses it to finish the login process on GOOD that they started “on your behalf”.

pandorobo•1h ago
Very short, badly written article. It can't even describe phishing correctly... At least label your threat model correctly.

While the premise is correct -- it's easy to complain but the author also provides zero recommendations on what is a better form of MFA.

ipython•1h ago
The first factor is access to your email. The second factor is…?
max__dev•1h ago
The article is not about MFA. It is about using email as a single factor.
pandorobo•1h ago
Thats simple a lie or you didn't read the article.

The very first bullet point states: Enter an email address or phone number

That insinuates email OR SMS.

It doesn't just mention email only.

sophiebits•1h ago
Half factor authentication, then, since either one will work.
max__dev•1h ago
The following is copied from wikipedia.

The authentication factors of a multi-factor authentication scheme may include: 1. Something the user has: Any physical object in the possession of the user, such as a security token (USB stick), a bank card, a key, a phone that can be reached at a certain number, etc. 2. Something the user knows: Certain knowledge only known to the user, such as a password, PIN, PUK, etc. 3. Something the user is: Some physical characteristic of the user (biometrics), such as a fingerprint, eye iris, voice, typing speed, pattern in key press intervals, etc.

Email and phone are both in category one, comprising only one unique factor.

donatj•1h ago
You misread the short article.

It's about email as single factor auth, which has become very trendy of late. You just enter your email address, no password, and the email you a code. Access to your email is the only authentication.

pandorobo•1h ago
The first bullet point mentions phone number.

- Enter an email address or phone number

Thats not just email, that's also SMS.

eddythompson80•1h ago
Email OR SMS is still one factor. Its not multiple factors. How are you not getting that? Do you know what MFA means?
max__dev•1h ago
Even if it was Email OR password, that would still be one factor due to the OR. I do not think they are discussing in good faith.
pandorobo•1h ago
Clearly I didn't misread that. It's literally the very first bullet point?
Ferret7446•1h ago
> It's about email as single factor auth, which has become very trendy of late

I must be in the wrong bubble, I have not encountered any site that does this since the 2000s. It was a minor trend around then IIRC.

wodenokoto•1h ago
The article is not about multiple factor authentication.

It’s about single factor, password logins, using a one-time-token

giantfrog•1h ago
Still seems far, far more likely that the average user will have their account stolen via password theft/reuse than the more complicated scheme the author is describing. Links instead of codes also fixes the issue.
esseph•1h ago
Links are not trustworthy and can leak to compromise.
6510•1h ago
MS can also call you, then you only have to press # to log in. Makes it even easier for a spoof website.
yieldcrv•1h ago
I like passkeys on the Apple ecosystem
moomoo11•1h ago
Passwordless is fine.

Let’s be honest all forms of auth suck and have pros and cons.

The real solution is detect weird logins because users cannot be trusted. That’s why we build for them!

ameliaquining•54m ago
So there are two complaints about this authn scheme that I'm seeing in this thread:

1. It's pretty phishable. I think this is mostly solved, or at least greatly mitigated, by using a Slack-style magic sign-in link instead of a code that you have the user manually enter into the trusted UI. A phisher would have to get the user to copy-paste the URL from the email into their UI, instead of clicking the link or copy-pasting it into the address bar. That's an unusual enough action that most users probably won't default to doing it (and you could improve this by not showing the URL in HTML email, instead having users click an image, but that might cause usability problems). It's not quite fully unphishable, but it seems about as close as you can get without completely hiding the authentication secret from the user, which is what passkeys, Yubikeys, etc., do. I'd love to see the future where passkeys are the only way to log into most websites, but I think websites are reluctant to go there as long as the ecosystem is relatively immature.

2. It's not true multi-factor authn because an attacker only needs to compromise one thing (your inbox) to hijack your account. I have two objections to this argument:

a. This is already the case as long as you have an email-based password reset flow, which most consumer-facing websites are unwilling to go without. (Password reset emails are a bit less vulnerable to phishing because a user who didn't request one is more likely to be suspicious when one shows up in their inbox, but see point 1.)

b. True multi-factor authn for ordinary consumer websites never really worked, and especially doesn't work in the age of password managers. As long as those exist, anyone who possesses and is logged into the user's phone or laptop (the usual prerequisites for a possession-based second factor) can also get their password. Most websites should not be in the business of trying to use knowledge-based authentication on their users, because they can't know whether the secret really came from the user's memory or was instead stored somewhere, the latter case is far more common in practice, and only in the former case is it truly knowledge-based. Websites should instead authenticate only the device, and delegate to the device's own authentication system (which includes physical possession and likely also a lock secret and/or biometric) the task of authenticating the user in a secure multi-factor way.