frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

<script type="text/llms.txt">

https://vercel.com/blog/a-proposal-for-inline-llm-instructions-in-html
1•indigodaddy•38s ago•0 comments

Bloom patterns:radially expansive, developable and flat-foldable origami

https://royalsocietypublishing.org/doi/10.1098/rspa.2025.0299
1•sargstuff•58s ago•0 comments

James Webb Telescope finds asteroidsBennu andRyugu may be pieces of one asteroid

https://www.livescience.com/space/james-webb-telescope-reveals-that-asteroids-bennu-and-ryugu-may-be-parts-of-the-same-gigantic-space-rock
1•bookofjoe•1m ago•0 comments

Custom slash commands in Claude Code

https://boliv.substack.com/p/claude-code-usage-patterns-2
2•brunooliv•4m ago•0 comments

Show HN: Automate the browser tasks without a $200 subscription

https://chromewebstore.google.com/detail/ai-browser-agent/gncjkiofpeebmdcgmpmionfgeepkdpod
1•JohnVersus•4m ago•0 comments

What our analysis of 900 firms shows about their values

https://www.economist.com/interactive/business/2025/06/16/corporate-culture
1•hheikinh•6m ago•0 comments

Ask HN: Solar+WiFi IP Security Cameras?

1•beezle•13m ago•0 comments

Japanese city pushes two-hour daily smartphone limit

https://www.tomshardware.com/phones/japanese-city-pushes-two-hour-daily-smartphone-limit-to-promote-healthier-sleep-for-its-citizens-particularly-school-age-children
1•LorenDB•14m ago•0 comments

Hank Green's 'Focus Friend' Unseated ChatGPT on the App Store

https://www.businessinsider.com/hank-green-focus-friend-app-adhd-tool-2025-8
1•vidyesh•15m ago•0 comments

EP 132: Sam the Vendor

https://darknetdiaries.com/episode/132/
1•paulpauper•17m ago•0 comments

The Importance of Counter-Clockwise Dance Rituals

https://www.honest-broker.com/p/the-importance-of-counter-clockwise
1•paulpauper•18m ago•0 comments

Meta's AI Companion Policy Is Outrageous

https://www.afterbabel.com/p/metas-ai-companion-policy-is-outrageous
2•paulpauper•18m ago•1 comments

Backpropogation through time: What it does and how to do it (1990) [pdf]

https://www.werbos.com/Neural/BTT.pdf
1•sonabinu•21m ago•0 comments

Libre – An anonymous social experiment without likes, followers, or ads

https://libreantisocial.com
2•rododecba•22m ago•3 comments

UK government suggests deleting files to save water

https://www.theverge.com/science/758275/drought-delete-files-email-data-center-water-uk
1•animal_spirits•22m ago•0 comments

JavaScript lib for exchanging selective disclosure proofs

https://github.com/zipwireapp/ProofPack
1•lukepuplett•24m ago•0 comments

Arch Team – Recent service outages

https://archlinux.org/news/recent-services-outages/
2•gpi•24m ago•1 comments

The reality of AI-Assisted software engineering productivity

https://addyo.substack.com/p/the-reality-of-ai-assisted-software
1•NotInOurNames•25m ago•0 comments

AI, layoffs, productivity and The Klarna Effect

https://garymarcus.substack.com/p/ai-layoffs-productivity-and-the-klarna
1•zdw•25m ago•0 comments

Fun OCaml 2025

https://fun-ocaml.com
1•mrtz•26m ago•0 comments

UK housing is dangerously unprepared for impact of climate crisis

https://www.theguardian.com/uk-news/2025/aug/10/overheated-homes-why-uk-housing-is-dangerously-unprepared-for-impact-of-climate-crisis
1•PaulHoule•26m ago•0 comments

Apple releases adapted SlowFast-LLaVA model for long-form video analysis

https://9to5mac.com/2025/08/22/apple-trained-a-large-language-model-to-efficiently-understand-long-form-video/
1•Terretta•27m ago•1 comments

I Hacked Monster Energy and You Won't Believe What They Think You Look Like

https://bobdahacker.com/blog/monster-energy
2•speckx•29m ago•1 comments

Struggling fusion power company General Fusion gets $22M lifeline from investors

https://techcrunch.com/2025/08/21/struggling-fusion-power-company-general-fusion-gets-22m-lifeline-from-investors/
1•riffraff•31m ago•0 comments

Twenty Years of Blog Posts

https://www.charlespetzold.com/blog/2025/08/Twenty-Years-of-Blog-Posts.html
1•NotInOurNames•31m ago•0 comments

Show HN: Created Knowledge Graph – Curated Y Combinator Videos

https://my.infocaptor.com/hub/summaries//y-combinator
1•rkj93•32m ago•0 comments

Ask HN: Why is Apple so far behind with Siri?

1•davidajackson•35m ago•1 comments

Show HN: Immutable AA Trees in Go

https://github.com/ncruces/aa
1•ncruces•39m ago•0 comments

Show HN: Intake, an AI nutrition app built with React Native (feels native now)

https://apps.apple.com/us/app/intake-ai-nutrition-companion/id6744113821
1•phmarques•39m ago•1 comments

Blue Marble Tool – Advanced Wplace Plugin for Pixel Art Templates

https://bluemarblewplace.com/
1•heihieih•39m ago•0 comments
Open in hackernews

Rethinking the Linux cloud stack for confidential VMs

https://lwn.net/Articles/1030818/
76•Bogdanp•5h ago

Comments

le-mark•4h ago
Timely considering the current (yet another) chip act. Presumably government mandated surveillance silicon would also require confidential compute capability.

https://www.atlanticcouncil.org/blogs/geotech-cues/how-the-c...

Joel_Mckay•2h ago
Funny, some people never consider burning goodwill with populations directly open a competitive advantage for competitors. =3
riedel•3h ago
Confidential computing is the straw for many people to overcome GDPR headaches in Europe. I know particularly medical researchers that hope that they get access to scalable infrastructure this way, because they can tick it as the only additional TOM on the processor side. As mentioned in the comments of OP though it is more a promise than a reality at the moment with very little actual benefit in term of reducing relevant attack vectors.
Bender•3h ago
Maybe this will check a box in some OpenStack cluster but it wont work for me personally. Anything sensitive I use physical servers. Once I am on a VM of a physical server that is not mine then my data is their data. It is just turtles all the way down and there will always be a way to obtain data. Whats more this is required for lawful intercept and authorities expect providers today to be able to live copy/clone a VM. There will always be a back door and when authorities can access the back door, so can the providers and malicious actors. Even more unpopular is that to me encryption is just mathematical obfuscation a.k.a. magic math and the devil is in the implementation details remember WEP and DVD encryption? Just like cell phones there will always be some simple "debugging" toggle function that can bypass it.
Joel_Mckay•2h ago
Unfortunately, if someone really wants into modern equipment it is rather trivial. As modern clouds often just used cost-optimized consumer grade CPUs/GPUs with sometimes minor conveniences like more ECC RAM, and backplane management options.

In many ways, incident detection and automated-recovery is more important than casting your servers in concrete.

Emulated VM can create read-only signed backing images, and thus may revert/monitor states. RancherVM is actually pretty useful when you dig into the architecture.

Best policy is to waste as much time and money of the irrational, and interleave tantalizing payloads of costly project failures. Adversaries eventually realize the lame prize is just not worth the effort, or steal things that ultimately will cost them later. =3

crote•1h ago
Why do you trust your physical servers? Do you believe it is impossible for a backdoor to exist in the CPU's Management Engine? Do you inspect the contents of every single network packet entering and exiting? Do you have a way of blocking or inspecting all electromagnetic radiation?

Confidential computing is trying to solve the very problem you are worried about. It is a way of providing compute as a service without the customer having to blindly trust the compute provider. It moves the line from "the host can do anything it wants" to "we're screwed if they are collaborating with Intel to bake a custom backdoor into their CPUs".

To me that sounds like a very reasonable goal. Go much beyond that, and the only plausible attacker is going to be the kind of people who'll simply drag you to a black site and apply the big wrench until you start divulging encryption keys.

matthewfcarlson•2h ago
Years ago, I saw a demo for a confidential gaming VM with the idea that games could ship with a whole VM instead of an anti cheat engine. Most of the tech was around doing it performantly. I wonder why it was never productized.
tomrod•1h ago
I'd imagine cost is a big factor. You have to contend with a lot of bad drivers on gpus, right? (This isn't my arena, just speculating here).
kg•1h ago
My understanding is that some modern game DRM does use an approach like that. See https://connorjaydunn.github.io/blog/posts/denuvo-analysis/
louwrentius•2h ago
I find the article a difficult read for someone not versed in “confidential computing”. It felt written for insiders and/or people smarter than me.

However, I feel that “confidential computing” is some kind of story to justify something that’s not possible: keep data ‘secure’ while running code on hardware maintained by others.

Any kind of encryption means that there is a secret somewhere and if you have control over the stack below the VM (hypervisor/hardware) you’ll be able to read that secret and defeat the encryption.

Maybe I’m missing something, though I believe that if the data is critical enough, it’s required to have 100% control over the hardware.

Now go buy an Oxide rack (no I didn’t invest in them)

crote•2h ago
The unique selling point here is that you don't need to trust the hypervisor or operator, as the separation and per-VM encryption is managed by the CPU itself.

The CPU itself can attest that it is running your code and that your dedicated slice of memory is encrypted using a key inaccessible to the hypervisor. Provided you still trust AMD/Intel to not put backdoors into their hardware, this allows you to run your code while the physical machine is in possession of a less-trusted party.

It's of course still not going to be enough for the truly paranoid, but I think it provides a neat solution for companies with security needs which can't be met via regular cloud hosting.

thrawa8387336•1h ago
Hasn't that been exploited several times?
crote•1h ago
I don't believe so? I have no doubt that there have been vulnerabilities, but the technology is quite new and barely used in practice, so I would be surprised if there have been significant exploits already - let alone ones applicable in the wild rather than a lab.
SvenL•1h ago
Well there were some advances in the space of homomorphic encryption, which I find pretty cool and would be an encryption which does not require a secret to work on the data. Sadly the operations which are possible are limited and quite performance intensive.
adam_gyroscope•2h ago
Apple has done a good job on the implementation and documentation for their confidential computing (https://security.apple.com/documentation/private-cloud-compu...) but of course it’s Apple only. There’s a few folks working on a non-Apple version of this, eg https://confident.security/ and others (disclaimer that I helped work on a very early version of this.

Read the Apple docs - they are very well written and accessible for the average HN reader.

warkdarrior•18m ago
Bit Google Cloud and AWS support confidential computing: https://cloud.google.com/security/products/confidential-comp... https://aws.amazon.com/confidential-computing/
signalloss•22m ago
Someone willing to price this out?