frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Claude has a compiler, I have SlopScript

https://slopscript.netlify.app/
1•hiten_sharma•1m ago•0 comments

Context Is Part of the Game

https://joy.pm/context-is-part-of-the-code/
1•rafadc•1m ago•0 comments

Dave Farber has passed away

https://lists.nanog.org/archives/list/nanog@lists.nanog.org/thread/TSNPJVFH4DKLINIKSMRIIVNHDG5XKJCM/
1•vitplister•2m ago•0 comments

Researchers find brain mechanism behind 'flashes of intuition'

https://medicalxpress.com/news/2026-02-brain-mechanism-intuition.html
1•pseudolus•5m ago•0 comments

Extracting Xcode's Claude Code Prompt

https://www.jackpearce.co.uk/posts/extracting-xcodes-claude-code-prompt
1•jkpe•5m ago•0 comments

AI is not another abstraction because god plays dice

https://rakhim.exotext.com/ai_is_not_another_abstraction_because_god_plays_dice
1•freetonik•6m ago•0 comments

Show HN: Tandem – An open-source, local-first AI workspace (Rust and React)

1•frumu•8m ago•0 comments

Show HN: AI Perks – A curated list of free AI credits and deals for developers

https://www.getaiperks.com/en
1•artluko•8m ago•0 comments

Why E cores make Apple Silicon fast

https://eclecticlight.co/2026/02/08/last-week-on-my-mac-why-e-cores-make-apple-silicon-fast/
1•ingve•9m ago•0 comments

Show HN: Google Maps but for your repo (Open Source)

https://github.com/zacharykapank/repomap
1•zacharykapank•11m ago•0 comments

Djevops: Host Django on Bare Metal

https://github.com/mherrmann/djevops
1•mherrmann•11m ago•0 comments

How to Destroy a Space Station

https://www.thequantumcat.space/p/how-to-destroy-a-space-station
1•verzali•13m ago•0 comments

Show HN: I built a framework to benchmark LLMs on System Design and Architecture

https://github.com/Ruhal-Doshi/hld-bench
1•ruhal•13m ago•0 comments

What do you expect from a Turkey-based hosting provider?

1•dpnet•13m ago•0 comments

Why Files Are Not Enough as Memory for AI Agents

https://medium.com/versanova/why-files-are-not-enough-as-memory-for-ai-agents-5a4aeca81154
2•gauravsc•14m ago•0 comments

Nabaztag: Embodiment of "IoT" that was before its time

https://nabaztag.com/archive/violet
1•simonjgreen•18m ago•0 comments

Show HN: Friends don't let friends do math after a few drinks

https://divvyai.app/
1•pieterdy•21m ago•0 comments

Show HN: A free, minimal CV builder I made as a side project

https://cv-today.com
1•PokeWorldJG•22m ago•1 comments

Show HN: Competitor Finder API – find real competitors from one hostname

https://champsignal.com/competitor-finder-api
1•maximedupre•25m ago•0 comments

Show HN: Textream: Dynamic Island-style teleprompter for macOS with voice track

https://blog.fka.dev/textream/
1•fka•29m ago•0 comments

How do you use AI coding tools at scale without losing architectural control?

https://contextfirst.dev/
1•seekerXtruth•34m ago•2 comments

What to do with the KDE Oxygen and Air themes?

https://filipfila.wordpress.com/2026/02/08/beating-an-old-but-not-dead-horse-what-to-do-with-the-...
3•jandeboevrie•36m ago•0 comments

Show HN: One app to command CLI agents across projects - RexIDE

https://rex.mindmeld360.com
1•tomerbd•39m ago•0 comments

Windows is leaving old printers behind without solution

https://www.tomshardware.com/peripherals/printers/microsoft-stops-distrubitng-legacy-v3-and-v4-pr...
2•storm1er•39m ago•1 comments

Eight More Months of Agents

https://crawshaw.io/blog/eight-more-months-of-agents
1•arrowsmith•40m ago•0 comments

Uber held liable, ordered to pay $8.5M in driver rape suit

https://www.cnbc.com/2026/02/06/uber-liable-pay-8-5-million-driver-rape-suit.html
1•gslin•46m ago•0 comments

DayTradingCentral – Free Trading Journal (Next.js, NestJS, Postgres)

https://www.daytradingcentral.com
1•MuZzZ•46m ago•1 comments

Creative problem-solving of unsolved puzzles during REM sleep

https://academic.oup.com/nc/article/2026/1/niaf067/8456489
3•tchalla•53m ago•0 comments

Show HN: Language learning through AI example sentences (onigiri.kr)

https://jpen.onigiri.kr/
1•jaehakl•55m ago•0 comments

Wi-Fi 7 marketing is lying about its biggest feature [video]

https://www.youtube.com/watch?v=-5o_Qu3XToQ
2•wateralien•55m ago•0 comments
Open in hackernews

Apple A17 Pro Chip Hardware Flaw?

https://github.com/JGoyd/Apple-Silicon-A17-Flaw
39•FluGameAce007•5mo ago

Comments

FluGameAce007•5mo ago
This isn't just a bug... it's a hardware-level oversight that can cause iPhones to silently fail during boot, leaving no logs, no recovery mode, and no forensic trace.

The flaw is triggered by abrupt power loss (e.g. during brownouts or unstable charging), preventing the secure world and logging subsystems from initializing. Confirmed it on real A17 Pro device.

Curious if others can reproduce this, or if similar behavior exists in M-series chips.

mlyle•5mo ago
Shared resources isn't a "hardware bug." It's a design choice.

I2C is always vulnerable to one device locking up the bus-- indeed almost all buses are. But it's intended to be a bus hooking up multiple pieces of hardware.

This is an interesting phenomenon-- source account is 100% dubious Apple "bug reports" and then we have another completely new account choosing to misinterpret the dubious report (which isn't really security related despite involving a security component) as a critical vulnerability. The cited reports all ring like they're written by a LLM.

FluGameAce007•5mo ago
True.. I2C lockups are a known limitation, not a bug. But this isn’t about bus contention. The issue is that debug logic is active on production-fused silicon, despite dev-fused = 0 and debug = 0x0. That’s a hardware trust failure, not a design trade-off. Fuses are supposed to make debug paths unreachable—but they’re not. That’s the problem.
mlyle•5mo ago
There's no secure enclave output here. Stop the bogus reports.

If I want to talk to ChatGPT, I'll go to the site or use the API kthx.

yunyu•5mo ago
You're absolutely right! This isn't just X, it's Y...
ACCount37•5mo ago
That looks very much like "just a bug" to me.

Long press hard reboot should rectify that if the device isn't severely damaged in a way that causes permanent instability on I2C4. And if it is, then welcome to board level repair, here's your introductory can of pickled suffering.

Now, if you could use that to pwn SEP? Or boot into a custom ROM, checkm8 style? That would be something. But I see zero evidence of this being exploitable in any way.

FluGameAce007•5mo ago
If debug logic can be reactivated... even briefly, even locally; then all bets are off for things like firmware extraction, secure boot bypass, or SEP fault analysis.
ACCount37•5mo ago
Debug logic reactivated? Show me JTAG then.
SandboxEscape0•5mo ago
Just watched the log video in the report... it's legit.

These are not ephemeral or misinterpreted logs... they’re hard evidence that SecureROM and HAL subsystems are exposing debug logic in production mode. That shouldn't be possible unless the chip itself is violating its own trust enforcement model.

If this behavior is reproducible across multiple production devices, it's a class of vulnerability that Apple cannot patch in software. We're talking about a silicon-level debug bypass that persists without jailbreak, unsigned code, or tampering.

Strongly recommend pulling logs from known-good A16/A17 Pro devices and look for those same entries.

saagarjha•5mo ago
These are 100% misinterpreted logs. There is no hard evidence here.
brcmthrowaway•5mo ago
What is I2c4?
IshKebab•5mo ago
I guess there are multiple I2C buses and this is the fifth.

But it's AI slop so who knows if it's even real. At best its wildly overblown.

unethical_ban•5mo ago
This looks like an availability issue. Is it a security flaw?
FluGameAce007•5mo ago
Yes, it’s a security flaw, because debug logic is active on production hardware that should have it permanently fused off.

Worse, the system prunes logs aggressively, erasing the very diagnostic history that could expose this behavior. So not only is debug logic unintentionally enabled, the evidence is self-erasing.

cameronehrlich•5mo ago
So if the bus degrades it stops working? Big whoop!

That’s like saying that if the circuit breaker melts, it might melt one next to it too, and certain outlets wont work anymore…

FluGameAce007•5mo ago
If a circuit breaker melts and causes other circuits to misbehave, we don’t say “big whoop”... we call it a fire hazard.
metmac•5mo ago
For what it’s worth. I have noticed oddities like this where digitizer partial failure and data being unavailable even after unlocking the device.

Only thing that fixes it, is a hard reboot.

I wonder if that is related to this flaw.

opa334•5mo ago
This "flaw" does not exist, it was hallucinated by AI.
gchadwick•5mo ago
If I'm reading this right, glitching the I2C bus prevents the Secure Enclave from booting. It seems the device recovers from this itself 'Although the device recovered and remained operable', maybe the Secure Enclave reboots itself after seeing a fault in the I2C?

No evidence of any security issue is presented. Though it's certainly wanted to drum it as something major 'This is a high-severity, unpatchable design flaw'.

FluGameAce007•5mo ago
The device "recovering" while entering debug mode on production hardware is the security issue. Fuses are supposed to prevent that. They don’t. That’s the flaw.
re•5mo ago
If I own an iPhone 15 Pro, how am I impacted by this? Why does this repo say that a hardware recall may be necessary?
FluGameAce007•5mo ago
If debug logic is still active, attackers with physical access can dump firmware, extract secrets, or bypass protections that should be fused off.

Think: stolen phones, shady repair shops, or border checks — cases where physical access + this flaw = real risk.

That’s why a hardware recall may be necessary... fuses are meant to be irreversible. If they fail, there's no patch.

comex•5mo ago
AI slop aside, just for the record,

- SPU is not a processor, it's a generic term that encompasses multiple coprocessors.

- The log lines don't even mention the Secure Enclave Processor (SEP).

- Each line of log output is its own thing and there is no reason to think they have anything to do with each other.

- Those are not specifically serial logs. It is possible to get the same logs over serial, but only with a development unit, Security Research Device, or jailbreak.

FluGameAce007•5mo ago
But the issue isn't about parsing log semantics...

It's that a production device entered a state where normally fused-off debug logic became accessible. That shouldn’t be possible, regardless of how the logs were captured or named.

saagarjha•5mo ago
Get off the slop generator for a moment and look up who ‘comex is. Then stop submitting AI slop articles to this site (and better yet, stop writing them at all). If you really care about security research for Apple platforms, learn how to do it properly and find your own bugs instead of posting clearly bogus content.