frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

DED – Directory-Editor

https://invisible-island.net/ded/ded.html
1•hggh•32s ago•0 comments

Building an Octopus Dictionary, One Arm Movement at a Time

https://www.nytimes.com/2025/09/11/science/octopus-arms-video-dictionary.html
1•bookofjoe•47s ago•1 comments

Always Bump Downwards

https://fitzgen.com/2019/11/01/always-bump-downwards.html
1•guntars•1m ago•0 comments

Agentic Ecommerce [video]

https://www.youtube.com/watch?v=MFp9vjr6rgA
1•gk1•1m ago•0 comments

AI-Designed Bacteriophages

https://www.asimov.press/p/ai-phages
1•mailyk•3m ago•0 comments

Is Data Modeling Dead?

https://www.confessionsofadataguy.com/is-data-modeling-dead/
1•speckx•3m ago•0 comments

Testing Claude's Native Integration with Reminders and Calendar on iOS/iPadOS

https://www.macstories.net/notes/testing-claudes-native-integration-with-reminders-and-calendar-o...
1•alwillis•4m ago•0 comments

Retrieval-Augmented Generation with Bob Remeika from Ragie [audio]

https://snyk.io/podcasts/the-secure-developer/retrieval-augmented-generation-with-bob-remeika-fro...
1•mooreds•5m ago•0 comments

Direct Preference Optimization Through Prediction Markets

https://reppo.ai/
1•rgvrmdya•5m ago•1 comments

MIT geologists discover where energy goes during an earthquake

https://news.mit.edu/2025/mit-geologists-discover-where-energy-goes-during-earthquake-0916
1•jocker12•6m ago•0 comments

Sare, a Qunatum-Safe Encryption at Rest Tool

https://sareproject.github.io/
1•znano•7m ago•0 comments

Deep dive into Go's memory allocator

https://nghiant3223.github.io/2025/06/03/memory_allocation_in_go.html
1•rlnorthcutt•8m ago•1 comments

Axiom Space Aims for International Space Station with Orbital Data Center Node

https://www.theregister.com/2025/09/17/axiom_space_aims_for_orbit/
1•rntn•9m ago•0 comments

Cve-2025-43330: breaking out of a sandbox using font files

https://bsssq.xyz/posts/sandbox/
1•faxmeyourcode•9m ago•1 comments

Major health insurer group says members will continue to cover vaccines

https://www.statnews.com/2025/09/17/ahip-vaccine-insurance-acip-coverage/
3•bikenaga•10m ago•0 comments

Rerun 0.25 – transparency, table filtering and initial MCAP support

https://github.com/rerun-io/rerun/releases/tag/0.25.0
1•Tycho87•13m ago•1 comments

The Code is your Enemy (2013)

https://longform.asmartbear.com/code-is-your-enemy/
1•mooreds•16m ago•0 comments

Ask HN: What should I consider when designing a custom embedded graphics format?

3•denis_dolya•16m ago•2 comments

Science's answer to the ultimate question: Where do we come from?

https://bigthink.com/starts-with-a-bang/science-answer-ultimate-question/
3•Brajeshwar•16m ago•1 comments

LIGO's 10th anniversary gift confirms Hawking's theorem

https://bigthink.com/starts-with-a-bang/ligo-10-anniversary-hawking-theorem/
1•Brajeshwar•16m ago•0 comments

A Napster Moment for AI?

https://cepa.org/article/a-napster-moment-for-ai/
1•geox•16m ago•0 comments

Gene editing is changing the meat in our diet

https://www.abc.net.au/news/science/2025-09-17/gene-editing-food-fish-beef-pork-regulations-genet...
1•Brajeshwar•16m ago•0 comments

Karpenter for Any Kubernetes Cluster

https://www.vcluster.com/blog/introducing-vcluster-auto-nodes-karpenter-based-dynamic-autoscaling...
8•saiyampathak•17m ago•0 comments

A refresh of Learn CSS with nine new modules

https://web.dev/blog/learn-css-refresh
2•eustoria•17m ago•0 comments

Typst: A Possible LaTeX Replacement

https://lwn.net/Articles/1037577/
2•leephillips•17m ago•2 comments

Software owned by Australian banks being tested for social media ban

https://www.reuters.com/business/finance/software-owned-by-australian-banks-being-tested-social-m...
1•c420•18m ago•0 comments

How Buyers Build Their Shortlist – and Why It's So Hard to Break In

https://www.learning.propelgrowth.com/blog/how-buyers-build-their-shortlist-and-why-it-s-so-hard-...
1•mooreds•18m ago•0 comments

Methane leaks at California oil facilities are also spewing toxic chemicals

https://www.latimes.com/environment/story/2025-08-26/methane-leaks-at-california-oil-facilities-a...
1•PaulHoule•19m ago•0 comments

Sugar-Proto: Strongly Typed, Expressive, User Friendly Protobuf Wrapper

https://github.com/illegal-instruction-co/sugar-proto
1•signa11•19m ago•0 comments

Stroke centres in England given AI tool that will help 50% of patients recover

https://www.theguardian.com/society/2025/sep/01/stroke-centres-in-england-given-ai-tool-that-will...
1•alphabetatango•19m ago•0 comments
Open in hackernews

Firefox 143 for Android to introduce DoH

https://blog.mozilla.org/en/firefox/dns-android/
95•HieronymusBosch•2h ago

Comments

LiamPowell•1h ago
This doesn't address why this needs to be built in to the browser when Android already does DoH by itself. I assume there's a reason, does anyone know what it is?
seanieb•1h ago
Privacy.
ape4•1h ago
Yeah, Android is Google
woodrowbarlow•1h ago
does android not allow you to configure a custom DoH resolver? could Mozilla simply offer a public resolver, and encourage users to switch at the OS level (possibly including a first-launch dialog offering to set the configuration for you)?
LiamPowell•1h ago
Why is DoH in the browser more private than DoH in the OS?
add-sub-mul-div•1h ago
It's not Google. My heuristic is that the bigger the tech giant the more sophisticated, indirect, and obfuscated the sharing/selling of data.
benoau•47m ago
The fact that Google has incurred over $3 billion in fines in recent years specifically for infringing people's privacy should be a consideration!
DetroitThrow•1h ago
It's all about whether you trust the OS to not track you when doing DoH at that level. In both mobile browser ecosystems, I can see why users of a browser would prefer the independent browser to do the DoH themselves, rather than leave it to the OS.
lucideer•42m ago
Because there are fewer actors to trust.

In the OS you need to trust (1) the OS vendor, (2) the client vendor & (3) any VPN app or HTTP intermediary that's integrated with OS network APIs.

In the client you need only to trust the client vendor.

e12e•22m ago
Surely you're at the mercy of the hardware vendor and os in either case?

Granted, the os would need to read your address space, not simply supply a recording DNS API, but still...

thyristan•1h ago
Query statistics is valuable data you can sell. Client DNS queries are in that regard similar to search queries and a default search engine setting, you can sell that to the highest bidder. So browser makers are incentivized to implement their own resolver with its own set of DNS servers instead of just the system ones. Either because they want to sell those statistics themselves. Or because they want to protect their users from the statistics collection of the underlying OS resolver or ISP resolver.
noirscape•1h ago
Android privacy tools are leaky (which is bad given it's privacy tooling, you don't want that to leak!) Their VPN tools on OS level are pretty notorious for not properly respecting kill switch settings[0].

That alone makes a native browser implementation a better solution than the OS version.

[0]: https://mullvad.net/en/blog/dns-traffic-can-leak-outside-the... is just one example I found on Google (in this case, using the C function getaddrinfo bypasses the tunnel entirely, which Chrome in particular uses for DNS queries - only android API calls respect the tunnel), but you hear about stuff like this every couple years; in that post they also link to a prior incident where connectivity checks and NTP updates were conveniently not using the VPN even when killswitches are active. Neither of these incidents have been fixed as of the time of writing (and Google explicitly doesn't consider conncheck/NTP calls occuring outside of the VPN tunnel to be a bug.)

izacus•53m ago
What does your post have to do with DoH though?
jansper39•55m ago
I thought Android only supported DNS over TLS, so at least this opens up options for people.
alerighi•48m ago
First not all Android versions do that, and not all vendors implement that. Not everyone is running the latest version and has a Google Pixel. Second passing from the OS is less secure since there are a multitude of actors, Google, the device vendor, eventual VPN app, etc. that could get access to that queries (in fact apps to block ADS such as ADAway if you don't have root use VPN functionality to intercept DNS queries). In the end if you want to be safe better not pass from the OS in the first place.
ekr____•34m ago
Android does same-provider auto-upgrade if it determines that the recursive supports DoH (last I checked, if it's on Google's list). However, this means that unless you configure your own resolver, you're vulnerable to whoever controls the network substituting their own resolver. Firefox uses a set of vetted and pre-specified resolvers ("trusted recursive resolvers"), so is less vulnerable to this form of attack. I say "less vulnerable" because by default it will fall back to the system DNS on failure, but you can configure hard-fail.

You may or may not think this is a better design (I was one of the people responsible for Firefox doing things this way, so I do), but hopefully this explains the difference.

See: https://educatedguesswork.org/posts/dns-security-dox/ for more on the difference.

nemomarx•1h ago
What's the good DoH provider nowadays? I feel like cloud flare has some downsides in terms of centralization
jsheard•1h ago
Mullvad runs a privacy-oriented DoH service, which is free to use regardless of whether you use their VPN service.

https://mullvad.net/en/help/dns-over-https-and-dns-over-tls

traceroute66•1h ago
Mullvad DoH is great, and things like ad-blocking seems to be more effective on Mullvad.

But, and its a BIG BUT ....

Mullvad don't have the geo-coverage that Quad9 has. They are predominantly Northern Europe with very limited server coverage outside (6x Northern Europe, 2xUSA, 1xSingapore)

Which is fine if you spend most of your time in those three places.

But if you are a road-warrior or you live elsewhere, then Quad9 is the better choice as they have global coverage (200 locations, 90 countries).

Avoid Cloudflare. They log traffic. Sure for a short-time period ($n days) but Quad9 still has the better privacy policy.

Quad9 is also Swiss, not US, so they can't be compelled to do anything under PATRIOT or whatever.

qiine•1h ago
I like quad9
miyuru•1h ago
For Germany/EU there is ffmuc: https://social.ffmuc.net/@freifunkMUC/114087819103432120

Hopefully we will see more regional DOH providers instead of centralized ones.

grepfru_it•1h ago
For those wanting a bit of privacy, you can run your own DOH server[0]. Be aware that the upstream requests can still be tracked, but additional safety steps can be taken such as hosting your own dns resolver (bind/powerdns), sending dns/doh queries over a vpn or tor connection, or spanning queries over multiple sources. Each has its own security and privacy implications, which is beyond the scope of this comment :)

[0] https://github.com/DNSCrypt/doh-server

mrweasel•1h ago
Running your own DOH server comes with it's own set of risks, depending on your adversary. If you're the only person using a DOH server, then any requests that server make must belong to you. I'd argue that it's better to use a public server and hide in between the other users.
mrweasel•1h ago
Wikimedia runs an experimental DoH server, see: https://meta.wikimedia.org/wiki/Wikimedia_DNS
hocuspocus•1h ago
NextDNS is great
mentalgear•1h ago
I wonder why DOH is in the intro described as getting activated by region. Is DoH now active globally for every region, on any (desktop) platform (Mac/Windows) ?
Aldipower•1h ago
DoH centralizes DNS traffic at a few DoH resolvers. Bad thing.
mikepo•1h ago
One approach to mitigate this is to spread the queries to multiple DoH providers: https://www3.cs.stonybrook.edu/~mikepo/papers/k-resolver.mad...
ekr____•32m ago
Actually, DoH doesn't change the situation here one way or the other, it's just a transport. It's true, that Firefox's approach to DoH ("trusted recursive resolver") does. centralize traffic some, but DoH need not be deployed this way. For example, Chrome does what's called same provider auto upgrade, which doesn't change the resolver, but just tries to use DoH if available.
MrAlex94•1h ago
Not sure why it took so long for Mozilla to expose the setting on Android, it's been a 'secret' setting for a long time. In fact, sometimes they let features ride the rails for a little bit too long IMO.

For Waterfox for Android I exposed the setting by default and also added an addition DNS over Oblivious HTTP setting (DoOH) which uses Fastly as the relay (they host and control it, for privacy sanitisation) and Cloudflare as the resolver.

sersi•2m ago
Hey, just wanted to say thanks for your work on Waterfox!
afh1•1h ago
>DNS query [...] in the clear. [...] (DoH) plugs this privacy leak [...] no one on the network, not your internet service provider [...] can eavesdrop on your browsing

Whoever could see DNS traffic can still see the target you're connecting to...

kyrra•55m ago
But if that request is going to a large provider (GCP, AWS, CloudFlare), without the hostname, the request is going to be close to meaningless for the snoop.
bscphil•46m ago
The promise is especially dangerous when a huge fraction of traffic doesn't use Encrypted Client Hello, [1] so the domain name is sent in the clear with the initial request to the server.

A while back I wrote a quick proof-of-concept that parses packet data from sniffglue [2] and ran it on my very low powered router to log all source IP address + hostname headers. It didn't even use a measurable amount of CPU, and I didn't bother to implement it efficiently, either.

I think it's safe to assume that anyone in a position to MITM you, including your ISP, could easily be logging this traffic if they want to.

[1] https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypt...

[2] https://github.com/kpcyrd/sniffglue

dbcooper•50m ago
Firefox for Android is some of the worst software I've ever used. A lot of extensions won't work in it, and even Edge Canary is far better with them. It is extremely slow, and the UI is horrible.

I'm running it on a device with a Qualcomm SM8635 Snapdragon 8s Gen 3 chipset, and it just crawls. The UI is very unresponsive, and page load times are terrible. It also has to reload the page if it was running in the background and you switch back to it.

MaKey•46m ago
I don't have any issues with it. NoScript and uBlock Origin are working fine for me.
veyh•41m ago
That's pretty harsh. It works fine for me. But even if it didn't, I'd still use it just for uBlock Origin.
dbcooper•36m ago
I'm running it on a device with a Qualcomm SM8635 Snapdragon 8s Gen 3 chipset, and it just crawls. The UI is very unresponsive, and page load times are terrible.

For youtube background play Brave is much better.

nemomarx•37m ago
Edge canary runs on android with full extension support?
dbcooper•33m ago
Yep. Enable extensions in edge://flags/. Then you can use ublock origin. You can install any crx file extension if you enable developer mode.
ChrisArchitect•46m ago
Update title to include "DNS-over-HTTPS"
throw7•21m ago
Does anyone know how to force disable DoH on a network?

In https://support.mozilla.org/en-US/kb/canary-domain-use-appli... it says that the canary domain does not apply for users who have made the choice to turn on DoH by themselves.

I want to avoid running an sslproxy, and it seems an application level proxy on the firewalls is necessary.

xvdAZh•17m ago
Outside of IP-blocking known popular DoH hosts (e.g. https://github.com/jameshas/Public-DoH-Lists, and even then it's not the best since there's overlap with popular DNS hosts like Cloudflare), there's no good way to do it without break-and-inspect. That's because DoH is TLS traffic over 443, just with DNS inside instead of HTTP.