frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Australian Coastline Imagery

https://tech.marksblogg.com/australia-coastline-satellite-imagery.html
1•marklit•31s ago•0 comments

New Comet Could Be 7B Years Old and Contain $455T of Nickel

https://cowboystatedaily.com/2025/10/17/new-comet-could-be-7-billion-years-old-and-contain-455-tr...
1•Bender•2m ago•0 comments

Ask HN: I have a CS degree but taught for 5 years– how can I get back into tech?

1•padzochambers•2m ago•0 comments

Recent developments in the US-China trade war [video]

https://sinocism.com/p/sinocism-live-council-on-foreign
1•novaleaf•3m ago•0 comments

Show HN: ElephantShadow: PHP for SSR of Webcomponents in declarative shadow DOM

https://github.com/ulrischa/ElephantShadow
1•ulrischa•4m ago•0 comments

Timezones as Types: Making Time Safer to Use in Go

https://www.matthewhalpern.com/posts/golang-type-safe-timezones/
1•Matthalp•4m ago•0 comments

Doing well in your courses: a guide by Andrej Karpathy

https://cs.stanford.edu/people/karpathy/advice.html
3•peterkshultz•8m ago•0 comments

Show HN: Browser-based PDF form fields detection (YOLO-based)

https://commonforms.simplepdf.com/
3•nip•8m ago•0 comments

Thieves steal crown jewels in 4 minutes from Louvre Museum

https://apnews.com/article/france-louvre-museum-robbery-a3687f330a43e0aaff68c732c4b2585b
3•malshe•8m ago•0 comments

When Carl Sagan Sued Apple Twice (2014)

https://www.engadget.com/2014-02-26-when-carl-sagan-sued-apple-twice.html
3•thunderbong•9m ago•0 comments

Do the new obesity drugs pay for themselves?

https://medicalxpress.com/news/2025-10-obesity-drugs-pay.html
1•PaulHoule•11m ago•0 comments

I found the missing 6GB on my Mac (APFS, recovery partitions, and GB vs. GiB)

https://mikenotthepope.com/i-found-the-missing-6gb-on-my-mac-apfs-recovery-partitions-and-gb-vs-gib/
1•MikeNotThePope•13m ago•0 comments

Show HN: The modern flip phone – but it's an iPhone

https://dumbsmartphones.com
1•YPCrumble•13m ago•1 comments

Roast Domains at This Domain Sucks

https://thisdomain.sucks
1•nachoag7•13m ago•0 comments

Creative Disruption in the Order of the World

https://www.noemamag.com/creative-disruption-in-the-order-of-the-world/
1•Brajeshwar•13m ago•0 comments

When Pollution Spikes in Southeast Asia, Rainfall Shifts from Land to Sea

https://e360.yale.edu/digest/southeast-asia-aerosols-rainfall?asds
3•Brajeshwar•14m ago•0 comments

ML-builder: Tool to recreate charts with prompt-friendly inputs

https://ml-builder.vercel.app/
1•samuelleecong•15m ago•1 comments

Ask HN: What are revenue generating side projects you can do utilizing AI?

1•sandboxdev•16m ago•0 comments

AT&T Long Lines – A Forgotten System (2018)

https://personal.garrettfuller.org/blog/2018/01/19/att-long-lines-a-forgotten-system/
1•Bogdanp•16m ago•0 comments

Space Frontiers

https://spacefrontiers.org/
1•alterdaddy•18m ago•0 comments

Robotics Scissors

https://huggingface.co/robotics-course
1•cjbarber•19m ago•0 comments

Yet Another Year with Decker

http://beyondloom.com/blog/unionstate3.html
1•RodgerTheGreat•20m ago•0 comments

America's Rare Earth Delusion

https://www.ft.com/content/583abbd2-ffa8-4232-931f-66f55949b5d5
2•bookofjoe•21m ago•1 comments

Discovery of Paranthropus Hand Changes Understanding of Human Evolution

https://www.haaretz.com/archaeology/2025-10-15/ty-article/paranthropus-boisei-hand-found-for-firs...
1•wslh•21m ago•0 comments

Breakthrough Vitamin K Compounds May Reverse Alzheimer's Damage

https://scitechdaily.com/breakthrough-vitamin-k-compounds-may-reverse-alzheimers-damage/
1•01-_-•22m ago•0 comments

New fossils reveal the hand of Paranthropus boisei

https://www.nature.com/articles/s41586-025-09594-8
1•wslh•23m ago•0 comments

Philco Predicta

https://en.wikipedia.org/wiki/Predicta
1•bariumbitmap•23m ago•0 comments

Judge says body cameras for Chicago officers "was not a suggestion"

https://www.cbsnews.com/chicago/news/judge-homeland-security-federal-agents-chicago-body-cameras/
29•01-_-•24m ago•11 comments

Who Owns RubyGems? [video]

https://www.youtube.com/shorts/a2MYmmHKBWA
1•basileafe•25m ago•1 comments

A firewall for AI agents – early access waitlist (92.2% attack detection acc.)

https://savira.dev/
1•colinlevine•27m ago•0 comments
Open in hackernews

Xubuntu.org Might Be Compromised

https://old.reddit.com/r/Ubuntu/comments/1oa4549/xubuntuorg_might_be_compromised/
136•kekqqq•2h ago

Comments

eth0up•1h ago
https://web.archive.org/web/20251019143921/https://old.reddi...
dominick-cc•1h ago
Thanks for this link. Opening reddit links on mobile is very frustrating for me because it opens the app and messes with the browser back button for me. Not sure if others have that problem too.
pluc•1h ago
That's because you're not supposed to open reddit links anymore, you can just share your content directly with AI companies and ad brokers and cut out the middleman.
exe34•57m ago
I had the same idea about the britcard - why doesn't the government just buy the information from the ad brokers?
eth0up•1h ago
I'm a grovelling Linux fiend and usually support related posts. I tried to visit the url and saw it was blocked. Didn't want the post to die so archived it asap.

Note too, that NextDNS blocks archive.is et al by default unless you manually add redirects.

Whatta world

marksbrown•1h ago
For the moment "yesterday for old reddit" on firefox android works quite well.
ntoskrnl_exe•1h ago
Try pressing on the original link and opening it in another tab, that usually bypasses opening the app for me.
ants_everywhere•54m ago
My solution is just to uninstall the app
layer8•29m ago
On iOS Safari, long-press the link and select Open (or Open in Background). That will open the link in the browser instead of in the app, and Safari will remember that preference for the app. Select Open in Reddit to revert.

Also, don’t install the app? Use Sink It instead: https://gosinkit.com/

zvmaz•1h ago
That is why I use Qubes OS [1] in order to have a certain peace of mind.

[1] https://www.qubes-os.org/

EDIT: further comment below:

On second thought, Qubes OS does not prevent such types of malicious downloads; it can also happen to Qubes images. Verify your downloads with checksums and cryptographic signatures [2].

[2] https://doc.qubes-os.org/en/latest/project-security/verifyin...

zvmaz•1h ago
On second thought, Qubes OS does not prevent such types of malicious downloads; it can also happen to Qubes images. Verify your downloads with checksums and cryptographic signatures [1].

[1] https://doc.qubes-os.org/en/latest/project-security/verifyin...

kachapopopow•1h ago
qubes is just as vulnerable as xubuntu in this case (poor website security) no?
zvmaz•1h ago
Yes indeed. Qubes has a good article on verifying distribution images not only with checksums but also with cryptographic signatures that verify the checksum files [1].

[1] https://doc.qubes-os.org/en/latest/project-security/verifyin...

xyzzy123•1h ago
But aren't you still trusting the website for instructions about how to verify the cryptographic signatures?
KAMSPioneer•42m ago
The idea (outlined in the QubesOS documentation) is to clone the git repo of their website, verify the PGP commit signatures, then render the website yourself. Then you can be reasonably sure the website is legitimate, modulo a DoS attack stopping you from receiving updates to the website code, I suppose.

Getting the correct PGP public key appears to be an exercise left to the reader, but if you are already running e.g. Fedora, you can view the packaged QubesOS distro keys distributed by your current OS, cross-reference that with a second source such as a PGP keyserver, and unless you're being Mossaded upon you're probably good if they match.

nekusar•23m ago
Check a history on archive.org and validate the checksum wasnt changed to be the potentially malicious iso?

Its not perfect... but its better than nothing.

crtasm•1h ago
There's a sticked comment on the source thread: https://old.reddit.com/r/xubuntu/comments/1oa43gt/xubuntuorg...
hamdingers•42m ago
> Thanks everyone. We're beholden to our hosting environment for upgrades and it looks like there was a bit of a slip-up here. It's being worked on, but for now the Downloads page is disabled.

Calling this a "slip-up" is an outrageous downplay. If anything this makes me suspicious of the moderator who posted the comment too. One does not accidentally prepare a zip file with a malicious exe and xubuntu-specific language, upload it to a server, and point a torrent link at it.

justin66•15m ago
Mistakes were made!
LambdaComplex•24m ago
Calling this "a bit of a slip-up" while neither confirming nor denying the presence of malware is weird at best and incredibly suspicious at worst.
amelius•1h ago
Let's not kid ourselves. A state level actor who is playing the long game can compromise any distro, package, etc. without us knowing about it.
CaptainOfCoit•54m ago
Sure, but realistically, how many of us right here have state level actors in our threat models? I sure don't, because it'd be impossible to live a normal life then.
iamnothere•21m ago
But state level actors could target you, so you should immediately abandon any hope of privacy, disable your ad blockers, stop using Signal, install Windows 11, cease any complaints about the government, and eat the bugs.
timefirstgrav•52m ago
Jia Tan with the XZ backdoor was caught because some performance obsessed person noticed a tiny delay... I'm sure they learned their lesson and are ensuring their next backdoor doesn't impact performance.
3eb7988a1663•32m ago
That is the insidious question - how many parallel efforts were/are in play when xz was going down? Surely that was not the only long term play to compromise an "unrelated" component of system security. The Jia Tan organization might have already inserted back doors into dozens of different projects by now.
layer8•50m ago
That kind of defeatism isn’t helpful.

The present case also just seems malware easily detected by VirusTotal: https://old.reddit.com/r/xubuntu/comments/1oa43gt/xubuntuorg...

amelius•45m ago
Sticking-your-head-in-the-sand-ism isn't helpful either.

But nobody wants to talk about true security. For example, why does a Python module that renders progress bars (for example) need my full trust about what it does to the rest of my system? Etc.

chorlton2080•33m ago
Look at all the mainstream scanners that failed to detect it!
layer8•22m ago
That’s pretty normal in my experience. That’s why you check with VirusTotal instead of a single “mainstream” scanner.
cozzyd•1h ago
fortunately, in this case, it seems like the malware may be moot if you use the iso to wipe your windows installation...
fainpul•13m ago
But if you just try the live ISO and go back to your Windows without installing, you're infected? Seems like someone wants users to switch to Linux :P
diogenes_atx•57m ago
I just ran the checksum for the current ISO file of the full Xubuntu desktop version on the Xubuntu website, and the checksum appears to be valid.

https://mirror.us.leaseweb.net/ubuntu-cdimage/xubuntu/releas...

[user@host]$ ls

SHA256SUMS SHA256SUMS.gpg xubuntu-24.04.3-desktop-amd64.iso

[user@host]$ cat SHA256SUMS

b61e083d8a5ab003bad6ef7ea31ec21d7bfdf19b99d75987ab3fa3bbe85ec1bf *xubuntu-24.04.3-desktop-amd64.iso

[user@host]$ sha256sum xubuntu-24.04.3-desktop-amd64.iso

b61e083d8a5ab003bad6ef7ea31ec21d7bfdf19b99d75987ab3fa3bbe85ec1bf xubuntu-24.04.3-desktop-amd64.iso

[user@host]$ echo $?

0

zvmaz•46m ago
From what I understood, it's the torrent link that downloads a compromised zip file rather then the authentic image:

"Torrent downloads over at https://xubuntu.org/download/ are serving a zip file with a suspicious exe and a tos.txt inside. The TOS starts with Copyright (c) 2026 Xubuntu.org which is sus, because it is 2025. I opened the .exe with file-roller and couldn't find any .torrent inside."

trebligdivad•43m ago
And where did you get the reference SHA256SUMS from ? Did you check the gpg signature on them against a good sig from somewhere?
tuhgdetzhh•37m ago
Good Point. The checksums posted on Xubuntu.org could also compromised.
diogenes_atx•29m ago
I downloaded the checksums and the ISO image from the Xubuntu website: https://mirror.us.leaseweb.net/ubuntu-cdimage/xubuntu/releas...

This url is on the main Xubuntu website, under "Xubuntu 24.04": click "Release page," then select United States. From there, you download the following files: SHA256SUMS, SHA256SUMS.gpg, xubuntu-24.04.3-desktop-amd64.iso

The output of the other checksum commands is shown here:

[user@host]$ gpg --keyid-format long --verify SHA256SUMS.gpg SHA256SUMS

gpg: Signature made Thu 07 Aug 2025 06:05:22 AM CDT

gpg: using RSA key 843938DF228D22F7B3742BC0D94AA3F0EFE21092

gpg: Can't check signature: No public key

[user@host]$ sha256sum --check SHA256SUMS

xubuntu-24.04.3-desktop-amd64.iso: OK

(output omitted for results of Xubuntu minimal version, which was not downloaded)

The checksum is a cryptographic hash generated from the ISO file's contents. While the checksum for a specific, unchanged ISO file is fixed, the checksum that is published on a website could be deliberately altered by an attacker to hide a modified, malicious ISO.

ntoskrnl_exe•22m ago
According to the SHA256SUMS from Canonical's official download page at https://cdimage.ubuntu.com/xubuntu/releases/24.04.3/release/ that is the correct checksum.
retsl•14m ago
the malware's main function seems to be to check the clipboard for crypto wallet addresses and then replace them with attacker addresses:

  Bitcoin (bc1): bc1qrzh7d0yy8c3arqxc23twkjujxxaxcm08uqh60v
  Litecoin (ltc1/L/M): LQ4B4aJqUH92BgtDseWxiCRn45Q8eHzTkH
  Ethereum (0x): 0x10A8B2e2790879FFCdE514DdE615b4732312252D
  Dogecoin (D): DQzrwvUJTXBxAbYiynzACLntrY4i9mMs7D
  Tron (T): TW93HYbyptRYsXj1rkHWyVUpps2anK12hg
  Ripple (r): r9vQFVwRxSkpFavwA9HefPFkWaWBQxy4pU
  Cardano (addr1): addr1q9atfml5cew4hx0z09xu7mj7fazv445z4xyr5gtqh6c9p4r6knhlf3jatwv7y72deah9un6yettg92vg8gskp04s2r2qren6tw
can't guarantee it doesn't do anything else.
Polizeiposaune•7m ago
oddly, the one "sus" thing flagged -- a " (C) 2026 " late in 2025 -- is consistent with practices of established book publishers.

I recall purchasing a textbook in September of year X and being surprised that it was "from the future" with a "Copyright X+1".