frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Alleged Jabber Zeus Coder 'MrICQ' in U.S. Custody

https://krebsonsecurity.com/2025/11/alleged-jabber-zeus-coder-mricq-in-u-s-custody/
1•todsacerdoti•11m ago•0 comments

Yakiniku

https://en.wikipedia.org/wiki/Yakiniku
1•nomilk•11m ago•0 comments

Deep DIVE: AI progress continues, as IQ scores rise linearly

https://www.maximumtruth.org/p/deep-dive-ai-progress-continues-as
1•ctoth•12m ago•0 comments

Show HN: A/B Test Your LLM Prompts in Production

https://switchport.ai/
1•rjfc•12m ago•0 comments

"You Don't Need Kafka, Just Use Postgres" Considered Harmful

https://www.morling.dev/blog/you-dont-need-kafka-just-use-postgres-considered-harmful/
1•ingve•13m ago•0 comments

Show HN: AI Chat Terminal – Private data stays local, rest goes to cloud

https://github.com/martinschenk/ai-chat-terminal
1•ma8nk•14m ago•0 comments

Brushless Motors [video]

https://www.youtube.com/watch?v=me6034BrwN8
1•andai•17m ago•0 comments

Waiting does not make a lot of sense to me

https://larr.net/p/wait.html
3•lr0•17m ago•0 comments

Manage Docker on the Go

https://github.com/theSoberSobber/Docker-Manager
1•remux•19m ago•1 comments

New nanoparticles stimulate the immune system to attack ovarian tumors

https://news.mit.edu/2025/new-nanoparticles-stimulate-immune-system-attack-ovarian-tumors-1031
2•gmays•21m ago•0 comments

Aider-desk – Desktop application for Aider AI

https://github.com/hotovo/aider-desk
1•bratao•22m ago•0 comments

DiscoBSD

https://github.com/chettrick/discobsd
1•turtleyacht•24m ago•1 comments

Celebrating 9 Years of Bear

https://blog.bear.app/2025/11/celebrating-9-years-of-bear/
1•mindracer•25m ago•0 comments

Chaldean Alphabet [pdf]

https://www.swslhd.health.nsw.gov.au/services/Interpreter/PDF/chaldean.pdf
1•marysminefnuf•25m ago•0 comments

After the Last Git Commit

https://gist.github.com/igorcosta/bb40cdab6b1468c373d647164afae7ef
1•igorpcosta•26m ago•2 comments

Amazon Rivian Electric Delivery Vans Arrive in Canada

https://cleantechnica.com/2025/10/30/rivian-electric-delivery-vans-arrive-in-canada/
1•TMWNN•29m ago•0 comments

Ask HN: Why are QR codes not clickable links on browsers?

5•obilgic•29m ago•1 comments

Down with Template (Or Not)

https://cedardb.com/blog/down_with_template/
1•aw1621107•31m ago•0 comments

The modern homes hidden inside ancient ruins

https://www.ft.com/content/5f722a2e-71d8-430c-a476-95de2c4ad9a5
3•Stratoscope•31m ago•1 comments

Adaptive Twisting Metamaterials

https://dx.doi.org/10.1002/adma.202513714
1•PaulHoule•33m ago•0 comments

Improving Emacs' iCalendar Support

https://recursewithless.net/emacs/icalendar-diary-import-export.html
2•rwl•35m ago•0 comments

Will AI Kill the Firm?

https://www.project-syndicate.org/onpoint/ai-rewriting-rules-of-modern-capitalism-by-sami-mahroum...
1•johntfella•37m ago•0 comments

Dempster-Shafer and modelling beliefs about sets

https://emiruz.com/post/2025-10-30-epistemics/
1•usgroup•40m ago•0 comments

'This is the big one' – tech firms bet on electrifying rail

https://www.bbc.com/news/articles/czdjg92y00no
24•mikhael•47m ago•2 comments

MTurk is 20 years old today – what did you create with it?

10•csmoak•49m ago•1 comments

Snap benefits cut off during shutdown, driving long lines at food pantries

https://apnews.com/article/government-shutdown-food-lines-snap-6b55e2c21c0198f3309f3a45a55f33b6
8•consumer451•55m ago•1 comments

Pressure to Change

https://maryrosecook.com/blog/post/pressure-to-change
1•janpio•55m ago•0 comments

EventSourcingDB 1.2.0 Is Available

https://docs.eventsourcingdb.io/blog/2025/11/03/eventsourcingdb-120-is-available/
2•goloroden•56m ago•0 comments

This Jet Engine Uses No Fuel – Only Microwaves and Air, According to Researchers

https://www.slashgear.com/2005698/microwave-plasma-jet-engine-no-fossil-fuel/
2•hek2sch•57m ago•0 comments

WLAN Rejection: Germany Favors Mobile for Upper 6 GHz Band

https://www.heise.de/en/news/WLAN-Rejection-Germany-Favors-Mobile-for-Upper-6-GHz-Band-10965806.html
1•i-con•1h ago•0 comments
Open in hackernews

X.org Security Advisory: multiple security issues X.Org X server and Xwayland

https://lists.x.org/archives/xorg-announce/2025-October/003635.html
94•birdculture•7h ago

Comments

rwmj•4h ago
Good that people are finding and fixing these, but basically allowing any untrusted client to talk to your X server is asking for trouble just by design. (Bonus points if you have any Tcl/Tk apps running, where you can simply transmit commands for the program to run via the X server.)
jeroenhd•4h ago
There are plenty of setups where the X server runs at higher privileges/on a different host than the (partially trusted) application that might exploit the X server. This is a classic elevation of privileges vulnerability in those setups.

X11's practical absence of any security mechanisms for user sessions means you should probably not run any kind of low-trust UI program anyway, as there is no prevention of keystroke injection or screen recording, but that's a design flaw that will never be solved. That doesn't mean that EoP style attacks like these should be ignored or underestimated, though.

mrktf•3h ago
Digging deeper there are mechanisms for long time on internal X side (see https://www.x.org/releases/X11R7.6/doc/xorg-docs/specs/Xserv... ) - granted never seen it practically implemented.

And going to rabbit hole there are even proof of concept security implementation named Xnamespace for Xorg fork (needs polishing and much more patches but looks doable. see wip documentation: https://raw.githubusercontent.com/X11Libre/xserver/d2b60a3d6... )

lotharcable•3h ago
The way X11 developers ended up fixing this is by creating Wayland. This way privileged operations (like keylogging, screen capture, etc) require the cooperation and authentication through the display server.
embedding-shape•3h ago
That way you also prevent things possible in X11 to be impossible in Wayland, like a window setting it's own position, if you were to want that.
lotharcable•2h ago
Fixing X11's security would of broken window positioning as well. Since that is a security issue.

The deal here is that the only way to fix X11's security issues is by breaking all those types of workflows and forcing application rewrites to implement them in authenticated ways.

So if you are going have to go and break all that stuff, why not fix a crapload of other problems while you are at it?

Calling Wayland "X13" may have avoided a lot of misunderstandings, but it probably would of caused others.

embedding-shape•2h ago
> Since that is a security issue.

Maybe it's both? There are applications with good reason that need to chose their location themselves, and users who want that type of behavior, so it's definitively not just a security issue.

mikkupikku•3h ago
That sort of solution is cancer if you want to do anything the display server authors didn't think of. I've got a script that I invoke with a global hotkey that determines the window title of the currently focused window and fuzzy matches it against pipewire audio stream names so I can mute the focused window with a single keypress. If I want that to work in Wayland I'm pretty much up shit creek because somebody with their head in the clouds thinks that my needs are super dangerous or something.
justin66•2h ago
> That sort of solution is cancer if you want to do anything the display server authors didn't think of.

Hey come on man, a locking screen saver is a totally niche application. No demand for that.

mikkupikku•2h ago
xscreensaver works just fine. It only needs to keep nosy roommates out, not the NSA. Not that Wayland would stop spooks anyway.
udev4096•1h ago
Totally unrelated, I like your nickname :)
ethin•2h ago
Wayland devs for the longest time thought implementing what was needed for accessibility (mainly, global keyboard hooks for Orca to work) was a security problem. Nevermind the fact that nobody hacks X servers, or your wayland compositor, because if I wanted to hook your keyboard with a keylogger, I'd hook it through evdev. And then you wouldn't even know let alone be able to do much about it if I did it properly.
array_key_first•1h ago
Wayland doesn't say "this is impossible", it says "this is out of scope of the core display protocol, implement this somewhere else".

Which, well, we do. Practically all the X usecases are covered on Wayland systems now. Screen sharing, screen clipping, global hotkeys, file pickers, getting the window title like you said... I can do all of that on KDE, right now, under Wayland.

mikkupikku•1h ago
Can you do it in a way that isn't KDE specific, and will work if you change your DE one day on a whim?
tuna74•21m ago
If you change to another DE that has less capabilities than KDE, of course you can't do it. Emacs and LibreOffice Writer will have vastly different capabilities and people can choose what they want based on the capabilities they desire.
tuna74•24m ago
You can write a Gnome Shell extension or whatever the KDE equivalent is.
uecker•3h ago
X11 had the distinction between trusted and untrusted X11 clients basically forever. But nobody bothered to even spend the minimal amount of work to make this usable in practice^1. This had two reasons: 1.) It is irrelevant when you run the programs as the same user so nobody bothered (and no: Wayland does not help: https://github.com/Aishou/wayland-keylogger) 2.) It is more fun to simply pretend it is unfixable broken and write something new (something any good engineering manager should have stopped immediately).

¹. I used to use this and also fixed some bugs in some programs. The main problem when I last checked a decade ag was that some important extensions such as composite would need to be exposed to untrusted clients.

rich66man•2h ago
> something any good engineering manager should have stopped immediately

Who exactly should and can control the horde of OSS developers?

DarkmSparks•2h ago
They were paid by redhat.
justin66•2h ago
Since we're talking about Wayland developers specifically, perhaps we could convince Elmer's to add a bitterant to its paste and glue products such that fewer of them would eat it.
Jasper_•1h ago
That Wayland keylogger is not the same thing. X11 has several mechanisms (XTest, XRecord, XI raw inputs) to receive a global raw key input stream, accessible to anyone who connects to the X server, without even making a visible window surface. It even bypasses grabs, meaning that your lock screen password entry can be snooped on.

The Wayland keylogger acts like an application; all Wayland compositors will only send key events to the focused surface, so the user has to focus an active surface in order to get key events. Even in the scenario where you've LD_PRELOAD-hooked all applications, you still will never get the lock screen password, as the compositor never sends it out across the wire.

LD_PRELOAD is problematic from a security perspective, but it's not Wayland-specific: the same issue is true for CLI applications and X11 applications, and any attacker with the ability to write files could also just replace your binaries with malicious ones (stuff them somewhere into ~/.hidden, and then add a $PATH entry to the start).

uecker•1h ago
I think you did not understand my point. X11 has several such mechanisms, yes, but it also has the concept of untrusted clients that disallow the use of these mechanisms and could be used to provide safety similar to Wayland. The point is that this mechanism of untrusted X clients was neglected and I gave an explanation way.
mikkupikku•3h ago
I don't think I've seen X configured to run as root in probably 15 years. If anybody still does anything like that, they're literally asking for it.
_flux•2h ago
Hmm.. On my Debian ps axuw|grep Xorg says

    root       34595  2.7  0.4 26146280 532248 tty4  Sl+  Nov13 783:33 /usr/lib/xorg/Xorg vt4 -displayfd 3 -auth /run/user/1000/gdm/Xauthority -nolisten tcp -background none -noreset -keeptty -novtswitch -verbose 3
asveikau•2h ago
That looks like the display manager (i.e. login screen) running on vt4, which is probably not where you are logged in. Does it switch to another user when you log in?

Note you have multiple virtual consoles which can have independent X servers.

0xbadcafebee•2h ago
Why do people keep persisting this myth? X11 has authentication. You can either rely on filesystem permissions, or a shared secret. The same way thousands of other network servers work.

Any program you run on a computer (especially a Linux computer, which lacks modern OS security measures and has constant privesc kernel holes) exposes you to security flaws. There has yet to be any computer system designed that a hacker can't break out of. If you intentionally download and execute a program, you are rolling the dice, regardless of what the software is.

What's insane about all these discussions is that NOBODY IS HACKING X SERVERS. There's a thousand other kinds of software on Linux that there is real malware for. But nobody is trying to hijack your X11 session. This imagined threat is a red herring designed to bolster the argument for Wayland's horrible designs.

tapoxi•2h ago
I think the issue isn't that you downloaded random hostile software, but that other software you do use has some sort of vulnerability (recent Unity vulnerability, browser sandbox escape, etc) and an issue like this would allow for privilege escalation.

Wayland doesn't need X11's vulnerability as its only argument, Wayland is a much simpler design that is easier to iterate on because it doesn't assume the client and server are on different machines. The fact that it moves privileged APIs like screen capture behind portals is a bonus.

kelnos•1h ago
So simple and easy to iterate on that Wayland compositors are still not as full-featured as X11 desktop environments after more then a decade, and can't be due to protocols no one is able to agree to implement.
phkahler•5m ago
>> Wayland compositors are still not as full-featured as X11 desktop environments

It depends what features you care about. X11 doesn't have tear-free video playback, HDR, or as good a security model as Wayland.

mikkupikku•2m ago
Using a compositor fixes screen tearing, no need to use Wayland for that.
zdragnar•1h ago
> What's insane about all these discussions is that NOBODY IS HACKING X SERVERS

I knew someone who worked for a small loan type company. Passwords were stored in plain text, but even worse, the login form didn't actually check the password at all, it created valid sessions as long as you provided a valid user name.

When he informed his boss that was very bad, his boss simply said that nobody has abused it, and nobody would, don't waste time changing it.

The point, of course, is why would you wait until people are getting hacked to address a known vulnerability?

Sure, there are others, and they should be closed too, and they are when they are found. It makes no sense whatsoever to leave one open just because.

portaouflop•1h ago
It does make sense if the vuln doesn’t fit in your threat model. There are always an uncountable number of vulnerabilities and you can never fix all that are found.

No idea of course if the threat model that said boss had in mind made sense. But I always recommend to come up with a reasonable threat model first and then think you can harden against it.

nurettin•7m ago
I don't dispute your anecdote but I think the point was: x11 has been around for decades, and these things just don't happen. And the reason is that there are much simpler and more effective ways to pwn a box than trying to screenshot an x session or trying to hook for key presses. So the vulnerability surface just isn't large enough.
jchw•1h ago
> Why do people keep persisting this myth? X11 has authentication. You can either rely on filesystem permissions, or a shared secret. The same way thousands of other network servers work.

Any program you incidentally run within a typical graphical user session will have access to the X socket and a cookie, they will be able to connect. And after they connect... They basically just can do anything they want with zero real restrictions, including most likely some fairly trivial paths to root escalation. Even if they're running inside of a sandbox or container, with only an X11 socket poking through.

This problem was realized a very long time ago with the security extension but most of it never really caught on.

> Any program you run on a computer (especially a Linux computer, which lacks modern OS security measures and has constant privesc kernel holes) exposes you to security flaws. There has yet to be any computer system designed that a hacker can't break out of. If you intentionally download and execute a program, you are rolling the dice, regardless of what the software is.

If you believe this is true, then what exactly is the point of any security measure? Why bother using isolation and sandboxing, or passwords? Why does Windows bother patching flaws if they know there are certainly more of them and they will never fix them?

Do you by chance also smoke because you're going to die anyways?

> What's insane about all these discussions is that NOBODY IS HACKING X SERVERS. There's a thousand other kinds of software on Linux that there is real malware for. But nobody is trying to hijack your X11 session. This imagined threat is a red herring designed to bolster the argument for Wayland's horrible designs.

Lol. That's primarily because the Linux desktop is utterly irrelevant, not because nobody would care to do it. Is it really surprising that attacks against desktop computers would focus almost entirely on the OS that has 90+% of the market share? We don't get free software OS desktop malware for the same reason we don't get free software OS software ports.

Watching and waiting with security was a totally acceptable position in the 90s, but we get the general gist these days. We need security-by-design.

On the server side of Linux where Linux is relevant, the situation is much more impressive; auditing using eBPF, sandboxing with gVisor, microVMs with Firecracker and cloud-hypervisor, isolation using namespaces and seccomp-bpf and more.

On the desktop side, people are still arguing over whether or not it's a problem that any X client can by default silently keylog the entire system trivially. Okay, but a lot of us actually see that as a problem, and we're not interested much in "hearing you out". Most of us recognize that the Wayland protocol has warts (and too many damn protocols), but X11 has many more warts. I didn't care what was the successor to X11 specifically, I just cared that we eventually made some progress. Most people have nothing to offer here and just suggest we should've stuck with X11. Okay dude, but nobody wants to. The X.org devs would like to move on. The desktop environments really would like to move on. There was basically one serious guy that actually wanted to work on improving X11 and he turned out to be kind of crazy and couldn't stop breaking shit anyways.

zzo38computer•1h ago
You could use a proxy server (regardless of the protocol), which might improve security (and other things) better than other methods do, I think.

There are problems with both X11 and Wayland, although I dislike some of the features of Wayland.

jchw•1h ago
Yeah, with Qubes that's exactly what they do. I forget what the software is called, but they use an X11 proxy that tries to enforce policy.

That said though, that does require you to proactively run every X application with this sandboxing. For Qubes which forces everything into VMs this is doable, but for most other systems there isn't an obvious way to handle this sort of thing.

My only major complaint about Wayland that can't just be fixed relatively easily is Mutter refusing to support SSD. (Well, the actual technical problem could be fixed relatively easily, but the social one not so much.)

udev4096•1h ago
Any application can literally log EVERYTHING! It's good to see wayland getting better everyday
exasperaited•2h ago
> Bonus points if you have any Tcl/Tk apps running, where you can simply transmit commands for the program to run via the X server.

Back in 1996 the level of X integration in Tk was awesome; I had a shell tool that could make Netscape do stuff by firing MIT magic cookies at it.

In a contemporary setting, it's pretty horrifying.

samtheprogram•3h ago
Would Fil-C have prevented the first or third?
dingdingdang•43m ago
Wonder how these play out against the https://github.com/X11Libre/xserver base, would be interesting to hear from that end as to how these things are handled. My understanding is that they address any sec issues that arise on x.org but it would be fascinating if the issues are already mitigated since XLibre updated their xserver port with 1000s of issues that were never addressed on the x.org side of things.