frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Maple Mono: Smooth your coding flow

https://font.subf.dev/en/
1•signa11•4m ago•0 comments

Sid Meier's System for Real-Time Music Composition and Synthesis

https://patents.google.com/patent/US5496962A/en
1•GaryBluto•11m ago•1 comments

Show HN: Slop News – HN front page now, but it's all slop

https://dosaygo-studio.github.io/hn-front-page-2035/slop-news
3•keepamovin•12m ago•1 comments

Show HN: Empusa – Visual debugger to catch and resume AI agent retry loops

https://github.com/justin55afdfdsf5ds45f4ds5f45ds4/EmpusaAI
1•justinlord•15m ago•0 comments

Show HN: Bitcoin wallet on NXP SE050 secure element, Tor-only open source

https://github.com/0xdeadbeefnetwork/sigil-web
2•sickthecat•17m ago•1 comments

White House Explores Opening Antitrust Probe on Homebuilders

https://www.bloomberg.com/news/articles/2026-02-06/white-house-explores-opening-antitrust-probe-i...
1•petethomas•17m ago•0 comments

Show HN: MindDraft – AI task app with smart actions and auto expense tracking

https://minddraft.ai
2•imthepk•22m ago•0 comments

How do you estimate AI app development costs accurately?

1•insights123•23m ago•0 comments

Going Through Snowden Documents, Part 5

https://libroot.org/posts/going-through-snowden-documents-part-5/
1•goto1•24m ago•0 comments

Show HN: MCP Server for TradeStation

https://github.com/theelderwand/tradestation-mcp
1•theelderwand•27m ago•0 comments

Canada unveils auto industry plan in latest pivot away from US

https://www.bbc.com/news/articles/cvgd2j80klmo
2•breve•28m ago•1 comments

The essential Reinhold Niebuhr: selected essays and addresses

https://archive.org/details/essentialreinhol0000nieb
1•baxtr•30m ago•0 comments

Rentahuman.ai Turns Humans into On-Demand Labor for AI Agents

https://www.forbes.com/sites/ronschmelzer/2026/02/05/when-ai-agents-start-hiring-humans-rentahuma...
1•tempodox•32m ago•0 comments

StovexGlobal – Compliance Gaps to Note

1•ReviewShield•35m ago•1 comments

Show HN: Afelyon – Turns Jira tickets into production-ready PRs (multi-repo)

https://afelyon.com/
1•AbduNebu•36m ago•0 comments

Trump says America should move on from Epstein – it may not be that easy

https://www.bbc.com/news/articles/cy4gj71z0m0o
6•tempodox•36m ago•2 comments

Tiny Clippy – A native Office Assistant built in Rust and egui

https://github.com/salva-imm/tiny-clippy
1•salvadorda656•41m ago•0 comments

LegalArgumentException: From Courtrooms to Clojure – Sen [video]

https://www.youtube.com/watch?v=cmMQbsOTX-o
1•adityaathalye•44m ago•0 comments

US moves to deport 5-year-old detained in Minnesota

https://www.reuters.com/legal/government/us-moves-deport-5-year-old-detained-minnesota-2026-02-06/
8•petethomas•47m ago•2 comments

If you lose your passport in Austria, head for McDonald's Golden Arches

https://www.cbsnews.com/news/us-embassy-mcdonalds-restaurants-austria-hotline-americans-consular-...
1•thunderbong•51m ago•0 comments

Show HN: Mermaid Formatter – CLI and library to auto-format Mermaid diagrams

https://github.com/chenyanchen/mermaid-formatter
1•astm•1h ago•0 comments

RFCs vs. READMEs: The Evolution of Protocols

https://h3manth.com/scribe/rfcs-vs-readmes/
3•init0•1h ago•1 comments

Kanchipuram Saris and Thinking Machines

https://altermag.com/articles/kanchipuram-saris-and-thinking-machines
1•trojanalert•1h ago•0 comments

Chinese chemical supplier causes global baby formula recall

https://www.reuters.com/business/healthcare-pharmaceuticals/nestle-widens-french-infant-formula-r...
2•fkdk•1h ago•0 comments

I've used AI to write 100% of my code for a year as an engineer

https://old.reddit.com/r/ClaudeCode/comments/1qxvobt/ive_used_ai_to_write_100_of_my_code_for_1_ye...
2•ukuina•1h ago•1 comments

Looking for 4 Autistic Co-Founders for AI Startup (Equity-Based)

1•au-ai-aisl•1h ago•1 comments

AI-native capabilities, a new API Catalog, and updated plans and pricing

https://blog.postman.com/new-capabilities-march-2026/
1•thunderbong•1h ago•0 comments

What changed in tech from 2010 to 2020?

https://www.tedsanders.com/what-changed-in-tech-from-2010-to-2020/
3•endorphine•1h ago•0 comments

From Human Ergonomics to Agent Ergonomics

https://wesmckinney.com/blog/agent-ergonomics/
1•Anon84•1h ago•0 comments

Advanced Inertial Reference Sphere

https://en.wikipedia.org/wiki/Advanced_Inertial_Reference_Sphere
1•cyanf•1h ago•0 comments
Open in hackernews

A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture

https://stack.int.mov/a-reverse-engineers-anatomy-of-the-macos-boot-chain-security-architecture/
122•19h•2mo ago

Comments

ziofill•2mo ago
Holy cow I was reading and reading and then I realized I was only 10% through!
astrange•2mo ago
It's long because it's AI-assisted and they're all bullet point lists all the time.
wanderingbit•2mo ago
This is top 10 for greatest HN deep dives. I learned something new almost every sentence, and could not complete it on my first attempt.
int3trap•2mo ago
This is top tier. Well written and insanely detailed.
ethin•2mo ago
This is a really interesting deep dive but why does the article hedge so much? For example, in the first few sections it says things like "... typically reveals the following sequence" or "The Boot ROM sets a specific control bit in the AES configuration register (e.g., AES_CMD_USE_GID)", which makes it sound like the author wasn't actually sure if any of this was accurate and was guessing.
kmeisthax•2mo ago
I smell AI writing assistance. Which is a shame because this is otherwise very good and well-collated information about Apple's security. But AI loves to use bullet point lists just for the hell of it and it makes the information here smell way less reliable than it actually is.

I'm also not sure if it's 100% accurate. My (possibly wrong) understanding of the guarded execution feature is that each GL is paired with a normal ARM EL. i.e. GL2 constrains EL2, GL1 constrains EL1, etc. XNU lives in EL2 so SPTM lives in GL2, and GENTER/GEXIT move you between ELx and GLx through a secure call vector. In contrast, this guide refers to GL0 being the "standard XNU kernel context" even though XNU lives in EL2 on macOS. Furthermore, on device OSes (iOS/iPadOS/etc) they put a second kernel in GL1 and various enforcement policy tools (i.e. code signing policy, camera indicator policy) in GL0[0]. So I'm not sure how macOS putting XNU in GL0 makes sense?

[0] XNU source refers to this concept as an Exclave, which itself can be grouped with other isolated resources as a Conclave.

VogonPoetry•2mo ago
Perhaps using AI assistance is good OPSEC. It could help to shield the author from stylometry or author profiling.
nicolas_17•2mo ago
And then the author posts it himself to Hacker News. Nah, that's not opsec.
nicolas_17•2mo ago
There's many factual errors in this AI slop.

For example, it says quite unambiguously that the bootloader is encrypted directly with the GID key (loading the LLB ciphertext into the AES engine), but that's not how it works, the GID key is used to decrypt the LLB's KBAG into an AES key:IV pair and that is used to decrypt the LLB.

More:

> The behavior of the Boot ROM changes fundamentally based on the "Security Domain" fuse. > > Production (CPFM 01):

Security Domain (SDOM) is a different thing than CPFM. And production devices have CPFM 03.

> CHIP (Chip ID): Identifies the SoC model (e.g., 0x8101 for M1).

The M1 SoC is 0x8103.

Due to Brandolini's Law I will not continue to list everything else that is wrong here...

nicolas_17•2mo ago
They just fixed the KBAG thing.

This quickly went from Brandolini's Law to Cunningham's Law. Learn how Apple's boot process works by explaining it wrong and waiting for people to correct you!

jjtech•2mo ago
All of these errors have now been stealth-corrected.

New strategy discovered: Ask LLM to write article, nerdsnipe HN into correcting it, feed corrections back into LLM until people stop complaining

ethin•2mo ago
Yeah, definitely not at all a fan of stealth editing.

I suspected LLM rewriting or generation but I don't possess enough knowledge into how the Apple pre-boot environment works to make an accurate judgement on the accuracy of the post. But I definitely had very strong suspicions of LLM influence with all the bullet lists and hem-hawing the post does; I would expect that someone who successfully reverse engineered the boot chain this thoroughly wouldn't need to hedge anything but Apple's rationale on why they did things. But maybe I'm too overly focused on details.

nicolas_17•2mo ago
That's exactly how LLMs are so effective: the text looks impressive to people who don't possess enough knowledge to make an accurate judgement. Meanwhile actual researchers with Apple experience found clear errors on a quick skim.

The large amount of rewriting being done within 5 minutes is another sign of LLM...

matu3ba•2mo ago
Can you recommend a more factual and complete overview on Apple security architecture and bootchain than this bug-ridden article? I'm interested in hardware security (models).
bri3d•2mo ago
I think the article is being stealth edited which is a bit annoying; its explanation of guarded execution is now closer to yours, which I think is accurate.
kmeisthax•2mo ago
I genuinely hope I'm not being used as a reference for how Apple device security works as I have absolutely NO credentials for that beyond "read a lot of posts from people on the Asahi Linux project"
inkyoto•2mo ago
> I smell AI writing assistance. Which is a shame […]

I have met multiple brilliant, very bright, and talented people (mathematicians, physicists, doctors) who excel at what they know and do, yet immensely struggle to spell, write, or both. There are also people who do not like to write (whatever the reason is).

GenAI has been a great boon for such a type of person as it dissolves their struggle – they convey the idea to the machine (however awful the scribe is) and GenAI handles the grammar and style.

Granted, it is different from «hey, GenAI pet, write me a blog post on XYZ».

nicolas_17•2mo ago
This article is definitely the latter, not just "fixing grammar".
QuantumNomad_•2mo ago
> e.g., AES_CMD_USE_GID

Sometimes people mix up “i.e.” (“id est”; “that is”) and “e.g.” (“exempli gratia”; “for example”).

Of course, only the author knows if this case was a mix up, or if they really wrote what they meant.

jshier•2mo ago
For anyone looking for a more memorable mnemonic, learned them as "I explain" and "example given".
DrammBA•2mo ago
I like "in essence" and "examples given"
deaux•2mo ago
Sometimes? Even on HN, where people are in the top 20% of "not making writing mistakes", compared to the general population, I see more people using i.e. wrong than I see people using it right. And sure descriptivism so now it just means that blahblah, it sucks because we already have e.g. for that and it makes i.e. pointless.
hu3•2mo ago
It's AI assitance. If you search for "e.g." the page lights up like a christmas tree. There's 90 appearances if "e.g."

I have never seen this frequency before.

nicolas_17•2mo ago
Or maybe fully AI-generated. There's many factual errors in the article too.
potsandpans•2mo ago
Damn is that a new signal? I use "e.g." all the time. Now I can't use the em dash or that I suppose or risk being called out for ai gen content
hu3•2mo ago
I use it too but 106 "e.g."s in a single page? That's how many there are now. Not to mention it's full of inconsistencies and being edited multiple times.

I think the author might have left an LLM agent in a loop fixing it whenever HN points out an error or finds something new to add on the internet.

EPWN3D•2mo ago
It's basically all AI-generated. There are significant omissions and errors for any flow that hasn't previously been reversed engineered. The launchd stuff has details that are just wrong.
ethin•2mo ago
Do you know of a much more accurate deep dive? I'd love to learn all this from a source that is actually trustworthy/authentic.
nicolas_17•2mo ago
If you're new to the topic, this is a good place to start https://support.apple.com/en-lamr/guide/security/welcome/web
Brian_K_White•2mo ago
Can't seem to load it. FF on Android. SSL problem?
wpm•2mo ago
Working ok for me
JSR_FDED•2mo ago
Incredible article. int summarizes it well:

Final Thought: macOS is no longer just a Unix system. It is a distributed system running on a single die, governed by a hypervisor that doesn't exist in software. The kernel is dead; long live the Monitor.

quantummagic•2mo ago
Will this enable someone who buys an apple laptop to boot directly into a third-party OS, from a thumb drive? Last I heard, they were still too locked down to allow it.
bigyabai•2mo ago
Apple Silicon doesn't support UEFI, so no.
quantummagic•2mo ago
Obviously, this article might not result in any concrete improvements for Apple owners, but why do you say that UEFI the only way to boot to a thumb drive?
pram•2mo ago
Boot loaders like GRUB etc only work with UEFI/BIOS to state the obvious.
nicolas_17•2mo ago
The bootloader doesn't even have a USB stack capable of reading external storage.
astrange•2mo ago
If you have kernel access you can do an OS-to-OS takeover from the original OS. That's how MkLinux worked on old Macs.
nicolas_17•2mo ago
Or you can just sign your Linux kernel from macOS recovery mode, which is what the Asahi Linux installer does already. No need for weird hacks.

You also don't have "kernel access" in macOS. After boot, the memory region corresponding to the macOS kernel is marked as read-only at the memory controller level.

astrange•2mo ago
> Or you can just sign your Linux kernel from macOS recovery mode, which is what the Asahi Linux installer does already. No need for weird hacks.

Does that work for USB boot?

> You also don't have "kernel access" in macOS. After boot, the memory region corresponding to the macOS kernel is marked as read-only at the memory controller level.

You can turn that off from recovery mode. (see `bputil`) It's needed to use dtrace.

Genbox•2mo ago
The security of the Apple ecosystem is miles ahead of others. Every time I reverse engineer some component of their OS, it is very different from what I've seen before. I always find myself surprised by their thoughtfulness and engineering craft.

Recently I've taken on their code signing component. The concepts they've created, such as identifying applications by their "designated requirements" is a stroke of genius. It makes the system completely stateless and capable of almost anything without auxiliary data structure or additional code.

I've seen other engineering teams try and fail at building something similar, and never with such powerful simplicity.

hulitu•2mo ago
> The security of the Apple ecosystem is miles ahead of others.

cough iMessage, hardware backdoors cough

Genbox•2mo ago
That's a bit disingenuous. Can you substantiate your claims?
bigyabai•2mo ago

  "In this case, the federal government prohibited us from sharing any information," the company said in a statement. "Now that this method has become public we are updating our transparency reporting to detail these kinds of requests."
- Apple addressing Senator Wyden's accusation of Push Notification backdoors (https://www.macrumors.com/2023/12/06/apple-governments-surve...)

  “At Apple, we are always working to defend our users against even the most complex cyberattacks. The steps we’re taking today will send a clear message: in a free society, it is unacceptable to weaponise powerful state-sponsored spyware against those who seek to make the world a better place,”
- Quote from Apple's head of security engineering on the lawsuit Apple eventually dismissed against NSO Group (https://www.theguardian.com/technology/2021/nov/23/apple-sue...)

  "The app in question is called “LassPass Password Manager” and lists Parvati Patel as the developer.  The app attempts to copy our branding and user interface..."
- Lastpass telling users that a trojan horse broke through Apple's manual review process (https://blog.lastpass.com/posts/warning-fraudulent-app-imper...)
atomicthumbs•2mo ago
Those aren't iMessage hardware backdoors.
bigyabai•2mo ago
You may have skipped my second link. Here it is a second time, with the important quote excerpted: https://www.theguardian.com/technology/2021/nov/23/apple-sue...

  The Pegasus project, an investigation into NSO by the Guardian and other media outlets, coordinated by the French media group Forbidden Stories, has documented dozens of examples in which NSO’s spyware was used to attack users of Apple’s iPhone. In some cases, a vulnerability in the company’s iMessage feature, which could be penetrated by Pegasus, was used against journalists, human rights activists and other members of civil society.
The source is describing an iMessage exploit known as FORCEDENTRY, which can be used to deliver a persistent hardware backdoor (Pegasus) to an iPhone. Often, Apple is unable to detect the persistent exploit and therefore incapable of warning the user that they have a backdoored device: https://9to5mac.com/2025/02/20/apple-currently-only-able-to-...
astrange•2mo ago
There are not any hardware backdoors.
bigyabai•2mo ago
(that you have seen)

After all, it wouldn't be a backdoor if everyone knew about it.

fsflover•2mo ago
> The security of the Apple ecosystem is miles ahead of others.

Have you heard about Qubes OS?