frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Performance Hints for BigQuery – TRM Blog

https://www.trmlabs.com/resources/blog/performance-hints-for-bigquery
1•Anon84•32s ago•0 comments

StreamKernel a Kafka-native, high-performance Java 21 event orchestration kernel

1•lopez_steven•50s ago•0 comments

Is the windows11 mandate to upgrade hardware akin to older corp's toxic messes?

1•srevenant•1m ago•0 comments

Your Team Uses AI. Why Aren't You 10x Faster?

https://bits.logic.inc/p/my-team-is-using-ai-why-arent-they
1•sgk284•4m ago•0 comments

What You Need to Know Before Touching a Video File

https://gist.github.com/arch1t3cht/b5b9552633567fa7658deee5aec60453/
1•qbow883•5m ago•0 comments

Show HN: AgentFuse – A local circuit breaker to prevent $500 OpenAI bills

https://github.com/AbdulBasitA/agent-fuse
2•abdulbasitali•6m ago•0 comments

I write (and you should too)

https://www.dbreunig.com/2025/12/27/why-i-write.html
1•dbreunig•7m ago•0 comments

The Theft That Never Was: Inside Venezuela's 1976 Oil Takeover

https://www.caracaschronicles.com/2025/12/26/the-theft-that-never-was-inside-venezuelas-1976-oil-...
1•_____k•8m ago•0 comments

Trust, or Rust

https://thinkhuman.com/trust-or-rust/
1•jamesgill•14m ago•0 comments

Big Ideas, No Scruples

https://www.commonwealmagazine.org/big-ideas-no-scruples
1•Anon84•14m ago•0 comments

Objects ejected from nearby stars in our solar system now [video]

https://www.youtube.com/watch?v=e6d0yoZzDkg
1•pfdietz•18m ago•1 comments

Infinibay DevUpdate 2

https://www.youtube.com/watch?v=Gl2j2RGlD_8
1•angaroshi•18m ago•1 comments

V8 Natives Syntax

https://github.com/pdubroy/til/blob/main/js/2025-12-23-V8-Natives-syntax.md
2•azhenley•20m ago•0 comments

Johannes Kepler

https://en.wikipedia.org/wiki/Johannes_Kepler
1•axiologist•20m ago•2 comments

How Is Russia Blocking Calls on WhatsApp/Telegram/Face Time/Snapchat/?

https://www.reuters.com/technology/whatsapp-complains-about-restrictions-russia-after-reported-sl...
2•urcite_ty_kokos•21m ago•2 comments

Engineers Are Retarded [video]

https://www.youtube.com/watch?v=C5d151lqJsA
3•pinkmuffinere•22m ago•1 comments

plainoldrecipe.com: transform a recipe URL to a plain-text version

https://github.com/poundifdef/plainoldrecipe
2•indigodaddy•23m ago•0 comments

Fastverse: A Suite of High-Performance and Low-Dependency R Packages

https://fastverse.org/fastverse/
1•todsacerdoti•26m ago•0 comments

Collaboration That Built Modern AI: Conversation with Geoff Hinton and Jeff Dean

https://www.youtube.com/watch?v=ue9MWfvMylE
1•guiambros•30m ago•0 comments

Show HN: Buildex – Interactive system design practice with AI feedback

https://buildex.dev
1•rushabh011•30m ago•0 comments

Rclone syncs your files to cloud storage

https://rclone.org/
1•rognjen•34m ago•0 comments

Nick Fuentes and Groypers: How Bots Built America's Anti-Indian Hate Movement

https://swarajyamag.com/commentary/nick-fuentes-and-the-groypers-how-foreign-bots-built-americas-...
7•rustoo•35m ago•1 comments

Both of these influencers are successful – but only one is human

https://www.bbc.com/news/articles/ce3wyplnev1o
1•dabinat•36m ago•0 comments

Prime Hacker News

https://dosaygo-studio.github.io/prime-news/
2•keepamovin•38m ago•1 comments

A Tale of Two Leaks: How Hackers Breached the Great Firewall of China [video]

https://media.ccc.de/v/39c3-a-tale-of-two-leaks-how-hackers-breached-the-great
3•brewmarche•38m ago•0 comments

Ask HN: Best Email AI Assistant?

2•watson•40m ago•1 comments

The Arctic: Where Drones Drop Dead and GPS Goes Haywire

https://www.wsj.com/world/where-drones-drop-dead-and-gps-goes-haywire-8e560e87
3•bookofjoe•40m ago•1 comments

How the CPython Compiler Works

https://tenthousandmeters.com/blog/python-behind-the-scenes-2-how-the-cpython-compiler-works/
2•fanf2•40m ago•0 comments

Bauhaus Clock – Most Elegant Clock Screensaver for Mac

https://bauhausclock.com/
2•tambourine_man•42m ago•0 comments

Show HN: Design your own post-AGI civilization with tradeoffs

https://agi.instavm.io
1•thepoet•44m ago•0 comments
Open in hackernews

Gpg.fail

https://gpg.fail
84•todsacerdoti•2h ago

Comments

rurban•2h ago
Zero-days from the CCC talk https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/...

But trust in Werner Koch is gone. Wontfix??

corndoge•1h ago
I am curious what you mean by "trust in Werner Koch is gone". Can you elaborate?
karambahh•1h ago
OP is complaining about GPG team rejecting issues with "wontfix" statuses.
cpach•1h ago
To be frank, at this point, GPG has been a lost cause for basically decades.

People who are serious about security use newer, better tools that replace GPG. But keep in mind, there’s no “one ring to rule them all”.

GaryBluto•1h ago
> brb, were on it!!!!
WesolyKubeczek•1h ago
gpg.fail fail: "brb, we're on it!"
_haxx0rz•1h ago
hug of death?
karambahh•1h ago
Considering it's on cloudflare, probably just switching from their initial rebroadcast of the talk to the actual content referenced in the slides (such as https://gpg.fail/clearsig for instance)
rurban•1h ago
Nope. Not yet enabled. It was submitted to HN right after the talk where they promised to make it public "really soon" after the talk. We all saw the talk live or on the stream
smallerize•1h ago
Seems to be down? Here's a thread with a summary of exploits presented in the talk: https://bsky.app/profile/filippo.abyssdomain.expert/post/3ma...
orblivion•1h ago
Maybe the site is overloaded. But as for the "brb, were on it!!!!" - this page had the live stream of the talk when it was happening. Hopefully they'll replace it with the recording when media.ccc.de posts it, which should be within a couple hours.
karambahh•1h ago
Also expect contents referred in the slides (every "chapter" of the presentation referred to a url such as https://gpg.fail/clearsig or https://gpg.fail/minisig and so on)
kleiba•53m ago
> this page had the live stream of the talk when it was happening

As they said, they were on it...

selfbottle•42m ago
it's online now
orblivion•17m ago
Took me a second but I got your joke
elric•1h ago
This is depressing.

From what I can piece together while the site is down, it seems like they've uncovered 14 exploitable vulnerabilities in GnuPG, of which most remain unpatched. Some of those are apparently met by refusal to patch by the maintainer. Maybe there are good reasons for this refusal, maybe someone else can chime in on that?

Is this another case of XKCD-2347? Or is there something else going on? Pretty much every Linux distro depends on PGP being pretty secure. Surely IBM & co have a couple of spare developers or spare cash to contribute?

collinfunk•1h ago
Haven't read it since it is down, but based on other comments, it seems to be an issue with cleartext signatures.

I haven't seen those outside of old mailing list archives. Everyone uses detached signatures nowadays, e.g. PGP/MIME for emails.

bytehamster•1h ago
If I understood their first demo correctly, they verified a fedora iso with a detached signature. The booted iso then printed "hello 39c3". https://streaming.media.ccc.de/39c3/relive/1854
unscaled•49m ago
It was a cleartext signature, not a detached signature.

Edit: even better. It was both. There is a signature type confusion attack going on here. I still didn't watch the entire thing, but it seems that unlike gpg, they do have to specify --cleartext explicitly for Sequoia, so there is no confusion going on that case.

singpolyma3•1h ago
AFAICT this is GnuPG specific and not OpenPGP related? Since GnuPG has pulled out of standards compliance anyway there are many better options. Sequoia chameleon even has drop in tooling for most workflows.
rurban•1h ago
They presented critical parser flaws in all major PGP implementations, not just GNU PGP, also sequoia, minisign and age. But gpg made the worst impression to us. wontfix
somethrowa123•1h ago
no, some clearsig issues are a problem in openpgp standard itself
derleyici•1h ago
Werner Koch from GnuPG recently (2025-12-26) posted this on their blog: https://www.gnupg.org/blog/20251226-cleartext-signatures.htm...

Archive link: https://web.archive.org/web/20251227174414/https://www.gnupg...

woodruffw•1h ago
This feels pretty unsatisfying: something that’s been “considered harmful” for three decades should be deprecated and then removed in a responsible ecosystem.

(PGP/GPG are of course hamstrung by their own decision to be a Swiss Army knife/only loosely coupled to the secure operation itself. So the even more responsible thing to do is to discard them for purposes that they can’t offer security properties for, which is the vast majority of things they get used for.)

LtWorf•57m ago
Well python discarded signing entirely so that's one way to solve it :)
woodruffw•51m ago
Both CPython and distributions on PyPI are more effectively signed than they were before.

(I think you already know this, but want to relitigate something that’s not meaningfully controversial in Python.)

cpach•48m ago
GPG is indeed deprecated.

Most people have never heard of it and never used it.

woodruffw•45m ago
Can you provide a source this? To my understanding, the GnuPG project (and by extension PGP as an ecosystem) considers itself very much alive, even though practically speaking it’s effectively moribund and irrelevant.

(So I agree that it’s de facto dead, but that’s not the same thing as formal deprecation. The latter is what you do explicitly to responsibly move people away from something that’s not suitable for use anymore.)

hendi_•8m ago
"his" blog.
clacker-o-matic•47m ago
its back up!
selfbottle•42m ago
writeups are online :))
somethrowa123•40m ago
the writeup is now available and the recording lives at https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical...
oefrha•37m ago
Okay, since there’s so much stuff to digest here and apparently there are issues designated as wontfix by GnuPG maintainers, can someone more in the loop tell us whether using gpg signatures on git commits/tags is vulnerable? And is there any better alternative going forward? Like is signing with SSH keys considered more secure now? I certainly want to get rid of gpg from my life if I can, but I also need to make sure commits/tags bearing my name actually come from me.
larusso•28m ago
I did the switch this year after getting yet another personal computer. I have 4 in total (work laptop, personal sofa laptop, Mac Mini, Linux Tower). I used Yubi keys with gpg and resident ssh keys. All is fine but the configuration needed to get it too work on all the machines. I also tend to forget the finer details and have to relearn the skills of fetching the public keys into the keychain etc. I got rid of this all by moving to 1Password ssh agent and git ssh signing. Removes a lot of headaches from my ssh setup. I still have the yubi key(s) though as a 2nd factor for certain web services. And the gpg agent is still running but only as a fallback. I will turn this off next year.
hk1337•4m ago
> 1Password ssh agent and git ssh signing

I’m still working through how to use this but I have it basically setup and it’s great!

SSLy•32m ago
https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical...