frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: HAPI - Vibe Coding Anytime, Anywhere

https://github.com/tiann/hapi
1•weishu•1m ago•0 comments

Show HN: Ferrite – Markdown editor in Rust with native Mermaid diagram rendering

https://github.com/OlaProeis/Ferrite
1•OlaProis•4m ago•0 comments

U.S. airstrikes hit ISIS targets in Syria, officials say

https://www.cbsnews.com/news/us-airstrikes-isis-targets-syria-central-command/
1•mhb•6m ago•0 comments

Cybercriminals stole the sensitive information of 17.5M Instagram users

https://bsky.app/profile/malwarebytes.com/post/3mbywfybiil26
3•gnabgib•7m ago•0 comments

Synthetic.new <3 OpenCode

https://synthetic.new/blog/2026-01-10-synthetic-heart-opencode
5•reissbaker•9m ago•0 comments

Check Out PCWorld's New Linux Podcast, the Dual Boot Diaries

https://www.pcworld.com/article/2888221/check-out-pcworlds-new-linux-podcast.html
1•jcurbo•11m ago•0 comments

What the AI Wizard taught us about LLM code generation at scale

https://posthog.com/blog/correct-llm-code-generation
1•Twixes•12m ago•0 comments

A Wig Maker Behind Many Hollywood Illusions

https://www.nytimes.com/2026/01/09/style/wigs-celebrities-red-carpet.html
2•whack•13m ago•0 comments

Show HN: Tatuagem, a boastful code signature suite

https://github.com/juleshenry/tatuagem
1•juleshenry•13m ago•0 comments

Trump announces one-year 10% cap on credit card interest rates

https://www.theguardian.com/us-news/2026/jan/10/trump-credit-card-interest-rate-cap
1•geox•14m ago•0 comments

Purdue University adds AI learning requirement for incoming students

https://www.wfyi.org/news/articles/purdue-university-adds-ai-learning-requirement-for-incoming-st...
2•gnabgib•19m ago•0 comments

Show HN: Fast, Low cost Pay as you go PDF API for HTML, Markdown and images

https://podpdf.com/
1•zameermfm•20m ago•0 comments

Show HN: Non-terminating response loop in Gemini Chat interface

https://gemini.google.com/share/03b40438aaa0
1•joebig•30m ago•1 comments

UK to Create New Fast-Track Residency Path for High-Earners

https://www.bloomberg.com/news/articles/2025-11-20/uk-will-allow-high-earners-faster-settlement-u...
1•mooreds•31m ago•1 comments

Bob Weir – RIP

https://www.nytimes.com/2026/01/10/obituaries/bob-weir-dead-grateful-dead.html
1•cjdentra•33m ago•1 comments

Shopify: What Is Dynamic Pricing? How It Works and Examples

https://www.shopify.com/enterprise/blog/102104006-dynamic-pricing-the-art-and-black-magic-of-situ...
4•hnburnsy•38m ago•3 comments

An Instagram data breach reportedly exposed the personal info of 17.5M users

https://www.engadget.com/cybersecurity/an-instagram-data-breach-reportedly-exposed-the-personal-i...
1•iamben•38m ago•0 comments

Trump Is Briefed on Options for Striking Iran as Protests Continue

https://www.nytimes.com/2026/01/10/us/politics/trump-iran-strikes.html
1•ent101•41m ago•0 comments

Replit Boss: CEOs Can Vibe Code Ideas Themselves Without Engineers

https://www.businessinsider.com/replit-ceo-vibe-coding-ideas-prototypes-without-engineers-ai-tool...
5•ivewonyoung•41m ago•0 comments

Kodbox: Open-source cloud desktop with multi-storage fusion and web IDE

https://github.com/kalcaddle/kodbox
2•indigodaddy•41m ago•0 comments

Big Ball of Mud (1999)

http://laputan.org/mud/
3•sea-gold•46m ago•1 comments

Show HN: A task-based workflow manager for bspwm – tasks as desktops

https://github.com/magik6k/taskwm
1•devttyeu•47m ago•0 comments

Grateful Dead co-founder Bob Weir has died at age 78

https://www.rollingstone.com/music/music-news/bob-weir-grateful-dead-dead-obituary-1234810106/
8•asix66•49m ago•2 comments

Show HN: Epstein IM, talk to Epstein clone in iMessage

https://epstein.im/
2•RyanZhuuuu•56m ago•1 comments

Show HN: Desktop weather widget for Windows with short-term rain nowcasting

https://github.com/malkosvetnik/desktop-weather-widget
1•malkosvetnik•58m ago•0 comments

YouTube has removed the ability to search by upload date

https://twitter.com/TeamYouTube/status/2009744367834022320
4•sergiotapia•1h ago•0 comments

"I Know I'm Not Going to Win": Why People Set Out on Impossible Quests

https://thewalrus.ca/why-people-set-out-on-impossible-quests/
2•pseudolus•1h ago•0 comments

Steve Jobs introduced MacBook Pro 20 years ago at Macworld San Francisco 2006

https://www.youtube.com/watch?v=I6JWqllbhXE
3•7777777phil•1h ago•4 comments

Employees Are Using AI

https://guardianhealth.dev/blog/employees-already-using-ai/
1•rndkeithw•1h ago•1 comments

Show HN: I made 25 tech predictions and mass-published them

2•JoseOSAF•1h ago•1 comments
Open in hackernews

New information extracted from Snowden PDFs through metadata version analysis

https://libroot.org/posts/going-through-snowden-documents-part-4/
281•libroot•14h ago

Comments

pfisherman•12h ago
Can someone spell out how this is possible? Do pdfs store a complete document version history? Do they store diffs in the metadata? Does this happen each time the document is edited?
alhirzel•12h ago
PDFs are just a table of objects and tree of references to those objects; probably, prior versions of the document were expressed in objects with no references or something like that.
flotzam•12h ago
At the bottom of the page there's a link to the pdfresurrect package, whose description says

"The PDF format allows for previous changes to be retained in a revised version of the document, thereby keeping a running history of revisions to the document.

This tool extracts all previous revisions while also producing a summary of changes between revisions."

QuantumNomad_•6h ago
Neat!

https://github.com/enferex/pdfresurrect

aidos•12h ago
You can replace objects in PDF documents. A PDF is mostly just a bunch of objects of different types so the readers know what to do with them. Each object has a numbered ID. I recommend mutool for decompressing the PDF so you can read it in a text editor:

    mutool clean -d in.pdf out.pdf
If you look below you can see a Pages list (1 0 obj) that references (2 0 R) a Page (2 0 obj).

    1 0 obj
    <<
      /Type /Pages
      /Count 1
      /Kids [ 2 0 R ]
    >>
    endobj

    2 0 obj
    <<
      /Type /Page
      /Contents 5 0 R
      ...
    >>
    endobj
Rather than editing the PDFs in place, it's possible to update these objects to overwrite them by appending a new "generation" of an object. Notice the 0 has been incremented to a 1 here. This allows leaving the original PDF intact while making edits.

    1 1 obj
    <<
      /Type /Pages
      /Count 2
      /Kids [ 2 0 R 200 0 R ]
    >>
    endobj
You can have anything inside a PDF that you want really and it could be orphaned so a PDF reader never picks up on it. There's nothing to say an object needs to be referenced (oh, there's a "trailer" at the end of the PDF that says where the Root node is, so they know where to start).
SeriousM•10h ago
To put it reaaaaaly simple, a PDF is like a notion document (blocks and bricks) with a git-like object graph?
aidos•10h ago
Ha! As if anything about Notion is simple.

But yeah. It's all just objects pointing at each other. It's mostly tree structured, but not entirely. You have a Catalog of Pages that have Resources, like Fonts (that are likely to be shared by multiple pages hence, not a tree). Each Page has Contents that are a stream of drawing instructions.

This gives you a sense of what it all looks like. The contents of a page is a stack based vector drawing system. Squint a little (or stick it through an LLM) and you'll see Tf switches to Font F4 from the resources at size 14.66, Tj is placing a char at a position etc.

    2 0 obj
    <<
      /Type /Page
      /Resources <<
        /Font <<
          /F4 4 0 R
        >>
      >>
      /Contents 5 0 R
    >>
    endobj

    5 0 obj
    <<
      /Length 340
    >>
    stream
    q
    BT
    /F4 14.66 Tf
    1 0 0 -1 0 .47981739 Tm
    0 -13.2773438 Td <002B> Tj
    10.5842743 0 Td <004C> Tj
    ET
    Q...
    endstream
    endobj
I'm going to hand wave away the 100+ different types of objects. But at it's core it's a simple model.
pfisherman•10h ago
Thanks for the technical explanation! This is pretty fascinating.

So it works kind of like a soft delete — dereference instead of scrubbing the bits.

Is this behavior generally explicitly defined in PDF editors (i.e. an intended feature)? Is it defined in some standard or set of best practices? Or is it a hack (or half baked feature) someone implemented years ago that has just kind of stuck around and propagated?

clord•9h ago
The intention is to make editing easy and quick on slow and memory deficient computers. This is how for example editing a pdf with form field values can be so fast. It’s just appending new values for those nodes. If you need to omit edits you’d have to regenerate a fresh pdf from the root.
1317•8h ago
https://hackerfactor.com/blog/index.php?/archives/1085-A-Typ...
alhirzel•12h ago
There needs to be better tooling for inspecting PDF documents. Right now, my needs are met by using `qpdf` to export QDF [1], but it is just begging for a GUI to wrap around it...

[1] https://qpdf.readthedocs.io/en/stable/qdf.html

soared•9h ago
In what contest do you use that tool? Looks like that page is primarily about editing pdfs using that format rather than inspecting.

Very tempting to fool around with the ideas especially after the Epstein pdf debacle.

piffey•6h ago
Take a look at the REMNux reverse engineering page for PDF documents (https://docs.remnux.org/discover-the-tools/analyze+documents...). Lots of tools here for looking at malicious PDFs that can be used to inspect/understand even non-malicious documents.
treetalker•11h ago
% pdfresurrect -w epsteinfiles.pdf
cypherpunks01•9h ago
Anyone tried this?
snek_case•8h ago
Weekend project?
jokoon•11h ago
I have read claims that there were fake documents inserted in those leaks, who aimed at pushing disinformation.
firefax•11h ago
Maybe you should include a source, especially if you're making claims about alleged "disinformation"? :-)
nkrisc•10h ago
That itself would be a very convenient lie if the disclosures were damaging or embarrassing.
Ms-J•11h ago
This is insightful work, great job.

Recently someone else revisited the Snowden documents and also found more info, but I can't recall the exact details.

Snowden and the archives were absolute gifts to us all. It's a shame he didn't release everything in full though.

libroot•10h ago
Thank you. The most recent completely new information from the Snowden files is found in Jacob Appelbaum's 2022 thesis[1], in which he revealed information that had not been previously public (not found on any previously published documents and so on). And AFAIK, the most recent new information from the published documents (along with this post) might actually be in our other posts[2], but there might be some others we aren't aware of.

[1]: https://www.electrospaces.net/2023/09/some-new-snippets-from...

[2]: Part 2: https://libroot.org/posts/going-through-snowden-documents-pa...

and part 3: https://libroot.org/posts/going-through-snowden-documents-pa...

password4321•10h ago
The "print and scan physical papers back to a PDF of images" technique for final release is looking better and better from an information protection perspective.
cookiengineer•9h ago
> The "print and scan physical papers back to a PDF of images" technique for final release is looking better and better from an information protection perspective.

Note that all (edit: color-/ink-) printers have "invisible to the human eye" yellow dotcodes, which contain their serial number, and in some cases even the public IP address when they've already connected to the internet (looking at you, HP and Canon).

So I'd be careful to use a printer of any kind if you're not in control of the printer's firmware.

There's lots of tools that started to decode the information hidden in dotcodes, in case you're interested [1] [2] [3]

[1] https://github.com/Natounet/YellowDotDecode

[2] https://github.com/mcandre/dotsecrets

[3] (when I first found out about it in 2007) https://fahrplan.events.ccc.de/camp/2007/Fahrplan/events/197...

everdrive•9h ago
>Note that all printers have "invisible to the human eye" yellow dotcodes, which contain their serial number, and in some cases even the public IP address when they've already connected to the internet (looking at you, HP and Canon).

I've got a black and white brother printer which uses toner. Is there something similar for this printer?

gramie•9h ago
I believe that this only exists for colour printers. The official reasoning was to trace people counterfeiting money.
cookiengineer•9h ago
> black and white brother printer

excellent choice, that's what I am using. Also it's Linux / CUPS compatible and without a broken proprietary rasterizer.

contingencies•9h ago
Same thing here. A few years ago I bought three brands of printer-scanner combos for our R&D office, returned the others. Brother was the least broken despite still not being perfect. Issues include broken scanning drivers and fake toner warnings at ~1/3 level.
nwallin•8h ago
It's only there for color printers.

A tiny yellow dot on white paper is basically invisible to the human eye. Yellow ink absorbs blue light and no other light, and human vision is crap at resolving blue details.

A tiny black dot on white paper sticks out like a sore thumb.

IshKebab•7h ago
Yes, the data can be embedded by modulating the laser.

But I've only seen research showing that it's possible. As far as I know nobody has demonstrated whether actual laser printers use that technique or not.

mmh0000•7h ago
If you have a UV flashlight, these dots are visible with decent vision.

And of course we have to include the Wikipedia entry:

https://en.wikipedia.org/wiki/Printer_tracking_dots

culi•7h ago
And also EFF's attempt to track all printers that do or do not display tracking dots which they eventually prepended with

> (Added 2015) Some of the documents that we previously received through FOIA suggested that all major manufacturers of color laser printers entered a secret agreement with governments to ensure that the output of those printers is forensically traceable.

> This list is no longer being updated.

https://www.eff.org/pages/list-printers-which-do-or-do-not-d...

emptybits•7h ago
Thanks for the links but can you share evidence for the "public IP address" claim? Each time I've read this concept (intriguing! possible!), I search for evidence and I can't find any.

The MIC and yellow dots have been studied and decoded by many and all I've ever seen, including at your links, are essentially date + time + serial#.

Don't get me wrong ... stamping our documents with a fingerprint back to our printers and adding date and time is nasty enough. I don't see a need to overstate the scope of what is shared though.

culi•7h ago
That's why I'm (still) waiting on this https://www.crowdsupply.com/open-tools/open-printer

It's mindboggling how much open-source 3d printing stuff is out there (and I'm grateful for it) but this is completely lacking in the 2d printing world

octoberfranklin•5h ago
Sorry, you have been blocked You are unable to access crowdsupply.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.

What can I do to resolve this? You can email the site owner to let them know you were blocked. Please include what you were doing when this page came up and the Cloudflare Ray ID found at the bottom of this page.

Cloudflare Ray ID: 9bbed59d7bcd9dfc • Performance & security by Cloudflare

askvictor•4h ago
Could this be circumvented by randomly (or not-so-randomly) adding single-pixel yellow dots to the data sent to the printer?
tester756•9h ago
Why not just make screenshoot of every PDF page?
jeffbee•9h ago
It could still be identifiable, for example if the document has been prepared such that the intended recipient's identity is encoded into subtle modulation of the widths of spaces.
sincerely•9h ago
Print and re-scan wouldn’t fix that though.
jeffbee•9h ago
That was my point. If you want to erase its origin you need to semantically extract the contents and reduce them to their most basic representation.
tester756•8h ago
Sure, but all those not-essential information hidden in PDFs format are removed
yyyk•7h ago
That's outside this threat model? The idea here is trying to foil outside analysis, not limit the document authors (which are allowed to add/update and even write openly 'the intended recipient's identity').
idiotsecant•5h ago
In PDF file format?
emeril•9h ago
I suppose I'd just save the pdf to tiff/png then remake back into a pdf from there to avoid printing and scanning?

if really paranoid, I suppose one could run a filter on the image files to make them a bit fuzzy/noisy

maximilianthe1•7h ago
I think "Print to PDF" would be easiest
bawolff•5h ago
I'd worry print to pdf might be ineffective. I think rasterizing is the way to go.
JumpinJack_Cash•9h ago
Is there a multifunction B&W printer which prints and then automatically positions the paper on the scanner and scans?
dredmorbius•7h ago
Far more straightforward to print a stack, then feed that stack through the copier/scanner.
IshKebab•7h ago
You don't need to actually print and scan. Just convert to a raster format like PNG.
iAMkenough•7h ago
Then use OCR to convert it back from raster for Section 508 compliance. All the existing work to make handwritten pages and visuals compliant would have to be redone after converting to raster.
dredmorbius•5h ago
Given issues with fully-electronic conversion, passing through a paper phase tends to guard against foul-ups. It's tangible and demonstrable. People ... take short-cuts, which is why we're having this discussion.
iAMkenough•7h ago
That'd be fun to make Section 508 compliant at mass scale.
notepad0x90•6h ago
a better approach is to convert them to jpeg/png. Then convert that to raw BMP, and then share or print that.

A more modern approach for text documents would be to have an LLM read and rephrase, and restructure everything without preserving punctuation and spacing, using a simple encoding like utf-8, and then use the technique above or just take analog pictures of the monitor. The analog (film) part protects against deepfakes and serves as proof if you need it (for the source and final product alike).

There various solutions out there after the leaks that keep happening where documents and confidential information is served/staged in a way that will reveal the person with who it is shared. Even if you copy paste the text into notepad and save it in ascii format, it will reveal you. Off-the-shelf printers are of course a big no-no.

If all else fails, that analog picture technique works best for exfil, but the final thing you share will still track back to you. I bet spies are back to using microfilms these days.

I only say all of that purely out of a fascination into the subject and for the sake of discussion (think like a thief if you want to catch one and all). Ultimately, you shouldn't share private information with unauthorized parties, period. Personal or otherwise. If you, like snowden, feel that all lawful means are exhausted and that is your only option to address some grievance, then don't assume any technique or planning will protect you, if it isn't worth the risk of imprisonment, then you shouldn't be doing it anyways. Assume you will be imprisoned or worse.

londons_explore•10h ago
So this is almost certainly redaction by the journalists?

It is disappointing they didn't mark those sections "redacted", with an explanation of why.

It is also disappointing they didn't have enough technical knowhow to at least take a screenshot and publish that rather than the original PDF which presumably still contains all kinds of info in the metadata.

libroot•10h ago
Yes, the journalists did the redactions. The metadata timestamps in one of the documents show that the versions were created three weeks before the publication.

And to be honest, the journalists generally have done a great work on pretty much in all the other published PDFs. We've went through hundreds and hundreds of the published documents, and these two documents were pretty much the only ones which had metadata leak by a mistake revealing something significant (there are other documents as well with metadata leaks/failed redactions, but nothing huge). Our next part will be a technical deep-dive on PDF forensic/metadata analysis we've done.

DANmode•7h ago
Great work, great comment.

Thank you.

layer8•9h ago
These PDFs apparently used the “incremental update” feature of PDF, where edits to the document are merely appended to the original file.

It’s easy to extract the earlier versions, for example with a plain text editor. Just search for lines starting with “%%EOF”, and truncate the file after that line. Voila, the resulting file is the respective earlier PDF version.

(One exception is the first %%EOF in a so-called linearized PDF, which marks a pseudo-revision that is only there for technical reasons and isn’t a valid PDF file by itself.)

ajross•9h ago
It's hilarious the extent to which Adobe Systems's ridiculously futile attempt to chase MS Word features ended up being the single most productive espionage tool of the last quarter century.
layer8•9h ago
I don’t think this was particularly modeled on MS Word. The incremental update feature was introduced with PDF 1.2 in 1996. It allows to quickly save changes without having to rewrite the whole file, for example when annotating a PDF.

Incremental updates are also essential for PDF signatures, since when you add a subsequent signature to a PDF, you couldn’t rewrite the file without breaking previous signatures. Hence signatures are appended as incremental updates.

cubefox•8h ago
I'm pretty sure you can change various file formats without rewriting the entire file and without using "incremental updates".
mattzito•8h ago
No, if you are going to change the structure of a structured document that has been saved to disk, your options are:

1) Rewrite the file to disk 2) Append the new data/metadata to the end of the existing file

I suppose you could pre-pad documents with empty blocks and then go modify those in situ by binary editing the file, but that sounds like a nightmare.

cubefox•8h ago
Aren't there file systems that support data structures which allow editing just part of the data, like linked lists?
layer8•8h ago
Look at the C file API which most software is based on, it simply doesn’t allow it. Writing at a given file position just overwrites existing content. There is no way to insert or remove bytes in the middle.

Apart from that, file systems manage storage in larger fixed-size blocks (commonly 4 KB). One block typically links to the next block (if any) of the same file, but that’s about the extent of it.

anthk•1h ago
DD should.
formerly_proven•7h ago
No. Well yes. On mainframes.

This is why “table of contents at the end” is such an exceedingly common design choice.

PhilipRoman•6h ago
Yeah there are, Linux supports parameters FALLOC_FL_INSERT_RANGE and FALLOC_FL_COLLAPSE_RANGE for fallocate(2). Like most fancy filesystem features, they are not used by the vast majority of software because it has to run on any filesystem so you'd always need to maintain two implementations (and extensive test cases).
cubefox•6h ago
Interesting that after decades of file system history, this is still considered a "fancy feature", considering that editing files is a pretty basic operation for a file system. Though I assume there are reasons why this hasn't become standard long ago.
layer8•5h ago
File systems aren’t databases; they manage flat files, not structured data. You also can’t just insert/remove random amounts of bytes in RAM. The considerations here are actually quite similar, like fragmentation. If you make a hundred small edits to a file, you might end up with the file taking up ten times as much space due to fragmentation, and then you’d need the file system to do some sort of defragmentation pass to rewrite the file more contiguously again.

In addition, it’s generally nontrivial for a program to map changes to an in-memory object structure back to surgical edits of a flat file. It’s much easier to always just serialize the whole thing, or if the file format allows it, appending the serialized changes to the file.

PhilipRoman•5h ago
Indeed, also userspace-level atomicity is important, so you probably want to save a backup in case power goes out at an unfortunate moment. And since you already need to have a backup, might as well go for a full rewrite + rename combo.
formerly_proven•5h ago
What this does on typical extent-based file systems is split the extent of the file at the given location (which means these operations can only be done with cluster granularity) and then insert a third extent. i.e. calling INSERT_RANGE once will give you a file with at least three extents (fragments). This, plus the mkfs-options-dependent alignment requirements, makes it really quite uninteresting for broad use in a similar fashion as O_DIRECT is uninteresting.
altfredd•1h ago
They are fully supported almost everywhere. XFS, ext4, tmpfs, f2fs and a bunch of misc filesystems all support them.

Ext4 support dates as early as Linux 3.15, released in 2014. It is ancient at this point!

layer8•8h ago
You can’t insert data into the middle of a file (or remove portions from the middle of a file) without either rewriting it completely, or at least rewriting everything after the insertion point; the latter requires holding everything after the insertion point in memory (or writing it out to another file first, then reading it in and writing it out again).

PDF is designed to not require holding the complete file in memory. (PDF viewers can display PDFs larger than available memory, as long as the currently displayed page and associated metadata fits in memory. Similar for editing.)

maweki•5h ago
While tedious, you can do the rewrite block-wise from the insertion point and only store a an additional block's worth of the rest (or twice as much as you inserted)

ABCDE, to insert 1 after C: store D, overwrite D with 1, store E, overwrite E with D, write E.

bahmboo•4h ago
This was 1996. A typical computer had tens of megabytes of memory with throughput a fraction of what we have today. Appending an element instead of reading, parsing, inserting and validating the entire document is a better solution in so many ways. That people doing redactions don't understand the technology is a separate problem. The context matters.
ajross•6h ago
PDF files are for storing fixed (!!) output of printed/printable material. That's where the format's roots are via Postscript, it's where the format found its main success in document storage, and it's the metaphor everyone has in mind when using the format.

PDFs don't change. PDFs are what they look like.

Except they aren't, because Adobe wanted to be able to (ahem) "annotate" them, or "save changes" to them. And Adobe wanted this because they wanted to sell Acrobat to people who would otherwise be using MS Word for these purposes.

And in so doing, Adobe broke the fundamental design paradigm of the format. And that has had (and continues to have, to hilarious effect) continuing security impact for the data that gets stored in this terrible format.

detourdog•3h ago
When Acrobat came out cross platform was not common. Being able to publish a document that could be opened on multiple platforms was a big advantage. I was using it to distribute technical specifications in the mid 90's. Different pages of these specifications came from, Filemaker, Excel, Word, Mini-Cad, Photoshop, Illustrator, and probably other applications as well. We would combine these into a single PDF file. This simplified version control. This also meant that bidders could not edit the specifications.

None of that could be accomplished with Word alone. I think you are underestimating the qualities of PDF for distribution of complex documents.

ajross•27m ago
> This also meant that bidders could not edit the specifications.

But they can! That's the bug, PDF is a mutable file format owing to Adobe's muckery. And you made the same mistake that every government redactor and censor (up to and including the ?!@$! NSA per the linked article) has in the intervening decades.

The file format you thought you were using was a great fit for your problem, and better than MS Word. The software Adobe shipped was, in fact, something else.

theturtletalks•5h ago
New OSINT skill unlocked
toomuchtodo•4h ago
I see an interesting parallel to how people think about captured encrypted data, and how long that encryption needs to be effective for until technology catches up and can decrypt (by which point, hopefully the decrypted data is worthless). If all of these documents are stored in durable archives, future methodologies may arrive to extract value or intelligence not originally available at the time of capture and disclosure.
theturtletalks•4h ago
> If all of these documents are stored in durable archives, future methodologies may arrive to extract value or intelligence not originally available at the time of capture and disclosure.

I recently learned that some people improve or brush up on their OSINT skills by trying to find missing people!

c-c-c-c-c•9h ago
> We contacted Ryan Gallagher, the journalist who led both investigations, to ask about the editorial decision to remove these sections. After more than a week, we have not received a response.

Hopefully we'll hear something now that the Christmas holidays are over.

echelon•8h ago
Why are the journalists redacting the docs? That's incredibly puzzling.

Is there something in here so damaging that they refuse to publish it?

Did the government tell them they'd be in trouble if they published it?

Are the journalists the only ones with access to the raw files?

nacozarina•7h ago
Traditionally an editor would be obligated to review the material and redact info that could be harmful to others. The publisher has distinct liability independent of govt opinion.
mlmonkey•12m ago
> and redact info that could be harmful to others.

of course, these concerns are only applicable when these "others" are Americans and the American institutions.

Everybody else can just fend for themselves.

Whats good for the goose, should be good for the gander. If American journalists feel like there is no problem with disclosing secrets of, say, Maduro, then they should not be protecting people like Trump (just as an example).

tolerance•8h ago
How much of this research and review is hands-on and how much of it is—ahem—machine assisted?
rendx•6h ago
Are you asking how much was done with pen and paper, and how much of it was done on a computer, i.e. machine assisted? Where do you draw the line? How is "hands-on" in contrast to anything? Is it only "hands-on" when you don't use any tool to assist you?

I suspect you're inquiring about the use of LLMs, and about that I wonder: Why does it matter? Why are you asking?

tolerance•4h ago
First thanks for taking my question seriously and not as just a rib and asking a lot of questions in return that I want to consider myself.

By "hands-on" I'm asking whether the provided insight is the product of human intellection. Experienced, capable and qualified. Or at least an earnest attempt at thinking about something and explaining the discoveries in the ways that thinking was done before ChatGPT. For some reason I find myself using phrases involving the hands (etc. hands-on, handmade, hand-spun) as a metaphor for work done without the use of LLMs.

I emphasize insight because I feel like the series of work on the Snowden documents by libroot is wanting in that. I expressed as much the last time their writing hit the front page: <https://news.ycombinator.com/item?id=46236672>.

These are summaries. I don't think that it yields information that can't otherwise be pointed out and made mention of by others; presumably known and reputable. With as high-profile of an event that this is I'd expect someone covering it almost 16 years later to tell us beyond what when judged on the merit of its import amounts to a motivated section of the ‘Snowden disclosures’ Wikipedia entry.

The discussion that this series invites typically is centered around people's thoughts about the story of the Snowden documents in general, and in this case exchanges about technical aspects like how PDF documents work and can be manipulated in general. The one comment that I feel addresses the actual tension embedded in the article—"Who edited the documents?"—leads to accusations that the documents were tampered with by the media: <https://news.ycombinator.com/item?id=46566372>. I don't think that that's an implausible claim but I find issue with it being made with such confidence by the anonymous source behind the investigations (I'm withholding ironically putting "investigations" in...nevermind).

If the author actually provided something that advanced to the reader why this information is significant, what to do with or think about it and how they came about discovering the answers to the aforementioned 'why' and ‘what’ and additionally why they’re word ought to matter to us at all, I'd be less inclined to speculate that this is just someone vibe sleuthing their way through documents that on the surface are only significant to the public as the claim "the government is spying on you" is.

This particular post uncovers some nice information. It's a great find. I'm in no position to investigate whether it was already known. But what are we supposed to learn from it aside from "one of the documents were changed before it was made public". What's significant about the redaction? Is Ryan Gallagher responsible? Or does he know who is. Is he at all obliged to explain this to a presumably anonymous inquirer? Or is it now the duty of the public to expect an explanation as affected by said anonymous inquirer?

Remember when believing that the government was rife with pedophiles automatically associated you with horn-helmet-wearing insurrectionists?

pseudosavant•6h ago
In addition to the print paper and scan approach, I do wonder how effective it would be to “Print to XPS” and then “print” that into a PDF.
bawolff•5h ago
Its crazy this is just being discovered now.
chatmasta•4h ago
I wonder if it’s because of all the attention on the Epstein PDF files.