frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Goldman Sachs taps Anthropic's Claude to automate accounting, compliance roles

https://www.cnbc.com/2026/02/06/anthropic-goldman-sachs-ai-model-accounting.html
2•myk-e•2m ago•1 comments

Ai.com bought by Crypto.com founder for $70M in biggest-ever website name deal

https://www.ft.com/content/83488628-8dfd-4060-a7b0-71b1bb012785
1•1vuio0pswjnm7•2m ago•1 comments

Big Tech's AI Push Is Costing More Than the Moon Landing

https://www.wsj.com/tech/ai/ai-spending-tech-companies-compared-02b90046
1•1vuio0pswjnm7•4m ago•0 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
1•1vuio0pswjnm7•6m ago•0 comments

Suno, AI Music, and the Bad Future [video]

https://www.youtube.com/watch?v=U8dcFhF0Dlk
1•askl•8m ago•0 comments

Ask HN: How are researchers using AlphaFold in 2026?

1•jocho12•11m ago•0 comments

Running the "Reflections on Trusting Trust" Compiler

https://spawn-queue.acm.org/doi/10.1145/3786614
1•devooops•16m ago•0 comments

Watermark API – $0.01/image, 10x cheaper than Cloudinary

https://api-production-caa8.up.railway.app/docs
1•lembergs•18m ago•1 comments

Now send your marketing campaigns directly from ChatGPT

https://www.mail-o-mail.com/
1•avallark•21m ago•1 comments

Queueing Theory v2: DORA metrics, queue-of-queues, chi-alpha-beta-sigma notation

https://github.com/joelparkerhenderson/queueing-theory
1•jph•33m ago•0 comments

Show HN: Hibana – choreography-first protocol safety for Rust

https://hibanaworks.dev/
5•o8vm•35m ago•0 comments

Haniri: A live autonomous world where AI agents survive or collapse

https://www.haniri.com
1•donangrey•35m ago•1 comments

GPT-5.3-Codex System Card [pdf]

https://cdn.openai.com/pdf/23eca107-a9b1-4d2c-b156-7deb4fbc697c/GPT-5-3-Codex-System-Card-02.pdf
1•tosh•48m ago•0 comments

Atlas: Manage your database schema as code

https://github.com/ariga/atlas
1•quectophoton•51m ago•0 comments

Geist Pixel

https://vercel.com/blog/introducing-geist-pixel
2•helloplanets•54m ago•0 comments

Show HN: MCP to get latest dependency package and tool versions

https://github.com/MShekow/package-version-check-mcp
1•mshekow•1h ago•0 comments

The better you get at something, the harder it becomes to do

https://seekingtrust.substack.com/p/improving-at-writing-made-me-almost
2•FinnLobsien•1h ago•0 comments

Show HN: WP Float – Archive WordPress blogs to free static hosting

https://wpfloat.netlify.app/
1•zizoulegrande•1h ago•0 comments

Show HN: I Hacked My Family's Meal Planning with an App

https://mealjar.app
1•melvinzammit•1h ago•0 comments

Sony BMG copy protection rootkit scandal

https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
2•basilikum•1h ago•0 comments

The Future of Systems

https://novlabs.ai/mission/
2•tekbog•1h ago•1 comments

NASA now allowing astronauts to bring their smartphones on space missions

https://twitter.com/NASAAdmin/status/2019259382962307393
2•gbugniot•1h ago•0 comments

Claude Code Is the Inflection Point

https://newsletter.semianalysis.com/p/claude-code-is-the-inflection-point
3•throwaw12•1h ago•2 comments

Show HN: MicroClaw – Agentic AI Assistant for Telegram, Built in Rust

https://github.com/microclaw/microclaw
1•everettjf•1h ago•2 comments

Show HN: Omni-BLAS – 4x faster matrix multiplication via Monte Carlo sampling

https://github.com/AleatorAI/OMNI-BLAS
1•LowSpecEng•1h ago•1 comments

The AI-Ready Software Developer: Conclusion – Same Game, Different Dice

https://codemanship.wordpress.com/2026/01/05/the-ai-ready-software-developer-conclusion-same-game...
1•lifeisstillgood•1h ago•0 comments

AI Agent Automates Google Stock Analysis from Financial Reports

https://pardusai.org/view/54c6646b9e273bbe103b76256a91a7f30da624062a8a6eeb16febfe403efd078
1•JasonHEIN•1h ago•0 comments

Voxtral Realtime 4B Pure C Implementation

https://github.com/antirez/voxtral.c
2•andreabat•1h ago•1 comments

I Was Trapped in Chinese Mafia Crypto Slavery [video]

https://www.youtube.com/watch?v=zOcNaWmmn0A
2•mgh2•1h ago•1 comments

U.S. CBP Reported Employee Arrests (FY2020 – FYTD)

https://www.cbp.gov/newsroom/stats/reported-employee-arrests
1•ludicrousdispla•1h ago•0 comments
Open in hackernews

FIPS dependencies and prebuilt binaries

https://www.docker.com/blog/fips-dependencies-and-prebuilt-binaries/
25•LaurentGoderre•2w ago
Author here. This came out of debugging a real Rails app running in a FIPS enabled container.

Everything looked correct. OpenSSL 3 with the FIPS provider enabled. Ruby built against it. A simple pg connection worked.

The app failed once ActiveRecord was involved. The error came from libpq. It turned out the pg gem had pulled in a prebuilt native dependency that was linked against different crypto. That path was always there. It just was not exercised until ActiveRecord hit it.

Forcing a source build fixed the issue because the extension then linked against the OpenSSL in the image.

The takeaway is that a FIPS base image does not mean your dependency graph respects the same boundary once native code is involved.

Curious how others have seen this play out in Ruby, Python wheels, Go with CGO, or Node native addons.

Comments

JasonADrury•2w ago
> FIPS compliance is a great idea that makes the entire software supply chain safer

Yes, gotta implement that Dual_EC_DRBG compatibility.

FIPS compliance is not a great idea, the benefits are questionable and possibly nonexistent. It's also significantly worse advice than simple "implement decent modern crypto", you can do all kinds of really bizarre stuff and still be FIPS compliant.

pixl97•2w ago
>FIPS compliance is not a great idea, the benefits are questionable and possibly nonexistent.

I counter about the benefits of FIPS. If you don't do it, you don't get paid by the government for whatever contract you have. Many people find getting paid to be beneficial.

Now, it's not the vast majority of applications, but I'm sure there are a significant number of developers on HN that are working on applications that need to meet FedRamp requirements and posts like this point out potential pitfalls on what needs enabled.

Not much different when dealing with stuff like STIGs. A large number of them are highly questionable and may only apply to very specific applications, yet you see barely trained button pushers saying you need to follow them. If you're aware of them when writing your application it will save a bunch of implementation headaches when it ends up in the field.

firesteelrain•2w ago
You can always waiver STIGs based on business or mission critical needs. You add it to your POA&M and/or SSP.

Not the entire RHEL STIG mind you but parts of it

pixl97•2w ago
Oh yeah, I know, but God getting exceptions is a pain in the ass.
JasonADrury•2w ago
>I counter about the benefits of FIPS. If you don't do it, you don't get paid by the government for whatever contract you have. Many people find getting paid to be beneficial.

I absolutely agree, but the OP does speak about making "the entire software supply chain safer" which is far from true.

tptacek•2w ago
I don't like FIPS and think people should avoid FIPS-compliance projects but FIPS doesn't require you to implement Dual EC.
JasonADrury•2w ago
Yeah, the first line was intended as a joke. I didn't communicate it very well though.

I think the problem with FIPS can be summed up very well as "it doesn't require you to implement good crypto", which makes it pointless and almost certainly harmful.

firesteelrain•2w ago
FIPS validates the crypto library, not your app design. It can still be a security upgrade for the crypto boundary, but you can build insecure stuff on top of it. The harm is when people treat “FIPS mode” as a magic security badge.
JasonADrury•2w ago
You can have an utterly broken crypto library that's FIPS compliant.

FIPS would be great if it actually explicitly required you to do things correctly, it does not.

firesteelrain•2w ago
FIPS 140 doesn’t prove ‘no bugs’, but it’s not meaningless either. It enforces a baseline around approved algorithms, RNG, key handling, self-tests, and module integrity. You can still misuse crypto or have non-crypto bugs, but ‘utterly broken and still FIPS’ is mostly rhetoric.
akerl_•2w ago
Why do I care if an algorithm is “approved”.
dragonwriter•2w ago
Are you in a contractual relationship with the federal government that involves handling federal data?

Alternatively, do you deal with HIPAA PHI (FIPS is—unless an update since the last time I checked has changed this—part of the HITECH Act guidance specification of whether PHI is secured or unsecured, and so is a factor in whether, legally, a breach has occurred.)

akerl_•2w ago
So I only care about it being approved if my customers are stipulating it; there’s not an inherent security value in “approved” algorithms?
dragonwriter•2w ago
Approval involves an assessment of security features, but it doesn’t change them, so the approval itself doesn't not have security value. Using it as part of a filter before choosing a solution may have efficiency benefits, though (assuming you are doing your own security assessment that has non-zero cost after the filter.)
akerl_•2w ago
I think we just fundamentally disagree about the quality of the “assessment” FIPS is doing.

Choosing to use FIPS is basically choosing to tether yourself to the finest decision-making that government agencies could muster based on the technology that existed decades ago.

You’re choosing to ride a horse to work because somebody whacked an “approved” brand on it. I’m sure it’s a very reliable horse, but unless somebody is paying me a lot of money to hold the reins, I’m going to opt to use the advances we’ve made as an industry since then

dragonwriter•2w ago
> I think we just fundamentally disagree about the quality of the “assessment” FIPS is doing.

I haven't said anything about the quality of the assessment done as part of FIPS approval. I think you are straining for things to disagree with.

> Choosing to use FIPS is basically choosing to tether yourself to the finest decision-making that government agencies could muster based on the technology that existed decades ago.

The current FIPS encryption standards and criteria were not decided decades ago, or based on technology adopted decades ago (FIPS 140-3 is 2019, SP 800-40 is 2023, etc.)

Beyond the basic idea of “Let’s have NIST establish standards in this area”, almost nothing is from “decades ago”.

tptacek•2w ago
It's not in fact a security upgrade for your crypto library. It might have been in 1992 when people were still building products based on hand-rolled polyalphabetic substitution ciphers, but that era ended before 2000.
direwolf20•2w ago
FIPS compliance should be used when the customer demands FIPS compliance, and at no other time. It does not make your software more secure. The federal government has many reasons for its Information Processing Standards, and actual security isn't high up the list.
firesteelrain•2w ago
That is backwards. NIST FIPS, especially FIPS 140, are explicitly security standards for cryptographic modules. They exist to define and validate security requirements and to give agencies a security metric for procurement. Security is central to the standard even if buyers also use it for compliance and contracting.
pseudohadamard•2w ago
And when has FIPS certification made a product more secure than the non-certified version? By which I mean, give examples of actual cases in which hackers were stopped by the expensive FIPS-certified version but not by the equivalent non-certified one.
firesteelrain•2w ago
Not really the right question. FIPS doesn’t stop ‘hackers’ like a forcefield. It’s a validated baseline for crypto modules (RNGs, key handling, approved modes, self-tests). The security win is fewer crypto footguns and more assurance, not a dramatic war story.
pseudohadamard•2w ago
It's exactly the right question, "what (demonstrable) value are you getting from this?". Having been through several FIPS certifications I can say that it added nothing to the security of the product, in fact if anything it reduced the security because of all the silly-walk stuff that had to be added. In particular the algorithm certs are essentially worthless because if you get (say) AES wrong you'll find that out the very first time you use it, with or without a NIST algorithm cert, and beyond that for level 1 which is what 99% of products go for it's mostly a paperwork-production exercise and the aforementioned silly-walk code changes.

About 30+ years ago it was somewhat useful for keeping out the homebrew snake-oil crypto that was common at the time, but since you can find (again as an example) AES code in the implementation language of your choice and license of your choice within seconds that's not been an issue for some time.

firesteelrain•2w ago
Fair. Level 1 can be heavy on paperwork, and compliance code can add complexity. But ‘algorithm certs are worthless’ is overstated: lots of crypto failures are silent misuse (modes/nonces/RNG/key handling), not ‘AES won’t decrypt.’ FIPS isn’t a magic shield, it’s a baseline control. Whether it’s net-positive depends on how much it slows upgrades and how disciplined the team already is.
pseudohadamard•2w ago
Absolutely. It allows you to check the box that says "must be FIPS certified", and that's it. Now I'm not saying that doesn't add value, but it's not adding any security.
voidfunc•2w ago
FIPS is what happens when idiots get promoted and start reading too much LinkedIn CISO slop.

If a customer demands FIPS compliance charge them out the ass for it. Its not inherently secure, it requires in some cases massive re-engineering of product and toolchains, and mostly seems to be an ask from clueless deep pocketed Fortune 500 companies looking to minimize liability claims after a breach by being able to point at their FIPS compliance.

Aloha•2w ago
FIPS is ancient and dates from the era when encryption was unusual and rare. That is why some of it seems so arcane. FIPS 140 didnt even allow software encryption until 140-3, 140-2 required a hardware secure enclave.
PeterWhittaker•2w ago
Definitely false, at least historically. The original FIPS only required HW at levels 3 and 4, "required" in the sense that levels 1 and 2 were quite doable in software (level was/is no authentication to the CM, letting it be protected by the host; level 2 was/is a form of basic authentication, e.g., encrypting private keys under a key derived from a password).

I was part of a team that had multiple level 1 and 2 certificates for software-only CMs in the 1990s, both 140 and the second edition, 140-1.

ocdtrekkie•2w ago
The current FIPS-approved OpenSSL module was released in 2023. FIPS compliance does not even allow security patches to address issues.

In my opinion, FIPS compliance is bad security practice and I suspect if a government agency called you on not meeting it, the justification of patching to address known vulnerabilities should hold up to scrutiny.

firesteelrain•2w ago
No, you can release another version but it needs to go through the testing and compliance regime which costs money and time.

This is the same as certifying an aircraft as airworthy. You can’t build another aircraft and say it is airworthy because the one you just built is airworthy too

ocdtrekkie•2w ago
Clearly Boeing has proven that aircraft certification is much easier to bypass than FIPS certification.
firesteelrain•2w ago
I know what aircraft you are pointing to (MAX) and new airworthiness compliance measures for all new and existing aircraft are a result of what happened with Boeing
storystarling•2w ago
I've run into this with Python manylinux wheels too. They bundle their own libraries for portability, so you often bypass the host OpenSSL entirely without realizing it. The fix is usually passing --no-binary to pip to force it to link against the system libraries.