frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Amazon Discontinuing One Palm?

1•sshillo•17s ago•0 comments

Ups retires its fleet of MD-11 cargo aircraft

https://www.pbs.org/newshour/nation/ups-retires-its-fleet-of-md-11-cargo-aircraft-involved-in-dea...
1•canucker2016•9m ago•1 comments

Rye pollen's cancer-fighting structure revealed for first time

https://phys.org/news/2026-01-rye-pollen-cancer-revealed.html
1•PaulHoule•10m ago•0 comments

Book: "Beading with Algorithms: Cellular Automata in Peyote Stitch."

https://mathstodon.xyz/@gwenbeads/115968206227675487
1•sohkamyung•11m ago•0 comments

Where can I find startups looking for fractional product leads?

1•stulogy•12m ago•0 comments

Who Contributed to PostgreSQL Development in 2025?

http://rhaas.blogspot.com/2026/01/who-contributed-to-postgresql.html
1•pabs3•16m ago•0 comments

Ask HN: In agent/automation incidents, what slows recovery?

1•paulrekai•20m ago•0 comments

The Librarians Film

https://thelibrariansfilm.com/
1•JumpCrisscross•21m ago•0 comments

'A militia that kills': uproar in Italy over ICE security role in Italy

https://www.theguardian.com/us-news/2026/jan/27/italy-ice-security-role-winter-olympics
4•KnuthIsGod•21m ago•0 comments

Blur any element on webpage for safer demos, screenshots, and screen sharing

https://github.com/KD-MM2/BlurShot
1•kaotd•24m ago•0 comments

Pretend to work: China's novel solution to youth unemployment

https://www.theaustralian.com.au/world/social-pressure-in-china-drives-the-jobless-to-fake-it-til...
1•Anon84•25m ago•1 comments

He Leaked Secrets of a Southeast Asian Scam Compound. He Had to Get Out Alive

https://www.wired.com/story/he-leaked-the-secrets-southeast-asian-scam-compound-then-had-to-get-o...
1•YeGoblynQueenne•26m ago•0 comments

Writing a browser with half a developer and ELIZA in 1 hours, 76 lines of C

https://www.hgreer.com/QuoteBrowserUnquote/
2•QuadmasterXLII•28m ago•0 comments

Measuring US workers' capacity to adapt to AI-driven job displacement

https://www.brookings.edu/articles/measuring-us-workers-capacity-to-adapt-to-ai-driven-job-displa...
2•cebert•29m ago•1 comments

Alex Pretti broke rib in violent confrontation with ICE days before he was shot

https://www.dailymail.co.uk/news/article-15502789/alex-pretti-federal-agents-shot-dead-minneapoli...
4•Bender•30m ago•2 comments

Nvidia's New Voice AI – low latency

https://www.youtube.com/watch?v=n_m0fqp8xwQ
1•mdani•30m ago•0 comments

Pope Leo makes plea for men to stop talking to fake online girlfriends

https://www.dailymail.co.uk/sciencetech/article-15502247/Pope-Leo-affectionate-chatbots-AI.html
3•Bender•31m ago•0 comments

List of stories set in a future now in the past

https://en.wikipedia.org/wiki/List_of_stories_set_in_a_future_now_in_the_past
2•Jugurtha•31m ago•0 comments

The official source for MDN Web Docs content

https://github.com/mdn/content
1•imwally•32m ago•0 comments

Coffee pods urgently recalled over health risk posed to 120M Americans

https://www.dailymail.co.uk/health/article-15502769/keurig-mccafe-coffee-pods-decaf-recall-caffei...
1•Bender•33m ago•0 comments

Show HN: Infinijest, video scrolling experiment no login

1•hnthrowawaste•34m ago•0 comments

Agents Need a Map

https://www.intent-systems.com/learn/intent-layer
2•contextty•34m ago•1 comments

Billion Multiplayer Pixels

https://bmp.grantkot.com/
1•xnx•34m ago•0 comments

Minnesota State Patrol uses long range acoustic device to disperse protesters

https://www.cbsnews.com/minnesota/news/minnesota-state-patrol-long-range-acoustic-device/
4•burnto•36m ago•2 comments

Where are all of the big tech competitors?

2•cadabrabra•40m ago•0 comments

Assessing internal quality while coding with an agent

https://martinfowler.com/articles/exploring-gen-ai/ccmenu-quality.html
2•geoffbp•45m ago•0 comments

"Dollars doing great" [video]

https://www.youtube.com/shorts/XwZxC9uWbXQ
1•SanjayMehta•47m ago•0 comments

Clawdbot: Eval() by default, no rate limiting, 50 attack scenarios

2•Chgdz•49m ago•0 comments

Nigel Richards (born 1967) is a New Zealand Scrabble player

https://en.wikipedia.org/wiki/Nigel_Richards
1•doener•49m ago•0 comments

AI benchmark of unsolved math problems, solutions verifiable programmatically

https://epoch.ai/frontiermath/open-problems
2•greghb•50m ago•0 comments
Open in hackernews

AI found 12 vulnerabilities in OpenSSL

https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
51•mmsc•1h ago

Comments

dnw•53m ago
"We submitted detailed technical reports through their coordinated security reporting process, including complete reproduction steps, root cause analysis, and concrete patch proposals. In each case, our proposed fixes either informed or were directly adopted by the OpenSSL team."

This sounds like a great approach. Kudos!

ktimespi•40m ago
Link seems to be down... But also, considering curl recently shut down its bug bounty program due to AI spam, this doesn't really inspire much confidence.
baby•35m ago
This sounds amazing but not too much info on how it worked
blibble•23m ago
> Finding a genuine security flaw in OpenSSL is extraordinarily difficult.

history suggests otherwise

> The fact that 12 previously unknown vulnerabilities could still be found there, including issues dating back to 1998, suggests that manual review faces significant limits, even in mature, heavily audited codebases.

no, the code is simply beyond horrible to read, not to mention diabolically bad

if you've never tried it, have a go, but bring plenty of eyebleach

lumost•17m ago
It really is just a collection of several dozen research grade implementations for algorithms + a small handful of load bearing algorithms for the entire internet. Surprisingly, OpenSSL isn't the only critical piece of internet architecture like this.
timschmidt•13m ago
The badness cannot be understated. "Hostile codebase" would be an appropriate label. Much more information available in Giovani Bechis's presentation: https://www.slideshare.net/slideshow/libressl/42162879

If someone meant to engineer a codebase to hide subtle bugs which might be remotely exploitable, leak state, behave unexpectedly at runtime, or all of the above, the code would look like this.

lovich•12m ago
I can read C/C++ code about as well as I can read German. Bits and pieces make sense but I definitely don’t get the subtleties.

What’s eye bleachy about this beyond regular C/C++?

For context I’m fluent in C#/javascript/ruby and generally understand structs and pointers although not confident in writing performant code with them.

jeffbee•7m ago
For one thing, "C/C++" is not a thing. If you see C-like C++, that is C.

Part of OpenSSL's incomprehensibility is that it is not C++ and therefore lacks automatic memory management. Because it doesn't have built-in allocation and initialization, it is filled with BLAH_grunk_new and QVQ_hurrr_init. "new" and "init" semantics vary between modules because it's all ad hoc. Sometimes callees deallocate their arguments.

The only reason is needs module prefixes like BLAH and QVQ and DERP is that again it is not C++ and lacks namespaces. To readers, this is just visual noise. Sometimes a function has the same name with a different module, and compatible function signature, so it's possible to accidentally call the wrong one.

move-on-by•23m ago
Pretty impressive. Whether you think AI is a bubble or not, we all benefit from these findings.

As for all the slop the Curl team has been putting up with, I suppose a fool with a tool is still a fool.

bandrami•22m ago
I'm bearish on AI creating working software but bullish on AI doing this kind of thing
martinald•22m ago
This really is quite scary.

I suspect this year we are going to see a _lot_ more of this.

While it's good these bugs are being found and closed, the problem is two fold

1) It takes time to get the patches through distribution 2) the vast majority of projects are not well equipped to handle complex security bugs in a "reasonable" time frame.

2 is a killer. There's so much abandonware out there, either as full apps/servers or libraries. These can't ever really be patched. Previously these weren't really worth spending effort on - might have a few thousand targets of questionable value.

Now you can spin up potentially thousands of exploits against thousands of long tail services. In aggregate this is millions of targets.

And even if this case didn't exist it's going to be difficult to patch systems quickly enough. Imagine an adversary that can drip feed zero days against targets.

Not really sure how this can be solved. I guess you'd hope that the good guys can do some sort of mega patch against software quicker than bad actors.

But really as the npm debacle showed the industry is not in a good place when it comes to timely secure software delivery even without millions of potential new zero days flying around.

crm9125•21m ago
"Humans + AI" ...

Without Humans, AI does nothing. Currently, at least.

adzm•18m ago
Just wait until AI has its own money
belter•17m ago
Wait until AI starts using AI
pizlonator•15m ago
Impressive.

I checked the stack overflow that was marked High, and Fil-C prevents that one.

One of the out-of-bounds writes is also definitely prevented.

It's not clear if Fil-C protects you against all of the others (Fil-C won't prevent denial of service, and that's what some of these are; Fil-C also won't help you if you accidentally didn't encrypt something, which is what another one of these bugs is about).

The one about forgetting to encrypt some bytes is marked Low Severity because it's an API that they say you're unlikely to use. Seems kinda believable but also ....... terrifying? What if someone is calling the AESNI codepath directly for reasons?

Here's the data about that one:

"Issue summary: When using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths, inputs whose length is not a multiple of 16 bytes can leave the final partial block unencrypted and unauthenticated.

Impact summary: The trailing 1-15 bytes of a message may be exposed in cleartext on encryption and are not covered by the authentication tag, allowing an attacker to read or tamper with those bytes without detection."

jeffbee•14m ago
I don't know why you're still using OpenSSL but if you're able to switch I note that BoringSSL was not affected by any of the January 2026 OpenSSL advisories, and was also not affected by any of the advisories from 2025, and was affected by only one of the 2024 advisories. I also note that I don't see any hasty commit activity to s2n-tls that looks like a response to these advisories.

Better software is out there.

aster0id•12m ago
How many false positives did the AI throw up?
ape4•3m ago
I wonder too. Did it take many human hours to verify everything?