frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The First Person Project: How to prove you are a real person online

https://www.firstperson.network/white-paper
1•walterbell•46s ago•0 comments

AI-Driven Low-Fi Prototyping with Balsamiq Cloud

https://balsamiq.com/blog/low-fidelity-prototyping/
1•ilt•1m ago•0 comments

SAIR Foundation

https://sair.foundation/
1•nsoonhui•1m ago•0 comments

Linux 7.0 Review: Major Performance, GPU, CPU, and Networking Upgrades

https://www.youtube.com/watch?v=3s37rDlIemI
1•cable2600•1m ago•0 comments

Show HN: Yan – Glitch Art Photo/Live Editor

https://yan.yichenlab.com/
1•xcc3641•5m ago•0 comments

A simpler way to remove explicit images from Search

https://blog.google/products-and-platforms/products/search/remove-explicit-images/
1•gnabgib•10m ago•0 comments

We're all called Julia, or maybe ChatGPT calls itself Julia

https://solresol.substack.com/p/were-all-called-julia-or-maybe-chatgpt
2•solresol•13m ago•1 comments

5,300-year-old 'bow drill' rewrites story of ancient Egyptian tools

https://www.ncl.ac.uk/press/articles/latest/2026/02/ancientegyptiandrillbit/
4•geox•13m ago•0 comments

Search the public domain through image embeddings

https://faenum.com
1•jlauf•16m ago•0 comments

Beautiful iOS SSH Terminal with GPU Acceleration

https://github.com/eriklangille/clauntty
1•dnw•16m ago•0 comments

Wall Street's anything-but-tech trade shakes up US stock market

https://www.ft.com/content/577b97f6-2416-48b9-9bd3-717bb202ca71
1•petethomas•16m ago•0 comments

Show HN: Obsidian Visual Skills – Generate Canvas, Excalidraw, Mermaid from Text

https://github.com/axtonliu/axton-obsidian-visual-skills
1•axtonliu•18m ago•0 comments

It's Time to Rage Against the AI Music Machine

https://time.com/7338205/rage-against-ai-generated-music/
1•cdrnsf•20m ago•0 comments

Show HN: Askill – A package manager for AI agent skills with AI safety scoring

https://github.com/avibe-bot/askill
1•alex_metacraft•20m ago•1 comments

AI is now a magic decompiler

https://stephenjayakar.com/posts/magic-decomp/
1•stephenjayakar•21m ago•0 comments

Lolong: Largest crocodile ever held in captivity

https://en.wikipedia.org/wiki/Lolong
2•teleforce•25m ago•0 comments

AI Can Work on VMs

https://www.fluid.sh/blog/how-fluid-reads-source-vms-safely
1•aspectrr•26m ago•0 comments

Medog Hydropower Station

https://en.wikipedia.org/wiki/Medog_Hydropower_Station
1•thunderbong•29m ago•0 comments

What FTX's investments would be worth today (based on public filings)

https://themissingbillions.com
2•apwn•30m ago•1 comments

Show HN: Runmoa – Create a global storefront with payments in 1 minute (no-code)

https://www.runmoa.com/?from=moa
1•shleefunnel•30m ago•0 comments

Show HN: AdKit MCP: Inject Ads into Your LLMs

https://www.adkitmcp.com/
1•Exorust•34m ago•0 comments

Why Smart Lawyers Are Building AI Tools Instead of Buying Them

https://natlawreview.com/article/why-smart-lawyers-are-building-ai-tools-instead-buying-them
2•petethomas•34m ago•0 comments

What can't be automated? The Last Human Bottleneck

https://bturtel.substack.com/p/what-cant-be-automated
1•bturtel•38m ago•0 comments

Ask HN: Is "make me laugh" the next Turing Test?

1•ryandvm•40m ago•3 comments

Building a semantic search engine in ±250 lines of code

https://bart.degoe.de/building-a-semantic-search-engine-in-250-lines-of-python/
2•bartdegoede•40m ago•0 comments

ChatGPT to PDF Extension – export ChatGPT chats to a clean PDF in one click

https://chromewebstore.google.com/detail/export-chatgpt-conversati/ploaaddkflkapjfbfapmkmkefigedefp
1•backrun•40m ago•2 comments

First Proof

https://1stproof.org/
1•wanderingmind•41m ago•0 comments

I have a new favorite coding font

https://fantinel.dev/blog/maple-mono-font/
2•cratermoon•41m ago•1 comments

Seedream 5.0-Preview Test: An image model that does web search during generation

https://www.atlascloud.ai/collections/seedream-5
2•Alisaqqt•44m ago•1 comments

Think I'm kidding bout 4o?

https://chatgpt.com/share/6927a0e2-7cc8-800d-9656-bc43f375cb5b
1•WindySoliloquy•44m ago•3 comments
Open in hackernews

Gnome leaks thumbnails from encrypted and external drives

https://gitlab.gnome.org/Teams/Design/whiteboards/-/issues/357
6•DwarvenEnemy•1h ago

Comments

DwarvenEnemy•1h ago
GNOME stores thumbnails in ~/.cache/thumbnails/, regardless of where the pictures are. Meaning pictures viewed on an encrypted or external drive leave a trail in your home folder. GNOME does not communicate this in any way to the user, and none of the 3 buttons to clear history in Settings > Privacy & Security delete thumbnails. Further, GNOME Disk utility's option on whether to save a password or not misleads users into thinking GNOME's security model respects defense-in-depth, when in reality they consider read-only access to a user's home folder to be game over, in contrast to web browsers giving easy ways to clear history or browse incognito.

In other words, everything exposed to the user, as well as their experience with common applications like web browsers, gives a false sense of security.

This was reported to Nautilus, and closed as not in their threat model. Then it was raised to the GNOME design board, but has been ignored for nearly 3 months now. I am hoping posting it here will raise some much needed attention, and at least make the 'Delete Temporary Files' button do what it promises.

Bender•1h ago
As a mitigating control one can mount the thumbnails directory as tmpfs accepting that it can grow rather large so one must calculate what size to set that tmpfs mount. Also tmpfs is swap backed so one would have to disable disk based swap and use zram or just dont have swap if memory permits. Be sure to set the owner and group to that user or use autofs with variables.
DwarvenEnemy•1h ago
Of course, there are many ways it can be solved or mitigated. The problem is that even very experienced users simply won't know there is anything to solve.
Bender•1h ago
Of course, there are many ways it can be solved or mitigated. The problem is that even very experienced users simply won't know there is anything to solve.

Absolutely agree. Keep fighting the fight. I was just attempting to assist with a mitigating control for anyone reading this. For what it's worth using tmpfs wherever someone can is one way to extend the life of SSD's/NVME for tiny rapid writes such as these. Downside being one may have to buy a bigger RAM kit and RAM prices are increasing.

Another mitigating control would be to encrypt /home but that is loaded with caveats and gotchas especially related to LUKS2 information disclosure.

winstonwinston•1h ago
The title is misleading. It would be justified if it leaked over network or outside of home directory.

If file history features are a privacy threat then it should be disabled.

DwarvenEnemy•59m ago
The post helpfully gives several scenarios in which calling it a leak is justified, as it endangers the user.
theamk•58m ago
I feel the modern systems are so complex, there will always be some record somewhere. Thumbnails are an extreme examples, but the filenames themselves can leak via LRU list, logs, history etc...