frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

LLM-Tainted Free Software and Alternatives

https://codeberg.org/small-hack/open-slopware#tainted-softwarehttps://codeberg.org/small-hack/ope...
1•replooda•4m ago•0 comments

Show HN: UBPE – a universal BPE tokenizer, optimized and rethought

https://github.com/Scurrra/ubpe
1•Scurrra•7m ago•0 comments

What Comes After the Pull Request

https://systemsignal.ai/stories/what-comes-after-the-pull-request
1•thenoahhein•10m ago•0 comments

Cortex Coding Agent in Chrome, Edge, Firefox

https://pervaziv.com/cortex/
1•asmprogrammer5•13m ago•1 comments

From the Rooftops of Tehran

https://www.nybooks.com/online/2026/03/27/from-the-rooftops-of-tehran/
1•mitchbob•14m ago•1 comments

Michael Mosley: 'Forget walking 10k steps a day' (2018)

https://www.bbc.com/news/health-42864061
1•thunderbong•15m ago•0 comments

Ask HN: Is it just me?

1•twoelf•16m ago•0 comments

The Porsche Diffusion

https://blog.est.im/2026/stdin-09
1•est•16m ago•0 comments

Anthony Leggett pushed the boundaries of quantum physics

https://www.newscientist.com/article/2521212-how-anthony-leggett-pushed-the-boundaries-of-quantum...
1•Brajeshwar•18m ago•0 comments

How ICE's Surveillance System Works [video]

https://www.youtube.com/watch?v=aRUhgrqnpGY
1•lisper•18m ago•0 comments

The Unseen Work of One of Iran's Greatest Filmmakers

https://www.newyorker.com/magazine/2026/04/06/mani-haghighi-movie-review
2•mitchbob•21m ago•1 comments

Brave Browser Multi-Account Container (Firefox)

https://twitter.com/BraveNightly/status/2037928854447169912
1•ahmetcadirci25•21m ago•0 comments

Electrofluidic Fiber Muscles: Artificial Muscle Fibers for Robots and Wearables

https://www.media.mit.edu/projects/electrofluidicmuscle/overview/
2•gryfft•21m ago•1 comments

NASA releases new Webb, Hubble images of Saturn

https://science.nasa.gov/missions/webb/nasa-webb-hubble-share-most-comprehensive-view-of-saturn-t...
2•dryadin•23m ago•0 comments

Mark Zuckerberg appears on CNBC to discuss a social network (2004) [video]

https://www.facebook.com/reel/10153395251424369/
1•chistev•24m ago•1 comments

Show HN: Tracetics – Funnel analytics for developers via REST API

https://tracetics.com
1•SArndt•24m ago•0 comments

Performance of 5k German fighter pilots and effort to gain the Knight's Cross

https://klementoninvesting.substack.com/p/nazis-are-people-too
1•stared•24m ago•0 comments

One API call for KYC: lessons from 100M+ verifications

https://www.signzy.com/our-innovations/one-touch-kyc
1•merobin_hood•25m ago•0 comments

Ask HN: Enabling Non-Protected VMS for Android Terminal for Samsung S26 Ultra

1•mbana•27m ago•0 comments

AI wrote a scientific paper that passed peer review

https://www.scientificamerican.com/article/ai-wrote-a-scientific-paper-that-passed-peer-review/
1•Brajeshwar•28m ago•0 comments

Controlling Lego Trains with AI and Larger Implications

https://hkelkar.com/2026/01/02/controlling-lego-trains-with-ai-larger-implications/
1•hvd•29m ago•0 comments

The Rise and Fall of ICE-Tracking Apps

https://www.newyorker.com/news/the-lede/the-rise-and-fall-of-ice-tracking-apps
1•mitchbob•29m ago•1 comments

USB Packet Analyzer easier to use than Wireshark

https://www.getphantom.app
2•samybencherif•30m ago•0 comments

UDP-Based SDK and API Bridge for Momento Cache

https://github.com/proxylity/examples/tree/main/momento-udp
3•mlhpdx•31m ago•0 comments

A hands-on Python tutorial for CKKS homomorphic encryption

https://github.com/manos02/ckks
2•manik02•33m ago•1 comments

Linux is an interpreter

https://astrid.tech/2026/03/28/0/linux-is-an-interpreter/
13•frizlab•34m ago•0 comments

Soverign AI Agent Accountability

https://at1c.com/2026/03/din-identity-soverign-ai-agent-accountability
2•At1C•35m ago•0 comments

Show HN: Web game, an AI decides if you would survive in a survival situation

https://youwillnotsurvive.com/
2•AlanSmitheee•35m ago•1 comments

The result of Joe Grand's $75M bulk hack [video]

https://www.youtube.com/watch?v=TGmGiN5Pa48
2•guiambros•35m ago•0 comments

Show HN: A prompt that builds the most capable AI agent system

https://github.com/fainir/most-capable-agent-system-prompt
2•fainir•35m ago•0 comments
Open in hackernews

I decompiled the White House's new app

https://thereallo.dev/blog/decompiling-the-white-house-app
99•amarcheschi•1h ago

Comments

colesantiago•1h ago
This is a pretty standard decomplation of an Android app.

I am sure if you decompile other apps used by hundreds of thousands of people, you would find all sorts of tracking in there.

Thanks for helping the White House improve their app security for free though.

yellow_lead•1h ago
Even in the apps I've worked on, you won't find us loading arbitrary JS from a random GitHub user's account.
colesantiago•1h ago
> Even in the apps I've worked on, you won't find us loading arbitrary JS from a random GitHub user's account.

You'd be surprised how many apps inside have hacks and workarounds because deadlines.

crtasm•1h ago
Let's see if anyone can give an example of such a high profile app doing something similar.
flutas•50m ago
I've worked on a three letter sports orgs (one of NFL, NBA, NHL, etc) Android app.

I always joke that we could probably tell you what color and type your underwear is on any random day with how much data is siphoned off your phone.

As for loading random JS, yeah also seen that done that before. "Partner A wants to integrate their SDK in our webviews." -> "Partner A" SDK is just loading a JS chunk in that can do whatever they want in webviews, including load more files.

Don't get me started on the sports betting SDKs...

Though we do have a Security team constantly scanning SDKs and the endpoints for changes in situations like this.

jasonlotito•31m ago
> As for loading random JS, yeah also seen that done that before.

Partner A is not random JS. The assumption there is 1) you have some official signed agreement with them and 2) you've done your due diligence to ensure you can use them in this way.

It's not just some person's GH repo who can freely change that file to whatever they want.

Hotlinking is as old as the internet, and a well-worn security threat.

Arainach•1h ago
"An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls."

In their defense, this is the first thing the Trump admin has done that's unambiguously positive for ordinary people.

ronsor•1h ago
Yes, this is a major UX improvement considering I remove those with uBlock Origin anyway.
oefrha•1h ago
> An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

Giving people a taste of web with Ublock Origin annoyance filters applied, refreshing. Can’t believe orange man regime is doing one thing right.

somehnguy•1h ago
Interesting. The site is nearly unusable to me unfortunately. '19 MBP w/ Chrome - scrolling stutters really bad
catlikesshrimp•54m ago
Not what you meant, but works fine on

Firefox 148.0.2 (Build #2016148295), 15542f265e9eb232f80e52c0966300225d0b1cb7 GV: 148.0.2-20260309125808 AS: 148.0.1 OS: Android 14

imalerba•32m ago
Scrolling is so laggy it's annoying to follow on mobile (FF 151.0a1)
vineyardmike•1h ago
> The official White House Android app has a cookie/paywall bypass injector, tracks your GPS every 4.5 minutes (9.5m when in background), and loads JavaScript from some guy's GitHub Pages (“lonelycpp” is acct, loads iframe viewer page).

Doesn’t seem too crazy for a generic react native app but of course coming from the official US government, it’s pretty wide open to supply chain attacks. Oh and no one should be continually giving the government their location. Pretty crazy that the official government is injecting JavaScript into web views to override the cookie banners and consent forms - it is often part of providing legal consent to the website TOS. But legal consent is not their strong suit I guess.

trimethylpurine•1h ago
Aren't the banners for EU page visitors. I don't think there is a US law about this, is there?
xocnad•11m ago
And when the app links off to an EU site? Nothing prevents an EU user from using this app. There are a variety of Trump enthusiasts, though I suspect less than there are here in the US.
SoftTalker•1h ago
Looks like what you might expect in a standard marketing app from a consultancy. They probably hired someone to develop it, that shop used their standard app architecure which includes location tracking code and the other stuff.
sitzkrieg•1h ago
i assumed it was malware out the gate. yep
trimethylpurine•1h ago
I don't see what the fuss is about. This all looks pretty standard. I use random people's stuff all the time. Isn't that the point of open source?

Did you find something malicious in the random GitHub repo? If so, you should write an article about that instead.

xocnad•6m ago
All good for you to make those choices for yourself. Your response seems to be show ignorance of all the recent supply chain attacks that have occurred. You can imagine that given the situation with the shoe gifts that many high up members of the administration and cabinet members are running this app.
rendx•3m ago
I don't know if you're being serious or not, but in case you are: There is a difference between (re)using other people's open sourced code, hopefully reviewed, and giving anyone in control of the third party repository the ability to run arbitrary code on your user's devices. Even if the "random GitHub repo" doesn't contain any malicious code right now, it may well contain some tomorrow.
kevinsync•1m ago
Using somebody's stuff is different than hot-linking directly to a hosted version of it, even just from the perspective that dude could delete it at any time and break the whole app.
r4indeer•1h ago
The argument regarding no certificate pinning seems to miss that just because I might be on a network that MITM's TLS traffic doesn't mean my device trusts the random CA used by the proxy. I'd just get a TLS error, right?
thegagne•1h ago
Not if you are part of an org that uses MDM and pushes their own CA to devices.
r4indeer•1h ago
Ok, fair point. However, I would consider any MDM-enabled device fully "compromised" in the sense that the org can see and modify everything I do on it.
p2detar•40m ago
An MDM orga cannot install a trusted CA on non-supervised (company owned) devices. By default on BYOD these are untrusted and require manual trust. It also cannot see everything on your device - certainly not your email, notes or files, or app data.
replwoacause•1h ago
lol honestly all of this tracks given the current administration. i'm actually surprised it isn't worse. but yeah, amateur hour for sure.
jfengel•56m ago
"Amateur hour" is basically their theme. They were swept in on a wave of distrust for people who know what they're talking about. They were elected to tear down Chesterton's fence, even (and especially) the parts holding in the face-eating leopards.

To mix the metaphors further, they (the politicians and their supporters) fancy themselves the kind to dream of things that never were and ask why not. Why not have a war in Iran? You won't know until you give it a try.

ThaFresh•50m ago
nice work, so they can get your location and have ICE scoop you up if required
iancarroll•45m ago
A bit skeptical of how this article is written as it seems to be mostly written by AI. Out of curiosity, I downloaded the app and it doesn't request location permissions anywhere, despite the claims in the article.

I've noticed Claude Code is happy to decompile APKs for you but isn't very good at doing reachability analysis or figuring out complex control flows. It will treat completely dead code as important as a commonly invoked function.

dijksterhuis•27m ago
what version are you on?

from the iphone app store: version 47.0.1 - minor bug fixes - 34 minutes ago

while the parent posted 18 minutes ago

they may have patched the location stuff as part of the “minor bug fixes”?

frizlab•23m ago
> it doesn't request location permissions anywhere, despite the claims in the article

The article does not claim the app requests the location. It claims it can do it with a single JS call.

post-it•38m ago
> An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

Rare Trump administration W. I'm assuming there's one particular website they open in the app that shows a cookie popup, and this was a dev's heavy-handed way of making that go away.

longislandguido•37m ago
The comments in here are pretty rich. If this was any other app, everyone would be screaming about "why are you being mean to the author", flagging posts left and right.