frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

We're Addicted to Our Devices

https://type-writer.org/?p=7369
1•speckx•1m ago•0 comments

The "Passive Income" trap ate a generation of entrepreneurs

https://www.joanwestenberg.com/the-passive-income-trap-ate-a-generation-of-entrepreneurs/
1•jotaen•2m ago•0 comments

Show HN: LLMnesia – search across ChatGPT, Claude, Gemini chats locally

https://chromewebstore.google.com/detail/llmnesia/leekfgbdojiaabifbjbbgiiclannjdkf
3•keiranflynn•2m ago•1 comments

From Hierarchy to Intelligence

https://block.xyz/inside/from-hierarchy-to-intelligence
1•gpi•6m ago•0 comments

The feet don't rotate with the body

https://en.wikipedia.org/w/extensions/WP25EasterEggs/resources/media/video/outerspace-idle-light....
2•ColinWright•11m ago•0 comments

Atmospheric CO₂ accelerating faster than fossil fuel emissions are growing

https://bsky.app/profile/thierryaaron.bsky.social/post/3mil6lnsrqc26
2•mariuz•13m ago•0 comments

From Reversibility to Irreversibility: Biggest shift in the history of physics

https://chillphysicsenjoyer.substack.com/p/from-reversibility-to-irreversibility
1•crescit_eundo•14m ago•0 comments

Running Qwen 35B on 16GB Mac Mini via MMAP (17 tok/s) then swapping to Gemma 4

https://thoughts.jock.pl/p/local-llm-35b-mac-mini-gemma-swap-production-2026
2•joozio•16m ago•0 comments

Funny Quotes Radar

https://gagdash.com/
1•hackerbeat•16m ago•0 comments

Adobe wrote to my hosts file. I've never had an app do this before

https://old.reddit.com/r/webdev/comments/1sb6hzk/adobe_wrote_to_my_hosts_file_ive_never_had_an_app/
4•speckx•17m ago•0 comments

Zperiod: Interactive Periodic Table and Chemical Equation Balancer

https://zperiod.app/
1•thunderbong•20m ago•0 comments

Why Is It So Difficult to Develop Drugs for Cancer? (2010)

https://www.newyorker.com/magazine/2010/05/17/the-treatment-2
2•downbad_•21m ago•1 comments

Mercor, a $10B AI startup confirms major data breach

https://fortune.com/2026/04/02/mercor-ai-startup-security-incident-10-billion/
3•taubek•22m ago•0 comments

Kafka Options Explorer

https://kafka-options-explorer.conduktor.io/
1•enether•23m ago•1 comments

The Noble Rhubarb: Himalayan Marvel of Nature's Ingenuity

https://www.kuriositas.com/2025/05/the-noble-rhubarb-himalayan-marvel-of.html
3•marukodo•24m ago•1 comments

Chess960x32 Experimental chess platform with 30720 unique opening configurations

https://topce.github.io/chess960x32/
1•topce•29m ago•0 comments

Unitary time-reversal on non-orientable spacetimes

https://arxiv.org/abs/2603.24650
2•ovidiu69•31m ago•0 comments

How the Apple II created the core of personal computing

https://www.theverge.com/tech/900677/apple-ii-personal-computer
1•rbanffy•31m ago•0 comments

How the UK's South West Became a 'Deep Tech' Powerhouse

https://www.wired.com/sponsored/story/how-the-uks-south-west-became-a-deep-tech-powerhouse-hsbc-uk/
1•zeristor•33m ago•1 comments

Switzerland hosts 'CERN of semiconductor research'

https://www.swissinfo.ch/eng/swiss-ai/switzerland-hosts-cern-of-semiconductor-research/91015332
10•teleforce•38m ago•0 comments

Penguin to sue OpenAI over ChatGPT version of German children's book

https://www.theguardian.com/technology/2026/mar/31/penguin-sue-openai-chatgpt-german-childrens-bo...
3•thm•40m ago•0 comments

OpenUMA – bring Apple-style unified memory to x86 AI inference (Rust, Linux)

https://github.com/hamtun24/openuma
1•hamtun24•40m ago•0 comments

Hintrix – Web scraping API that returns content and AI search audit

https://hintrix.com/
1•slreport•41m ago•0 comments

The plumbing behind Claude Code

https://siddhantkhare.com/writing/the-plumbing-behind-claude-code
1•speckx•42m ago•0 comments

University researchers develop way to measure how sleeps cleans the brain

https://www.oulu.fi/en/news/sleep-cleans-brain-university-oulu-researchers-develop-fast-non-invas...
2•thunderbong•44m ago•0 comments

Can 8k Bouncy Springs Hide Secret Messages? (Tutte's Theorem) [video]

https://www.youtube.com/watch?v=3YlC_W5myxg
1•zeristor•45m ago•0 comments

SSH certificates: the better SSH experience

https://jpmens.net/2026/04/03/ssh-certificates-the-better-ssh-experience/
3•jandeboevrie•48m ago•0 comments

AllyHub – AI agent that builds reusable skills from every task it runs

https://allyhub.com
2•chloecv•49m ago•0 comments

Category Theory Illustrated – Types

https://abuseofnotation.github.io/category-theory-illustrated/06_type/
3•boris_m•50m ago•0 comments

I built an AI data extraction engine and E2E encrypted SMS router in Rust

2•adibite•57m ago•0 comments
Open in hackernews

Proton Meet Isn't What They Told You It Was

https://www.sambent.com/proton-meet-isnt-what-they-told-you/
100•bundie•1h ago

Comments

rvnx•1h ago
Most of the privacy claims (of all type of apps) are essentially garbage anyway because realistically, if a website or an app can be compelled to push an update to a specific user, then they can intercept anything they want.

It doesn't even have to be a specific binary, it can be "just turn on this A/B testing / debug flag for that user" or a piece of javascript

henearkr•58m ago
Is there any evidence that the mechanism to do that is in place?

I think that would be widely decried especially on HN if that is one day implemented.

Cthulhu_•55m ago
Yes? A/B testing flags, auto-updates, server-side re-routing, etc are just some mechanisms from the top of my head that can do that.

The ways to avoid it is by having locked and cryptographically verified software and connections.

izacus•27m ago
That's not evidence, that's conjecture again. Is there evidence that this kind of client push is actually used to extract data in these projects?
Imustaskforhelp•20m ago
Not sure if that counts as proper evidence, but I have seen some logs[0] albeit with encryption but from my understanding, they control the encryption keys or atleast certainly have the ability to change (if they get hacked themselves for example)

Would you like to see a proper evidence of the logging policy? I feel like I can try finding that again if you/HN community would be interested to see that.

Edit: also worth pointing out that keeping logs with time might be a form of meta-data, which depending on your threat-vector (journalism etc.) can be very sensitive info.

[0]: my another comment here: https://news.ycombinator.com/item?id=47624960

nextaccountic•14m ago
That's evidence for the mechanism, as asked

The evidence that it's being actively used in the US is in the secret proceedings of a secret court. I kid you not, look up FISA warrant

chrismorgan•33m ago
You need mechanisms to avoid the possibility. The mechanisms to do such things exist by default, by both the software provider (e.g. Proton) and the software distributor (e.g. Apple for App Store, Google for Play Store, Cloudflare or AWS for web stuff), and various countries have laws that allow them to secretly compel implementing specific backdoors.

In order to block the distributor from going rogue, you need to be able to guarantee that the user device can only install/run code signed by the provider, who must never give those keys to the distributor. My impression is that Android is the only major platform that ever had this, but that Google ruined it a few years ago in the name of lighter bundles by insisting that they hold the keys. (I once had VLC from Google Play Store, but replaced it with a build from F-Droid under the same app ID; Google Play Store shows it has an update for it, but that it can’t install it.)

In order to block the provider or distributor sending specific users a different build, you need something more like Certificate Transparency logs: make it so that devices will only run packages that contains proof that they have been publicly shared. (This is necessary, but not sufficient.)

And if you’re using web tech, the mechanisms required to preclude such abuse do not at this time exist. If you’re shipping an app by some other channel, it can do a resource integrity check and mandate subresource integrity. But no one does things that way—half the reason for using web tech is specifically to bypass slow update channels and distribute new stuff immediately!

The_Goonies1985•52m ago
>Most of the privacy claims (of all type of apps) are essentially garbage...

True. Everything has backdoored CPUs as its foundation. Consider, for starters: (Intel's 'Management' Engine); AMD's (PSP); Apple/Arm (black-box hardware).

You can layer as much theater as you like on top of the hardware-surveillance-layer in modern computers; it still won't grant you privacy.

badgersnake•47m ago
Power is open. But nobody wants to build power devices for some reason.
ricardobeat•45m ago
Power?
supermatt•38m ago
https://en.wikipedia.org/wiki/Power_ISA
ricardobeat•33m ago
RISC-V is also open. That “some reason” is likely to be power/performance levels being quite far from ARM & Intel for consumer devices.
vrganj•23m ago
China is building out RISC-V, just like they are leading actually-open AI.

https://www.scmp.com/tech/big-tech/article/3347684/alibaba-d...

Weirdly, the authoritarian state is the one saving us from our own digital authoritarians.

NitpickLawyer•4m ago
> they are leading actually-open AI.

How are they leading? If I parse this correctly, "actually" open would mean fully open data training and weights? Then, by this definition, I'm only aware of Olmo (AllenAI - Seattle), Apertus (Swiss) and to some degree (unclear what data was actually published) Nemotron (Nvda, US). What are some examples of chinese similar models? (I'm not aware of any).

jagged-chisel•29m ago
That’s no guarantee that a Power implementation isn’t compromised.
UltraSane•21m ago
They are very expensive. Cheapest Power9 system Raptor Systems has is $6,794.99 and it has only 4 cores and 8GB DDR4 RAM and 128GB SSD. Reminds me of Sun Sparc pricing.

https://www.raptorcs.com/content/BK1SD1/intro.html

fsflover•9m ago
My laptop has the Intel ME disabled and neutralized. Also I run Qubes OS.
boramalper•44m ago
> Most of the privacy claims (of all type of apps) are essentially garbage anyway

I think that’s a sweeping generalisation.

Ylpertnodi•19m ago
And sweepingly true.
victorbjorklund•40m ago
I don’t think that is a useful definition even if technically true. With that logic even Linux isn’t privacy because in theory they can push code that will only run for you.
63stack•23m ago
Linux as in the kernel? Who is "they"? Torvalds?
progbits•11m ago
How will they push it?
maweaver•10m ago
Using what mechanism? Most Linux updates are not pushed but rather pulled at the user request. You can use Linux totally offline. This is fundamentally different than a webapp, where code is sent with every visit
kalaksi•28m ago
You'll have to be more specific what kind of "privacy claims" you're talking about. Proton is definitely a lot more private than, say, Google. But, as always, you'll have to trust the party delivering the binaries you run. Also, any company operating legally, have to co-operate with court orders etc., but afaik they try to push back
Imustaskforhelp•22m ago
I once did some tinkering with Proton Docs and I was able to find that the comments within Proton Docs when I used it via curl definitely felt like it had something like logs (I feel like I should try doing this again to have more definitive answer)

Either way, the response was encrypted but they hold the encryption key atleast within proton-docs.

I also want to say that Proton allows the ability to change password through OTP, (Something which I sorta appreciate[0]) but that means that their infrastructure can then have the ability to change password and you can toggle that functionality by sending a request to proton to allow OTP and on which number, so proton themselves can do that too. Unless, I am getting it wrong, by default, Proton still has your encryption keys and even if you change them (which 99% including me might not do), even then I definitely feel like there can be some concern.

To be honest, There is nothing like zero trust, that's what I learnt, You are still trusting Proton Aka The swiss laws behind it so that you know that they won't get legally forced to give more data than usual (like US companies for example) but they will still comply with the swiss laws (recent proton incident)

Then, secondly, you have to trust Proton themselves, but with something like this incident where Proton Meet might be omitting somethings, it doesn't paste a clear picture of transparency or trust.

I don't really know why Proton might create something like Meet especially with its infrastructure relying on the CLOUD Act, and then, try to sell it within the idea of privacy. They both are contradictory.

Proton is, creating lots of products, On one hand I can appreciate that, but on the other, as part of community, I feel frustrated/sad because they don't have some core features like proper proton drive rsync support or even some API[1]'s surrounding it. I tried to do the experiment in first place because I wanted to create a commenting engine for static websites which could use proton-drive as its backend. They really could gain a lot from transparency with proper API support and letting the community do things with it, but that's not really the case :/

I am still using Proton but they definitely aren't a bastion recently. I might still recommend Proton, but I sort of hope that companies self host some open source applications themselves, whether self-hosting with hardware or in a proper EU cloud like Hetzner/OVH.

But Incidents like these are making me a little more hesitant to recommend Proton nowadays.

[0]: as someone who had lost one of my previous accounts after my Keepassxc database got deleted because of me accidentally wiping my archlinux with tinkering with it, Now I use Bitwarden with OTP on proton.

[1]: I was able to make something like an API myself by relying on something like puppeteer, even with puppeteer though, it was really hard to make something like that. I couldn't create a public endpoint of it because having puppeteer instances for a commenting engine would be very resource intensive.

ErroneousBosh•59m ago
What a shitty website. I got to about the third slowly-fading-in-picture-of-text block and realised that whether or not I wanted to read it, it's more effort than it's worth.
ramon156•58m ago
May I suggest reader view in FF? It's the first thing I do when I open an article (Ctrl+Alt+R)
j16sdiz•51m ago
Some text (e.g. what metadata is included) are only in the animation -- not in the reader view.

The animation is just some text fading in. If you want to read those text, the only way is disable reader mode and wait..

arcza•7m ago
No, if a website is that obnoxious I just close the tab. It is not worth yet another mental drain on my limited attention span to read slop.

Just give me the boring single .htm page with your thoughts or a Wordpress site with minimal plugins. I'd hate to think the strain the author puts on people with accessible needs making this.

a-rbsn•58m ago
easiest way to private video calls is just to self-host Jitsi Meet anyway
pogue•56m ago
After Proton has repeatedly turned over users of their email account to law enforcement, always with many excuses, their claims about no ability for any government to see what's going on on their network ran very hollow.

I know Brave has offered their talk video conferencing service for awhile, but I don't know if any serious network analysis has been performed on it. https://talk.brave.com/

For document collaboration, I'm not aware of much else that's private/encrypted (etc) however. https://www.privacyguides.org/en/document-collaboration/

mastermage•42m ago
Privacy and anonymity are not the same.

I am fundamentally against spyware that constantly monitors you and reports anything. Because of the constant and pre crime nature of it.

On the other hand i am actually not fundamentally against turning over data when independent judges sign a warrant.

This is arguably a very tight rope to walk but i think thats the most realistic comporomise between my right to privacy and the right of others to get justice when something is done onto them.

readthenotes1•32m ago
Perhaps you may not remember the US government's tendency to invade privacy for suspicious reasons (that is, at the very least extra-legal and sometimes downright unconstitutional).

You mentioned a warrant. I do not believe that has been a required threshold.

E.g., https://judiciary.house.gov/media/in-the-news/jordan-biggs-d...

mastermage•2m ago
I am not American so my lense may be a different one. What I am coming from is basically an extension of the German Laws that Govern the Mail Secret (Briefgeheimnis) which actually is constitutionally enshrined in the German constitution.

But has notable exceptions that can be made uppon federal law. The burden for these is supposed to be pretty high.

I think this should not happen willy nilly. And if thats the case in the US I am obviously against it.

It is a complex multi layered subject because it has to weigh the rights of multiple people against each other.

k__•14m ago
Sadly this is not binary.
0x3f•33m ago
I'm always confused by the conspiratorial takes that think there's some service out there _not_ bound by the legal system where it resides. Obviously Proton obeys the law and gives up data when it has to. Where are the services that don't do that? Somalia?
streetfighter64•25m ago
I mean, is it really a conspiracy theory to want or believe that there are services (based in Europe) that don't hand over any and all user data to the USA government when asked? It's probably wrong to believe it to be the case, but just because it's wrong doesn't make it "conspiratorial".

It's quite hypocritical of Proton to claim that they protect against government surveillance when they do things like this though [0]. Their legal team has probably ensured they don't claim anything strictly false, but the implication and the reality are wildly different.

[0] https://freedom.press/digisec/blog/proton-mail-is-not-for-an...

woutervdb•21m ago
I think the key difference is the amount of data the service can offer when it is asked to do so by some legal entity. Signal famously claims to barely have any useful data to turn over when ordered to do so [1]. If some provider like Proton states they are pricacy-focused and protect your data from governments, but can still offer loads of your private data when ordered to, that damages their privacy claim.

[1] https://signal.org/blog/looking-back-as-the-world-moves-forw...

Yiin•9m ago
can you expand on the "loads" part? ip and payment option?
woutervdb•4m ago
Keyword is "like": a service like Proton. No idea if and what data they have offered to their government. I was merely trying to offer an explanation to the parent commenter, who was wondering how people can critique pricacy-focused services offering data when required by law.
neobrain•8m ago
> If some provider like Proton states they are pricacy-focused and protect your data from governments, but can still offer loads of your private data when ordered to, that damages their privacy claim.

"Loads" of private data? When has this allegedly happened or how would it technically even be possible?

niam•30m ago
When have Proton turned their data over to law enforcement without a Swiss court order?
izacus•27m ago
What do you mean by "excuse"? What kind of excuse would a company need to comply with the law of it's government?!
Subdivide8452•25m ago
I think this comment deserves some nuance. Every company has to comply to local laws. Unless you want to run something illegal, at which point it's not a very reliable alternative for all your mail and more.

Proton in some cases was forced to turn over whatever they knew of a few accounts, according to Swiss law. They try to obfuscate as much as possible, so they can't turn over complete e-mail conversations. But some info is in there, and they have to turn that over. But (correct me if I'm wrong) they have to only comply to Swiss law, when there's a court order.

irusensei•51m ago
I'm sorry I had to use a feature on my browser I rarely use which is summarize. I'm pretty sure your point is valid and concerning but the way that page was designed is just too painful to read.
q3k•43m ago
I'm so tired of this particular kind of LLM (-assisted) slop. The engagement bait, the stupid little hacker-style animations, the drawn out text...

Please, people, use your own words, and don't overdo every little thing. It's tiring. When everybody does this, nobody stands out.

bootsmann•27m ago
Yeah this same site did an article on some minor ubuntu bootloader drama some weeks ago and when I recognized the design I just stopped reading. If you have something to say don’t go out of your way to make it hard to parse.
zero0529•47m ago
Question is will the government learn anything meaningful if they subpoena the LiveKit providers? (Including and excluding HNDL)
surgical_fire•31m ago
After reading the whole article I was left with the same question.

I think they can know the IP from every participant in the call and some other metadata?

Imustaskforhelp•17m ago
> some other metadata

"We kill people based on metadata."

- Michael Hayden (former NSA and CIA director)

syl5x•46m ago
The quiz at the end of the article is wild honestly.
jrflowers•43m ago
This is actually kind of hilarious. “We don’t store your data when you use our service. You hand it over in real time when you use it.”
red_admiral•42m ago
Is this the web version design of the "moon landings were a hoax" conspiracy poster?
avazhi•41m ago
Pretty funny because a few weeks ago some dude felt compelled to virtue signal about how he was moving off American-controlled services like Gmail, as some ostensible protest against Trump and the Iran War. I pointed out that Proton Mail, one of the services he moved to, is ultimately controlled by the US Gov, and my comment got flagged lol.

Proton being at the behest has been old news for a while.

guilamu•31m ago
"Proton Mail, one of the services he moved to, is ultimately controlled by the US Gov,"

Would you mind elaborating, pretty please?

streetfighter64•21m ago
"Controlled" is a bit hyperbolic, but there's a collaboration agreement between the USA government and the Swiss government, so Proton has to comply with requests from for example the FBI. Quoting a comment by Proton staff on Reddit

> First, let's correct the headline: Proton did not provide information to the FBI. What happened is that the FBI submitted a Mutual Legal Assistance Treaty (MLAT) request, which was processed by the Swiss Federal Department of Justice and Police. Proton operates exclusively under Swiss law, and we only respond to legally binding orders from Swiss authorities, after all Swiss legal checks have been passed. This is an important distinction.

> [...]

> The only information Proton could provide was a payment identifier because the user chose to pay with a credit card. This is information the user themselves provided to us through their choice of payment method. Proton also accepts cryptocurrency and cash payments, which would not have been linkable to an identity.

So basically, don't trust Proton with information unless you want the FBI to know it.

Yiin•3m ago
"So basically", what a weird conclusion to take out of it, just don't pay with your credit card for services you can pay cash or crypto.
beevelop•41m ago
Especially questionable choice by Proton not to opt for the self-hosted option. LiveKit offers an enterprise tier that even lets you set up your own mesh, so you are not dependent on their hosted infra.
raverbashing•33m ago
I just love people who go on their soapbox to complain about a newer alternative when the status quo is worse

"nooo but proton mail complies to court orders!!111" wow shocking I know right? Do you think the other providers don't?

These are usually the same people who forget rubber-hose decrypting works

ashikns•28m ago
People complain because Proton specifically advertises privacy, mainstream providers don't. Which is pretty reasonable as far as complaining goes.

Good job on mocking others though :*

InsideOutSanta•6m ago
Proton does offer more privacy than mainstream providers, because they have less information to hand over when courts compel them.

Proton isn't perfect by any means, but the idea that there is no meaningful privacy difference between Proton and (for example) Gmail because both respond to court orders is flat-out false.

defrost•28m ago
https://en.wikipedia.org/wiki/Deniable_encryption
readthenotes1•21m ago
Your complaint is not at all what the article is about.

The article is showing that the proton claim that their new service is private from the US government data acquisition, including inability to access call metadata, is a lie (an intentional misrepresentation of the known truth by Proton).

tamimio•24m ago
Proton is the most shady company out there, especially with the fact that they try to make you put all your eggs into their basket. I stopped using their email (when they used to be an only email company) when they dropped the .ch domain. Same goes with botched security products like grapheneOS and the likes, when the hardware is backdoored, the modem is tracking you more than your psycho ex, yet you are given these illusion of security to buy.. you are not, in fact, you are gonna get more obvious for fingerprinting than using an average iPhone like most people and blend in. Honeypot, hornets nest, whatever the terminology but the concept being used and is still used to lure people in and make the job easier to ID them than going after them in the wild.
arcza•11m ago
What a truly unreadable website. As another commenter said I see a few of these get churned out with the same annoying dark patterns.
IceDane•11m ago
This is the worst form of Article I've ever seen. Did the author read this? Is there even really an author or did Chatgpt just write all of it and generate the page?