frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Gemini Pro 3 hallucinates the HN front page 10 years from now

https://dosaygo-studio.github.io/hn-front-page-2035/news
679•keepamovin•3h ago•304 comments

PeerTube is recognized as a digital public good by Digital Public Goods Alliance

https://www.digitalpublicgoods.net/r/peertube
133•fsflover•1h ago•17 comments

Mistral Releases Devstral 2 (72.2% SWE-Bench Verified) and Vibe CLI

https://mistral.ai/news/devstral-2-vibe-cli
263•pember•4h ago•98 comments

If you're going to vibe code, why not do it in C?

https://stephenramsay.net/posts/vibe-coding.html
85•sramsay•1h ago•87 comments

Handsdown one of the coolest 3D websites

https://bruno-simon.com/
175•razzmataks•2h ago•46 comments

Pebble Index 01 – External memory for your brain

https://repebble.com/blog/meet-pebble-index-01-external-memory-for-your-brain
216•freshrap6•3h ago•234 comments

Kaiju – General purpose 3D/2D game engine in Go and Vulkan with built in editor

https://github.com/KaijuEngine/kaiju
102•discomrobertul8•4h ago•41 comments

LLM from scratch, part 28 – training a base model from scratch on an RTX 3090

https://www.gilesthomas.com/2025/12/llm-from-scratch-28-training-a-base-model-from-scratch
382•gpjt•1w ago•86 comments

Launch HN: Mentat (YC F24) – Controlling LLMs with Runtime Intervention

https://playground.ctgt.ai
20•cgorlla•2h ago•12 comments

Clearspace (YC W23) Is Hiring a Founding Designer

https://www.ycombinator.com/companies/clearspace/jobs/yamWTLr-founding-designer-at-clearspace
1•roycebranning•1h ago

My favourite small hash table

https://www.corsix.org/content/my-favourite-small-hash-table
65•speckx•4h ago•12 comments

AWS Trainium3 Deep Dive – A Potential Challenger Approaching

https://newsletter.semianalysis.com/p/aws-trainium3-deep-dive-a-potential
41•Symmetry•4d ago•12 comments

The Joy of Playing Grandia, on Sega Saturn

https://www.segasaturnshiro.com/2025/11/27/the-joy-of-playing-grandia-on-sega-saturn/
147•tosh•9h ago•88 comments

Show HN: AlgoDrill – Interactive drills to stop forgetting LeetCode patterns

https://algodrill.io
123•henwfan•7h ago•79 comments

Transformers know more than they can tell: Learning the Collatz sequence

https://www.arxiv.org/pdf/2511.10811
82•Xcelerate•6d ago•30 comments

Constructing the Word's First JPEG XL MD5 Hash Quine

https://stackchk.fail/blog/jxl_hashquine_writeup
77•luispa•1w ago•16 comments

30 Year Anniversary of WarCraft II: Tides of Darkness

https://www.jorsys.org/archive/december_2025.html#newsitem_2025-12-09T07:42:19Z
101•sjoblomj•9h ago•72 comments

Ask HN: Should "I asked $AI, and it said" replies be forbidden in HN guidelines?

380•embedding-shape•2h ago•223 comments

Show HN: Detail, a Bug Finder

https://detail.dev/
22•drob•1h ago•9 comments

Donating the Model Context Protocol and Establishing the Agentic AI Foundation

https://www.anthropic.com/news/donating-the-model-context-protocol-and-establishing-of-the-agenti...
23•meetpateltech•1h ago•8 comments

"The Matilda Effect": Pioneering Women Scientists Written Out of Science History

https://www.openculture.com/2025/12/matilda-effect.html
5•binning•55m ago•0 comments

AI needs more power than the grid can deliver – supersonic tech can fix that

https://boomsupersonic.com/flyby/ai-needs-more-power-than-the-grid-can-deliver-supersonic-tech-ca...
32•simonebrunozzi•3h ago•39 comments

Icons in Menus Everywhere – Send Help

https://blog.jim-nielsen.com/2025/icons-in-menus/
772•ArmageddonIt•23h ago•308 comments

How private equity is changing housing

https://www.theatlantic.com/ideas/2025/12/private-equity-housing-changes/685138/
28•harambae•1h ago•68 comments

Apple's slow AI pace becomes a strength as market grows weary of spending

https://finance.yahoo.com/news/apple-slow-ai-pace-becomes-104658095.html
51•bgwalter•3h ago•79 comments

Oliver Sacks Put Himself into His Case Studies. What Was the Cost?

https://www.newyorker.com/magazine/2025/12/15/oliver-sacks-put-himself-into-his-case-studies-what...
30•barry-cotter•5h ago•13 comments

Epsilon: A WASM virtual machine written in Go

https://github.com/ziggy42/epsilon
127•ziggy42•1w ago•30 comments

ZX Spectrum Next on the Internet: Xberry Pi ESP01 and Pi Zero Upgrades

https://retrogamecoders.com/zx-spectrum-next-on-the-internet-xberry-pi-esp01-and-pi-zero-upgrades/
49•ibobev•7h ago•0 comments

Brent's Encapsulated C Programming Rules (2020)

https://retroscience.net/brents-c-programming-rules.html
55•p2detar•7h ago•27 comments

A deep dive into QEMU: The Tiny Code Generator (TCG), part 1 (2021)

https://airbus-seclab.github.io/qemu_blog/tcg_p1.html
65•costco•1w ago•2 comments
Open in hackernews

Mac app launches slowed by malware scan (2024)

https://lapcatsoftware.com/articles/2024/2/3.html
118•username223•7mo ago
Follow-up: https://lapcatsoftware.com/articles/2025/5/1.html

Comments

lapcat•7mo ago
Author here. It's unclear why HN is interested in this post, because it's just a response to another blogger's recent posts, which weren't even submitted to HN. Visitors aren't going to have the background context.

My original post "Mac app launches slowed by malware scan" was submitted to HN last year, though it received 0 comments at the time. https://lapcatsoftware.com/articles/2024/2/3.html

username223•7mo ago
Submitter here. I submitted it because it explains a bug I recently encountered. Other people apparently found it useful. Should I delete it?
lapcat•7mo ago
> Should I delete it?

Is that even possible?

Anyway, I just think my 2024 post is a better place to start, because it explains the issue directly, whereas this new post simply refutes another blogger and argues that there's nothing new beyond my 2024 post. That interpersonal drama/conflict probably isn't going to be understandable or useful to readers.

tough•7mo ago
@dang or mods can replace a main discussion link if they think its apt/good for the final user you might write to the email on the footer of this page to reach them
dang•7mo ago
Ok, we've switched to that from https://lapcatsoftware.com/articles/2025/5/1.html above, and I'll add a link to the follow-up to the top text.
carlosjobim•7mo ago
EVERYBODY: You can fix the Affinity slow start-up problem on MacOS in a simple step:

Go to your App folder and duplicate the "Affinity Photo 2" app. Then remove the original and use the duplicate.

Now Affinity starts in 2 seconds instead of in 30 seconds on my M3 machine.

dijit•7mo ago
Why does this work?
carlosjobim•7mo ago
I have no idea. I found it deeply buried in a support forum the other day.
saagarjha•7mo ago
I think I checked this once and it was doing Rosetta translation
pier25•7mo ago
I just updated to the latest version and Affinity Photo 2 opens in seconds now.
spiffotron•7mo ago
I'd legitimately love to know why this has worked wtf
mmastrac•7mo ago
I bet you could get the same results by duplicating the inner binary only rather than the whole folder. I saw something very similar with terminal apps.

The blog post doesn't mention this app - am I missing something?

carlosjobim•7mo ago
The follow up blog post published today mentions Affinity. It's also one of the worst apps to start slowly on macos.
keyle•7mo ago
That's mind boggling. I always wondered why it takes so long to open. Is it a shady deal with Adobe and Apple?
jdiff•7mo ago
There is absolutely no reason to jump immediately to conspiracy here.
Tagbert•7mo ago
Does this still load as fast. I have found that, after you have run the app once, it will load very quickly for a day or so and then load more slowly again. I believe that there is a cached state which does not run the slow check and which expires after a while and a new check must be run.

It has been two days since I ran Affinity Photo, latest version, and it took about 30 sec to load.

carlosjobim•7mo ago
This fixes the problem permanently.
ksec•7mo ago
I think this needs blog post and a much deeper explanation.
larrywright•7mo ago
I wonder if this is why Fusion 360 is so slow to start. It's by far the slowest app on my relatively modern M1 MacBook Pro.
Avamander•7mo ago
It's slow on almost everything, so I kinda doubt macOS is to blame.
longtimelistnr•7mo ago
Never saw a CAD app boot fast... Shapr3D is the best but something as advanced as Fusion or Solidworks has always been slow to open
m3047•7mo ago
TIL: MacOS ships with YARA.
john-h-k•7mo ago
I’ve got a personal project compiler I built and it’s hit by this very hard. Testing involves (naturally) generating lots of executables. Running it in a Linux docker container takes around ~1s for all 500 tests. macOS by default takes around a _minute_, and even with the workarounds I’ve found (“allow untrusted software to be run by iterm2”) it takes 5-8 seconds.

It’s a pretty niche use case but it’s deeply frustrating

krackers•7mo ago
> Macs have a cache of SHA-256 hashes of all bundled files of all apps that have been launched. But where exactly is this cache

I always assumed this had to be the case? When you first launch an application gatekeeper takes a long time verifying it, but on subsequent launches it's fast. So _some_ bit seems to be stored somewhere indicating whether or not this is "first launch" and whether full verification needs to be performed (maybe it's the launch services cache?)

As for whether the entire image is verified before _each_ launch, I'm not 100% familiar with the flow but I don't think that's correct, it can be done lazily on a page by page basis. https://developer.apple.com/documentation/endpointsecurity/e...

>In the specific case of process execution, this is after the exec completes in the kernel, but before any code in the process starts executing. At that point, XNU has validated the signature itself and has verified that the cdhash is correct. This second validation means that the hash of all individual page hashes in the Code Directory match the signed cdhash, essentially verifying the signature wasn’t tampered with. However, XNU doesn’t verify individual page hashes until the binary executes and pages in the corresponding pages. XNU doesn’t determine a binary shows signs of tampering until the individual pages page in, at which point XNU updates the code signing flags.

If you can replicate this on an Intel mac where code signature is optional, you could try more rigorous comparisons comparing an unsigned binary vs a signed one. In both cases I'd assume yara signature checks would apply.

lapcat•7mo ago
> So _some_ bit seems to be stored somewhere indicating whether or not this is "first launch"

Yes, of course.

How do you go from that to "a cache of SHA-256 hashes of all bundled files of all apps that have been launched"?

krackers•7mo ago
Isn't there some cache of code-signing info? https://wiki.lazarus.freepascal.org/Code_Signing_for_macOS

>Specifically, the code signing information (code directory hash) is hung off the vnode within the kernel, and modifying the file behind that cache will cause problems. You need a new vnode, which means a new file, that is, a new inode. Documented in WWDC 2019 Session 703 All About Notarization - see slide 65 (PDF).

This seems to be described in https://eclecticlight.co/2024/04/29/apfs-beyond-to-vfs-and-v... but I'm just a layman here. I don't quite understand the benefits of this caching if you have to recompute them to detect mismatch anyway. [1]

And I realize now the initial gatekeeper scan is probably just controlled by presence of quarantine bit, the result themselves are probably not cached.

Edit: Now I'm not so sure, spctl has a --ignore-cache option. So the result of gatekeeper is indeed cached somehow. And presumably as you noted it's a cache miss for this which causes the long application launch delay.

[1] https://github.com/golang/go/issues/42684 has a bit more info on this, I'm happy to see that even seasoned experts are confused about these things.

lapcat•7mo ago
> This seems to be described in https://eclecticlight.co/2024/04/29/apfs-beyond-to-vfs-and-v... but I'm just a layman here. I don't quite understand the benefits of this caching if you have to recompute them to detect mismatch anyway.

It appears that Howard Oakley is once again very confused. Unfortunately, his blog is sometimes a foundation of misinformation, which drives me nuts. The Apple technical note that he links to is talking about a process updating itself at runtime while its code signing information is cached by the kernel in memory. Oakley has somehow warped that into a some kind of disk cache, using the odd phrasing "saved to the kernel's cache against the vnode".

> spctl has a --ignore-cache option. So the result of gatekeeper is indeed cached somehow.

Yes. I think it's in /var/db? But again, it's not a cache of the hashes of every file in the app bundle. What would the system even do with that? Not only is there no evidence for the existence of such a thing, but its existence would make no practical sense. Oakley is simply grasping for something that takes a significant amount of time computationally, without giving much consideration to what would be done with the products of that computation.

> And presumably as you noted it's a cache miss for this which causes the long application launch delay.

No, I've showed that it's a periodic malware scan.

bdash•7mo ago
What's most amusing is that in the most recent blog post (https://eclecticlight.co/2025/04/30/why-some-apps-sometimes-...), the handful of log statements that serve as the source of the claim in fact confirm that it is syspolicyd performing a malware scan that is responsible for the delay during launch.

11.012004 com.apple.syspolicy.exec Recording cache miss for <private>

20.898736 AppleSystemPolicy Waking up reference: 174

The first of the two messages is from `syspolicyd` and is reporting that it has no cached malware scan result for a file it was asked to scan. The malware scan is triggered by an up-call within the AppleSystemPolicy kernel extension during a MACF hook (`proc_notify_exec_complete`, `file_check_library_validation`, or `file_check_mmap`) if the kext doesn’t have a cached malware scan result for the vnode of the file in question.

The second log message is from the AppleSystemPolicy kernel extension when it receives the result of the malware scan and permits the process to resume execution.

It's a little puzzling that the original analysis is published based on speculation, without any real attempt at verifying that the data supports their hypothesis. Looking at `top` or Activity Monitor during the slow launch would show which process is performing work. A spindump captured during the slow launch would reveal what work it is doing. The system log store captures the process and subsystem that logged any given message. A few minutes in Binary Ninja or Hopper gives you a rough idea of what the code that emits the log is doing.

lapcat•7mo ago
Oakley's brain just seems to be stuck in a loop of misunderstanding and mistaken assumptions. He gave the same bizarre response to me that he gave to you:

"The only feature in macOS that I know of that matches that description is what Apple terms XProtect, and there are only two (in Sequoia, previously one) sets of Yara rules in macOS. Now if I’m missing something, please tell me where those other Yara rules are." https://eclecticlight.co/2025/04/22/why-some-apps-launch-ver...

"Well, the only Yara rules that I know of in macOS are those in the XProtect bundle. Do you know of any others?" https://eclecticlight.co/2025/04/30/why-some-apps-sometimes-...

davb•7mo ago
Related, I found that even after designating an application (iTerm2) as a "Developer Tool" in System Settings -> Privacy & Security, there were circumstances where notarisation checks were still carried out. Particularly, launching tmux then detaching and reattaching would cause the processes to no longer be exempt. This applies to any executable (+x), including shell scripts. I put together a test script that proves it at https://gist.github.com/davebarkerxyz/4111276ae1fb4a7566b271... (the second run is much quicker than the first one after a tmux reattach, but within applications marked as Developer Tools the times should be nearly identical).

Fortunately as of Sequoia (15.4.1), I'm no longer able to reproduce the issue.

eviks•7mo ago
> doubt that the built-in system libraries are scanned for malware, because they reside on a separate cryptographically-signed read-only disk volume.

Would be nice to be able to do the same for user apps and only scan on volume updates (when app update) instead of the current constant waste of time and energy

musicale•7mo ago
syspolicyd rears its ugly head again.