frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

ACM Is Now Open Access

https://www.acm.org/articles/bulletins/2026/january/acm-open-access
104•leglock•1h ago•12 comments

OpenWorkers: Self-Hosted Cloudflare Workers in Rust

https://openworkers.com/introducing-openworkers
62•max_lt•1h ago•11 comments

2025 Letter

https://danwang.co/2025-letter/
24•Amorymeltzer•1h ago•4 comments

Bluetooth Headphone Jacking: A Key to Your Phone [video]

https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone
240•AndrewDucker•5h ago•79 comments

Common Lisp SDK for the Datastar Hypermedia Framework

https://github.com/fsmunoz/datastar-cl
4•fsmunoz•44m ago•1 comments

50% of U.S. vinyl buyers don't own a record player

https://lightcapai.medium.com/the-great-return-from-digital-abundance-to-analog-meaning-cfda9e428752
31•ResisBey•45m ago•22 comments

Sony PS5 ROM keys leaked – jailbreaking could be made easier with BootROM codes

https://www.tomshardware.com/video-games/playstation/playstation-5-rom-keys-leaked-jailbreaking-c...
21•gloxkiqcza•33m ago•1 comments

I rebooted my social life

https://takes.jamesomalley.co.uk/p/this-might-be-oversharing
182•edent•5h ago•105 comments

DHS Says DHS-Certified Real IDs Too Unreliable to Confirm U.S. Citizenship

https://reason.com/2025/12/31/dhs-says-real-id-which-dhs-certifies-is-too-unreliable-to-confirm-u...
18•xenophonf•15m ago•3 comments

2025: The Year in LLMs

https://simonwillison.net/2025/Dec/31/the-year-in-llms/
724•simonw•16h ago•376 comments

Heap Overflow in FFmpeg EXIF

https://bugs.pwno.io/0014
7•retr0reg•59m ago•1 comments

Python Numbers Every Programmer Should Know

https://mkennedy.codes/posts/python-numbers-every-programmer-should-know/
9•WoodenChair•1h ago•1 comments

Build a Deep Learning Library

https://zekcrates.quarto.pub/deep-learning-library/
7•butanyways•1h ago•0 comments

Implementing HNSW (Hierarchical Navigable Small World) Vector Search in PHP

https://centamori.com/index.php?slug=hierarchical-navigable-small-world-hnsw-php&lang=en
3•centamiv•42m ago•1 comments

Meta made scam ads harder to find instead of removing them

https://sherwood.news/tech/rather-than-fully-cracking-down-on-scam-ads-meta-worked-to-make-them-h...
127•wtcactus•4h ago•31 comments

Easel Turns One One year of building my own IDE in Clojure

https://blog.phronemophobic.com/easel-one-year.html
121•todsacerdoti•5d ago•9 comments

BYD Sells 4.6M Vehicles in 2025, Meets Revised Sales Goal

https://www.bloomberg.com/news/articles/2026-01-01/byd-sells-4-6-million-vehicles-in-2025-meets-r...
19•toomuchtodo•41m ago•4 comments

I canceled my book deal

https://austinhenley.com/blog/canceledbookdeal.html
556•azhenley•22h ago•306 comments

Partisan X posts boost political polarisation among users, research finds

https://www.theguardian.com/technology/2025/nov/27/partisan-x-posts-increase-political-polarisati...
11•PaulHoule•40m ago•2 comments

Pokémon Team Optimization

https://nchagnet.pages.dev/blog/pokemon-team-optimization/
127•nchagnet•5d ago•52 comments

Show HN: I created a tool to design and create foamcore inserts for boardgames

https://boxinsertdesigner.com/
31•Rabidgremlin•4d ago•7 comments

A font with built-in TeX syntax highlighting

https://rajeeshknambiar.wordpress.com/2025/12/27/a-font-with-built-in-tex-syntax-highlighting/
14•LorenDB•4d ago•2 comments

iOS allows alternative browser engines in Japan

https://developer.apple.com/support/alternative-browser-engines-jp/
8•eklavya•3h ago•1 comments

Beyond the Nat: Cgnat, Bandwidth, and Practical Tunneling

https://blog.rastrian.dev/post/beyond-the-nat-cgnat-bandwidth-and-practical-tunneling
5•rastrian•5d ago•1 comments

A Christmas Present to Myself – Vector Network Analyzer (2014)

https://axotron.se/blog/vector-network-analyzer-a-christmas-present-to-myself/
24•joebig•1w ago•2 comments

Web Browsers have stopped blocking pop-ups

https://www.smokingonabike.com/2025/12/31/web-browsers-have-stopped-blocking-pop-ups/
307•coldpie•22h ago•324 comments

Resistance training load does not determine hypertrophy

https://physoc.onlinelibrary.wiley.com/doi/10.1113/JP289684
192•Luc•18h ago•240 comments

European Space Agency hit again as cybercriminals claim 200 GB data up for sale

https://www.theregister.com/2025/12/31/european_space_agency_hacked/
3•smurda•2m ago•0 comments

Flow5 released to open source

https://flow5.tech/docs/releasenotes.html
127•picture•12h ago•9 comments

GoGoGrandparent (YC S16) Is Hiring Tech Leads

https://www.ycombinator.com/companies/gogograndparent/jobs/w2jGKM7-gogograndparent-yc-s16-is-hiri...
1•davidchl•15h ago
Open in hackernews

Leeks and Leaks

https://daniel.haxx.se/blog/2025/05/16/leeks-and-leaks/
123•mrmanner•7mo ago

Comments

Snawoot•7mo ago
Side note: redirection of .onion domain to Tor proxy is how proxy routing with JS script illustrated by example in dumbproxy docs: https://github.com/SenseUnit/dumbproxy?tab=readme-ov-file#up...
immibis•7mo ago
One of the things on my cool ideas list is AF_ONION. getaddrinfo should be able to translate a .onion DNS name into an AF_ONION address immediately, and then you should be able to open an AF_ONION socket to that address. Tor would instantly be compatible with every program that doesn't assume IPv4/6 (which is shockingly few, but automatic Tor support would be a good reason to fix that). Same with I2P.

Prior to that, .onion blocking in getaddrinfo would also make sense - it would apply to a large swath of apps - and could be overridden with nsswitch.conf, perhaps.

Props to Daniel for recognizing that the situation is impossible to solve in a way that pleases everyone. Some people would just change it to meet the demands of the last person who asked, without thinking deeper.

knome•7mo ago
if they're going to be arbitrarily against env vars, like CURL_HOME, CURL_SSL_BACKEND, CURL_CA_BUNDLE, or the other dozen-ish variables curl already checks, an option in could .curlrc seem reasonable.

of course, having a CURL_ALLOW_ONION would allow the oniux program to set it, which would very easy and straight forward for both sides.

alternately, oniux could itself run a proxy and set the appropriate proxying environment variable, like HTTPS_PROXY. This would have the advantage of curl not having to do anything, but would add a rather ugly bit of complication to oniux.

seeing as the ability to run and inform curl of a proxy means oniux can already bypass the onion blocking with an envvar, adding one specifically to do that is convenient for callers, and does not expose the user to parent programs controlling onion exposure any more than it already does.

at best you could argue that requiring a full proxy makes it slightly harder for naive users to accidentally expose themselves since it would raise the bar for exposure from what curl knows, being the env var, to what curl has, in the form of an available proxy endpoint, but this isn't really a great excuse not to implement the CURL_ALLOW_ONION env var.

it's nice that curl is helpful for blocking by default, but having curl require the user to jump through hoops to unblock onion is a bit much.

remram•7mo ago
This doesn't really fix the problem. Curl is not the only tool to have implemented this block, many tools have, this was the point of Tor requesting this mechanism via an RFC. Is oniux going to set hundreds of environment variables to deactivate the block in all programs they know about? And cause users to send bug reports to all programs complying with their RFC that their tool doesn't yet know the workaround for?

The fix is much simpler: have oniux set $http_proxy (and drop non-tor traffic). This is the mechanism that makes the more sense and is in line with their own RFC.

nytpu•7mo ago
Almost like those existing env vars made it clear that they were mistakes that make behavior inconsistent (especially libcurl) and they want to avoid repeating it with additional env vars. Having almost contributed to Curl before, they repeatedly note for contributors that just because old code does something questionable doesn't mean your new code is allowed to do it—if anything, you're just highlighting the questionable piece of old code as being important for them to rewrite soon (of course they can't remove the current env vars for compatibility reasons).

And the article specifically notes that the current solution doesn't work, but it requires discussion on what the best solution is instead of just taking the literal first solution suggested by someone.

captainmuon•7mo ago
I feel like most people only use Tor via the Tor browser or a socks proxy, and the developers in the ecosystem cater only to these users. But there are a bunch of other creative uses of Tor around.

A couple of years ago, I used the TransPort feature of Tor combined with an iptables rule to redirect certain applications over Tor, like a web browser. The goal was a poor man's VPN. Access some websites without your local network admin to know about it, and without the website to know who you are. Back then there was Java applets and Flash, and this worked to hide network requests from them, too, as opposed to other solutions. Later iptables removed the feature that allowed you to filter on PID and broke my workflow. I changed it to use a dedicated unix user for tor, but that broke at some point, too, and I just got a commercial VPN.

Tor discouraged my use case, and I guess if you are afraid of being tracked or recognized as a returning user, then you should stick to Tor browser. But everybody has their own use cases.

Joker_vD•7mo ago
> redirect certain applications over Tor, like a web browser

I personally use a proxy.pac file (which all both Firefox/Chrome support) with roughly the following contents:

    function FindProxyForURL(url, host) {
        var httpProxy = "PROXY localhost:3128";
        var onionProxy = "SOCKS5 localhost:9050";

        if (host.endsWith(".onion")) {
            return onionProxy;
        }

        var proxiedDomains = [
              "example.com",
              ...
        ];

        for (var proxied of proxiedDomains) {
            if (shExpMatch(host, proxied) || shExpMatch(host, "*." + proxied)) {
                return httpProxy;
            }
        }

        return "DIRECT";
    }
The only inconvenient part is that Chrome for some stupid reason can't read this file from a file:// url, so I have to host it on my localhost; oh well.
geocar•7mo ago
Take care with this. Some people are putting sneaky code in that detects if your regular non-proxied access will receive some other network path via a .onion domain. It is not clear to me what exactly they are doing with this knowledge.
loa_in_•7mo ago
That's anecdotal or is there something to confirm this?
iaaan•7mo ago
Not the person you replied to, but theoretically, it's easy for me to imagine how that would work, so I'd definitely be wary of using a solution like this.
geocar•7mo ago
Hi. I checked your profile and it says you like to be referred to as a "black hat hacker" who is being "pursued by multiple agencies".

Can you explain exactly what you hope to do with this knowledge?

Or is it not obvious when pointed out to you that you would have a different IP address accessing a .onion address and a .com address at roughly the same time?

irelephant•7mo ago
It says "i wish" right under that.
fucker42069•7mo ago
terrible idea since .onion websites can (and many do) load resources from non-.onion urls
amiga386•7mo ago
I feel the new oniux command is doing both the right thing and the wrong thing:

- right thing: catch every network access and redirect to Tor

- wrong thing: create the user expectation that (if you remember to prepend "oniux") it'll catch every network access and redirect to Tor

It is essentially moral hazard. What happens when you accidentally forget "oniux"? Or think you've booted up a Tails environment but it's not? Or mistake the Tor Browser window for a Firefox window? You only have to resolve a DNS name _once_ for the world to know you're interested in accessing it.

I like the idea that oniux should not only intercept gethostbyname(), but also always set standard environment variables pointing to its SOCKS proxy. That way curl can do the right thing - refuse to pass .onion names to gethostbyname() - but support automatically passing them on to a proxy. If it's a non-Tor proxy, it should also do the right thing and refuse to resolve .onion addresses, leaving only safe ways forward, which is passing on name resolution to whichever proxy is configured, and the only proxy that will resolve .onion addresses is the Tor proxy.

0points•7mo ago
oniux is completely new to me, but this is not at all a new idea.

torsocks has been available doing the same thing since 2008.

irelephant•7mo ago
I'd say its advantage is being made officially by tor.
Ey7NFZ3P0nzAe•7mo ago
Had not heard about oniux:

https://blog.torproject.org/introducing-oniux-tor-isolation-...