frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Q-learning is not yet scalable

https://seohong.me/blog/q-learning-is-not-yet-scalable/
86•jxmorris12•5h ago•17 comments

Infinite Grid of Resistors

https://www.mathpages.com/home/kmath668/kmath668.htm
134•niklasbuschmann•8h ago•55 comments

I have reimplemented Stable Diffusion 3.5 from scratch in pure PyTorch

https://github.com/yousef-rafat/miniDiffusion
385•yousef_g•16h ago•69 comments

Breaking My Security Assignments

https://www.akpain.net/blog/breaking-secnet-assignments/
20•surprisetalk•2d ago•0 comments

AMD's AI Future Is Rack Scale 'Helios'

https://morethanmoore.substack.com/p/amds-ai-future-is-rack-scale-helios
56•rbanffy•9h ago•28 comments

Iconic icons to showcase your skills

https://github.com/YuheshPandian/ICONIC
20•Yuhesh•2d ago•6 comments

Have a damaged painting? Restore it in just hours with an AI-generated “mask”

https://news.mit.edu/2025/restoring-damaged-paintings-using-ai-generated-mask-0611
51•WithinReason•2d ago•30 comments

Inside the Apollo “8-Ball” FDAI (Flight Director / Attitude Indicator)

https://www.righto.com/2025/06/inside-apollo-fdai.html
138•zdw•15h ago•25 comments

Solar Orbiter gets world-first views of the Sun's poles

https://www.esa.int/Science_Exploration/Space_Science/Solar_Orbiter/Solar_Orbiter_gets_world-first_views_of_the_Sun_s_poles
209•sohkamyung•3d ago•27 comments

Chicken Eyeglasses

https://en.wikipedia.org/wiki/Chicken_eyeglasses
84•thomassmith65•4d ago•25 comments

Wrong ways to use the databases, when the pendulum swung too far

https://www.luu.io/posts/2025-database-pendulum
62•luuio•2d ago•32 comments

Waymo rides cost more than Uber or Lyft and people are paying anyway

https://techcrunch.com/2025/06/12/waymo-rides-cost-more-than-uber-or-lyft-and-people-are-paying-anyway/
318•achristmascarl•2d ago•558 comments

Dance Captcha

https://dance-captcha.vercel.app/
12•edwinarbus•2d ago•4 comments

Last fifty years of integer linear programming: Recent practical advances

https://inria.hal.science/hal-04776866v1
187•teleforce•1d ago•55 comments

Unsupervised Elicitation of Language Models

https://arxiv.org/abs/2506.10139
125•kordlessagain•18h ago•16 comments

Fixing the mechanics of my bullet chess

https://jacobbrazeal.wordpress.com/2025/06/14/fixing-the-mechanics-of-my-bullet-chess/
27•tibbar•7h ago•16 comments

Bioprospectors mine microbial genomes for antibiotic gold

https://cen.acs.org/pharmaceuticals/drug-discovery/Bioprospectors-mine-microbial-genomes-antibiotic/103/web/2025/06
5•bryanrasmussen•3d ago•0 comments

Cray versus Raspberry Pi

https://www.aardvark.co.nz/daily/2025/0611.shtml
83•flyingkiwi44•4d ago•61 comments

Seven replies to the viral Apple reasoning paper and why they fall short

https://garymarcus.substack.com/p/seven-replies-to-the-viral-apple
263•spwestwood•10h ago•200 comments

SIMD-friendly algorithms for substring searching (2016)

http://0x80.pl/notesen/2016-11-28-simd-strfind.html
207•Rendello•1d ago•31 comments

Endometriosis is an interesting disease

https://www.owlposting.com/p/endometriosis-is-an-incredibly-interesting
336•crescit_eundo•1d ago•232 comments

The Many Sides of Erik Satie

https://thereader.mitpress.mit.edu/the-many-sides-of-erik-satie/
141•anarbadalov•6d ago•31 comments

How to Build Conscious Machines

https://osf.io/preprints/thesiscommons/wehmg_v1
65•hardmaru•19h ago•68 comments

Clinical knowledge in LLMs does not translate to human interactions

https://arxiv.org/pdf/2504.18919
72•insistent•8h ago•32 comments

Sperm are very different from all other cells

https://www.bbc.com/future/article/20250613-untangling-the-mysteries-of-what-we-dont-know-about-sperm
32•viewtransform•5h ago•21 comments

TimeGuessr

https://timeguessr.com/
278•stefanpie•5d ago•58 comments

We investigated Amsterdam's attempt to build a 'fair' fraud detection model

https://www.lighthousereports.com/methodology/amsterdam-fairness/
62•troelsSteegin•2d ago•49 comments

Peano arithmetic is enough, because Peano arithmetic encodes computation

https://math.stackexchange.com/a/5075056/6708
227•btilly•1d ago•114 comments

Debunking HDR [video]

https://yedlin.net/DebunkingHDR/index.html
75•plastic3169•3d ago•43 comments

Large language models often know when they are being evaluated

https://arxiv.org/abs/2505.23836
44•jonbaer•4h ago•56 comments
Open in hackernews

Slowing the flow of core-dump-related CVEs

https://lwn.net/SubscriberLink/1024160/f18b880c8cd1eef1/
81•jwilk•4d ago

Comments

charcircuit•19h ago
>For example, the core-dump handler is launched by the kernel as a user-mode helper, meaning that it runs fully privileged in the root namespace.

Why is it not run as a dedicated core dump user?

>the core-dump socket to a helper can be intercepted

There have been several vulnerabilities related to this feature of passing core files to a container. I question if this feature is actually worth it considering one probably wants to have shared infrastructure for crash reporting anyways.

rwmj•17h ago
> Why is it not run as a dedicated core dump user?

You could imagine an API that sets the UID of this user, and the kernel could easily run the coredump handler as that user, but the kernel can't so easily automate the creation of a complicated namespace to contain that process (and the process can't do it itself because it could be exploited before it gets around to it). Look at the code in runc some time to see how complicated setting up a namespace has got.

> one probably wants to have shared infrastructure for crash reporting anyways

Not really on a single machine. coredumpctl actually works very well for solo development, I use it all the time.

nolist_policy•15h ago
You're thinking to complicated. You can configure the coredump helper in a way that the kernel presents it with the coredump on stdin. So you drop privileges and self-sandbox at startup and only then start reading the coredump from stdin.

IIUC Ubuntu and systemd however choose to dump the process manually for some reason and for that you need to have same permission as the target process.

charcircuit•13h ago
>You could imagine an API that sets the UID of this user

No, I think there should be a dedicated user. People will configure it in insecure ways if you let them.

>easily automate the creation of a complicated namespace to contain that process

Why is this being done. The core dump has already been created.

>coredumpctl actually works

Coredumpctl would still be possible without forwarding.

bandrami•2h ago
Wouldn't that user have to be able to access arbitrary kernel memory, meaning there's little point in it not being root?
mort96•19h ago
I'm having a hard time parsing this because I don't understand what "****" is supposed to mean in "**** API". Is it a "shit API" or "crap API", indicating that the API has problems? Is it a "damn API", which just indicates that the author of the quote is annoyed but there's nothing wrong with the API itself?

I assume it's meant to be the first meaning, that the API is bad? But the censorship honestly makes me a bit unclear.

lionkor•18h ago
4 star API

I'm not sure why people do this censoring; who are they trying to get into good relations with?

Either swear, or don't.

eru•16h ago
I have sympathies for your view; but sometimes it's funnier to fake censor things. Though that's more of an artistic choice for comedy, than something to do in a technical piece.

Compare https://tvtropes.org/pmwiki/pmwiki.php/Main/CensoredForComed...

remram•15h ago
This is not that, though.
eru•4h ago
Yes, it's going off on a tangent and replying only to the 'Either swear, or don't.' bit.
majormajor•14h ago
If it was an article posting a censored version of a quote, that would be pretty normal. Some publications care about different audiences than the people they are quoting might.

Seems weird when you click through the link and it's the original social media post where the author censored himself. Just say "super poor" or something then.

DeepYogurt•15h ago
Good to see CVEs driving design change I guess
10000truths•10h ago
The design of core dump handling in Linux leaves much to be desired. Among its several flaws, the biggest is that it is a global setting, accessible only by the root user. A proper design would either allow it to be isolated via namespace, or delegated to a reaper/subreaper process (in an opt-in fashion for back-compat). There has been discussion of the former idea [0] and even a submitted patch [1], but it seems like it never went anywhere.

[0]: https://groups.google.com/g/linux.kernel/c/hJLP3XcKKSY

[1]: https://mail-archive.com/linux-kernel@vger.kernel.org/msg107...

inopinatus•5h ago
This flurry of effort reminds me of that time in the '90s when I had the privilege of exploiting a core dump mishandling for real after a friend of mine forget the root password for his ISP's nameserver.