frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Modifying an HDMI dummy plug's EDID using a Raspberry Pi

https://www.downtowndougbrown.com/2025/06/modifying-an-hdmi-dummy-plugs-edid-using-a-raspberry-pi/
38•zdw•1h ago•2 comments

Red Hat Linux in 1998 (2009)

https://linuxgazette.net/165/laycock.html
24•marcodiego•57m ago•2 comments

Canyon.mid

https://canyonmid.com/
129•LorenDB•3h ago•61 comments

How to modify Starlink Mini to run without the built-in WiFi router

https://olegkutkov.me/2025/06/15/how-to-modify-starlink-mini-to-run-without-the-built-in-wifi-router/
134•LorenDB•4h ago•38 comments

Datalog in Rust

https://github.com/frankmcsherry/blog/blob/master/posts/2025-06-03.md
155•brson•5h ago•16 comments

Social anxiety disorder-associated gut microbiota increases social fear

https://www.pnas.org/doi/abs/10.1073/pnas.2308706120
51•thunderbong•50m ago•11 comments

1k year old 3 sisters crop farm found in Northern Michigan

https://www.smithsonianmag.com/smart-news/massive-field-where-native-american-farmers-grew-corn-beans-and-squash-1000-years-ago-discovered-in-michigan-180986758/
86•CoopaTroopa•3d ago•33 comments

Childhood leukemia: how a deadly cancer became treatable

https://ourworldindata.org/childhood-leukemia-treatment-history
32•surprisetalk•3h ago•7 comments

Biofuels Policy, a Mainstay of American Agriculture, a Failure for the Climate

https://insideclimatenews.org/news/13062025/agriculture-ethanol-biofuel-policy-climate-failure/
21•rntn•1h ago•3 comments

The Art of Lisp and Writing (2003)

https://www.dreamsongs.com/ArtOfLisp.html
129•Bogdanp•9h ago•46 comments

How easy is it for a developer to "sandbox" a program?

https://kristaps.bsd.lv/devsecflops/
22•zdw•4d ago•3 comments

Foundations of Computer Vision

https://visionbook.mit.edu
41•tzury•6h ago•0 comments

The Keyset

https://dougengelbart.org/content/view/273/
9•tosh•3h ago•2 comments

Journalists Wary of Travelling to US Due to Palantir Surveillance

https://bsky.app/profile/alistairkitchen.bsky.social/post/3lrjsdecc5c2x
108•Kapura•1h ago•37 comments

Text-to-LoRA: Hypernetwork that generates task-specific LLM adapters (LoRAs)

https://github.com/SakanaAI/text-to-lora
56•dvrp•3d ago•1 comments

Tiny-diffusion: A minimal implementation of probabilistic diffusion models

https://github.com/tanelp/tiny-diffusion
47•BraverHeart•9h ago•1 comments

Q-learning is not yet scalable

https://seohong.me/blog/q-learning-is-not-yet-scalable/
189•jxmorris12•16h ago•38 comments

I have reimplemented Stable Diffusion 3.5 from scratch in pure PyTorch

https://github.com/yousef-rafat/miniDiffusion
445•yousef_g•1d ago•71 comments

CI/CD Observability with OpenTelemetry Step by Step Guide

https://signoz.io/blog/cicd-observability-with-opentelemetry/
102•ankit01-oss•4d ago•32 comments

Infinite Grid of Resistors

https://www.mathpages.com/home/kmath668/kmath668.htm
196•niklasbuschmann•18h ago•100 comments

Ruby on Rails Audit Complete

https://ostif.org/ruby-on-rails-audit-complete/
137•todsacerdoti•3d ago•87 comments

Show HN: Meow – An Image File Format I made because PNGs and JPEGs suck for AI

https://github.com/Kuberwastaken/meow
73•kuberwastaken•4h ago•62 comments

Bits and bobs related to Wireless-Tag's WT32-ETH01 board

https://github.com/egnor/wt32-eth01
9•johnnyApplePRNG•2d ago•0 comments

Waymo rides cost more than Uber or Lyft and people are paying anyway

https://techcrunch.com/2025/06/12/waymo-rides-cost-more-than-uber-or-lyft-and-people-are-paying-anyway/
444•achristmascarl•3d ago•756 comments

Notes on the History of the Map Tile

https://placing.technology/notes-on-the-history-of-the-map-tile
28•altilunium•7h ago•4 comments

The Talented Ms. Highsmith

https://yalereview.org/article/working-for-patricia-highsmith
20•Caiero•1d ago•1 comments

AMD's AI Future Is Rack Scale 'Helios'

https://morethanmoore.substack.com/p/amds-ai-future-is-rack-scale-helios
116•rbanffy•20h ago•67 comments

Meta-analysis of three different notions of software complexity

https://typesanitizer.com/blog/complexity-definitions.html
74•ingve•1d ago•13 comments

Breaking My Security Assignments

https://www.akpain.net/blog/breaking-secnet-assignments/
75•surprisetalk•3d ago•14 comments

Nvidia CEO criticizes Anthropic boss over his statements on AI

https://www.tomshardware.com/tech-industry/artificial-intelligence/nvidia-ceo-slams-anthropic-chief-over-claims-of-job-eliminations-says-many-jobs-are-going-to-be-created
87•01-_-•2h ago•112 comments
Open in hackernews

Breaking My Security Assignments

https://www.akpain.net/blog/breaking-secnet-assignments/
75•surprisetalk•3d ago

Comments

red_admiral•9h ago
I feel if you solve a security assignment by hacking the system, YOU'RE DOING IT RIGHT. I hope you get a first-class mark for this.

Also, https://xkcd.com/2385/

dmurray•9h ago
It's important that he's hacking a system developed by (presumably) his lecturer or professor, not by the university's IT department.

The professor hopefully has an interest in actual security research and some level of intellectual curiosity in general. The IT department is more likely to run on security by checklist and certification, and much more likely to throw the student under the bus of some Academic Misconduct Committee.

cornfieldlabs•8h ago
(She's a girl btw)
dmurray•5h ago
Oops - I'm sorry!
red_admiral•5h ago
It's a locally run VM, so I doubt IT even knows what's in there and wouldn't notice what you're doing with it. How do you know if a student mounts the disk of a VM locally that they've already downloaded to their laptop?

The goal of the assignment is to exploit something anyway, just not necessarily this way. And she got her professor's consent to publish the article.

It seems the system was moved to the cloud in later years with ssh-only access. Exploiting something inside the VM should be fine and maybe a feature for some assignments - probably one reason it's a VM in the first place. It's not like anyone's hacking the university network.

Since there's mention of `@bham.ac.uk` - I forget if it was Birmingham or Brighton or someone else, but the way things work in GB is teachers submit "unreleased" grades after marking their exams, an exam board approves or fiddles with these grades, and then the grades for all students on a course are released together on "results day". A CS student got in trouble somewhere because they passed around the info that you could see unreleased grades in the "learning mangement system" by selecting "view source" and looking for the "display:none" entries in a table or something like that.

akpa1•46m ago
The professor did take this very well, as it happened - he asked me to come along to one of his office hours to discuss how I did it and what I might do to prevent it, among other things. The quote "if you can exploit it like this, you're not really the target audience and you've already achieved the aims of the module" from the article is basically something he said to me word-for-word in that chat - in the end, it almost seemed like he was hoping someone would go after the implementation itself!

(I wrote this article)

dmurray•9h ago
Great post and great attitude. Little bit of a mixed message from this:

> Within the aims of the module this is fine - this is an introuction to security module so if you can exploit it like this, you're not really the target audience and you've already achieved the aims of the module.

> This isn't going to save me any time - I still need to do the assignments because they're assignments for a University module, which is supposed to teach me things. If I don't do the assignments and effectively cheat by submitting tokens I recover this way, I personally will suffer and not know what I'm doing in enough detail when it comes to the final exam and just generally will lack this knowledge that might be useful in future.

Which is it? This introduction to security module couldn't possibly have anything to teach someone who already has this level of ability, or it could?

pastage•8h ago
When you do problems from books, you do them to get faster and to discover edge cases and that is where you learn stuff. Being able to mount a disk image is a good thing to know how to do in security research, but it is not enough.

I do not know how these exercise were made but it sounds like in the beginning they had a central server for tests probably not security things and then someone just moved that software to VMs to let the students be more flexible.

glitchc•3h ago
You may be right, of course. However, it's worth noting that switching to VMs changed the security posture of the exercise and it's not an encouraging sign that the cybersecurity faculty did not pick up on it.
saghm•8h ago
To me, the first paragraph you quoted seems to be describing the modules themselves in the abstract, whereas the latter is about the university testing environment. There are plenty of things that I could do given ample time and the ability to look things up but would struggle to answer detailed questions about in a timed context without any notes or access to the internet. l think it's a fairly well-established concept that actively restating something you already know helps with recall later, like how the act of writing notes is considered to be useful even independent of studying them later. In the outside world, if you already know these concepts, you'll be able to refresh yourself about them easily enough whenever you end up needing to use them, but when you're getting tested in school, you need to do the refresher beforehand, and going through the exercises as they're intended is a pretty reasonable way to do that.
akpa1•29m ago
I see the contradiction there!

The bit about the "aims of the module" comes from its aims to get people thinking in a certain way about security, something I definitely already had. But that doesn't mean it had nothing to teach me - it was quite a while ago that I took it, but one exercise about the nuances of the setuid bit and how misconfigurations could be exploited stands out as something I doubt I'd have come across otherwise. There was also plenty of content on cryptography and basic binary reverse engineering/attacks that I'd not seen before.

My level of ability and knowledge isn't consistent - some places I'd dug into more, and some less. With tech, there's always a more detail to be explored and more learning to be done, even in areas I'm familiar with.

(I wrote the article)

Oleksii1n•8h ago
I still don't understand why they must compile assignments' source code on your instance. Why can't assignments be pre-compiled and shared as binary to prevent open code data?
saghm•8h ago
I don't think they did need to; the author mentioned this in one of the footnotes:

> I'm a little surprised that the source code was included as opposed to precompiled .class files to further obfuscate what's going on, but then again by this point, with the GPG encryption and all, I don't imagine the module team was focused on preventing me from meddling around as much as they were focused on getting a module out of the door

glitchc•4h ago
Kudos for breaking the environment in a security course.

> This entire attack was possible because I have the VM's disk image right here on my computer and I can do absolutely whatever I want to it, such as overriding its access control settings.

This is the key insight. Protecting via VMs and obfuscations does not provide security equivalent to network boundaries and hardware protections. While the encryption step may have helped, it was self-defeating as the key was stored on the VM and the VM was in your control. It would have been much harder (perhaps impossible) to crack if the unique key was ephemerally sourced from a server prior to every decryption coupled with some end state from the exercise.

> Within the aims of the module this is fine - this is an introuction to security module so if you can exploit it like this, you're not really the target audience and you've already achieved the aims of the module.

Yes, it's clear to me that the course has little left to teach you. At this point I would just submit the generated tokens for every assignment and read more complex material. I say this as an academic and a cybersecurity expert.