frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma

https://rhodesmill.org/brandon/2009/commands-with-comma/
143•theblazehen•2d ago•42 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
668•klaussilveira•14h ago•202 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
949•xnx•19h ago•551 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
122•matheusalmeida•2d ago•33 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
53•videotopia•4d ago•2 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
229•isitcontent•14h ago•25 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
16•kaonwarb•3d ago•19 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
28•jesperordrup•4h ago•16 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
223•dmpetrov•14h ago•117 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
330•vecti•16h ago•143 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
494•todsacerdoti•22h ago•243 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
381•ostacke•20h ago•95 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
359•aktau•20h ago•181 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
288•eljojo•17h ago•169 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
412•lstoll•20h ago•278 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
19•bikenaga•3d ago•4 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
63•kmm•5d ago•6 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
90•quibono•4d ago•21 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
256•i5heu•17h ago•196 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
32•romes•4d ago•3 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
44•helloplanets•4d ago•42 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
12•speckx•3d ago•5 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
59•gfortaine•12h ago•25 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
33•gmays•9h ago•12 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1066•cdrnsf•23h ago•446 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
150•vmatsiiako•19h ago•67 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
288•surprisetalk•3d ago•43 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
149•SerCe•10h ago•138 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
183•limoce•3d ago•98 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
73•phreda4•13h ago•14 comments
Open in hackernews

Coming to Apple OSes: A seamless, secure way to import and export passkeys

https://arstechnica.com/security/2025/06/apple-previews-new-import-export-feature-to-make-passkeys-more-interoperable/
23•01-_-•7mo ago

Comments

newscracker•7mo ago
> The private key remains bound to the user device, where it can’t be extracted.

So what exactly is being transferred with this new cross platform mechanism? Isn’t it the same private key, except that it’s a direct device-to-device transfer?

This export and import of passkeys also seems to blur the lines between passwords and passkeys a little more. If every device supported a built in password manager that generates a random password on signup with a service, stores it securely and then the platforms implement a secure password export and import mechanism where the CSV/JSON/whatever file is encrypted and kept only in memory during a direct device-to-device transfer, that would be close to this, right?

Other than passkeys being randomly generated for each site (and linked to it) and tied to some kind of biometric authentication, it looks like passwords and passkeys are converging (except for some implementation details).

The biggest advantage (which could also be considered a disadvantage from a different angle) with passwords is that one can use it from any device without having their primary device close by. With passkeys, the primary device must be close by if one wants to authenticate with a service on another device.

The biggest disadvantage with passkeys is that if one’s primary device is lost, they wouldn’t be able to login to services. The recovery process would also have to be the same old personal information check or (ugh) secret questions or a link sent to an email address or (ouch) an OTP by SMS to a new replacement device.

lapcat•7mo ago
Passkeys are basically the same as ssh keys. What the big tech corporations have "added" is a walled garden. Apparently you can now transfer from one walled garden to another walled garden, Apple iCloud Keychain to 1Password or Google or whatever, but they completely distrust users and refuse to allow users to get directly to the private keys. In other words, they've added paternalism.

I personally don't want to use any "cloud" syncing service, no matter whose it is. I just want to manage my own credentials and back them up myself, like I do with my passwords. Local-only, with offsite backups controlled only by me, is my principle for almost everything. I don't object to the existence of cloud syncing services, as an option for users, but I do object to the forced paternalism on everyone.

One of the great things about passwords is that they are completely device-independent. You can write a password down on a piece of paper. You can do that with an ssh private key too, by the way. It's the ultimate backup that resists all vendor lock-in.

anon7000•7mo ago
Anyone can write a password manager which supports passkeys for iOS, and there are plenty of third party ones that already exist! Passkeys are (technically device independent too.
daft_pink•7mo ago
I think the criticism is there is no way for the user to access their own passkeys. For example, if you go into 1password, you cannot export your passkey, you cannot view your passkey.

You’ve essentially walked into a form of vendor lockin without that ever being explained to the user and it looks like they are building a way to move from vendor to vendor, but you never get direct access yourself for whatever reason.

pabs3•7mo ago
keepassxc has a passkey implementation that can export passkeys.
diggernet•7mo ago
> So what exactly is being transferred with this new cross platform mechanism? Isn’t it the same private key, except that it’s a direct device-to-device transfer?

The sentence you quote is describing passkeys, not this new transfer mechanism. I assume this does transfer the private key.

Oh the other hand, while the article is short on details, it sure sounds like this only supports a move operation, where the passkey is removed from the first device and installed on the second. Which means it'll so nothing for disaster recovery, because they are still assuming your one passkey device will always be present and functional. For example, say your iPhone is smashed and you decide to buy an Android replacement. Nope, sorry, first you need to buy an iPhone to restore from iCloud, then you can transfer to Android.

It really needs to be possible to back up passkeys, no matter how much the advocates say we shouldn't be allowed to do that.

anon7000•7mo ago
> Other than passkeys being randomly generated for each site (and linked to it) and tied to some kind of biometric authentication, it looks like passwords and passkeys are converging (except for some implementation details).

The fact that a passkey can only be used with the ONE site it was generated at, that it can encode the identity of the user as well as the password, and that there is a standardized, programmatic way to submit/retrieve a passkey to a website are all huge security upgrades over passwords. So no, they aren’t really converging in the ways that matter.

Syncing, export, whatever, are just implementation details of the platform and aren’t really related to the passkey standards.

Someone could create an iOS password manager for passkeys that stores the private keys in plain text for you to view and write down on paper. Of course, the major apps & platforms don’t do that because it’s not a popular feature (or secure), but anyone can write a password app for iOS

krackers•7mo ago
I don't get those benefits: randomly generated password is by definition only going to be usable at the site it was generated for. I'm not sure what it means for a password to "encode my identity", but if it includes device-specific bits then that seems like an anti-feature. And autofill for passwords is mostly good enough as a standardized way to input passwords saved in a password manager.
ghusto•7mo ago
Too little, hopefully too late.

I can export to another device, _whilst I still have my current device_? That's only half the story, and a little of the anxiety. The real issue is; what happens when my devices are gone? If I get robbed, I'm not sure they're going to be considerate enough to leave me one of my devices so I can still have access to my passkeys.

pabs3•7mo ago
Just add some backup passkeys you store in a safe place, like a Yubikey in a physical safe.