frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Study mode

https://openai.com/index/chatgpt-study-mode/
511•meetpateltech•4h ago•322 comments

More honey bees dying, even as antibiotic use halves

https://news.uoguelph.ca/2025/07/more-honey-bees-dying-even-as-antibiotic-use-halves/
74•pseudolus•1h ago•38 comments

Maru OS – Your phone is your PC

https://maruos.com/
94•fsflover•2h ago•71 comments

Learning basic electronics by building fireflies

http://a64.in/posts/learning-basic-electronics-by-building-fireflies/
126•signa11•4h ago•29 comments

Launch HN: Hyprnote (YC S25) – An open-source AI meeting notetaker

110•yujonglee•5h ago•69 comments

BugBash Ep1 – FoundationDB: from idea to Apple acquisition [video]

https://www.youtube.com/watch?v=C1nZzQqcPZw
38•zdw•3d ago•1 comments

A month using XMPP (using Snikket) for every call and chat (2023)

https://neilzone.co.uk/2023/08/a-month-using-xmpp-using-snikket-for-every-call-and-chat/
56•ColinWright•3h ago•24 comments

Show HN: I built an AI that turns any book into a text adventure game

https://www.kathaaverse.com/
147•rcrKnight•5h ago•65 comments

Microsoft Flight Simulator 2024: WebAssembly SDK

https://docs.flightsimulator.com/msfs2024/html/6_Programming_APIs/WASM/WebAssembly.htm
88•breve•3d ago•45 comments

Show HN: A GitHub Action that quizzes you on a pull request

https://github.com/dkamm/pr-quiz
39•dkamm•3h ago•18 comments

A Periodic Table of System Design Principles

https://github.com/jarulraj/periodic-table
46•qianli_cs•3h ago•24 comments

Playing with Open Source LLMs

https://alicegg.tech//2025/07/29/open-source-llm.html
40•zer0tonin•2h ago•28 comments

Observable Notebooks 2.0 Technology Preview

https://observablehq.com/notebook-kit/
162•mbostock•6h ago•40 comments

Supervised Fine Tuning on Curated Data is Reinforcement Learning

https://arxiv.org/abs/2507.12856
11•GabrielBianconi•1h ago•3 comments

PAX Markets (YC W25) is hiring a founding principal hardware (RTL) engineer

https://www.ycombinator.com/companies/pax-markets/jobs/qv4p3Al-founding-principal-hardware-engineer
1•etep•4h ago

Irrelevant facts about cats added to math problems increase LLM errors by 300%

https://www.science.org/content/article/scienceadviser-cats-confuse-ai
215•sxv•6h ago•108 comments

Stanford’s Management Science and Engineering programs

https://poetsandquants.com/2025/07/28/the-secret-stanford-program-no-ones-heard-about/
27•curioustock•3h ago•21 comments

My 2.5 year old laptop can write Space Invaders in JavaScript now (GLM-4.5 Air)

https://simonwillison.net/2025/Jul/29/space-invaders/
397•simonw•7h ago•293 comments

How the brain increases blood flow on demand

https://hms.harvard.edu/news/how-brain-increases-blood-flow-demand
18•gmays•2h ago•4 comments

RIP Shunsaku Tamiya, the man who made plastic model kits a global obsession

https://JapaneseNostalgicCar.com/rip-shunsaku-tamiya-plastic-model-kits/
7•fidotron•35m ago•1 comments

The Making of Dario Amodei

https://www.bigtechnology.com/p/the-making-of-dario-amodei
15•spenvo•2h ago•0 comments

Linux 6.16: faster file systems, improved confidential memory, more Rust support

https://www.zdnet.com/article/linux-6-16-brings-faster-file-systems-improved-confidential-memory-support-and-more-rust-support/
87•CrankyBear•3h ago•28 comments

2D to 3D model and 3D print it

https://www.amodeling.com/
8•Jimmy6929•3d ago•4 comments

A grand tour through the essays of Lewis H. Lapham

https://www.laphamsquarterly.org/roundtable/motet-record
22•samclemens•3d ago•0 comments

Show HN: Monchromate – the best greyscale browser extension

https://monochromate.lirena.in
19•lirena00•3h ago•2 comments

Project Zero – Policy and Disclosure: 2025 Edition

https://googleprojectzero.blogspot.com/2025/07/reporting-transparency.html
71•esnard•6h ago•21 comments

Playing with more user-friendly methods for multi-factor authentication

https://tesseral.com/blog/i-designed-some-more-user-friendly-methods-for-multi-factor-authentication
33•noleary•23h ago•17 comments

Linux Performance Analysis (2015)

https://netflixtechblog.com/linux-performance-analysis-in-60-000-milliseconds-accc10403c55
153•benjacksondev•8h ago•32 comments

Pony: An actor-model, capabilities-secure, high-performance programming language

https://www.ponylang.io/discover/
262•RossBencina•15h ago•195 comments

The Saltgator: A Desktop SoftGel Injection Molding Machine

https://www.core77.com/posts/137875/The-Saltgator-A-Desktop-SoftGel-Injection-Molding-Machine
49•surprisetalk•2d ago•19 comments
Open in hackernews

Exploiting zero days in abandoned hardware

https://blog.trailofbits.com/2025/07/25/exploiting-zero-days-in-abandoned-hardware/
99•ingve•4d ago

Comments

myself248•11h ago
> If you have an EOL device, it may not be necessary to throw it away, but you should consider the risks of continuing to use it. For consumers, this necessitates careful consideration not just of a device’s features but its entire security lifecycle, including manufacturer support commitments and community firmware options.

Which I read as "Don't buy it in the first place, if it's not already supported by OpenWRT."

Simple enough.

iszomer•8h ago
This was my baseline 20 or so years ago starting from the WRT54G. Now, it's just a bullet point in the miscellaneous section of my cv.
sidewndr46•8h ago
I find the EOL aspect of this discussion out of place. These devices shipped like this. They didn't gain these vulnerabilities due to aging or something like that.

You can have a device that is 100% supported by everyone from the chip vendor, board assembler, and an OEM that is still trivially vulnerable.

yjftsjthsd-h•7h ago
If it's supported, then as soon as somebody finds a vulnerability (and notifies the vendor) it should get fixed.
tonyhart7•7h ago
or they sell them to blackmarket as 0 day exploit
sidewndr46•6h ago
Why would I care if I have already been compromised? It's like I was murdered and the prosecutor leaves a "got em!" note on my grave after a conviction. I don't think I'm going to care very much.
kej•1h ago
It would matter quite a bit to the next person on the murderer's hit list, just like it matters to people whose devices haven't been compromised yet.
swinglock•7h ago
My thought too. They are not insecure because they won't be patched, they are just insecure. Even if patched, what's to say there are not 99 other vulnerabilities lurking, even in their supported products?
sidewndr46•6h ago
I seem to remember at least one case where a manufacturer attempted to patch an issue like this and managed to actually introduce another one in its place.
Hilift•7h ago
It's probably relevant due to companies usually dump EOL hardware, and some of it gets a new life in a non-business environment. But if it needs a firmware update for a security vulnerability you're out of luck. There is legitimate commercial market for used EOL hardware as parts for people that keep old hardware a bit longer, but that's probably short term until it can be replaced.
sidewndr46•6h ago
But no one should be buying or using these devices when they are brand new. Why would I care about them when used?
Zigurd•5h ago
I bought a TV on deep discount. The Android TV OS was already trailing-edge and soon went unsupported. Being just a little paranoid, I monitored the network for continued activity after I removed the network configuration from the built-in software, which I replaced with an external device that's fully supported. I doubt many of the other customers for this cheap TV are as vigilant.
bee_rider•4h ago
There really ought to be an “open source your drivers or offer a refund” law for companies that want to EOL devices. It isn’t the 90’s anymore, hardware innovation has really slowed, a chip could be good for decades.
nickpsecurity•5h ago
The differences are vulnerability disclosure, vulnerability class, and patch availability. The device is most-vulnerable between the moment common hackers know how to exploit it and when a patch (or mitigation) for that vulnerability is applied.

Older hardware has had longer for vulnerabilities to be found. Some might not mitigate new classes of vulnerabilities. The EOL hardware will not receive patches for any vulnerabilities. So, they're at higher risk of attack.

From there, the attack will be either malicious input to that machine over the network or a file that embeds an attack. Many problems can be mitigated by running secure software, esp for input validation, on that hardware. One might also use them offline or on trusted networks with software that's hand-chosen for them. (That's what I do.)

ge96•3h ago
I'm wondering if not upgrading from Win 10 to Win 11 will be considered EOL

I have a powerful gaming desktop but says not eligible to upgrade to win 11

gnopgnip•1h ago
After Oct 14, yes. You won't receive security patches
ge96•44m ago
sucks gotta dump the box, excuse to get an SFF I guess
nickpsecurity•5h ago
I do want to note about the secure, update claim that there is a tension between providing systems that can't receive false updates and giving users control of their hardware. Solutions for the former often prevent the latter.

An alternative would be to have the firmware show a description of the signed content, like version information, that the user must OK. It might show it along with the current version with a warning if versions are downgrading or the whole thing is changing. The warning might tell you to be sure of the source of this update. If it's the same software, and another version, it might be set to automatically update.

If it's the lowest-level, unrecoverable firmware, I like it being hard for attackers to change it. One idea I used to push was putting that in EEPROM with a jumper (or switch) required to update it. The software will have already performed numerous checks from the kernel state to the payload with external inputs (eg networking) shut down. If malicious, it can't do anything without that physical interaction.

The regular, update mechanism which uses other storage is in that EEPROM. It has highly, security-enhanced mechanisms for updates. It might even have it's own partition if it's a microkernel-based system. So, we have one that's hard to attack with software while the other takes physical attack or social engineering. Also, I think a Chromebook or something implemented a ROM/flash combo.

variadix•4h ago
I feel like there are better ways to make it hard to push malicious updates, while still allowing a user to flash their own devices.

For example: manufacturer bakes in their public key and a per device public/private key pair. The bootloader checks firmware updates against the manufacturers public key and the per device public key. The per device private key is only readable with hardware access via serial or USB etc. The user can extract their device’s private key to be able to sign their own firmware updates. Additionally, the bootloader could support adding new public keys to verify firmware with, so long as the payload to add the new public key was signed by the per device key. This would simplify getting updates from e.g. OpenWRT if they have their own key pair they sign with, vs requiring each user to sign each firmware update with their personal key.

bornfreddy•5h ago
I have mixed feelings about the message "no updates -> vulnerable". The vulnerabilities have been in these devices all along. Some techniques for uncovering them got better over time, but I would guess not substantially. So why should abandoned hardware be any riskier than a brand new router, whose vulnerabilities haven't yet been discovered?

If they support OpenWRT or similar, fair enough - maturity does bring some additional safety. But in general this is not the case. Or am I missing something?

ectospheno•4h ago
This is why my routers are dell computers with an intel quad port nic and openbsd installed. Dell gives bios updates far past most other vendors, intel nics just work, and openbsd is trivial to upgrade and gets updates.
jgalt212•3h ago
Is Android TV OS planned obsolescence for Sony (et al) TVs?
dguido•3h ago
In case anyone is looking for them, here are the exploits for these EOL devices. I avoided allowing Trail of Bits to release exploits for 13 years, but I decided it was finally time for a policy change. We'll be dropping a lot more as time goes on now.

Here's the exploit for the Netgear WGR614v9: https://github.com/trailofbits/exploits/tree/main/junkyard-2...

Here's the exploit for the BitDefender Box 1: https://github.com/trailofbits/exploits/tree/main/junkyard-2...

There's a lot of included detail so you can learn how to write your own and really understand every decision we made in writing them.