frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

GPT-5: Overdue, overhyped and underwhelming. And that's not the worst of it

https://garymarcus.substack.com/p/gpt-5-overdue-overhyped-and-underwhelming
139•kgwgk•1h ago•83 comments

How I code with AI on a budget/free

https://wuu73.org/blog/aiguide1.html
55•indigodaddy•2h ago•15 comments

Abusing Entra OAuth for fun and access to internal Microsoft applications

https://research.eye.security/consent-and-compromise/
71•the1bernard•3h ago•14 comments

Show HN: The current sky at your approximate location, as a CSS gradient

https://sky.dlazaro.ca
545•dlazaro•11h ago•111 comments

GPTs and Feeling Left Behind

https://whynothugo.nl/journal/2025/08/06/gpts-and-feeling-left-behind/
26•Bogdanp•2h ago•8 comments

My Lethal Trifecta talk at the Bay Area AI Security Meetup

https://simonwillison.net/2025/Aug/9/bay-area-ai/
265•vismit2000•10h ago•83 comments

A CT scanner reveals surprises inside the 386 processor's ceramic package

https://www.righto.com/2025/08/intel-386-package-ct-scan.html
158•robin_reala•7h ago•45 comments

R0ML's Ratio

https://blog.glyph.im/2025/08/r0mls-ratio.html
37•zdw•12h ago•3 comments

Ch.at – a lightweight LLM chat service accessible through HTTP, SSH, DNS and API

https://ch.at/
76•ownlife•6h ago•19 comments

OpenFreeMap survived 100k requests per second

https://blog.hyperknot.com/p/openfreemap-survived-100000-requests
358•hyperknot•11h ago•74 comments

Debian 13 "Trixie"

https://www.debian.org/News/2025/20250809
510•ducktective•6h ago•191 comments

People returned to live in Pompeii's ruins, archaeologists say

https://www.bbc.com/news/articles/c62wx23y2v1o
31•bookofjoe•2d ago•5 comments

Just Buy Nothing: A fake online store to combat shopping addiction

https://justbuynothing.com/
13•Improvement•1h ago•1 comments

Who got arrested in the raid on the XSS crime forum?

https://krebsonsecurity.com/2025/08/who-got-arrested-in-the-raid-on-the-xss-crime-forum/
50•todsacerdoti•3d ago•1 comments

Quickshell – building blocks for your desktop

https://quickshell.org/
240•abhinavk•4d ago•31 comments

Long-term exposure to outdoor air pollution linked to increased risk of dementia

https://www.cam.ac.uk/research/news/long-term-exposure-to-outdoor-air-pollution-linked-to-increased-risk-of-dementia
242•hhs•12h ago•78 comments

Don't "let it crash", let it heal

https://www.zachdaniel.dev/p/elixir-misconceptions-1
5•ahamez•3d ago•0 comments

A Simple CPU on the Game of Life (2021)

https://nicholas.carlini.com/writing/2021/unlimited-register-machine-game-of-life.html
30•jxmorris12•3d ago•4 comments

An AI-first program synthesis framework built around a new programming language

https://queue.acm.org/detail.cfm?id=3746223
59•tosh•9h ago•3 comments

How I use Tailscale

https://chameth.com/how-i-use-tailscale/
167•aquariusDue•3d ago•32 comments

Stanford to continue legacy admissions and withdraw from Cal Grants

https://www.forbes.com/sites/michaeltnietzel/2025/08/08/stanford-to-continue-legacy-admissions-and-withdraw-from-cal-grants/
165•hhs•12h ago•322 comments

Consistency over Availability: How rqlite Handles the CAP theorem

https://philipotoole.com/consistency-over-availability-how-rqlite-handles-the-cap-theorem/
20•otoolep•3d ago•1 comments

Did California's fast food minimum wage reduce employment?

https://www.nber.org/papers/w34033
67•lxm•15h ago•161 comments

MCP overlooks hard-won lessons from distributed systems

https://julsimon.medium.com/why-mcps-disregard-for-40-years-of-rpc-best-practices-will-burn-enterprises-8ef85ce5bc9b
248•yodon•10h ago•139 comments

ESP32 Bus Pirate 0.5 – A hardware hacking tool that speaks every protocol

https://github.com/geo-tp/ESP32-Bus-Pirate
98•geo-tp•10h ago•21 comments

An engineer's perspective on hiring

https://jyn.dev/an-engineers-perspective-on-hiring
56•pabs3•15h ago•81 comments

Testing Bitchat at the music festival

https://primal.net/saunter/testing-bitchat-at-the-music-festival
71•alexcos•3d ago•40 comments

Ratfactor's illustrated guide to folding fitted sheets

https://ratfactor.com/cards/fitted-sheets
128•zdw•13h ago•18 comments

Installing a mini-split AC in a Brooklyn apartment

https://probablydance.com/2025/08/04/installing-a-mini-split-ac-in-a-brooklyn-apartment/
55•ibobev•3d ago•98 comments

Isle FPGA Computer: creating a simple, open, modern computer

https://projectf.io/isle/fpga-computer.html
37•pabs3•3d ago•4 comments
Open in hackernews

How I use Tailscale

https://chameth.com/how-i-use-tailscale/
167•aquariusDue•3d ago

Comments

sixothree•3d ago
I love me some tailscale. But it kills the battery on my phone and it kills resolve.conf every time I boot wsl. I wish I had better luck.
em-bee•2d ago
i use zerotier without problems on the phone. yes, they are no longer open source, but source is accessible and it's not worth the effort to switch.
th0ma5•2h ago
Straight WireGuard to a single point is completely not noticeable.
8n4vidtmkvmk•3d ago
Sounds a bit like a fancier ngrok.

Accidentally wiring everything to everything else sounds kind of scary.

There's 1 or 2 things I wouldn't mind securely exposing to the internet (like Plex) but nothing I need so desperately while I'm out and about that I'd even want to take that risk.

Sounds like this is just for self-hosting?

oliyoung•3d ago
> Sounds a bit like a fancier ngrok.

Well, yes and no.

You can use it like ngrok, and I'm sure you could configure wireguard and ngrok to give you something similar to what Tailscale does, but Tailscale does it out of the box, with polished and well built client and server apps.

I'm no infra guy, I'm just a former front-end eng, but it gives me the confidence to expose media centres and file servers etc to "the wild" without it being public.

Using Jellyfin to watch content from my home server on my iPad while I'm away from home is as "easy" as Disney or Netflix with Tailscale, just installed the clients and servers and .. voila?

mh-•2h ago
I was an infra guy early in my career, and I'm still savvy, and I still prefer using Tailscale. It's very polished and reliable.

But personally, I'm past the point of wanting to fiddle with things like this and would much prefer them to just work out of the box.. so I can fiddle with the things I wanted to, and not end up down a (personally) unenjoyable rabbit hole.

No judgment on people who do enjoy it, though! I used to, and maybe I will again at some point.

Larrikin•3d ago
Having all your mobile traffic routed through AdGuard Home (or PiHole) is a game changer. It's also nice using an exit node through my home network whenever I am on public wifi.
burnt-resistor•2d ago
Plex already supports remote access via UPnP. https://support.plex.tv/articles/200289506-remote-access/
c0wb0yc0d3r•2d ago
To me WireGuard is safer than exposing services directly to the internet.
burnt-resistor•2d ago
Sure, it's pretty simple. I had WG provided by an Deciso OPNsense router with an automatic VPN profile on most user devices. All of my infrastructure also had PKI. (I moved recently and have yet to set it up again.)
15155•2d ago
Tailscale is able to hole punch in scenarios where UPnP is disabled (just good practice) as well as many NAT environments.
em-bee•2d ago
Speaking of SSH, Tailscale has special support for it whereby it handles any incoming connection to port 22 from the Tailscale network, and deals with authentication itself. No public keys or passwords: if you’re logged into Tailscale you can be logged into the machine. This is particularly handy when you SSH from a phone, as proper credential management is a bit of a nightmare there.

this has me worried. i would not want that. i use zerotier, not tailscale, but the principle is the same. i have my laptops and my phone connected to my servers. given that all of those machines are already on the internet, connecting them into a virtual network does not add any risk in my opinion. (at least as long as you don't use features like the above). all i get is a known ip address for all my devices, with the ability to connect to them if they have an ssh server running. when i am outside the primary benefit is that i can tell which devices are online.

15155•2d ago
This feature isn't enabled by default.
thrown-0825•2d ago
I use a similar setup, but for anyone following this guide i would not recommend hosting your custom oidc server behind the same tailnet it authorizes.

Any configuration issues will lock you out entirely and you will need to have tailscale support re-enable an oauth provider and its not reversible.

I use an oauth provider to log in to tailscale and keycloak internally as an oidc provider for service to service auth.

redat00•1d ago
Neat way to use Tailscale !

I have a similar set-up, without authentication however, relying on Nebula! https://github.com/slackhq/nebula

abdusco•2h ago
I tried using `tailscale funnel` against a dummy server `python -m http.server`, and within 10 seconds the bots started to check for vulnerabilities.

Tailscale warns you about how enabling it will issue an HTTPS certificate which will be in a public ledger. But I wasn't expecting it to be this quick.

    127.0.0.1 - - [10/Aug/2025 00:11:34] "GET /@vite/env HTTP/1.1" 404 -
    127.0.0.1 - - [10/Aug/2025 00:11:34] code 404, message File not found
    127.0.0.1 - - [10/Aug/2025 00:11:34] "GET /actuator/env HTTP/1.1" 404 -
    127.0.0.1 - - [10/Aug/2025 00:11:34] code 404, message File not found
    127.0.0.1 - - [10/Aug/2025 00:11:34] "GET /server HTTP/1.1" 404 -
    127.0.0.1 - - [10/Aug/2025 00:11:35] code 404, message File not found
    127.0.0.1 - - [10/Aug/2025 00:11:35] "GET /.vscode/sftp.json HTTP/1.1" 404 -
    127.0.0.1 - - [10/Aug/2025 00:11:35] code 404, message File not found
    127.0.0.1 - - [10/Aug/2025 00:11:39] "GET /s/7333e2433323e20343e2538313/_/;/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.properties HTTP/1.1" 404 -
mh-•2h ago
Yeah, I have mixed feelings about CT (certificate transparency) for this reason. Folks are just consuming the firehose and scanning.

And in this case, if the thing you're funnel'ing is on your residential connection, it basically amounts to you summoning a DDoS.

One (obvious?) tip I'd offer is to put your stuff on high non-standard ports if you can. It'll reduce the amount of connections you get dramatically.

modernpacifist•1h ago
A DoS that will disappear once you close the funnel. Tailscale are proxying the traffic so your public IP isn’t exposed. Your choice of port makes no difference.
tptacek•1h ago
When you care about this, if you're managing your own certificates, you can issue wildcard certificates.
mh-•1h ago
Hmm, yeah, that's a great suggestion, thanks!
gitgud•2h ago
Wait, so bots watch for new records added to this HTTPS cert public ledger, then immediately start attacking?

To me that sounds like enabling HTTPS is actually a risk here…

yjftsjthsd-h•2h ago
The server was already exposed. All this does is remove obscurity
afavour•1h ago
Which is something that makes a notable difference. It’s telling the bots the OP listed are trying Vite endpoints, they’re targeting folks doing short term local web development. Removing obscurity and indicating relative likelihood of still being online is a big shift.
dijit•1h ago
I wish this trend of “security through obscurity” should mean that all info should just be exposed would die, its silly and lacks basis in reality.

Even within infosec, certain types of information disclosure are considered security problems. Leaking signed up user information or even inodes on the drives can lead to PCI-DSS failures.

Why is broadcasting your records treated differently? Because people would find the information eventually if they scanned the whole internet? Even then they might not due to SNI; so this is actually giving critical information necessary for an attack to attackers.

augusto-moura•43m ago
The issue is not that obscurity per se is bad, but relying _only_ on obscurity is absolute the same as not having any security measures at all.

With the public ledger or not, you will still need to implement proper security measures. So it shouldn't matter if your address is public or not, in fact making it public raises the awareness for the problem. That's the argument.

yjftsjthsd-h•14m ago
Okay, but we're not talking about that here. This is very much the case of a service being exposed that shouldn't be and relying on obscurity to try and avoid actually getting compromised
homebrewer•1h ago
IME, moving ssh off the standard port reduces bot scanning traffic by >99%. Not only it means less noise in the logs (and thus higher SNR), but also lowers the chance you're hit by spray-and-pray in case there's a zero day in sshd (or any other daemon really).
augusto-moura•37m ago
True, but I hardly open any ssh to the wide world. I would only allow it inside a closed network anyways. HTTP on the other hand _needs_ to be exposed on 80 or 443 (not technically, but in practice)
Jnr•1h ago
I use Headscale, an open source implementation of Tailscale control server. And it doesn't have funnel functionality implemented out of the box, but I use a custom Traefik proxy manager Web UI in which I can expose ports on different Tailnet nodes.

In order to avoid exposing something unnecessarily in the certificate transparency logs, I use a single wildcard certificate, so all the subdomains are not listed anywhere automatically.

I use the same approach for services hosted in the internal subdomain, because I don't want everyone to know what exactly I'm running in my homelab.

mlhpdx•2h ago
I’ve been experimenting with different ways of using WireGuard but hadn’t heard of the header based authentication Tailscale does. Interesting stuff.
Lammy•1h ago
> It’s a subscription product, but it has an insanely generous free tier that covers basically anything you’d ever want to do as an individual.

Tailscale do have a very nice product, but privacy-conscious users should be aware that you must disable Tailscale's real-time remote collection of your behavior on your “private” network. See KB1011: https://tailscale.com/kb/1011/log-mesh-traffic

“Each Tailscale agent in your distributed network streams its logs to a central log server (at log.tailscale.io). This includes real-time events for open and close events for every inter-machine connection (TCP or UDP) on your network.”

It's possible to opt out of this spying on Unix/Windows/Mac clients by starting Tailscale with `--no-logs-no-support` or `TS_NO_LOGS_NO_SUPPORT=true` environment variable (see https://tailscale.com/kb/1011/log-mesh-traffic#opting-out-of...), but it is not currently possible to opt out in the Android/iOS clients: https://github.com/tailscale/tailscale/issues/13174

For an example of how invasive this is for the average user, this person discovered Tailscale trying to collect ~18000 data points per week about their network usage based on the number of blocked DNS requests for `log.tailscale.com`: https://github.com/tailscale/tailscale/issues/15326

Also see their privacy policy: https://tailscale.com/privacy-policy#information-we-collect-...

“When you use the Tailscale Solution, we collect limited metadata regarding your device used to access the Tailscale Solution, such as: the device name; relevant operating system type; host name; IP address; cryptographic public key; user agent (where applicable); language settings; date and time of access to the Tailscale Solution; logs describing connections and containing statistics about data sent to and from other devices (“Inter-Node Traffic Logs”); and version of the Tailscale Solution installed.” (emphasis mine)

Anyway, the reason I quoted that part of your post is because Tailscale are using some Fear, Uncertainty, and Doubt tactics here by naming the privacy-preserving option “no-support”, and if you are a free user then you aren't getting support from them anyway, so there should be no downside to keeping your private network private :)

mcsniff•18m ago
This comment should really be much higher.