frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

PYX: The next step in Python packaging

https://astral.sh/pyx
257•the_mitsuhiko•3h ago•112 comments

Nginx introduces native support for ACME protocol

https://blog.nginx.org/blog/native-support-for-acme-protocol
403•phickey•6h ago•151 comments

NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices

https://www.nist.gov/news-events/news/2025/08/nist-finalizes-lightweight-cryptography-standard-protect-small-devices
27•gnabgib•1h ago•10 comments

OCaml as my primary language

https://xvw.lol/en/articles/why-ocaml.html
159•nukifw•3h ago•101 comments

VC-backed company just killed my EU trademark for a small OSS project

119•marcjschmidt•20h ago•22 comments

FFmpeg 8.0 adds Whisper support

https://code.ffmpeg.org/FFmpeg/FFmpeg/commit/13ce36fef98a3f4e6d8360c24d6b8434cbb8869b
741•rilawa•11h ago•260 comments

Illinois bans use of artificial intelligence for mental health therapy

https://www.washingtonpost.com/nation/2025/08/12/illinois-ai-therapy-ban/
101•reaperducer•1h ago•25 comments

PCIe 8.0 announced by the PCI-Sig will double throughput again

https://www.servethehome.com/pcie-8-0-announced-by-the-pci-sig-will-double-throughput-again/
67•rbanffy•3d ago•78 comments

Launch HN: Golpo (YC S25) – AI-generated explainer videos

https://video.golpoai.com/
46•skar01•4h ago•55 comments

Cross-Site Request Forgery

https://words.filippo.io/csrf/
76•tatersolid•4h ago•14 comments

So what's the difference between plotted and printed artwork?

https://lostpixels.io/writings/the-difference-between-plotted-and-printed-artwork
170•cosiiine•8h ago•57 comments

Rerank-2.5 and rerank-2.5-lite: instruction-following rerankers

https://blog.voyageai.com/2025/08/11/rerank-2-5/
31•fzliu•1d ago•4 comments

Pebble Time 2 Design Reveal [video]

https://www.youtube.com/watch?v=pcPzmDePH3E
151•net01•8h ago•145 comments

Coalton Playground: Type-Safe Lisp in the Browser

https://abacusnoir.com/2025/08/12/coalton-playground-type-safe-lisp-in-your-browser/
80•reikonomusha•6h ago•28 comments

DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls

https://pub.aimind.so/doubleagents-fine-tuning-llms-for-covert-malicious-tool-calls-b8ff00bf513e
73•grumblemumble•8h ago•22 comments

ReadMe (YC W15) Is Hiring a Developer Experience PM

https://readme.com/careers#product-manager-developer-experience
1•gkoberger•4h ago

OpenIndiana: Community-Driven Illumos Distribution

https://www.openindiana.org/
68•doener•6h ago•52 comments

New treatment eliminates bladder cancer in 82% of patients

https://news.keckmedicine.org/new-treatment-eliminates-bladder-cancer-in-82-of-patients/
238•geox•6h ago•109 comments

Fighting with YouTube to show a preview image

https://shaneosullivan.wordpress.com/2025/08/11/fighting-with-youtube-to-show-a-preview-image/
20•shaneos•2d ago•2 comments

The Mary Queen of Scots Channel Anamorphosis: A 3D Simulation

https://www.charlespetzold.com/blog/2025/05/Mary-Queen-of-Scots-Channel-Anamorphosis-A-3D-Simulation.html
65•warrenm•8h ago•13 comments

Electrically controlled heat transport in graphite films

https://www.science.org/doi/10.1126/sciadv.adw8588
3•PaulHoule•2d ago•0 comments

Claude says “You're absolutely right!” about everything

https://github.com/anthropics/claude-code/issues/3382
580•pr337h4m•14h ago•446 comments

We caught companies making it harder to delete your personal data online

https://themarkup.org/privacy/2025/08/12/we-caught-companies-making-it-harder-to-delete-your-data
243•amarcheschi•7h ago•60 comments

April Fools 2014: The *Real* Test Driven Development (2014)

https://testing.googleblog.com/2014/04/the-real-test-driven-development.html
102•omot•4h ago•20 comments

Job Listing Site Highlighting H-1B Positions So Americans Can Apply

https://www.newsweek.com/h1b-jobs-now-american-workers-green-cards-2041404
79•walterbell•2h ago•38 comments

A case study in bad hiring practice and how to fix it

https://www.tomkranz.com/blog1/a-case-study-in-bad-hiring-practice-and-how-to-fix-it
97•prestelpirate•5h ago•78 comments

US national debt reaches a record $37T, the Treasury Department reports

https://apnews.com/article/treasury-debt-spending-trump-obbb-6f807c4aae78dcc96f29ff07a3c926f4
62•atombender•3h ago•28 comments

This website is for humans

https://localghost.dev/blog/this-website-is-for-humans/
415•charles_f•6h ago•222 comments

29 years later, Settlers II gets Amiga release

https://gamingretro.co.uk/29-years-later-settlers-ii-finally-gets-amiga-release/
75•doener•3h ago•21 comments

Gartner's grift is about to unravel

https://dx.tips/gartner
122•mooreds•5h ago•55 comments
Open in hackernews

New downgrade attack can bypass FIDO auth in Microsoft Entra ID

https://www.bleepingcomputer.com/news/security/new-downgrade-attack-can-bypass-fido-auth-in-microsoft-entra-id/
15•mikece•2h ago

Comments

moi2388•1h ago
Pff.. again an Entra ID security flaw? It’s incredibly how sloppy their single auth solution is..
Loudergood•1h ago
Safari on Windows? That browser hasn't been supported since 2012...
lousken•1h ago
What if you have conditional access policy requiring phishing resistant auth to be able to login?
parliament32•1h ago
It's not clear who this is an attack for.. organizations that have implemented phishing-resistant MFA will already have CA policy to block any sign-ins that don't have the required authentication strength (that same "You can't get there from here" message users in unsupported browsers get). Maybe it's effective if the organization is in the middle of a rollout, where FIDO is enabled but old MFA methods haven't been disabled yet?

EDIT: This is actually called out in the article:

> The attack sequence relies on the existence of an alternative authentication method (usually MFA), besides FIDO, for the targeted user account. But luckily, this tends to be the case with FIDO implementations, as most admins prefer to maintain a practical option for account recovery.

Most orgs will have TAP for account recovery, but that's not really phishable for other reasons.

tatersolid•6m ago
Basically all other identity providers are also vulnerable to phishers which strip out webautn calls in the payload when acting as a proxy to the real IdP.

Basically you must disable all other phishable forms of MFA fallback if you want phishing-resistant FIDO2/passkeys. Conditional access policies in Entra can do this selectively or org-wide. If you don’t do this you’re relying on “end user training and wariness” again as phishing protection.

dvno42•1h ago
Since this relies on simulating safari as the broswer, I wonder if a conditional access policy enforcing browser selection would help mitigate this.

While only realistic for a small number of users, I've started enforcing users of privileged tools to go through a wireguard instance before being allowed to access Azure hosted tools that rely on Entra auth. Services I publish then have a ingress whitelist of said wireguard VM.