frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Nitro: A tiny but flexible init system and process supervisor

https://git.vuxu.org/nitro/about/
52•todsacerdoti•2h ago•12 comments

The First Media over QUIC CDN: Cloudflare

https://moq.dev/blog/first-cdn/
61•kixelated•2h ago•44 comments

FFmpeg 8.0

https://ffmpeg.org/index.html#pr8.0
561•gyan•5h ago•148 comments

Should the web platform adopt XSLT 3.0?

https://github.com/whatwg/html/issues/11578
33•protomolecool•3h ago•15 comments

Scientists just found a protein that reverses brain aging

https://www.sciencedaily.com/releases/2025/08/250820000808.htm
96•stevenjgarner•2h ago•45 comments

Sprinkling self-doubt on ChatGPT

https://justin.searls.co/posts/sprinkling-self-doubt-on-chatgpt/
103•ingve•3h ago•58 comments

Launch HN: BlankBio (YC S25) - Making RNA Programmable

25•antichronology•4h ago•13 comments

Show HN: Clyp – Clipboard Manager for Linux

https://github.com/murat-cileli/clyp
50•timeoperator•5h ago•31 comments

Io_uring, kTLS and Rust for zero syscall HTTPS server

https://blog.habets.se/2025/04/io-uring-ktls-and-rust-for-zero-syscall-https-server.html
433•guntars•17h ago•130 comments

LabPlot: Free, open source and cross-platform Data Visualization and Analysis

https://labplot.org/
171•turrini•11h ago•31 comments

Waymo granted permit to begin testing in New York City

https://www.cnbc.com/2025/08/22/waymo-permit-new-york-city-nyc-rides.html
393•achristmascarl•4h ago•361 comments

The issue of anti-cheat on Linux

https://tulach.cc/the-issue-of-anti-cheat-on-linux/
40•todsacerdoti•19h ago•60 comments

Show HN: Pinch – macOS voice translation for real-time conversations

https://www.startpinch.com/
42•christiansafka•2d ago•14 comments

Leaving Gmail for Mailbox.org

https://giuliomagnifico.blog/post/2025-08-18-leaving-gmail/
58•giuliomagnifico•3h ago•85 comments

DeepSeek-v3.1

https://api-docs.deepseek.com/news/news250821
730•wertyk•1d ago•252 comments

DeepSeek v3.1 is not having a moment

https://thezvi.wordpress.com/2025/08/22/deepseek-v3-1-is-not-having-a-moment/
12•speckx•4h ago•0 comments

Does MHz Still Matter?

https://www.ubicloud.com/blog/does-mhz-still-matter
52•furkansahin•6h ago•35 comments

Closing the Nix Gap: From Environments to Packaged Applications for Rust

https://devenv.sh/blog/2025/08/22/closing-the-nix-gap-from-environments-to-packaged-applications-for-rust/
28•domenkozar•5h ago•4 comments

Harper Evolves

https://elijahpotter.dev/articles/harper_evolves
21•chilipepperhott•2h ago•4 comments

Ejabberd 25.08 / ProcessOne – Erlang Jabber/XMPP/Matrix Server – Communication

https://www.process-one.net/blog/ejabberd-25-08/
9•neustradamus•44m ago•0 comments

What about using rel="share-url" to expose sharing intents?

https://shkspr.mobi/blog/2025/08/what-about-using-relshare-url-to-expose-sharing-intents/
69•edent•9h ago•30 comments

Build Log: Macintosh Classic

https://www.jeffgeerling.com/blog/2025/build-log-macintosh-classic
29•speckx•6h ago•8 comments

Launch HN: Inconvo (YC S23) – AI agents for customer-facing analytics

30•ogham•8h ago•19 comments

Making LLMs Cheaper and Better via Performance-Efficiency Optimized Routing

https://arxiv.org/abs/2508.12631
87•omarsar•6h ago•18 comments

Control shopping cart wheels with your phone (2021)

https://www.begaydocrime.com/
255•mystraline•20h ago•119 comments

Everything is correlated (2014–23)

https://gwern.net/everything
225•gmays•19h ago•103 comments

It’s not wrong that "\u{1F926}\u{1F3FC}\u200D\u2642\uFE0F".length == 7 (2019)

https://hsivonen.fi/string-length/
133•program•14h ago•183 comments

A guide to Gen AI / LLM vibecoding for expert programmers

https://www.stochasticlifestyle.com/a-guide-to-gen-ai-llm-vibecoding-for-expert-programmers/
105•ChrisRackauckas•6h ago•94 comments

VHS-C: When a lazy idea stumbles towards perfection [video]

https://www.youtube.com/watch?v=HFYWHeBhYbM
171•surprisetalk•4d ago•96 comments

The Minecraft Code (2024) [video]

https://www.youtube.com/watch?v=nz2LeXwJOyI
46•zichy•13h ago•61 comments
Open in hackernews

The issue of anti-cheat on Linux

https://tulach.cc/the-issue-of-anti-cheat-on-linux/
40•todsacerdoti•19h ago

Comments

ai_critic•17h ago
I miss PUBG, but the fundamental purpose of anti-cheat software is to circumvent and curtail user freedom. I don't really want affordances for that in my OS.
xg15•9h ago
This article gave me more appreciation for the stance of the Linux community.

So to sum up. Valorant's anti-cheat, which the author sees something like an ideal solution:

- starts up and loads its kernel driver on boot.

- generates a persistent unique ID based on hardware serial numbers and associates this with my game account.

- stays active the entire time the system is up, whether I play the game or not. But don't worry, it only does some unspecified logging.

- is somehow not a spyware or data protection risk at all...

gjsman-1000•2h ago
- … but successfully, more or less, prevents most cheating attempts which would also make the game unplayable regardless.

For anyone saying “just do server side,” no, it’s physically impossible to stop all cheating that way until we have internet faster than human perception.

dvdkon•2h ago
Sure, but you could stop the most blatant wallhacks at least, but most times I see a video of a cheater, it's something stupid like that. It can't be that hard to do occlusion calculations server-side, right?

Don't let perfect be the enemy of good.

gjsman-1000•2h ago
When it comes to cheating, perfect is the enemy of good. This is one of those rare cases where the phrase doesn’t hold.

The problem is that server-side occlusion is only a small piece of the puzzle. A naïve implementation means hundreds of thousands of raycasts per second, which doesn’t scale. Real engines rely on precomputed visibility sets, spatial partitioning, and still have to leak some data client-side for responsiveness.

Basically - the kernel level check is not laziness, but for unsolvable problems without huge compute costs or latency.

dvdkon•1h ago
Fine, then let's not bother with anti-cheat at all, since an aimbot can work by just filming the screen and sending HID events over USB. Anti-cheat is like DRM: You have to make do with a compromise.

Hundreds of thousands of raycasts per second sounds doable to me, but couldn't you just use a GPU and some simplified level geometry? That ought to scale well enough. It's not free or perfect (knowing the position of a hand a cheat will be able to estimate where the head is anyway), but that's not the goal, right?

whatevaa•12m ago
There is a video of DYI aimbot of using a camera and sending electrical impulses into his arm to make him do certain adjustments. It's a bit hit and miss but seems refineable.

It's cat and mouse game.

koakuma-chan•2h ago
> - is somehow not a spyware or data protection risk at all...

Don't worry, it's owned by Tencent.

NewsaHackO•2h ago
The author made the most ridiculous arguments, had to stop reading after that point.
Retr0id•2h ago
- and, by design, is resistant to auditing, analysis, or user-modification
gjsman-1000•2h ago
If you trust Microsoft with your OS; I suppose you should trust Microsoft when they sign kernel modules, right? ;)
mitkebes•2h ago
I also always hear a lot of people complain about cheaters in Valorant, so all of that compromised personal security doesn't actually stop cheaters.

Honestly I feel like you should only use kernel anticheat on a dedicated machine that's kept 100% separate from any of your personal data. That's a lot to ask of people, but you really shouldn't have anything you don't consider public data on the same hardware.

pfooti•2h ago
A dedicated machine with no other general purpose apps that has minimal private data on it sounds like a gaming console.
zaptheimpaler•1h ago
Except that this kernel driver is audited and signed by Microsoft, whom you also trust with the rest of your kernel if you use Windows at all.
hulitu•3h ago
> The issue of anti-cheat on Linux

Is the memory of this kernel module protected from access from another kernel module ?

kuschku•2h ago
That's why anticheats demand they are loaded first, and then intercept the loading of later drivers.

Which obviously causes all kinds of issues, and violates both freedoms 0 and 1 https://www.gnu.org/philosophy/free-sw.en.html

And they don't just remove those freedoms regarding the game, but for the entire system.

cyberax•2h ago
> Which obviously causes all kinds of issues, and violates both freedoms 0 and 1 https://www.gnu.org/philosophy/free-sw.en.html

They do not, as long as you can disable the anti-cheat and reboot.

kuschku•40m ago
The core freedoms are about allowing anyone to run, inspect, understand and modify software.

Even if the game itself doesn't grant me that freedom, my OS and drivers should not prevent me from attaching a debugger to the game without it noticing.

My computer, and the software on it, should obey me, and me alone. Never should they obey a developer's desire to restrict what I can and cannot do.

That is the ideological basis of the free software movement, and as you may have noticed, incompatible with client side anticheat.

mitkebes•2h ago
The author cites fear mongering over kernel anticheat, but I don't think anyone reasonable should be ok with their personal computer having kernel anticheat installed.

Genshin's anticheat was used to install ransomware, ESEA's anticheat was used to install bitcoin miners on users machines, EA's anticheat was used to hack clients computers during a tournament, etc.

When not explicitly malicious, anticheat software is at best spyware that's spying on your computer use to identify cheating. People complain a ton about Microsoft recall storing screenshots of your computer locally being a security risk, and yet they're fine with a Chinese owned anticheat program taking screenshots of your computer and uploading them online. And even if the company isn't trying to use that info to spy on you, my understanding is that when you're a chinese company, you have to give full access of that data to the government.

With the ongoing/rising tensions between the US and China, I actually think there's a significant chance that we may see all Chinese owned anticheat programs banned in the US, which would be pretty significant since they own or partially own the majority (as far as I know).

ectospheno•2h ago
I just gave up and only console game. On the plus side I can buy cheaper computers now.
phendrenad2•2h ago
> I don't think anyone reasonable should be ok with

Well, I don't think anyone reasonable should be telling others what they "should" be ok with, myself included (I made an exception this one time).

> Genshin's anticheat was used to install ransomware

You should tell the full story: Ransomware installed Genshin's anticheat because it was whitelisted by antivirus providers, it then used the anti-cheat to load itself deeper into the system. So not really a problem with Genshin's anticheat (indeed, users who had never played the game or even heard about it would be affected), but a problem with how antivirus providers dealt with it.

> ESEA's anticheat was used to install bitcoin miners

You should tell the full story: Someone compromised the supply-chain and snuck a miner into the anticheat binary. It was discovered immediately, and the fact that the miner was in the anticheat and not, say, a game loader, did nothing to hide it.

> People complain a ton about Microsoft recall storing screenshots of your computer locally being a security risk, and yet they're fine with a Chinese owned anticheat program taking screenshots of your computer and uploading them online

This is just a fallacy. Like saying "people voted for candidate A, but then they voted for candidate B!" Obviously, there can be multiple groups of people, and saying that "people" vaguely support X but not Y is usually a misunderstanding of the groupings involved.

The obvious explanation for this is"apparent" contradiction you point out is: Windows Recall is likely to be an on-by-default feature, and people don't really trust Microsoft not to "accidentally" enable it after an update. Also, Recall would likely be installed on all computers, not just gaming PCs. That's a big deal. A lot of people have multiple PCs, because they're cheap and ubiquitous these days. Maybe they're okay with recall and/or anticheat taking snapshots of their gaming PCs, but not the laptop they use to do their taxes, etc. The source of your confusion is likely the misunderstanding that most people, unlike the HN crowd, are practical, not ideological. They don't oppose anticheat on some abstract level, they care about the practical reality it brings to their life.

Another element is that most people, at least in the US, have "spy fatigue". They figure, hey, the US government spies on me, the five eyes spies on me, Russia and China spy on me, what does it matter?

jrm4•2h ago
Can't help but consider how, perhaps, this could be a teaching moment for other folks. I know "convenience reigns supreme" but getting perhaps less-tech savvy gamers knowledgeable about what is being given up when you use anti-cheat.

Alas, I'd like to believe we could be in an era of "hey, not a problem, just have a dedicated gaming machine," but that too is difficult.

Retr0id•2h ago
> Just recompile the kernel and change the functions it uses to hide the possible cheat and bypass all checks.

You can do this on macOS too, by the way. XNU is open-source.

gjsman-1000•2h ago
… well, technically speaking, most of it is open source. However, some parts regarding Apple Pay, FileVault, FairPlay DRM, any iOS compatibility, it’s excised.
Retr0id•2h ago
Right, but you can splice your recompiled version back into the original binary, complete with proprietary components. I've done this before, maybe I should write up the process.
commandersaki•2h ago
With SIP enabled?
Retr0id•2h ago
For my particular use case I disabled SIP and everything was fine, but workarounds should be possible.
porridgeraisin•2h ago
Please do!
chuckadams•2h ago
Good luck booting a custom kernel with SIP enabled, and I'm pretty sure any anti-cheat will nope out immediately if SIP is disabled.
15155•2h ago
So intercept whatever mechanism it's using to detect SIP enabled status...?
Retr0id•2h ago
You do have to disable it, but you can patch the kernel to lie to userland about SIP status.
hollerith•2h ago
Is that really true?

How would one get the modified XNU past the verified-boot process? Turn off verified boot?

Retr0id•2h ago
The overall process is documented here: https://kernelshaman.blogspot.com/2021/02/building-xnu-for-m...
why_at•2h ago
This is one use case where I think the idea of cloud gaming (e.g. google stadia) could make some sense. Having this as an alternative for linux users would be nice.

It's much harder to cheat if the game isn't running on your computer.

dvdkon•2h ago
That's a good idea, sadly I think gamers would reject it due to extra latency.

The ultimate "anti-cheat" is playing on some trusted party's computer. That can be a cloud machine, but I think today a game console would work just as well, turn that closed nature into an actual user-facing benefit. Console manufacturers seem focused on their traditional niche of controller couch gaming and not on appealing to high-FPS keyboard-and-mouse gamers, though.

why_at•2h ago
Yeah I don't think this would work for hardcore competitive gamers, but it would be nice to have as an option for those who are more casual. Definitely better than not being able to play at all.

It doesn't even seem very hard to implement, steam already has the ability to stream games, they could add this pretty easily as an option for any game (although there is the concern of the extra cost of running the servers).

mitkebes•2h ago
Generally yes, although some cheats like aim assistance would work fine on online streamed games, since they can scan your screen and adjust your mouse input to aim.

To be fair kernel anticheat can't block this completely either, it can be run on external hardware that uses a capture card to analyze your video feed and alter your mouse inputs to the computer. Generally undetectable unless the game is able to identify unnatural mouse movements.

why_at•2h ago
>it can be run on external hardware that uses a capture card to analyze your video feed and alter your mouse inputs to the computer.

I think at some point defeating this becomes impossible. This sort of cheating isn't much different conceptually from just having someone who's really good at the game play for you.

Tuna-Fish•2h ago
Cloud gaming is flatly non-workable for any kind of game where latency matters. This also covers most of the market for games where anti-cheats matter a lot.
tracker1•1h ago
Lag is the biggest issue... even a local wifi connection vs wired can make a massive difference in terms of what's acceptable lag.

Of course, to TFA's point on network code... a lot of the issues in question could come down to checking for movements that exceed human... moving faster than the speed in game, or even twitch aiming movements faster than a mouse, or a consistent level of X accuracy in shooting over time. On the last part, I'm not sure if there might be some way to mask a user's hit zone, rendering and such so that an aim-bot thinks the foot is center-mass, etc. Or if it could be randomly shifted in a test scenario.

bigstrat2003•2h ago
I don't personally see an issue that my computer can't run literal rootkits being shipped with the game. But I concede that not everyone shares my preferences, and if you wish to run this malware you should be able to do so.
AlienRobot•2h ago
Cheats are why I stopped playing FPS's and only occasionally play Rocket League. I can't tell if I'm bad at the game or if everyone else is cheating. Half of the games on this list are FPS's.

I think the more important question isn't how you implement an anti-cheat, it's why some types of games attract cheaters.

When victory in a game isn't about strategy but just about how quickly you can click o character's head, and just by doing it once you win the game, that makes the whole game a clear target for cheating. Everyone cheats as the sniper, nobody cheats as the medic.

I think you could make an FPS that cheaters hate by designing it so that it requires at least 2 players to defeat a player on the opposite team, e.g. by giving everyone weapons of different type and needing two types to defeat an enemy.

I wonder if anti-cheating game design is a thing?

bee_rider•1h ago
Cheating and worrying about cheating in these matchmaking FPS games is a ridiculous thing to do. If you get matched with cheaters, and the ranking system actually works, they are cheaters whose cheat-augmented skill is equal to yours.

Game designers could have just worked on their ranking systems, and least the cheaters rocket off into their own domain of impossibly-high-elo games. Let there be a cheaters league. It could be fascinating, what’s fully-cheated gameplay look like? Just ban disruptive behavior like ddosing other players.

OTOH, artificially lowering your rank to stomp low-level players is a problem. But cheaters, as well as just legitimately really good players, can do this; the place to solve this is the ranking system.

tracker1•1h ago
I think that Team Fortress is pretty good in this regard... at least for some CTF maps and configurations... (I'm mostly recalling the original quake mod)... there were some maps that you had to have a scout/spy to be able to get past a strategically positioned automatic gun, and even then an HW guy by the flag was a pretty good secondary that was hard to get through.

Of course, I still remember seeing cheaters back then, in that game... usually quickly kicked off the server you were playing on.

fa3556•2h ago
I feel like the only other solution to kernel-level anticheat is some kind of measured and verified system image. The whole chain has to be signed and trusted from the TPM through the kernel to userspace. This way if anyone tampers with the system the game will refuse to launch. I think something like this is already possible with systemd or is at least the long term goal IIRC from Lennart's blog.
dvdkon•2h ago
I don't know much about TPM APIs, but I think (barring some hardware attestation scheme) a malicious kernel could intercept any game-TPM communication.
PUSH_AX•2h ago
I thought DMA cheats rendered all of these anticheat efforts useless? It feels like the future of anticheat should probably be focused on how to efficiently send player data to clients only when they would be able to interact with them anyway. Or replay moderation?
Asooka•1h ago
Not entirely. Valorant's anti-cheat tries hard to detect DMA cards, which eventually led to one of their largest banwaves. See:

https://playvalorant.com/en-gb/news/dev/vanguard-hits-new-ba...

Of course the cheat developers don't sit idle, so this is far from over.

PUSH_AX•1h ago
I read this article, unless I missed it Brazilian pixel bots comprised the bulk of the ban wave, with DMA cheaters getting a mention but of unspecified quantities, and could have been swept up in manual and rage hacking bans?
Retr0id•2h ago
One way to do anti-cheat on linux without compromising the sanctity of your host kernel would be to run the game inside a hardware-protected VM.

Anti-cheat does not ordinarily like to run inside a VM, because then the hypervisor can do the cheating, invisibly to the kernel. However, technologies like AMD SEV can (in theory) protect the guest from the host, using memory encryption. (And potentially also protect from DMA-based cheats, too)

What you'd need is some way for the hardware to attest to the guest "yes, you really are running inside SEV".

donatj•2h ago
It's an unpopular opinion, but for better or worse, this is why I think it still makes sense to have a dedicated games machine separate from the main computer.

I'm largely a console gamer, so I don't have to worry about EA's latest malware opening my computer up to the world. I'm also a filthy casual though.

Wowfunhappy•2h ago
I found this part notable:

---

Let me ask you a question. How many vulnerable drivers (yes, those that can be abused by bad actors to gain kernel access) do you think the average gamer has on their Windows install? I’ll start with my own system. This is what I can immediately think of:

• MSI Afterburner - RTCore64.sys driver (yes, even in the latest version) has a vulnerability that allows any usermode process to read and write any kernel memory it wishes

• CPU-Z - cpuz142_x64.sys driver has (again) kernel memory read/write vulnerability and MSR register read/write

If I looked hard enough, I would most likely find more.

Retr0id•1h ago
I didn't really get the point being made there. Yes, windows kernel security posture is swiss cheese, but that's not an argument for poking more holes.
Wowfunhappy•1h ago
Well, if nothing else, it makes me think that if you are doing truly security-sensitive work, you almost certainly need to get a separate computer for that. Whether or not you play any games with kernel-level anti-cheat, you probably have cpu-z installed.

And if you're not doing something particularly sensitive, then security on consumer PCs must matter a lot less than some people think.

J_McQuade•2h ago
Was going to post this on a now-deleted comment about anticheat being a hard problem, so popping it here because it might be relevant:

Anticheat is only hard because people are looking for a technical solution to a social problem. The actual way to get a good game in most things is to only play with people you trust and, if you think someone is cheating, stop trusting them and stop playing with them.

This doesn't scale to massive matchmaking scenarios of course - and so many modern games don't even offer it as an option - so companies would have to give up the automatic ranking of all players and the promise of dopamine that can be weaponised against them, but it works for sports in the real world and it worked for the likes of Quake, UT, etc. so I don't think it's a necessarily bad idea. Social ostracism is an incredibly powerful force.

However, it does mean that the big publishers wouldn't have control over everything a player does. Getting them to agree to that is probably the real hard problem.

Wowfunhappy•1h ago
I think there's immense value in being able to just press a button and jump into a game, without having to actually know people and build up a community.

However, I wonder if you could have that while still removing features that make cheating seem appealing. For example, as you said, you can have games with randoms without an automatic ranking of all players. (Or maybe you rank players so you can match people of similar skill levels, but you don't tell anyone what their rank is.)

zaptheimpaler•1h ago
So how am I supposed to play a game of PUBG if I don't have 99 friends who I trust not to cheat who also play it? How is any community going to establish and continuously monitor that their members don't cheat, while also allowing new members to join over time? I don't have a big group of friends who also like playing the same games I play at the same times I want to play, sounds like a total non-starter to me.
Asooka•1h ago
The cat and mouse game between cheat devs and anti-cheat devs is quite interesting. I saw a nice video [1] a year ago about the state of the art in cheat development, which at that point was having a PCIe device that can issue DMA requests to read the RAM at any time and stream the data to a second PC to analyse. Vanguard did end up banning those people eventually, since it can see what devices you have plugged in. I can't help but wonder if the next level would be some kind of shim on the physical RAM sticks; or maybe custom UEFI firmware.

Ultimately the OS should be providing a service that can verify a program is running in a secure environment and hasn't been tampered with. That's something that's useful for things far beyond games. I kind of hope the cheaters win this war for now, to create the incentive for building a better, proper, standardized, cross-platform solution.

[1] https://www.youtube.com/watch?v=kzVYgg9nQis

tracker1•1h ago
I would think the Linux kernel could offer a "don't let anything read/write to the process I'm about to open" with a launcher then have that process also create a random/temp executable to test that the configuration is working...

Having the kernel itself, actually deny any access... The game devs run a build without debug symbols (not that debugging could work with it on), and run with it... Also, this should severely limit what that process can do in terms of communication outside itself. And maybe a launch warning from the OS... "You are about to launch a sealed application that cannot be observed, do you want to continue? Y/N"

positr0n•18m ago
That would only protect against userland cheats. A cheat developer would just write a kernel module to read the memory so it wouldn't be another process attempting to read it, but the kernel itself.