frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Monodraw

https://monodraw.helftone.com/
115•mafro•1h ago•43 comments

The Therac-25 Incident

https://thedailywtf.com/articles/the-therac-25-incident
177•lemper•5h ago•97 comments

QEMU 10.1.0

https://wiki.qemu.org/ChangeLog/10.1
56•dmitrijbelikov•1h ago•12 comments

WebLibre: The Privacy-Focused Browser

https://docs.weblibre.eu/
43•mnmalst•3h ago•22 comments

Claude for Chrome

https://www.anthropic.com/news/claude-for-chrome
687•davidbarker•17h ago•368 comments

Ember (YC F24) Is Hiring Full Stack Engineer

https://www.ycombinator.com/companies/ember/jobs/OTB0qby-full-stack-engineering-intern-summer-2026
1•charlene-wang•4m ago

Scientist exposes anti-wind groups as oil-funded. Now they want to silence him

https://electrek.co/2025/08/25/scientist-exposes-anti-wind-groups-as-oil-funded-now-they-want-to-...
333•xbmcuser•5h ago•151 comments

Gemini 2.5 Flash Image

https://developers.googleblog.com/en/introducing-gemini-2-5-flash-image/
969•meetpateltech•22h ago•439 comments

F-35 pilot held 50-minute airborne conference call with engineers before crash

https://www.cnn.com/2025/08/27/us/alaska-f-35-crash-accident-report-hnk-ml
22•Michelangelo11•25m ago•7 comments

Word documents will be saved to the cloud automatically on Windows going forward

https://www.ghacks.net/2025/08/27/your-word-documents-will-be-saved-to-the-cloud-automatically-on...
69•speckx•1h ago•29 comments

Internet Access Providers Aren't Bound by DMCA Unmasking Subpoenas–In Re Cox

https://blog.ericgoldman.org/archives/2025/08/internet-access-providers-arent-bound-by-dmca-unmas...
14•hn_acker•2d ago•1 comments

Dissecting the Apple M1 GPU, the end

https://rosenzweig.io/blog/asahi-gpu-part-n.html
543•alsetmusic•10h ago•113 comments

Light pollution prolongs avian activity

https://gizmodo.com/birds-across-the-world-are-singing-all-day-for-a-disturbing-reason-2000646257
83•gmays•3d ago•16 comments

Show HN: FilterQL – A tiny query language for filtering structured data

https://github.com/adamhl8/filterql
18•genshii•2d ago•5 comments

GNU Artanis – A fast web application framework for Scheme

https://artanis.dev/index.html
230•smartmic•15h ago•51 comments

Rv, a new kind of Ruby management tool

https://andre.arko.net/2025/08/25/rv-a-new-kind-of-ruby-management-tool/
274•steveklabnik•1d ago•102 comments

Chinese astronauts make rocket fuel and oxygen in space

https://www.livescience.com/space/space-exploration/chinese-astronauts-make-rocket-fuel-and-oxyge...
244•Teever•2d ago•106 comments

The man with a Home Computer (1967) [video]

https://www.youtube.com/watch?v=w6Ka42eyudA
51•smarm•6h ago•22 comments

Neuralink 'Participant 1' says his life has changed

https://fortune.com/2025/08/23/neuralink-participant-1-noland-arbaugh-18-months-post-surgery-life...
310•danielmorozoff•3d ago•350 comments

Reverse Engineered Raspberry Pi Compute Module 5

https://github.com/schlae/cm5-reveng
50•_Microft•2d ago•9 comments

One universal antiviral to rule them all?

https://www.cuimc.columbia.edu/news/one-universal-antiviral-rule-them-all
311•breve•21h ago•137 comments

US Intel

https://stratechery.com/2025/u-s-intel/
472•maguay•1d ago•493 comments

Bypass PostgreSQL catalog overhead with direct partition hash calculations

https://www.shayon.dev/post/2025/221/bypass-postgresql-catalog-overhead-with-direct-partition-has...
24•shayonj•3d ago•8 comments

Molluscs of the Multiverse: molluscan diversity in Magic: The Gathering

https://jgeekstudies.org/2025/08/24/molluscs-of-the-multiverse-molluscan-diversity-in-magic-the-g...
10•zdw•2d ago•0 comments

Japan has opened its first osmotic power plant

https://www.theguardian.com/world/2025/aug/25/japan-osmotic-power-plant-fukuoka
269•pseudolus•2d ago•85 comments

SpaCy: Industrial-Strength Natural Language Processing (NLP) in Python

https://github.com/explosion/spaCy
99•marklit•4d ago•37 comments

A teen was suicidal. ChatGPT was the friend he confided in

https://www.nytimes.com/2025/08/26/technology/chatgpt-openai-suicide.html
322•jaredwiener•21h ago•374 comments

iOS 18.6.1 0-click RCE POC

https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md
215•akyuu•1d ago•47 comments

The McPhee method for writing deeply reported nonfiction

https://jsomers.net/blog/the-mcphee-method
172•jsomers•1d ago•45 comments

Michigan Supreme Court: Unrestricted phone searches violate Fourth Amendment

https://reclaimthenet.org/michigan-supreme-court-rules-phone-search-warrants-must-be-specific
502•mikece•18h ago•93 comments
Open in hackernews

iOS 18.6.1 0-click RCE POC

https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md
215•akyuu•1d ago

Comments

kirito1337•1d ago
Dang that's so cool!
Alifatisk•1d ago
I wonder how much this would be worth for Zerodium
gruez•18h ago
$0, given it's patched in ios 18.6.2
crossroadsguy•18h ago
Before that obviously. Possibly pc meant to ask if the “finder” would have gone to them instead of dealing with Apple directly.
tptacek•16h ago
The AirDrop requirement probably decreases its value substantially, but I think all these kinds of questions are kind of tricky to reason about:

https://news.ycombinator.com/item?id=43025038

This might be a weird corner case where Apple would outbid the grey market, but generally even though Apple comes in lower than the grey market (for these very specific kinds of vulnerabilities), the term sheets are different, and the rest of the terms tend to favor going with Apple.

rafram•18h ago
And given that Zerodium has shut down.
anon6362•8h ago
Its website still works and there's a gpg key, so it's a "shutdown" rather than shutdown.
tptacek•16h ago
$0, since I don't think Zerodium still exists.
MajesticHobo2•18h ago
I AirDropped the PoC to my vulnerable iPhone. It didn't cause a crash until I tried to edit it in the Photos app.
VladVladikoff•10h ago
Maybe you need to iMessage it to someone else? Just guessing.
byearthithatius•9h ago
I downloaded the image he provided (https://www.dpreview.com/sample-galleries/4949897610/pentax-...)

The DNG file did have the 01 byte at `2FD00` (from xxd or hexdump -C). However it didn't have a byte position `3E40B`. I tried searching and there is literally no entry at that position. I found a 02 value at 3e40 but not at 3e40b. Is this a typo?

Where did you find it to try and repro?

MajesticHobo2•9h ago
You need to click the link that says "RAW (33.0MB)". The filename should be "IMGP0847.DNG".
byearthithatius•9h ago
Thanks immensely. Very important detail,

Did you find a 02 at 3E40B? I found 01 at 2FD00, but there was no 3E40B byte position entry.

I did find something similar at 00003e40: 00003e40 02 00 04 00 0a 00 00 00 30 01 00 00 00 00 00 00 |........0.......|

MajesticHobo2•9h ago
Yes:

  dd status=none if=IMGP0847.DNG bs=1 skip=0x3e40b count=1 | xxd
  00000000: 02
byearthithatius•7h ago
Thanks! You are correct, when I did a dump with `xxd IMGP0847.DNG > output.hex` it wasn't showing up for some reason.... But your command worked (though my dd doesn't like hex values so I needed to get decimal via printf "%d\n" 0x3E40B).

Curious if you (clearly smarter than me) know why it didn't show correctly in the xxd or hexdump for the file. Would love to learn.

gruez•18h ago
Note that even though the CVE is for a RCE (remote code execution)[1], this specific PoC is at most a DoS (denial of service). There's more work needed to bypass mitigations for it to be actually usable as a RCE.

[1] https://support.apple.com/en-us/124925

bri3d•18h ago
Where's the 0-click or the RCE here?

I'm actually really curious about how the ITW exploit for this CVE worked; the OOB write is quite obvious in hindsight but going from OOB write to execution on iOS is very much not easy these days, and going from OOB write to sandbox escape should be extremely hard, especially since I thought (?) all image previews in iMessage should be behind BlastDoor. There's a lot of interesting stuff that's still missing here.

gruez•18h ago
>Where's the 0-click or the RCE here?

See my other comment. There's an exploit in the wild that uses this bug to get RCE, but this specific example just causes a crash.

bri3d•18h ago
Yes, that's what I'm referring to with

> I'm actually really curious about how the ITW exploit for this CVE worked

It's really weird to see only a single OOB write patched for a full 0-click chain in the wild - how did they get code execution? PAC+ASLR bypass? Sandbox escape/kernel escalation?

Literally only RawCamera is patched in the update - were the other bugs in the chain already patched? Too difficult to patch immediately? (ie - close the front door while working on replacing the other locks?)? Still unknown? (ie - found a crash dump from RawCamera but didn't get as sample of the full chain?)

mkhalil•17h ago
Seems like it was major enough that it was the lone patch[0] in all active Apple OS's:

macOS Ventura 13.7.8 | macOS Sonoma 14.7.8 | macOS Sequoia 15.6.1

iPadOS 17.7.10 | iPadOS 18.6.2 | iOS 18.6.2

Usually, its multiple CVE's in a security update.

Examples:

- https://support.apple.com/en-us/122375 (macOS Ventura 13.7.5)

- https://support.apple.com/en-us/122718 (macOS Ventura 13.7.6)

- https://support.apple.com/en-us/124151 (macOS Ventura 13.7.7)

--------------------------- References/Sources ---------------------------

[0] https://support.apple.com/en-us/124925 -> https://support.apple.com/en-us/124929 | (124925 -> 124929)

https://support.apple.com/en-us/100100

https://nvd.nist.gov/vuln/detail/CVE-2025-43300#vulnConfigur...

rvz•17h ago
Does this affect any of the iOS, iPadOS macOS, tvOS, watchOS 26 Beta?
Reason077•13h ago
Apple patched it on August 20, so presumably any release from after this date is not vulnerable.
0x0•16h ago
Surprised to see no patch available for watchOS, which can also receive images via iMessage. Not important enough to patch, or not vulnerable, or just not exploited in the wild yet?
transpute•16h ago
For iOS defense, enable Lockdown Mode and reboot daily to evict non-persistent malware, https://www.youtube.com/watch?v=fAhTPMmvrB0

> For me, there is only lockdown mode. That is the Apple Experience.

iOS backups can be scanned for the presence of this CVE-2025-43300 DNG processing vulnerability, via OSS tool for iOS forensics, https://github.com/msuiche/elegant-bouncer | https://www.msuiche.com/posts/elegantbouncer-when-you-cant-g...

  ELEGANTBOUNCER is a detection tool for file-based mobile exploits. It employs an innovative approach for advanced file-based threat identification, eliminating the need for in-the-wild samples and outperforming traditional methods based on regular expressions or IOCs. At present, it primarily targets the identification of mobile vulnerabilities such as FORCEDENTRY (CVE-2021-30860), BLASTPASS (CVE-2023-4863, CVE-2023-41064), and TRIANGULATION (CVE-2023-41990) [and recently added CVE-2025-43300].
https://x.com/darknavyorg/status/1959271176062251333

> While reproducing the iOS ITW CVE-2025-43300 (support.apple.com/en-us/124925), we accidentally triggered another old DNG image parsing vulnerability. The analysis is still ongoing.

notepad0x90•7h ago
I would think mvt and related ioc repos would support these newer indicators,but sadly I'm not seeing that:

https://docs.mvt.re/en/latest/iocs/

transpute•7h ago
It's a different approach:

  Traditional detection approaches like YARA rules, IOC matching, and signature-based systems fall apart when:

   • You don’t have the actual malicious samples to create signatures from
   • The attackers use polymorphic techniques that change file hashes
   • The exploit leverages legitimate file format features in unexpected ways
   • You need to detect future variants of the same technique

  The Philosophy: Structure Over Signatures

  ELEGANTBOUNCER takes a fundamentally different approach to threat detection. Instead of looking for specific byte patterns or known-bad indicators, it analyzes the structural properties of files that make exploits possible.
saagarjha•2h ago
Assuming someone hasn't removed it from the filesystem
zb3•16h ago
Oh, so we'll get another jailbreak soon? Wow, thanks [whatever Israeli agency/company is behind this] :)
makestuff•15h ago
How do people even find these types of bugs? Is it just years and years experience allowing you to know where to look?
tomasphan•15h ago
Experience /n Fuzzing (when you try a bunch of stuff automatically) /n Reverse engineering the code (using tools like ghidra or hopper)
NoPicklez•10h ago
Lots of experience in what are common exploit tactics are and where to look and test if things will break.

Identifying an exploit in iOS requires a significant amount of knowledge in how the OS works, what existing exploits are and how you could chain them together to create a larger exploit.

I've have very limited experience, but reading about how some people identify and exploit these things is extremely impressive.

transpute•10h ago
Fuzzing is one approach.

"Fuzzing ImageIO" (2020), https://googleprojectzero.blogspot.com/2020/04/fuzzing-image...

> This blog post discusses an old type of issue, vulnerabilities in image format parsers, in a new(er) context: on interactionless code paths in popular messenger apps. This research was focused on the Apple ecosystem and the image parsing API provided by it: the ImageIO framework. Multiple vulnerabilities in image parsing code were found, reported to Apple or the respective open source image library maintainers, and subsequently fixed. During this research, a lightweight and low-overhead guided fuzzing approach for closed source binaries was implemented and is released alongside this blogpost.

"ImageIO, the infamous iOS Zero Click Attack Vector" (2024), https://r00tkitsmm.github.io/fuzzing/2024/03/29/iOSImageIO.h...

> I used LLDB to examine the testHeader functions, it turned out there are three new testHeader functions for different file formats, such as KTX2 and WebP and ETC, so because they were fairly new I thought maybe they have not been fuzzed by Project Zero... I ported Project Zero’s harness to Jackalope fuzzer.. My fuzzing effort found several vulnerabilities [fixed by Apple]..

fmajid•15h ago
It's 2025, and Apple clearly still hasn't incorporated fuzzers in their CI and QA. Perhaps I am giving them too much credit in assuming they have any QA in the first place.
tptacek•12h ago
I have no idea what you're talking about; Apple has one of the largest and most sophisticated software security practices on the planet.
pjmlp•6h ago
They do, but unfortunately it is built on top of a shacky foundation.
transpute•9h ago
ImageIO has been fuzzed by Google and others, https://news.ycombinator.com/item?id=45034650
user214412412•12h ago
is it me or does ios have a myriad of cves in in the image processing/decoder stack? You'd think they'd sandbox in some kind of memory safe framework/lang by now?
muricula•12h ago
Look up iMessage's "blastdoor" sandbox: https://support.apple.com/guide/security/blastdoor-for-messa...
kaladin-jasnah•6h ago
FORCEDENTRY bypassed this sandbox IIRC. That was a bug in the JBIG2 decoder.
jimmyl02•11h ago
unfortunately sandboxes also have bugs which allows for RCE. this is typically called a "full chain" because it chains together a series of bugs (initial decoder exploit + sandbox escape exploit) to gain full RCE
ladyanita22•6h ago
For some reason, Apple seems reluctant about using Rust on their operating systems.
steve1977•5h ago
That reason is probably called Swift. But they obviously still have many many system libraries written in Objective-C, plain C or C++.

I don't see them using Rust when they have their own language under their full control, especially since both are targeting LLVM anyway.

GoblinSlayer•3h ago
Also image formats are fairly stable, so they are a good candidate for a verified F* parser. Not sure how easy it is for pdf, maybe start with a reasonable subset of it.
mschuster91•1h ago
Good luck doing that for stuff like PDF which can include JavaScript in the PDF file itself, or SVG+PDF which both can include raw font files, another reliable source of exploits.
Hilift•2h ago
Apple should formalize the iMessage de facto DeviceAndAccountTakeover() API call. I lost count how many zero-click it has. Tim Apple can take the privacy high road all day but it doesn't matter if the code is rotten.

https://citizenlab.ca/2025/06/first-forensic-confirmation-of...

https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zer...

https://citizenlab.ca/2021/09/forcedentry-nso-group-imessage...

https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hac...

saagarjha•2h ago
This isn't just an iOS thing, and they do sandbox it. Parsers are hard.
aspenmayer•4h ago
https://web.archive.org/web/20250827063813/https%3A%2F%2Fs3....