frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The Most Important Machine Learning Equations: A Comprehensive Guide

https://chizkidd.github.io//2025/05/30/machine-learning-key-math-eqns/
21•sebg•38m ago•0 comments

The Math Behind GANs

https://jaketae.github.io/study/gan-math/
18•sebg•34m ago•4 comments

The Deletion of Docker.io/Bitnami

https://community.broadcom.com/tanzu/blogs/beltran-rueda-borrego/2025/08/18/how-to-prepare-for-th...
247•zdkaster•7h ago•154 comments

Altered states of consciousness induced by breathwork accompanied by music

https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0329411
398•gnabgib•11h ago•198 comments

Windows 11 Update KB5063878 Causing SSD Failures

https://old.reddit.com/r/msp/comments/1n1sgxx/windows_11_update_kb5063878_causing_ssd_failures/
99•binwiederhier•2h ago•45 comments

Fossjobs: A job board for Free and Open Source jobs

https://www.fossjobs.net/
40•rendx•1h ago•8 comments

Prosper AI (YC S23) Is Hiring Founding Account Executives (NYC)

https://jobs.ashbyhq.com/prosper-ai/29684590-4cec-4af2-bb69-eb5c6d595fb8
1•XDGC•16m ago

A Fast Bytecode VM for Arithmetic: The Compiler

https://abhinavsarkar.net/posts/arithmetic-bytecode-vm-compiler/
33•abhin4v•3d ago•1 comments

Claude Code Checkpoints

https://claude-checkpoints.com/
9•punnerud•3h ago•0 comments

Yamanot.es: A music box of train station melodies from the JR Yamanote Line

https://yamanot.es/
271•zdw•15h ago•81 comments

Malicious versions of Nx and some supporting plugins were published

https://github.com/nrwl/nx/security/advisories/GHSA-cxm3-wv7p-598c
404•longcat•1d ago•413 comments

Certificates for Onion Services

https://onionservices.torproject.org/research/proposals/usability/certificates/
85•keepamovin•9h ago•12 comments

Nvidia DGX Spark

https://www.nvidia.com/en-us/products/workstations/dgx-spark/
149•janandonly•3d ago•155 comments

Toyota is recycling old EV batteries to help power Mazda's production line

https://www.thedrive.com/news/toyota-is-recycling-old-ev-batteries-to-help-power-mazdas-productio...
264•computerliker•4d ago•119 comments

Petition to stop Google from restricting sideloading and FOSS apps

20•nativeforks•1h ago•3 comments

Unexpected productivity boost of Rust

https://lubeno.dev/blog/rusts-productivity-curve
440•bkolobara•20h ago•395 comments

Launch HN: Bitrig (YC S25) – Build Swift apps on your iPhone

153•kylemacomber•20h ago•100 comments

What Is Synthetic Gasoline?

https://iere.org/what-is-synthetic-gasoline/
6•alexandrehtrb•2d ago•6 comments

Sci-Hub has been blocked in India

https://sci-hub.se/sci-hub-blocked-india
207•the-mitr•7h ago•95 comments

VIM Master

https://github.com/renzorlive/vimmaster
316•Fluffyrnz•20h ago•103 comments

Open Source is one person

https://opensourcesecurity.io/2025/08-oss-one-person/
77•LawnGnome•10h ago•13 comments

Like Intel before it, AMD blames motherboard makers for burnt-out CPUs

https://arstechnica.com/gadgets/2025/08/like-intel-before-it-amd-blames-motherboard-makers-for-bu...
9•seemaze•2d ago•0 comments

GMP damaging Zen 5 CPUs?

https://gmplib.org/gmp-zen5
215•sequin•19h ago•191 comments

The GitHub website is slow on Safari

https://github.com/orgs/community/discussions/170758
406•talboren•1d ago•312 comments

What is this? The case for continually questioning our online experience (2021)

https://systems-souls-society.com/what-is-this-the-case-for-continually-questioning-our-online-ex...
24•Gigamouse•3d ago•11 comments

Google has eliminated 35% of managers overseeing small teams in past year

https://www.cnbc.com/2025/08/27/google-executive-says-company-has-cut-a-third-of-its-managers.html
486•frays•15h ago•224 comments

Pausing Insect Activity

https://www.asimov.press/p/insect-diapause
8•surprisetalk•3d ago•0 comments

Lesser known mobile adtech domains where data is sent

https://jamesoclaire.com/2025/08/28/uncovering-lesser-known-mobile-adtech-domains/
34•ddxv•6h ago•14 comments

Object-oriented design patterns in C and kernel development

https://oshub.org/projects/retros-32/posts/object-oriented-design-patterns-in-osdev
234•joexbayer•2d ago•157 comments

On the screen, Libyans learned about everything but themselves (2021)

https://newlinesmag.com/argument/on-the-screen-libyans-learned-about-everything-but-themselves/
45•thomassmith65•3d ago•16 comments
Open in hackernews

Certificates for Onion Services

https://onionservices.torproject.org/research/proposals/usability/certificates/
85•keepamovin•9h ago

Comments

xg15•3h ago
Does external cert validation for onion domains even make sense? I thought the "domain name" was already the hash of some public key that is used in the normal encryption of the onion router - so there is already a mandatory cryptographic proof that the service you're talking with "owns" the domain. What additional security benefit would CA-signed certs bring?
jontro•3h ago
They write the following reason in the article: But as the web and other internet technologies mature, certificates are starting to be a requirement in order to unleash functionalities, especially in web browsers, such as the faster connection protocol HTTP/2 and payment processing.
xg15•3h ago
This seems really sad. But I guess it depends what the goal is. If you want to integrate onion purely on a DNS resolver and network interface level and then use a stock browser for accessing the services, yes, you'd need that.

(Then you'll also have to fight with the stock browser for using your special DNS resolver, not leaking info to Google, Cloudflare or whoever else, etc etc, tho)

But don't most people use custom browsers with built-in support for onion anyway? If that's the case, the easiest solution would seem to just declare .onion a "secure origin" like localhost and patch the browser accordingly.

rnhmjoj•1h ago
> But don't most people use custom browsers with built-in support for onion anyway? If that's the case, the easiest solution would seem to just declare .onion a "secure origin" like localhost and patch the browser accordingly.

Indeed, the use of the onion TLD has been standardised in RFC 7686 [1], so browsers should really treat it as secure and stop the usual plaintext HTTP shenanings.

[1]: https://datatracker.ietf.org/doc/html/rfc7686

flotzam•2h ago
The section Benefits (after Introduction) lists 9 reasons why it makes sense. Some of them are about working around a mismatch with existing standards, but not all.
arvinjoar•2h ago
"Doesn't make sense for us but mandated by policy" is a super common phenomenon that you'll sadly encounter all the time in the industry. Especially when it comes to security. In this case it's at least motivated by something as peripheral as onion services wanting to fit in with the browser ecosystem, which, fair, maybe it doesn't make sense for browsers to bloat their designs by taking onion services into account, and then onion services have to adapt to modern browser standards.
potato3732842•1h ago
>"Doesn't make sense for us but mandated by policy"

It's way worse in the physical world than in the software world IMO.

maqp•1h ago
>I thought the "domain name" was already the hash of some public key

With v3 it's the ed25519 key with a checksum.

For something like a Cwtch address or your personal dissident blog criticizing Emutopia, it's enough your contacts get the address from you personally or that they find it some other way and pin the site to bookmarks for TOFU.

But with public services like Duckduckgo onion service, it's possible for people to trivially spin up their own unique per-target MITM proxy server instance, and share the link to their friends, bookmark it to their SO's Tor browser and MITM their connections, poison link repositories, or official links on wikipedia pages etc.

Having a CA validate you own the clearweb site first helps mitigate this stuff to some extent. Problem is of course, will the user know if they're supposed to be expecting a cert for a page they visit the first time.

(I wonder if Tor browser could have a list of pinned onion addresses with "clearweb_equivalent_of" field for this, and you could easily check that from the site security badge.)

xg15•1h ago
This seems like a general problem of using search on onion. I don't really understand how this is supposed to work at all, honestly.

Either you already know the domain you want to visit or you don't.

If you do, you don't need search.

If you don't, how could you be sure that any search results are for the real site and not an MITM proxy?

keepamovin•8m ago
[delayed]
throw0101c•1h ago
> Does external cert validation for onion domains even make sense? […] What additional security benefit would CA-signed certs bring?

Yes, and the page/documents explain some use cases:

> The two ACME-defined methods allowed by CA/BF described in Sections 3.1.2 and 3.1.3 (http-01 and tls-alpn-01) do not allow issuance of wildcard certificates. A ".onion" Special-Use Domain Name can have subdomains (just like any other domain in the DNS), and a site operator may find it useful to have one certificate for all virtual hosts on their site. This new validation method incorporates the specially signed Certificate Signing Request (CSR) (as defined by Appendix B.2.b of [cabf-br]) into ACME to allow for the issuance of wildcard certificates.

* https://datatracker.ietf.org/doc/html/rfc9799#name-new-onion...

> Some Hidden Services do not wish to be accessible to the entire Tor network, and so they encrypt their Hidden Service Descriptor with the keys of clients authorized to connect. Without a way for the CA to signal what key it will use to connect, these services will not be able to obtain a certificate using http-01 or tls-alpn-01, nor enforce CAA with any validation method.

> To this end, an additional field in the challenge object is defined to allow the ACME server to advertise the Ed25519 public key it will use (as per the "Authentication during the introduction phase" section of [tor-spec]) to authenticate itself when retrieving the Hidden Service Descriptor.

* https://datatracker.ietf.org/doc/html/rfc9799#name-new-onion...

throw0101c•1h ago
"Automated Certificate Management Environment (ACME) Extensions for ".onion" Special-Use Domain Names", June 2025:

* https://datatracker.ietf.org/doc/html/rfc9799

WhyNotHugo•6m ago
This is another example of why requiring TLS everywhere doesn't make sense. Onion traffic is already encrypted, but because software demands TLS everywhere, we add TLS on top, even when unnecessary.

The same happens with 1:1 tunnels, or even localhost. None of these need TLS, and I should be able to tell my browser "enable all features on this site, consider it fully secure".