frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
254•theblazehen•2d ago•85 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
26•AlexeyBrin•1h ago•2 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
706•klaussilveira•15h ago•206 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
969•xnx•21h ago•558 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
68•jesperordrup•6h ago•31 comments

Reinforcement Learning from Human Feedback

https://arxiv.org/abs/2504.12501
7•onurkanbkrc•46m ago•0 comments

Making geo joins faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
135•matheusalmeida•2d ago•35 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
45•speckx•4d ago•35 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
68•videotopia•4d ago•7 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
39•kaonwarb•3d ago•30 comments

ga68, the GNU Algol 68 Compiler – FOSDEM 2026 [video]

https://fosdem.org/2026/schedule/event/PEXRTN-ga68-intro/
13•matt_d•3d ago•2 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
45•helloplanets•4d ago•46 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
239•isitcontent•16h ago•26 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
237•dmpetrov•16h ago•126 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
340•vecti•18h ago•147 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
506•todsacerdoti•23h ago•247 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
389•ostacke•21h ago•98 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
303•eljojo•18h ago•188 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
361•aktau•22h ago•186 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
428•lstoll•22h ago•284 comments

Cross-Region MSK Replication: K2K vs. MirrorMaker2

https://medium.com/lensesio/cross-region-msk-replication-a-comprehensive-performance-comparison-o...
3•andmarios•4d ago•1 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
71•kmm•5d ago•10 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
23•bikenaga•3d ago•11 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
96•quibono•4d ago•22 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
26•1vuio0pswjnm7•2h ago•17 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
271•i5heu•18h ago•219 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
34•romes•4d ago•3 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1079•cdrnsf•1d ago•461 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
64•gfortaine•13h ago•30 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
306•surprisetalk•3d ago•44 comments
Open in hackernews

Apple A17 Pro Chip Hardware Flaw?

https://github.com/JGoyd/Apple-Silicon-A17-Flaw
39•FluGameAce007•5mo ago

Comments

FluGameAce007•5mo ago
This isn't just a bug... it's a hardware-level oversight that can cause iPhones to silently fail during boot, leaving no logs, no recovery mode, and no forensic trace.

The flaw is triggered by abrupt power loss (e.g. during brownouts or unstable charging), preventing the secure world and logging subsystems from initializing. Confirmed it on real A17 Pro device.

Curious if others can reproduce this, or if similar behavior exists in M-series chips.

mlyle•5mo ago
Shared resources isn't a "hardware bug." It's a design choice.

I2C is always vulnerable to one device locking up the bus-- indeed almost all buses are. But it's intended to be a bus hooking up multiple pieces of hardware.

This is an interesting phenomenon-- source account is 100% dubious Apple "bug reports" and then we have another completely new account choosing to misinterpret the dubious report (which isn't really security related despite involving a security component) as a critical vulnerability. The cited reports all ring like they're written by a LLM.

FluGameAce007•5mo ago
True.. I2C lockups are a known limitation, not a bug. But this isn’t about bus contention. The issue is that debug logic is active on production-fused silicon, despite dev-fused = 0 and debug = 0x0. That’s a hardware trust failure, not a design trade-off. Fuses are supposed to make debug paths unreachable—but they’re not. That’s the problem.
mlyle•5mo ago
There's no secure enclave output here. Stop the bogus reports.

If I want to talk to ChatGPT, I'll go to the site or use the API kthx.

yunyu•5mo ago
You're absolutely right! This isn't just X, it's Y...
ACCount37•5mo ago
That looks very much like "just a bug" to me.

Long press hard reboot should rectify that if the device isn't severely damaged in a way that causes permanent instability on I2C4. And if it is, then welcome to board level repair, here's your introductory can of pickled suffering.

Now, if you could use that to pwn SEP? Or boot into a custom ROM, checkm8 style? That would be something. But I see zero evidence of this being exploitable in any way.

FluGameAce007•5mo ago
If debug logic can be reactivated... even briefly, even locally; then all bets are off for things like firmware extraction, secure boot bypass, or SEP fault analysis.
ACCount37•5mo ago
Debug logic reactivated? Show me JTAG then.
SandboxEscape0•5mo ago
Just watched the log video in the report... it's legit.

These are not ephemeral or misinterpreted logs... they’re hard evidence that SecureROM and HAL subsystems are exposing debug logic in production mode. That shouldn't be possible unless the chip itself is violating its own trust enforcement model.

If this behavior is reproducible across multiple production devices, it's a class of vulnerability that Apple cannot patch in software. We're talking about a silicon-level debug bypass that persists without jailbreak, unsigned code, or tampering.

Strongly recommend pulling logs from known-good A16/A17 Pro devices and look for those same entries.

saagarjha•5mo ago
These are 100% misinterpreted logs. There is no hard evidence here.
brcmthrowaway•5mo ago
What is I2c4?
IshKebab•5mo ago
I guess there are multiple I2C buses and this is the fifth.

But it's AI slop so who knows if it's even real. At best its wildly overblown.

unethical_ban•5mo ago
This looks like an availability issue. Is it a security flaw?
FluGameAce007•5mo ago
Yes, it’s a security flaw, because debug logic is active on production hardware that should have it permanently fused off.

Worse, the system prunes logs aggressively, erasing the very diagnostic history that could expose this behavior. So not only is debug logic unintentionally enabled, the evidence is self-erasing.

cameronehrlich•5mo ago
So if the bus degrades it stops working? Big whoop!

That’s like saying that if the circuit breaker melts, it might melt one next to it too, and certain outlets wont work anymore…

FluGameAce007•5mo ago
If a circuit breaker melts and causes other circuits to misbehave, we don’t say “big whoop”... we call it a fire hazard.
metmac•5mo ago
For what it’s worth. I have noticed oddities like this where digitizer partial failure and data being unavailable even after unlocking the device.

Only thing that fixes it, is a hard reboot.

I wonder if that is related to this flaw.

opa334•5mo ago
This "flaw" does not exist, it was hallucinated by AI.
gchadwick•5mo ago
If I'm reading this right, glitching the I2C bus prevents the Secure Enclave from booting. It seems the device recovers from this itself 'Although the device recovered and remained operable', maybe the Secure Enclave reboots itself after seeing a fault in the I2C?

No evidence of any security issue is presented. Though it's certainly wanted to drum it as something major 'This is a high-severity, unpatchable design flaw'.

FluGameAce007•5mo ago
The device "recovering" while entering debug mode on production hardware is the security issue. Fuses are supposed to prevent that. They don’t. That’s the flaw.
re•5mo ago
If I own an iPhone 15 Pro, how am I impacted by this? Why does this repo say that a hardware recall may be necessary?
FluGameAce007•5mo ago
If debug logic is still active, attackers with physical access can dump firmware, extract secrets, or bypass protections that should be fused off.

Think: stolen phones, shady repair shops, or border checks — cases where physical access + this flaw = real risk.

That’s why a hardware recall may be necessary... fuses are meant to be irreversible. If they fail, there's no patch.

comex•5mo ago
AI slop aside, just for the record,

- SPU is not a processor, it's a generic term that encompasses multiple coprocessors.

- The log lines don't even mention the Secure Enclave Processor (SEP).

- Each line of log output is its own thing and there is no reason to think they have anything to do with each other.

- Those are not specifically serial logs. It is possible to get the same logs over serial, but only with a development unit, Security Research Device, or jailbreak.

FluGameAce007•5mo ago
But the issue isn't about parsing log semantics...

It's that a production device entered a state where normally fused-off debug logic became accessible. That shouldn’t be possible, regardless of how the logs were captured or named.

saagarjha•5mo ago
Get off the slop generator for a moment and look up who ‘comex is. Then stop submitting AI slop articles to this site (and better yet, stop writing them at all). If you really care about security research for Apple platforms, learn how to do it properly and find your own bugs instead of posting clearly bogus content.