frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Writing an operating system kernel from scratch

https://popovicu.com/posts/writing-an-operating-system-kernel-from-scratch/
100•Bogdanp•2h ago•16 comments

Models of European metro stations

http://stations.albertguillaumes.cat/
559•tcumulus•11h ago•112 comments

Why We Spiral

https://behavioralscientist.org/why-we-spiral/
61•gmays•3h ago•20 comments

You're a Slow Thinker. Now What?

https://chillphysicsenjoyer.substack.com/p/youre-a-slow-thinker-now-what
43•sebg•3d ago•9 comments

Bank of Thailand freezes 3M accounts, sets daily transfer limits to curb fraud

https://www.thaienquirer.com/57752/bot-freezes-3-million-accounts-sets-daily-transfer-limits-of-5...
133•walterbell•3h ago•106 comments

Observable Notebooks Data Loaders

https://observablehq.com/notebook-kit/data-loaders
40•mbostock•4d ago•6 comments

Nicu's test website made with SVG (2007)

https://svg.nicubunu.ro/
101•caminanteblanco•3h ago•66 comments

CorentinJ: Real-Time Voice Cloning (2021)

https://github.com/CorentinJ/Real-Time-Voice-Cloning
64•redbell•7h ago•16 comments

Repetitive negative thinking associated with cognitive decline in older adults

https://bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-025-06815-2
91•redbell•6h ago•59 comments

Geedge and MESA leak: Analyzing the great firewall’s largest document leak

https://gfw.report/blog/geedge_and_mesa_leak/en/
334•yourapostasy•1d ago•95 comments

Read to Forget

https://mo42.bearblog.dev/read-to-forget/
47•diymaker•5h ago•16 comments

SpikingBrain 7B – More efficient than classic LLMs

https://github.com/BICLab/SpikingBrain-7B
109•somethingsome•12h ago•30 comments

Fukushima Insects Tested for Cognition

https://news.cnrs.fr/articles/fukushima-insects-tested-for-cognition
81•nis0s•7h ago•52 comments

A single, 'naked' black hole confounds theories of the young cosmos

https://www.quantamagazine.org/a-single-naked-black-hole-rewrites-the-history-of-the-universe-202...
138•pykello•14h ago•56 comments

macOS Tahoe is certified Unix 03 [pdf]

https://www.opengroup.org/openbrand/certificates/1223p.pdf
138•john_alan•7h ago•132 comments

Refurb Weekend: Silicon Graphics Indigo² Impact 10000

http://oldvcr.blogspot.com/2025/09/refurb-weekend-silicon-graphics-indigo.html
132•Bogdanp•12h ago•47 comments

Show HN: A store that generates products from anything you type in search

https://anycrap.shop/
992•kafked•1d ago•296 comments

Two Slice, a font that's only 2px tall

https://joefatula.com/twoslice.html
441•JdeBP•18h ago•108 comments

Introduction to GrapheneOS

https://dataswamp.org/~solene/2025-01-12-intro-to-grapheneos.html
76•renehsz•4d ago•55 comments

The PC was never a true 'IBMer'

https://thechipletter.substack.com/p/the-pc-was-never-a-true-ibmer
50•klelatti•9h ago•38 comments

MIT-MC CP/M archive files, 1979-1984

https://github.com/MITDDC/cpmarchive-1979-1984
46•elvis70•2d ago•1 comments

High Altitude Living – 8,000 ft and above (2021)

https://studioq.com/blog/2021/5/30/high-altitude-living-8000-ft-and-above-2450-meters
65•walterbell•15h ago•51 comments

Pass: Unix Password Manager

https://www.passwordstore.org/
285•Bogdanp•19h ago•149 comments

Gemini (2023)

https://geminiquickst.art/
59•jhanschoo•9h ago•26 comments

Dynamic Bird Migration Map

https://explorer.audubon.org/explore/species?sidebar=expand
71•skadamat•4d ago•9 comments

The Socratic Journal Method: A Simple Journaling Method That Works

https://mindthenerd.com/the-socratic-journal-method-a-simple-journaling-method-that-actually-works/
159•surprisetalk•4d ago•68 comments

Will AI be the basis of many future industrial fortunes, or a net loser?

https://joincolossus.com/article/ai-will-not-make-you-rich/
195•saucymew•20h ago•282 comments

The unreasonable effectiveness of modern sort algorithms

https://github.com/Voultapher/sort-research-rs/blob/main/writeup/unreasonable/text.md
117•Voultapher•3d ago•34 comments

How the restoration of ancient Babylon is drawing tourists back to Iraq

https://www.theartnewspaper.com/2025/09/12/how-the-restoration-of-ancient-babylon-is-helping-to-d...
101•leoh•17h ago•50 comments

AMD’s RDNA4 GPU architecture

https://chipsandcheese.com/p/amds-rdna4-gpu-architecture-at-hot
150•rbanffy•21h ago•35 comments
Open in hackernews

Introduction to GrapheneOS

https://dataswamp.org/~solene/2025-01-12-intro-to-grapheneos.html
76•renehsz•4d ago

Comments

yjftsjthsd-h•2h ago
> GOS does not allow you to become root on your phone though, it just gives you more control through permissions and profiles.

It really is sad that there isn't any ROM with Graphene's permission and sandboxing features while still leaving the user in control. IIRC it's theoretically possible since they publish the code, but one assumes it would be a non-trivial effort:\

ranger_danger•2h ago
If you have the UI layer able to grant root access, it has root access itself and is not sandboxed. If the UI layer can grant it, an attacker gaining slight control over it has root access. An accessibility service trivially has root access. A keyboard can probably get root access, and so on. Instead of a tiny little portion of the OS having root access, a massive portion of it does.

In the verified boot threat model, an attacker controls persistent state. If you have persistent root access as a possibility then verified boot doesn't work since persistent state is entirely trusted.

A userdebug build of AOSP or GrapheneOS has a su binary and an adb root command providing root access via the Android Debug Bridge via physical access using USB. This does still significantly reduce security, particularly since ADB has a network mode that can be enabled. Most of the security model is still intact. This is not what people are referring to when they talk about rooting on Android, they are referring to granting root access to apps via the UI not using it via a shell.

yjftsjthsd-h•2h ago
EDIT: This is a reply to the 2nd(?) version of your comment before it was silently changed into something different.

Yes, I'm sure it is. But I don't consider that a tolerable tradeoff, and I believe we could have a system that has most of the best of both worlds.

cakealert•2h ago
> If you have the UI layer able to grant root access, it has root access itself and is not sandboxed.

The same is true even of an operating system such as QubesOS. And it's a minimal risk.

Not providing optional root access on GOS makes it only useful if you have a constrained application in mind for the phone. I don't have time to compile GOS with root so I just use LineageOS instead.

bbarnett•1h ago
It's useful for general use just fine.

But you could always do both. Compile it, but preinstall a specific set of apps as root, no su.

yjftsjthsd-h•2h ago
Quoting inline since parent has been rewritten multiple times now...

> If you have the UI layer able to grant root access, it has root access itself and is not sandboxed. If the UI layer can grant it, an attacker gaining slight control over it has root access. An accessibility service trivially has root access. A keyboard can probably get root access, and so on. Instead of a tiny little portion of the OS having root access, a massive portion of it does.

Android has an established way to handle permission dialogs that require the user to confirm their approval, including use of fingerprint/PIN/password to authenticate. If it's good enough to unlock and decrypt the device, it's good enough to control root access. Besides which, I think

> An accessibility service trivially has root access.

is hitting https://xkcd.com/1200/ ; an a11y service already has access to everything inside the sandbox (including all your sensitive data), and the system settings that control permissions and sandboxing.

> In the verified boot threat model, an attacker controls persistent state. If you have persistent root access as a possibility then verified boot doesn't work since persistent state is entirely trusted.

I'm tentatively willing to agree, but I don't see the point? 1. If an attacker controls persistent state, don't they already control all the other permissions, including what security domains exist and what permissions are given to apps. 2. You don't have to persist it; even just one-off root access is quite useful.

> A userdebug build of AOSP or GrapheneOS has a su binary and an adb root command providing root access via the Android Debug Bridge via physical access using USB. This does still significantly reduce security, particularly since ADB has a network mode that can be enabled. Most of the security model is still intact. This is not what people are referring to when they talk about rooting on Android, they are referring to granting root access to apps via the UI not using it via a shell.

Agreed, that's not what I want.

ranger_danger•1h ago
> Android has an established way to handle permission dialogs that require the user to confirm their approval

With the advent of choicejacking I don't think I want to trust permission dialogs anymore.

> including use of fingerprint/PIN/password to authenticate

IMO if you have the UI layer able to grant root access at all, even with requiring re-authentication, it still already has root access itself and is therefore not sandboxed.

yjftsjthsd-h•1h ago
> With the advent of choicejacking I don't think I want to trust permission dialogs anymore.

So you're using a version of Android patched to remove all permissions? After all, in your threat model all apps can get permission to use the microphone and camera, make phone calls, access fine-grained location information, read and write files at will, etc. Frankly, I'm not sure what they'd get out of root at this point.

> IMO if you have the UI layer able to grant root access at all, even with requiring re-authentication, it still already has root access itself and is therefore not sandboxed.

Likewise, surely this applies to any permission system, and every other permission. The system UI controls every other permission in the system; if we assume it compromised, then everything else is already lost.

codethief•1h ago
> Frankly, I'm not sure what they'd get out of root at this point.

A permission that allows them to hide that they have access to everything, including other apps' data?

yjftsjthsd-h•1h ago
Possibly. Yes, hiding from auditing would be a possible advantage, but I think an app with accessibility permissions could already draw over the settings app to hide the real list of permissions from your view without root. Off the top of my head I think there's a whole mess of permissions needed to allow that, but we're discussing a threat model where permission dialogs can be effectively bypassed so that's no obstacle.
ysnp•1h ago
>This is not what people are referring to when they talk about rooting on Android

Would this have been easier or more possible if Android had a full capability-based security model?

yjftsjthsd-h•1h ago
Arguably Android has a capability-based security model, though it suffers from being ... well, it's not what you'd build if you were doing it from scratch today. Hindsight is 20/20. But I'd tentatively say not really, because the point of root is to get outside the existing capabilities. As an example: For a while, the most common root app I ran was one to limit charging to 80% or whatever to make the battery age more gracefully.[0] The whole reason that needed root is because there wasn't a capability/permission for that; the app couldn't ask the OS to let it control charging, because nobody even thought to expose that API surface.

[0] This was later obsoleted by the OS adding that feature natively, which is an interesting angle to consider; directly supporting the things people root for definitely helps, but you're unlikely to ever get everything so it's not a panacea.

ysnp•1h ago
>This was later obsoleted by the OS adding that feature natively, which is an interesting angle to consider; directly supporting the things people root for definitely helps, but you're unlikely to ever get everything so it's not a panacea.

For what it's worth, my understanding is that this has always been the position of GrapheneOS too. Given the resources and enough benefit/cost to allocate, the project would rather integrate or implement usability features at the OS level instead of encouraging people to expose attack surface. Specifically because GrapheneOS is a project meant to be primed to defend some of the most intimate and personal aspects of a person's life.

yjftsjthsd-h•54m ago
Yeah, I definitely think it's an excellent goal to erode the cases that need root. It is a powerful escape hatch, and I think it's important that it exist, but it's also a good thing to not need it. The difference is that I don't believe the system will ever cover everything I want to do, so I consider that escape hatch to be really important.
subscribed•1h ago
Okay, but it's very easy for you to build and sign your own builds that provide root access to the user.

I dint understand why you insist on this massive risk to be laid on on everyone.

GOS publishes pretty detailed documentation. They don't explain step by step how to build an OS with root specifically, instead assuming that the users knowing the immense risks also have the skils they need to achieve it without handholding.

jampekka•1h ago
If the risks are so immense, surely we shouldn't be allowed root on our laptops either?
bornfreddy•1h ago
Pssst, quiet, don't give them any ideas... :-/
paulhart•1h ago
That's a Chromebook, no?
jampekka•1h ago
Chromebooks have Developer Mode that gives full root.

https://www.chromium.org/chromium-os/developer-library/guide...

codethief•1h ago
From a security point of view that would be a good idea, or at least making sure you don't need root for everyday tasks. Requiring root to, e.g., install & configure applications is a huge antipattern IMO.
jampekka•1h ago
Android of course requires root for installing and configuring applications. It just grants the root automatically.
oneshtein•20m ago
Developers cannot trust a random phone «owner».
sfdlkj3jk342a•1h ago
They actually do include how to do it in their official build guide. Just change the build target from -user to -userdebug. All other steps remain the same. That will give you adb root access.
yjftsjthsd-h•1h ago
> That will give you adb root access.

I don't want adb root access? I want to be able to run apps with root access.

fsflover•1h ago
> massive risk

Are you saying that the Qubes OS security model is worse than the GrapheneOS one?

IlikeKitties•34m ago
It's a different approach to compartmentalization and the security risk of root in Grapheneos is different to that in QubesOS. But you know this looking at your bio, you just chose to ignore it.
yjftsjthsd-h•1h ago
> Okay, but it's very easy for you to build and sign your own builds that provide root access to the user.

> GOS publishes pretty detailed documentation. They don't explain step by step how to build an OS with root specifically, instead assuming that the users knowing the immense risks also have the skils they need to achieve it without handholding.

It really sounds like you call it very easy, then promptly turn around and say that it's not easy but that's okay because it should be hard. You're also conflating the ability to assess security risks with the ability to build Android from source and modify it in the process, even though these skills are mostly unrelated.

> I dint understand why you insist on this massive risk to be laid on on everyone.

Largely, I don't agree that it's a "massive risk" in the first place. I don't believe that user-controlled root access is a problem, and I certainly don't believe that a default-off option to enable root access constitutes a problem.

crapple8430•1h ago
You can root GrapheneOS just fine. Moreover you can even re-lock the bootloader after rooting.

See: github.com/chenxiaolong/avbroot

charcircuit•48m ago
Giving the user control does not mean giving the user root. Giving root breaks Android security model. Whatever capability you want should be implemented as a proper feature to avoid breaking the security of the device.

Equating control to root is an outdated way of thinking that comes from a time before the principle of least privilege existed. The way UNIX did things should not be put on a pedestal.

oneshtein•26m ago
> Giving root breaks Android security model.

It's true only if user is the threat for the user, e.g. a user with low IQ but high curiosity, but such user usually cannot install GrapheneOS.

treyd•22m ago
That would be nice, but trying to get those kinds of functionality upstreamed into GOS so they can be exposed tovapps in a structured way with the usual permissions model is a high effort.

There needs to be some escape hatch that you can use, even if your grandma doesn't have access to it.

fsflover•1h ago
GrapheneOS developers keep insisting [0] that their security model is the only reasonably secure approach in the world, despite that Qubes OS proved that wrong.

https://news.ycombinator.com/item?id=45101400

ysnp•1h ago
>their security model is the only reasonably secure approach in the world

They have not said anything like that. In fact there are plenty of things about the current GrapheneOS + Pixel end result that they would change if they had the resources and support to do so. They have repeatedly praised or highlighted improvements in iOS and other less mainstream operating systems.

QubesOS is a completely different project with different goals and constraints. GrapheneOS have praised the isolation model of Qubes repeatedly, but have always said it is a strong approximation of many laptops. Older laptop operating systems (Windows/macOS/desktop Linux distros) do not aim to provide similar protections against threats that the newer mobile operating systems have done.

ranger_danger•56m ago
How did Qubes OS prove them wrong? You still have root on qubes, humans still make errors, IMO it's therefore technically still less secure. Of course this assumes your goal is to prevent bad things from happening in general, regardless of how it happens, and not just say "yea the OS is secure but humans can still mess things up by using it wrong".

I think protecting people from themselves is a noble goal that is often overlooked, even if many will disagree with me.

IlikeKitties•38m ago
What utter nonesense. Just because the GrapheneOS Team doesn't do free work to support devices you like doesn't mean they prevent you from doing it. It's still 100% opensource and you are free to port it yourself to whatever device you please. The entitlement of people that want the grapheneos project to work for them for free is insane. Fucking hire a dev to work on this for a few month yourself if you don't like the device support.
electric_muse•1h ago
I just bought a pixel from best buy to install gos, which was an ordeal.

At checkout they looked at me like I was up to no good when I said I didn’t want to give them my name, address, and phone number just to purchase the device. I didn’t set up a plan. They said it was for “restocking” or something.

Fortunately they accepted obviously fake info. These front line sales people just don’t care as long as they can say they followed the policy.

The user containers are very helpful. I have to have TikTok for work and I put it in a container all by itself with a vpn on kill switch. And for one app that needs google play services, I have it a container with that.

The duress passcode is super clever, too. You enter a different device passcode and it just wipes the device.

codethief•1h ago
> The user containers are very helpful

You mean different user accounts? Those are available on stock Android, too.

a0sud0a8s•57m ago
True, although on GrapheneOS, apps on different profiles can remain active when you switch and notifications can be sent to the primary profile if you choose.
ysnp•57m ago
I think it depends on the Android distribution. I am not sure it is available on Samsung's One UI.
gertop•25m ago
Multiple user is available on Samsung. Both multiple profiles as well as work profile.

Samsung also has "secure folder" which isolates apps and files and presumably uses multiple users to do the isolation.

ysnp•17m ago
Apparently multiple user profiles is available on their tablets but not on their smartphones.
subscribed•28m ago
On GrapheneOS they're profiles. Pretty much the same as with the stock aosp, but they add very extensive support - like notifications forwarding and a perfect balance between security and convenience, 2FA with shorter pin.
dosshell•39m ago
> I have to have TikTok for work

I'm sorry but what? Your job demands what apps you have installed on your PRIVATE phone!?

TranquilMarmot•2m ago
I would assume for advertising/business account. There are things you can only do on the TikTok app that you can't do on the web.
NoiseBert69•1h ago
Bought an Google Pixel Tablet only for GOS. Installation worked like a charm and all my applications are still working without problems.

Loving it.

junkblocker•1h ago
There did not seem to be an RCS story. Whether the device is RCS capable or not seems to be up to some unfathomable Google logic the tickling of which didn't work for me. Having old RCS chat histories and new RCS chats not work made me go back to stock quick.
throawayonthe•58m ago
you need the google messaging app for RCS
goda90•48m ago
Is it because no one else has tried implementing the RCS standard or because Google has some proprietary hold over it?
ThePowerOfFuet•9m ago
RCS is an abomination.
tietjens•37m ago
Sincere question: what is the point of using this OS for privacy and then using Google services? The intro runs though how it’s very easy to do this. Maybe I’m missing something.
krior•31m ago
Afaik, Google services are run in a sandbox on Graphene OS.
tietjens•21m ago
Hm ok but location data etc still goes to them? What about the device fingerprint?

I’m just wondering what the selling point for using Graphene with Google is. Very Graphene curious.

arminiusreturns•23m ago
Security, including privacy, is about layers of hardening. In this case, minimization of leakage and other privacy concerns for some can still be worth the tradeoffs. For example, some apps literally refuse to work on a completely de-googled phone. (I ran one for many years with no google services). Also, the general control the user gets offers a lot more ability to harden than most android. I bricked my phone and am currently borrowing one and using stock android and there are things like facebook that are literally uninstallable... At least on lineage/graphene the user can actually control the system.
ysnp•21m ago
GrapheneOS primarily exists to give you tools to exert more control over what apps have access to and to better protect your data. What you do with those tools is entirely your own concern. Where those apps come from is not GrapheneOS's concern.

I don't think most people use Google services out of choice anyway, but more because sometimes that's the only way to get functionality you may need.

cool_cherry•14m ago
It's actually really great!

Google Play Services is a dependency for some apps, and GrapheneOS allows for people to take steps to protect their privacy while still being able to use those apps.

First, with GrapheneOS google play services run in a sandbox like any other app. (play services have more privileged access in vanilla android)

It also works well with a multi-user setup. The default account in Android is the "owner account" and in GrapheneOS (and AOSP) you can use the owner account to create multiple distinct user accounts on the device. Then, you can only install google play services in one user account. Google play services won't start if you're not logged into that user account.

Google play services won't have visibility into your other user accounts and what you're doing there. And even in your account with play services installed, there's a bit more privacy because of the sandboxing (although I believe google play will know all of the apps installed in that user account)

There's a full explanation here: https://grapheneos.org/usage#sandboxed-google-play