frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
576•klaussilveira•10h ago•167 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
889•xnx•16h ago•540 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
91•matheusalmeida•1d ago•20 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
18•helloplanets•4d ago•9 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
21•videotopia•4d ago•0 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
197•isitcontent•11h ago•24 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
199•dmpetrov•11h ago•91 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
307•vecti•13h ago•136 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
352•aktau•17h ago•175 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
350•ostacke•17h ago•91 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
452•todsacerdoti•18h ago•228 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
20•romes•4d ago•2 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
79•quibono•4d ago•18 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
52•kmm•4d ago•3 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
253•eljojo•13h ago•153 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
388•lstoll•17h ago•263 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
5•bikenaga•3d ago•1 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
230•i5heu•13h ago•175 comments

Zlob.h 100% POSIX and glibc compatible globbing lib that is faste and better

https://github.com/dmtrKovalenko/zlob
12•neogoose•3h ago•7 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
68•phreda4•10h ago•12 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
24•gmays•6h ago•6 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
116•SerCe•7h ago•94 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
135•vmatsiiako•16h ago•59 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
268•surprisetalk•3d ago•36 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
42•gfortaine•8h ago•13 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
168•limoce•3d ago•87 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1039•cdrnsf•20h ago•431 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
60•rescrv•18h ago•22 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
14•denuoweb•1d ago•2 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
88•antves•1d ago•63 comments
Open in hackernews

Pixnapping Attack

https://www.pixnapping.com/
311•kevcampb•3mo ago
See also Hackers can steal 2FA codes and private messages from Android phones - https://news.ycombinator.com/item?id=45574613

Comments

ChrisArchitect•3mo ago
Discussion: https://news.ycombinator.com/item?id=45574613
jonplackett•3mo ago
In the previous discussion everyone seems happy it’s been patched and not to worry (even though androids mostly don’t run anything like the latest android)

But in this write up they say the patch doesn’t work fully

charcircuit•3mo ago
The bigger issue is the sidechannel that exists which leaks information from secure windows, even from protected buffers, potentially including DRM protected content.

While these blurs make the sidechannel easier to use as it provides a clear signal, considering you can predict the exact contents of the screen I feel like you could get away with just a mask.

esher•3mo ago
I was looking for a nice browser game, just judging by the name.
ggm•3mo ago
Not a phone designer, but could we imagine a new class of screen region which is excluded from screen grab, draw over and soft focus with a mask, and then notification which do otp or pin subscribe to use it?
charcircuit•3mo ago
App developers can already dynamically mark their windows as secure which should prevent any other app from reading the pixels it rendered. The compositor composites all windows, including secure windows and applies any effects like blur. No apps are supposed to be able to see this final composited image, but this attack uses a side channel they found that allows apps on the system to learn information about the pixels within the final composition.
ZiiS•3mo ago
The attack needs you to be able to alter the blur of pixels in a secure window; this could be forbidden. A secure window should draw 100% as requested or not at all.
charcircuit•3mo ago
The blur happens in the compositor. It doesn't happen in the secure windows.

>A secure window should draw 100% as requested or not at all.

Take for example "night mode" which adds an orange tint to everything. If secure windows don't get such an orange tint they will look out of place. Being able to do post processing effects on secure windows is desirable, so as I said there is a trade off here in figuring out what should be allowed.

hamandcheese•3mo ago
> Take for example "night mode" which adds an orange tint to everything. If secure windows don't get such an orange tint they will look out of place. Being able to do post processing effects on secure windows is desirable, so as I said there is a trade off here in figuring out what should be allowed.

That seems well worth the trade to me.

jasonjayr•3mo ago
These sort of restrictions also often interfere with accessibility and screen readers.

Either the screen reader is built into the OS as signed + trusted (and locks out competition in this space), or it's a pluggable interface, that opens an attack surface to read secure parts of the screen.

IshKebab•3mo ago
Right but night mode is built into the OS so you can easily make an exception (same for things like toasts). Are there use cases where you need a) a secure window, and b) a semi-transparent app-controlled window on top of it?
ZiiS•3mo ago
Yes; that is a perfect example of where I would prefer security over not looking out of place.
bilekas•3mo ago
It's not exactly a new technique but it's effective for most super targeted attacks, honestly it seems if you were this inclined to be able to get a specific app on the users phone, you might as well just work off the Android app you've already gotten delivered to the users phone. Like Facebook.

Throw a privacy notice to the users "This app will take periodic screenshots of your phone" You'd be amazed how many people will accept it.

> Did you release the source code of Pixnapping? We will release the source code at this link once patches become available: https://github.com/TAC-UCB/pixnapping

It's not exactly impossible to reverse what's happening here. You could have waited until it was patched but sounds like you wanted to get your own attention as soon as possible.

yorwba•3mo ago
A patch for the original vulnerability is already public: https://android.googlesource.com/platform/frameworks/native/... and explicitly states in the commit message that it tries to defeat "pixel stealing by measuring how long it takes to perform a blur across windows."

The researchers aren't releasing their code because they found a workaround to the patch.

Then there's a bunch of "no GPU vendor has committed to patching GPU.zip" and "Google has not committed to patching our app list bypass vulnerability. They resolved our report as “Won’t fix (Infeasible)”."

And their original disclosure was on February 24, 2025, so I don't think you can accuse them of being too impatient.

As for "This app will take periodic screenshots of your phone", you still need an exploit to screenshot things that are explicitly excluded from screenshots (even if the user really wants to screenshot them.)

MASNeo•3mo ago
If genuine, this finger pointing is an interesting approach to a security vulnerability. Last time I read such arguments was 20 years ago from a different firm in California and it was not to their advantage.

P.S.: where did you see this discussion?

yorwba•3mo ago
TFA: https://www.pixnapping.com
noname120•3mo ago
The initial disclosure to Google was on February 24, 2025. They had more than enough time.
4gotunameagain•3mo ago
Modern devices are simply too complex to be completely secure.

We have this tendency of adding more and more "features", more and more functionality 85% of which nobody asked for or has use for.

I believe that there will be a market for a small, bare bones secure OS in the future. Akin to how freeBSD is being run.

immibis•3mo ago
Bunnie's Precursor? It sounds cool, but it's also expensive as fuck. If you thought $100 for a graphing calculator was a ripoff, the Precursor is a similar form factor and level of computational power, but costs $1000 and can't be used in maths exams.

https://www.bunniestudios.com/blog/2020/introducing-precurso... (currently down, might be up later)

MASNeo•3mo ago
Would love a terminal and make world while on the go (-;
AJ007•3mo ago
From reading comments on hn over the past couple of years, I'm disappointed how terrible the security practices and knowledge has become. All of this stuff is about to get a lot worse with generative AI.

There are complaints on this story, and on the recent one about the fsf phone project about how inconvenient it is to not be able to access banking apps on your mobile phone. I can't be bothered to enter my banking password every 30 minutes on my desktop! What, I'm supposed to have two phones?

The first thing someone is going to do when they steal your phone (after they saw you enter your password in public) is open your banking and money apps and exfiltrate as much as they can from your accounts. This happens every single day. None of those apps should be installed or logged in on your phone. Same goes for 2FA apps. That's like traveling with Louis Vuitton luggage which is basically a "steal me" sign.

That's the most basic stuff for people who aren't a CEO of a company that is in the crosshairs of state sponsored espionage attacks.

The problems with "bare bones secure OS" device remain the same from a physical access standpoint: social engineering, someone sees your password, steals the device. But otherwise, yes, the devices you install a bunch of spyware/adware games on and take to bars should not be the ones you are doing your banking, 2FA, work, etc on ever.

ChrisMarshallNY•3mo ago
Huh. I don’t know that I’ve seen a whole domain name registered, for a paper on a single CVE, before.
w4yai•3mo ago
It's quite standard for "big" CVEs nowadays
dotancohen•3mo ago
I'd say that it started with heartbleed.
cc81•3mo ago
Maybe Linus has a point

>"It looks like the IT security world has hit a new low," Torvalds begins. "If you work in security, and think you have some morals, I think you might want to add the tag-line: "No, really, I'm not a whore. Pinky promise" to your business card. Because I thought the whole industry was corrupt before, but it's getting ridiculous," he continues. "At what point will security people admit they have an attention-whoring problem?"

https://www.techpowerup.com/242340/linus-torvalds-slams-secu...

ChrisMarshallNY•3mo ago
Interesting. Looks like I upset someone. Not sure why admitting to ignorance is so offensive. Maybe because it's so rare, hereabouts?
rs186•3mo ago
It started at least since https://www.heartbleed.com/ if not earlier
a022311•3mo ago
https://taptrap.click/ has been around for a while.
TheCapeGreek•3mo ago
Things like this make me wonder if the social media giants use attacks like these to gain certain info about you and advertise to you that way.

Either that or Meta's ability to track/influence emotional state by behaviour is that good that they can advertise to me things I've only thought of and not uttered or even searched anywhere.

vanviegen•3mo ago
Are you sure that isn't just the horoscope effect?
lhmiles•3mo ago
Similar people thinking similar thoughts I'd wager
malnourish•3mo ago
Consider that your thoughts are a consequence of what you've consumed. They're not guessing what you think, they're influencing it.
sph•3mo ago
You know it's serious because it's got a domain and a logo. Even security researchers gotta create engagement and develop their brand.
AbuAssar•3mo ago
Anyone remembers the OG heartbleed?
r00t-•3mo ago
I'd say it's _not_ serious when they need to market it.
TekMol•3mo ago
My takeaway:

Do not install apps. Use websites.

Apps have way too much permissions, even when they have "no permissions".

seethishat•3mo ago
The unfortunate truth is that so many things require a dedicated mobile app these days to use.

I don't own or carry a smart phone. I'm still able to get by without one, but just barely.

kingforaday•3mo ago
I wish Uber or Lyft allowed me to use a website. I hate having to find a regular taxi or rely on the kindness of others to use their app.
VGHN7XDuOXPAzol•3mo ago
surprisingly, Uber does! m.uber.com is a mobile website for Uber.

I only used once, in February, so hopefully they didn't break it since then.

kingforaday•3mo ago
Thanks. Will try it!
heavyset_go•3mo ago
No OS vendor wants you to do that, unless you're using a desktop, and then Google wants you to use Chrome. They all want a 30% cut of revenue and/or platform lock-in. They'll rely on dark patterns and nerfing features to push you to their app stores.

Similarly, software vendors want you to use apps for the same reason you don't want to use them. They'll rely on dark patterns to herd you to their native apps.

These two desires influence whether it's viable to use the web instead of apps. I think we need legislation in this area, apps should be secondary to the web services they rely on, and companies should not be allowed to purposely make their websites worse in order to get you on their apps.

pera•3mo ago
I am not familiar to this type of side-channel attacks but the article says they use GPU.zip which is exploitable through Chrome:

https://www.hertzbleed.com/gpu.zip/

macNchz•3mo ago
Looks to me that the browser version requires the targeted website to be iframed into the malicious site for this to work, which is mitigated significantly by the fact that many sites today—and certainly the most security-sensitive ones—restrict where they can be iframed via security headers. Allowing your site to be loaded in an iframe elsewhere is already a security risk, and even the most basic scans will tell you you're vulnerable to clickjacking if you do not set those headers.
AJ007•3mo ago
With JS disabled!
noname120•3mo ago
Note that for TOTP the attack is only feasible if the font and pixel-perfect positions on the screen are known:

> The attacks described in Section 5 take hours to steal sensitive screen regions—placing certain categories of ephemeral secrets out of reach for the attacker app. Consider for example 2FA codes. By default, these 6-digit codes are refreshed every 30 seconds [38]. This imposes a strict time limit on the attack: if the attacker cannot leak the 6 digits within 30 seconds, they disappear from the screen

> Instead, assuming the font is known to the attacker, each secret digit can be differentiated by leaking just a few carefully chosen pixels

x0x0•3mo ago
Since there's only 3 or so (google, microsoft authenticator, okta, anyone else?) apps in widespread use, that seems not actually like an obstacle?
goatsi•3mo ago
They also need to know where in the app the code for each service is displayed, so they are grabbing the code for your bank and not for your World of Warcraft account.
x0x0•3mo ago
which they can read from the same fixed layout/offsets displaying it to you
efreak•3mo ago
I assume Authy is fairly high use. I use Aegis usually, but I likely it has very little usage share.
lozenge•3mo ago
The best defence seems to be to configure your 2FA app to require biometrics. I'm not sure why they didn't mention this option.
DyslexicAtheist•3mo ago
think it's a fair point. but it still triggered this in me: "only way to prevent more of my data from being stolen is to give Android more of my data"
pixl97•3mo ago
Biometrics can't be changed if someone ever figures out how to duplicate them.
dominicrose•3mo ago
I'm no expert in security, but I'm guessing if you install an app on a Windows Desktop computer it can do more chaos faster and more discreetly than pixnapping can on Android.

If you use the same password on two websites, any one of the two websites can use it to log you it in the second website (if it doesn't have an extra layer of security).

On paper security is pretty weak yet in practice these attacks are not very common or easy to do.

Thorrez•3mo ago
>but I'm guessing if you install an app on a Windows Desktop computer it can do more chaos faster and more discreetly than pixnapping can on Android.

On desktop, apps aren't sandboxed. On mobile, they are. Breaking out of the sandbox is a security breach.

On desktop, people don't install an app for every fast food chain. On mobile, they do.

dark_mode•3mo ago
inb4 "graphene solves this"
anandagali•3mo ago
interesting
shivasurya•3mo ago
I would say this is a nice & clever attack vector by calculating from rendering time aka side channeling. Kudos to the researchers though it would take lot of time and capture pixels even for Google authenticator. My worry is now how much of this could be reproduced to steal OTP from messages.

Given to rise of well defined templates (accurately vibe coding design for example: GitHub notification emails) phishing via email, I have literally stopped clicking links email and now I have stop launching apps from intent directly (say open with). Better to open manually and perform such operation + remove useless apps but people underestimate the attack surface (it can come through sdk, web page intents)

myfonj•3mo ago
> I am an app developer. How do I protect my users? > We are not aware of mitigation strategies to protect apps against Pixnapping. If you have any insights into mitigations, please let us know and we will update this section.

IDK, I think there are obvious low-hanging attempts [0] such as: do not display secret codes in stable position on screen? Hide it when in background? Move it around to make timing attacks difficult? Change colours and contrast (over time)? Static noise around? Do not show it whole at the time (not necessarily so that user could observe it: just blink parts of it in and out maybe)? Admittedly, all of this will harm UX more or less, but in naïve theory should significantly raise demands for the attacker.

[0] Provided the target of the secret stealing is not in fact some system static raster snapshot containing the secret, cached for task switcher or something like that.

chias•3mo ago
Huh. I remember a while ago Google Authenticator hid TOTP codes until you tap on them to reveal them. I remember thinking this was an absolutely stupid feature, because it did not mitigate any real threat and was annoying and inconvenient. Apparently a lot of people agreed because a few weeks later, Google Authenticator quietly rolled that feature back.

I wonder if they were aware of this flaw, and were mitigating the risk.

tabbott•3mo ago
They could have made it a setting, with an explanation of the security benefits of it, so that folks who are paranoid can take advantage of it.

A relevant threat scenario is when you're using your phone in a public place. Modern cameras are good enough to read your phone screen from a distance, and it seems totally realistic that a hacked airport camera could email/password/2FA combinations when people log into sites from the airport.

Ideally, you want the workflow to be that you can copy the secret code and paste it, without the code as a whole ever appearing on your screen.

pvillano•3mo ago
https://unscreenshottable.vercel.app/?text=12345
tabbott•3mo ago
In my view, the core issue here is that Android's permissions system doesn't consider "Running in the background" and "Accessing the Internet" to be things that apps need to ask the user for permission and the user can restrict.

This attack wouldn't work if every app, even an "offline game", has those implicit permissions by default. Many apps should at most have "Only while using the app" permission to access the Internet. Which would not be complete protection -- there's always the risk you misclick on a now-malicious app that you never use -- but it would make the attack far less effective.

hansvm•3mo ago
> now-malicious app that you never use

Mildly off-topic, do you know of any good studies in the dangerous defect rate of auto-updating vs never/manually updating in a semi-sandboxed environment like Android?

tabbott•3mo ago
I'm not sure for Android. Chrome's store has a history of legitimate free apps with millions of users but little revenue being purchase by threat actors who then add malware to the app.

But I've seen fewer stories of that sort of thing with Android apps. Maybe the app store review process is able to catch it? But just as likely to me is that it's harder to discover that a mobile app is now maliciously sending data somewhere.

GuB-42•3mo ago
Here is a rather convincing answer about why not require user approval for internet access in Android applications. From the Android developers themselves.

https://old.reddit.com/r/androiddev/comments/ci4tdq/were_on_...

I don't know about "running in the background" but Android work using "intents", which mean an app can be woken up effectively at any time, so "don't allow app to run in the background" may not do what you expect.

tabbott•3mo ago
I'm sure there's subtle details to manage here. But "You can exfiltrate data be opening a browser" is a weak argument: One can display the URL to be opened to the user if such an Internet-limited app asks to open a browser, or decide that apps that aren't allowed to use the Internet also aren't allowed to open a browser.

I think there's ways to manage the communication with users around which cases it is surprising/suspicious for the app to require that functionality. Personally, I don't love the model that apps ask for certain permissions but aren't required to explain in a way that can be verified by app store reviewers what they need those permissions for.

And even if one doesn't want every consumer to have to explicitly consent to the permission, it seems to me like you could still have an opt-out mechanism, so that the paranoid among us can implement a more restrictive policy, rather than giving up on the idea of having such a permission entirely.

ItsHarper•3mo ago
There is an Internet permission, and GrapheneOS allows denying it to apps that declare use of it.
dvngnt_•3mo ago
Seems like the only real solution would be to have a dedicated device just for 2fa
cryptonector•3mo ago
Or... don't use Android?
zaruvi•3mo ago
Don't extra security measures in authenticator apps provide protection against this? I need to enter a pin/fingerprint in order to access my codes. And the code of an entry is hidden and only temporarily shown after being tapped.
cryptonector•3mo ago
This is wild.
johanyc•3mo ago
I don't get how this works after watching the video. is it still accessing the pixels from the authenticator app even after you switch to another app?