frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Google demonstrates 'verifiable quantum advantage' with their Willow processor

https://blog.google/technology/research/quantum-echoes-willow-verifiable-quantum-advantage/
103•AbhishekParmar•1h ago•54 comments

Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)

https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
80•botanica_labs•2h ago•19 comments

Linux Capabilities Revisited

https://dfir.ch/posts/linux_capabilities/
74•Harvesterify•2h ago•12 comments

MinIO stops distributing free Docker images

https://github.com/minio/minio/issues/21647#issuecomment-3418675115
440•LexSiga•10h ago•267 comments

Designing software for things that rot

https://drobinin.com/posts/designing-software-for-things-that-rot/
70•valzevul•18h ago•8 comments

AI assistants misrepresent news content 45% of the time

https://www.bbc.co.uk/mediacentre/2025/new-ebu-research-ai-assistants-news-content
195•sohkamyung•2h ago•145 comments

The security paradox of local LLMs

https://quesma.com/blog/local-llms-security-paradox/
47•jakozaur•3h ago•35 comments

SourceFS: A 2h+ Android build becomes a 15m task with a virtual filesystem

https://www.source.dev/journal/sourcefs
46•cdesai•3h ago•16 comments

Die shots of as many CPUs and other interesting chips as possible

https://commons.wikimedia.org/wiki/User:Birdman86
132•uticus•4d ago•26 comments

Internet's biggest annoyance: Cookie laws should target browsers, not websites

https://nednex.com/en/the-internets-biggest-annoyance-why-cookie-laws-should-target-browsers-not-...
330•SweetSoftPillow•4h ago•390 comments

French ex-president Sarkozy begins jail sentence

https://www.bbc.com/news/articles/cvgkm2j0xelo
263•begueradj•10h ago•343 comments

Go subtleties

https://harrisoncramer.me/15-go-sublteties-you-may-not-already-know/
149•darccio•1w ago•104 comments

Tesla Recalls Almost 13,000 EVs over Risk of Battery Power Loss

https://www.bloomberg.com/news/articles/2025-10-22/tesla-recalls-almost-13-000-evs-over-risk-of-b...
135•zerosizedweasle•3h ago•114 comments

Infracost (YC W21) Hiring First Dev Advocate to Shift FinOps Left

https://www.ycombinator.com/companies/infracost/jobs/NzwUQ7c-senior-developer-advocate
1•akh•4h ago

Patina: a Rust implementation of UEFI firmware

https://github.com/OpenDevicePartnership/patina
65•hasheddan•1w ago•12 comments

Farming Hard Drives (2012)

https://www.backblaze.com/blog/backblaze_drive_farming/
12•floriangosse•6d ago•2 comments

Evaluating the Infinity Cache in AMD Strix Halo

https://chipsandcheese.com/p/evaluating-the-infinity-cache-in
121•zdw•12h ago•51 comments

Show HN: Cadence – A Guitar Theory App

https://cadenceguitar.com/
135•apizon•1w ago•28 comments

The Dragon Hatchling: The missing link between the transformer and brain models

https://arxiv.org/abs/2509.26507
110•thatxliner•3h ago•65 comments

Greg Newby, CEO of Project Gutenberg Literary Archive Foundation, has died

https://www.pgdp.net/wiki/In_Memoriam/gbnewby
352•ron_k•7h ago•59 comments

Cigarette-smuggling balloons force closure of Lithuanian airport

https://www.theguardian.com/world/2025/oct/22/cigarette-smuggling-balloons-force-closure-vilnius-...
48•n1b0m•2h ago•17 comments

Knocker, a knock based access control system for your homelab

https://github.com/FarisZR/knocker
49•xlmnxp•7h ago•74 comments

LLMs can get "brain rot"

https://llm-brain-rot.github.io/
446•tamnd•1d ago•274 comments

Sequoia COO quit over Shaun Maguire's comments about Mamdani

https://www.ft.com/content/8e6de299-3eb6-4ba9-8037-266c55c02170
11•amrrs•46m ago•7 comments

Ghostly swamp will-O'-the-wisps may be explained by science

https://www.snexplores.org/article/swamp-gas-methane-will-o-wisp-chemistry
22•WaitWaitWha•1w ago•10 comments

Distributed Ray-Tracing

https://www.4rknova.com//blog/2019/02/24/distributed-raytracing
21•ibobev•5d ago•7 comments

Starcloud

https://blogs.nvidia.com/blog/starcloud/
129•jonbaer•5h ago•168 comments

Power over Ethernet (PoE) basics and beyond

https://www.edn.com/poe-basics-and-beyond-what-every-engineer-should-know/
216•voxadam•6d ago•170 comments

rlsw – Raylib software OpenGL renderer in less than 5k LOC

https://github.com/raysan5/raylib/blob/master/src/external/rlsw.h
228•fschuett•19h ago•87 comments

Ask HN: Our AWS account got compromised after their outage

364•kinj28•1d ago•86 comments
Open in hackernews

Evaluating Argon2 adoption and effectiveness in real-world software

https://arxiv.org/abs/2504.17121
25•pregnenolone•1w ago

Comments

tialaramex•5h ago
"Real-World Software" maybe but not real world effectiveness.

A lot of effort was expended on modelling the hypothetical thing Argon2 is good at, but a reasonable question is: Does that make any real world difference? And my guess is that the answer, awkwardly, is approximately No.

If you use good passwords or you have successfully stopped using passwords in the decades we've known they're a bad idea, Argon2 makes no difference at all over any of the other reasonable choices, and nor does its configuration. If you figure that nobody will remember your password is hunter2 then Argon2 can't help you either. If the attack being undertaken is an auth bypass, Argon2 can't help. If they're stealing credentials, Argon2 can't help.

integralid•4h ago
Most people don't use password managers and their passwords are very weak - Argon2 helps here. And even if your use a password that most would consider strong, if something like md5 is used then modern gpsu can do a crazy number of operations per second and have a serious shot at breaking then - Argon2 helps here. Not every programmer knows how to handle passwords properly, and may forget to use salt. Argon2 makes this impossible, and helps here. Finally when comparing to something like bcrypt, improvements are less significant, but improved gpu resistance won't hurt. And bcrypt has weird implementation quirks (password length restriction) that lead to real world vulnerabilities, argon does not.

In short, I disagree.

helpfulclippy•3h ago
Strong hashes aren’t so useful for you the individual with a high entropy per-site password… they’re useful for responsible organizations trying to proactively mitigate the impact of a future data breach on users with bad password habits (which is a lot of users).

If ClownCo gets hacked that’s bad. If ClownCo gets hacked and discloses millions of sets of credentials, it is now enabling a new wave of credential stuffing attacks.

palantird•4h ago
> ... developer education remain essential for realizing Argon2's theoretical advantages.

> 46.6% of deployments use weaker-than-OWASP parameters.

Sounds like a job for better default parameter values. I'm willing to bet most startups just install the default argon2 (or password hashing) library in their language of choice and don't jump head-first into the rabbithole of fine-tuning argon2 parameters unless a contract or certification depend on it.

swiftcoder•3h ago
The documentation on this is... uh... intimidating? I come away from this with the sense that I need to learn a whole lot about cryptography to make a good decision here:

https://argon2-cffi.readthedocs.io/en/stable/parameters.html

luizfelberti•3h ago
Do not reference these kinds of docs whenever you need practical, actionable advice. They serve their purpose, but are for a completely different kind of audience.

For anyone perusing this thread, your first resource for this kind of security advice should probably be the OWASP cheatsheets which is a living set of documents that packages current practice into direct recommendations for implementers.

Here's what it says about tuning Argon2:

https://cheatsheetseries.owasp.org/cheatsheets/Password_Stor...

tptacek•3h ago
It's been a couple years since I've looked but the track record of OWASP for cryptography advice has been pretty dismal.
linsomniac•2h ago
Do you have a better recommendation?

I feel bad for OWASP. They're doing the lords work, but seem to have a shoestring budget.

franciscop•3h ago
This reminded me to check, and now I'm happy to see Argon2 has finally made it into Node.js core!

https://github.com/nodejs/node/issues/34452

gregoriol•2h ago
It seems that PHP, Symfony, ... have kept bcrypt as their preference even when Argon2 is available; is there a rationale there from such big projects?
upofadown•22m ago
There is some thought that bcrypt is better than Argon2 for run times less than a second. So passwords in other words.
upofadown•25m ago
>...OWASP's recommended 46 MiB configuration reduces compromise rates by 42.5% compared to SHA-256...

Not sure that is a good comparison. The competition is against things like scrypt not raw hashes.

The default suggested 2GB Argon2 memory requirement is likely putting people off so there certainly is room for a different suggestion. It is just too bad this stuff wasn't worked out at the beginning.