frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Replacement.ai

https://replacement.ai
499•wh313•3h ago•281 comments

The Spherical Cows of Programming

https://programmingsimplicity.substack.com/p/the-spherical-cows-of-programming
13•whobre•1h ago•11 comments

Show HN: Duck-UI – Browser-Based SQL IDE for DuckDB

https://demo.duckui.com
119•caioricciuti•5h ago•37 comments

What Are RFCs? The Forgotten Blueprints of the Internet

https://ackreq.github.io/posts/what-are-rfcs/
23•ackreq•1h ago•13 comments

Show HN: Pyversity – Fast Result Diversification for Retrieval and RAG

https://github.com/Pringled/pyversity
22•Tananon•2h ago•2 comments

How to Assemble an Electric Heating Element from Scratch

https://solar.lowtechmagazine.com/2025/10/how-to-build-an-electric-heating-element-from-scratch/
32•surprisetalk•3h ago•15 comments

Abandoned land drives dangerous heat in Houston, Texas A&M study finds

https://stories.tamu.edu/news/2025/10/07/abandoned-land-drives-dangerous-heat-in-houston-texas-am...
72•PaulHoule•3h ago•69 comments

Comparing the power consumption of a 30 year old refrigerator to a brand new one

https://ounapuu.ee/posts/2025/10/14/fridge-power-consumption/
12•furkansahin•5d ago•6 comments

The case for the return of fine-tuning

https://welovesota.com/article/the-case-for-the-return-of-fine-tuning
91•nanark•7h ago•40 comments

Xubuntu.org Might Be Compromised

https://old.reddit.com/r/Ubuntu/comments/1oa4549/xubuntuorg_might_be_compromised/
141•kekqqq•2h ago•40 comments

Why an abundance of choice is not the same as freedom

https://aeon.co/essays/why-an-abundance-of-choice-is-not-the-same-as-freedom
47•herbertl•1h ago•12 comments

Improving PixelMelt's Kindle Web Deobfuscator

https://shkspr.mobi/blog/2025/10/improving-pixelmelts-kindle-web-deobfuscator/
53•ColinWright•4h ago•12 comments

Websites Are for Humans

https://marcus-obst.de/blog/websites-are-for-humans
45•freediver•2h ago•16 comments

The macOS LC_COLLATE hunt: Or why does sort order differently on macOS and Linux

https://blog.zhimingwang.org/macos-lc_collate-hunt
19•g0xA52A2A•3h ago•0 comments

Lost Jack Kerouac story found among assassinated mafia boss' belongings

https://www.sfgate.com/sf-culture/article/lost-jack-kerouac-chapter-found-mafia-boss-estate-21098...
60•rmason•4d ago•30 comments

With deadline looming 4 of 9 universities reject Trumps pact to remake higher ed

https://arstechnica.com/culture/2025/10/with-deadline-looming-4-of-9-universities-reject-trumps-c...
53•Bender•1h ago•11 comments

EQ: A video about all forms of equalizers

https://www.youtube.com/watch?v=CLAt95PrwL4
225•robinhouston•1d ago•64 comments

OpenAI researcher announced GPT-5 math breakthrough that never happened

https://the-decoder.com/leading-openai-researcher-announced-a-gpt-5-math-breakthrough-that-never-...
244•Topfi•5h ago•155 comments

When Pollution Spikes in Southeast Asia, Rainfall Shifts from Land to Sea

https://e360.yale.edu/digest/southeast-asia-aerosols-rainfall?asds
4•Brajeshwar•22m ago•0 comments

Chen-Ning Yang, Nobel laureate, dies at 103

https://www.chinadaily.com.cn/a/202510/18/WS68f3170ea310f735438b5bf2.html
269•nhatcher•1d ago•68 comments

Jupyter Collaboration has a history slider

https://blog.jupyter.org/exploring-a-documents-timeline-in-jupyterlab-6084f96db263
45•fghorow•6d ago•10 comments

The Accountability Problem

https://www.jamesshore.com/v2/blog/2025/the-accountability-problem
112•FrancoisBosun•14h ago•45 comments

Root System Drawings

https://images.wur.nl/digital/collection/coll13/search
386•bookofjoe•1d ago•75 comments

A Tower on Billionaires' Row Is Full of Cracks. Who's to Blame?

https://www.nytimes.com/2025/10/19/nyregion/432-park-avenue-condo-tower.html
70•danso•4h ago•43 comments

Feed me up, Scotty – custom RSS feed generation using CSS selectors

https://feed-me-up-scotty.vincenttunru.com/
7•diymaker•3h ago•3 comments

How one of the longest dinosaur trackways in the world was uncovered in the UK

https://www.bbc.co.uk/news/resources/idt-5f8c77b0-92bc-40f2-bf21-6793abbe5ffe
41•6LLvveMx2koXfwn•5d ago•8 comments

How to sequence your DNA for <$2k

https://maxlangenkamp.substack.com/p/how-to-sequence-your-dna-for-2k
229•yichab0d•20h ago•101 comments

ISP Blocking of No-IP's Dynamic DNS Enters Week 2

https://torrentfreak.com/isp-blocking-of-no-ips-dynamic-dns-enters-week-2-251019/
21•HotGarbage•2h ago•2 comments

When you opened a screen shot of a video in Paint, the video was playing in it

https://devblogs.microsoft.com/oldnewthing/20251014-00/?p=111681
365•birdculture•2d ago•64 comments

Thieves steal crown jewels in 4 minutes from Louvre Museum

https://apnews.com/article/france-louvre-museum-robbery-a3687f330a43e0aaff68c732c4b2585b
4•malshe•16m ago•0 comments
Open in hackernews

Xubuntu.org Might Be Compromised

https://old.reddit.com/r/Ubuntu/comments/1oa4549/xubuntuorg_might_be_compromised/
139•kekqqq•2h ago

Comments

eth0up•2h ago
https://web.archive.org/web/20251019143921/https://old.reddi...
dominick-cc•1h ago
Thanks for this link. Opening reddit links on mobile is very frustrating for me because it opens the app and messes with the browser back button for me. Not sure if others have that problem too.
pluc•1h ago
That's because you're not supposed to open reddit links anymore, you can just share your content directly with AI companies and ad brokers and cut out the middleman.
exe34•1h ago
I had the same idea about the britcard - why doesn't the government just buy the information from the ad brokers?
eth0up•1h ago
I'm a grovelling Linux fiend and usually support related posts. I tried to visit the url and saw it was blocked. Didn't want the post to die so archived it asap.

Note too, that NextDNS blocks archive.is et al by default unless you manually add redirects.

Whatta world

marksbrown•1h ago
For the moment "yesterday for old reddit" on firefox android works quite well.
ntoskrnl_exe•1h ago
Try pressing on the original link and opening it in another tab, that usually bypasses opening the app for me.
ants_everywhere•1h ago
My solution is just to uninstall the app
layer8•37m ago
On iOS Safari, long-press the link and select Open (or Open in Background). That will open the link in the browser instead of in the app, and Safari will remember that preference for the app. Select Open in Reddit to revert.

Also, don’t install the app? Use Sink It instead: https://gosinkit.com/

zvmaz•1h ago
That is why I use Qubes OS [1] in order to have a certain peace of mind.

[1] https://www.qubes-os.org/

EDIT: further comment below:

On second thought, Qubes OS does not prevent such types of malicious downloads; it can also happen to Qubes images. Verify your downloads with checksums and cryptographic signatures [2].

[2] https://doc.qubes-os.org/en/latest/project-security/verifyin...

zvmaz•1h ago
On second thought, Qubes OS does not prevent such types of malicious downloads; it can also happen to Qubes images. Verify your downloads with checksums and cryptographic signatures [1].

[1] https://doc.qubes-os.org/en/latest/project-security/verifyin...

kachapopopow•1h ago
qubes is just as vulnerable as xubuntu in this case (poor website security) no?
zvmaz•1h ago
Yes indeed. Qubes has a good article on verifying distribution images not only with checksums but also with cryptographic signatures that verify the checksum files [1].

[1] https://doc.qubes-os.org/en/latest/project-security/verifyin...

xyzzy123•1h ago
But aren't you still trusting the website for instructions about how to verify the cryptographic signatures?
KAMSPioneer•50m ago
The idea (outlined in the QubesOS documentation) is to clone the git repo of their website, verify the PGP commit signatures, then render the website yourself. Then you can be reasonably sure the website is legitimate, modulo a DoS attack stopping you from receiving updates to the website code, I suppose.

Getting the correct PGP public key appears to be an exercise left to the reader, but if you are already running e.g. Fedora, you can view the packaged QubesOS distro keys distributed by your current OS, cross-reference that with a second source such as a PGP keyserver, and unless you're being Mossaded upon you're probably good if they match.

nekusar•31m ago
Check a history on archive.org and validate the checksum wasnt changed to be the potentially malicious iso?

Its not perfect... but its better than nothing.

crtasm•1h ago
There's a sticked comment on the source thread: https://old.reddit.com/r/xubuntu/comments/1oa43gt/xubuntuorg...
hamdingers•50m ago
> Thanks everyone. We're beholden to our hosting environment for upgrades and it looks like there was a bit of a slip-up here. It's being worked on, but for now the Downloads page is disabled.

Calling this a "slip-up" is an outrageous downplay. If anything this makes me suspicious of the moderator who posted the comment too. One does not accidentally prepare a zip file with a malicious exe and xubuntu-specific language, upload it to a server, and point a torrent link at it.

justin66•24m ago
Mistakes were made!
LambdaComplex•32m ago
Calling this "a bit of a slip-up" while neither confirming nor denying the presence of malware is weird at best and incredibly suspicious at worst.
amelius•1h ago
Let's not kid ourselves. A state level actor who is playing the long game can compromise any distro, package, etc. without us knowing about it.
CaptainOfCoit•1h ago
Sure, but realistically, how many of us right here have state level actors in our threat models? I sure don't, because it'd be impossible to live a normal life then.
iamnothere•30m ago
But state level actors could target you, so you should immediately abandon any hope of privacy, disable your ad blockers, stop using Signal, install Windows 11, cease any complaints about the government, and eat the bugs.
timefirstgrav•1h ago
Jia Tan with the XZ backdoor was caught because some performance obsessed person noticed a tiny delay... I'm sure they learned their lesson and are ensuring their next backdoor doesn't impact performance.
3eb7988a1663•41m ago
That is the insidious question - how many parallel efforts were/are in play when xz was going down? Surely that was not the only long term play to compromise an "unrelated" component of system security. The Jia Tan organization might have already inserted back doors into dozens of different projects by now.
layer8•58m ago
That kind of defeatism isn’t helpful.

The present case also just seems malware easily detected by VirusTotal: https://old.reddit.com/r/xubuntu/comments/1oa43gt/xubuntuorg...

amelius•54m ago
Sticking-your-head-in-the-sand-ism isn't helpful either.

But nobody wants to talk about true security. For example, why does a Python module that renders progress bars (for example) need my full trust about what it does to the rest of my system? Etc.

chorlton2080•41m ago
Look at all the mainstream scanners that failed to detect it!
layer8•30m ago
That’s pretty normal in my experience. That’s why you check with VirusTotal instead of a single “mainstream” scanner.
cozzyd•1h ago
fortunately, in this case, it seems like the malware may be moot if you use the iso to wipe your windows installation...
fainpul•22m ago
But if you just try the live ISO and go back to your Windows without installing, you're infected? Seems like someone wants users to switch to Linux :P
diogenes_atx•1h ago
I ran the checksum for the current ISO file of the full Xubuntu desktop version on the Xubuntu website, and the checksum appears to be valid.

https://mirror.us.leaseweb.net/ubuntu-cdimage/xubuntu/releas...

[user@host]$ ls

SHA256SUMS SHA256SUMS.gpg xubuntu-24.04.3-desktop-amd64.iso

[user@host]$ cat SHA256SUMS

b61e083d8a5ab003bad6ef7ea31ec21d7bfdf19b99d75987ab3fa3bbe85ec1bf *xubuntu-24.04.3-desktop-amd64.iso

[user@host]$ sha256sum xubuntu-24.04.3-desktop-amd64.iso

b61e083d8a5ab003bad6ef7ea31ec21d7bfdf19b99d75987ab3fa3bbe85ec1bf xubuntu-24.04.3-desktop-amd64.iso

[user@host]$ echo $?

0

zvmaz•54m ago
From what I understood, it's the torrent link that downloads a compromised zip file rather then the authentic image:

"Torrent downloads over at https://xubuntu.org/download/ are serving a zip file with a suspicious exe and a tos.txt inside. The TOS starts with Copyright (c) 2026 Xubuntu.org which is sus, because it is 2025. I opened the .exe with file-roller and couldn't find any .torrent inside."

trebligdivad•51m ago
And where did you get the reference SHA256SUMS from ? Did you check the gpg signature on them against a good sig from somewhere?
tuhgdetzhh•45m ago
Good Point. The checksums posted on Xubuntu.org could also compromised.
diogenes_atx•37m ago
I downloaded the checksums and the ISO image from the Xubuntu website: https://mirror.us.leaseweb.net/ubuntu-cdimage/xubuntu/releas...

This url is on the main Xubuntu website, under "Xubuntu 24.04": click "Release page," then select United States. From there, you download the following files: SHA256SUMS, SHA256SUMS.gpg, xubuntu-24.04.3-desktop-amd64.iso

The output of the other checksum commands is shown here:

[user@host]$ gpg --keyid-format long --verify SHA256SUMS.gpg SHA256SUMS

gpg: Signature made Thu 07 Aug 2025 06:05:22 AM CDT

gpg: using RSA key 843938DF228D22F7B3742BC0D94AA3F0EFE21092

gpg: Can't check signature: No public key

[user@host]$ sha256sum --check SHA256SUMS

xubuntu-24.04.3-desktop-amd64.iso: OK

(output omitted for results of Xubuntu minimal version, which was not downloaded)

The checksum is a cryptographic hash generated from the ISO file's contents. While the checksum for a specific, unchanged ISO file is fixed, the checksum that is published on a website could be deliberately altered by an attacker to hide a modified, malicious ISO.

ntoskrnl_exe•30m ago
According to the SHA256SUMS from Canonical's official download page at https://cdimage.ubuntu.com/xubuntu/releases/24.04.3/release/ that is the correct checksum.
retsl•22m ago
the malware's main function seems to be to check the clipboard for crypto wallet addresses and then replace them with attacker addresses:

  Bitcoin (bc1): bc1qrzh7d0yy8c3arqxc23twkjujxxaxcm08uqh60v
  Litecoin (ltc1/L/M): LQ4B4aJqUH92BgtDseWxiCRn45Q8eHzTkH
  Ethereum (0x): 0x10A8B2e2790879FFCdE514DdE615b4732312252D
  Dogecoin (D): DQzrwvUJTXBxAbYiynzACLntrY4i9mMs7D
  Tron (T): TW93HYbyptRYsXj1rkHWyVUpps2anK12hg
  Ripple (r): r9vQFVwRxSkpFavwA9HefPFkWaWBQxy4pU
  Cardano (addr1): addr1q9atfml5cew4hx0z09xu7mj7fazv445z4xyr5gtqh6c9p4r6knhlf3jatwv7y72deah9un6yettg92vg8gskp04s2r2qren6tw
can't guarantee it doesn't do anything else.
Polizeiposaune•15m ago
oddly, the one "sus" thing flagged -- a " (C) 2026 " late in 2025 -- is consistent with practices of established book publishers.

I recall purchasing a textbook in September of year X and being surprised that it was "from the future" with a "Copyright X+1".