frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Google demonstrates 'verifiable quantum advantage' with their Willow processor

https://blog.google/technology/research/quantum-echoes-willow-verifiable-quantum-advantage/
104•AbhishekParmar•1h ago•54 comments

Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)

https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
80•botanica_labs•2h ago•19 comments

Linux Capabilities Revisited

https://dfir.ch/posts/linux_capabilities/
75•Harvesterify•2h ago•12 comments

MinIO stops distributing free Docker images

https://github.com/minio/minio/issues/21647#issuecomment-3418675115
441•LexSiga•10h ago•267 comments

Designing software for things that rot

https://drobinin.com/posts/designing-software-for-things-that-rot/
71•valzevul•18h ago•8 comments

AI assistants misrepresent news content 45% of the time

https://www.bbc.co.uk/mediacentre/2025/new-ebu-research-ai-assistants-news-content
196•sohkamyung•2h ago•147 comments

The security paradox of local LLMs

https://quesma.com/blog/local-llms-security-paradox/
47•jakozaur•3h ago•35 comments

SourceFS: A 2h+ Android build becomes a 15m task with a virtual filesystem

https://www.source.dev/journal/sourcefs
46•cdesai•3h ago•16 comments

Die shots of as many CPUs and other interesting chips as possible

https://commons.wikimedia.org/wiki/User:Birdman86
132•uticus•4d ago•26 comments

Internet's biggest annoyance: Cookie laws should target browsers, not websites

https://nednex.com/en/the-internets-biggest-annoyance-why-cookie-laws-should-target-browsers-not-...
331•SweetSoftPillow•4h ago•390 comments

French ex-president Sarkozy begins jail sentence

https://www.bbc.com/news/articles/cvgkm2j0xelo
263•begueradj•10h ago•343 comments

Go subtleties

https://harrisoncramer.me/15-go-sublteties-you-may-not-already-know/
149•darccio•1w ago•104 comments

Tesla Recalls Almost 13,000 EVs over Risk of Battery Power Loss

https://www.bloomberg.com/news/articles/2025-10-22/tesla-recalls-almost-13-000-evs-over-risk-of-b...
135•zerosizedweasle•3h ago•114 comments

Infracost (YC W21) Hiring First Dev Advocate to Shift FinOps Left

https://www.ycombinator.com/companies/infracost/jobs/NzwUQ7c-senior-developer-advocate
1•akh•4h ago

Patina: a Rust implementation of UEFI firmware

https://github.com/OpenDevicePartnership/patina
65•hasheddan•1w ago•12 comments

Farming Hard Drives (2012)

https://www.backblaze.com/blog/backblaze_drive_farming/
12•floriangosse•6d ago•2 comments

Evaluating the Infinity Cache in AMD Strix Halo

https://chipsandcheese.com/p/evaluating-the-infinity-cache-in
121•zdw•12h ago•51 comments

Show HN: Cadence – A Guitar Theory App

https://cadenceguitar.com/
135•apizon•1w ago•28 comments

The Dragon Hatchling: The missing link between the transformer and brain models

https://arxiv.org/abs/2509.26507
110•thatxliner•3h ago•65 comments

Greg Newby, CEO of Project Gutenberg Literary Archive Foundation, has died

https://www.pgdp.net/wiki/In_Memoriam/gbnewby
352•ron_k•7h ago•59 comments

Cigarette-smuggling balloons force closure of Lithuanian airport

https://www.theguardian.com/world/2025/oct/22/cigarette-smuggling-balloons-force-closure-vilnius-...
48•n1b0m•3h ago•17 comments

Knocker, a knock based access control system for your homelab

https://github.com/FarisZR/knocker
49•xlmnxp•7h ago•74 comments

LLMs can get "brain rot"

https://llm-brain-rot.github.io/
446•tamnd•1d ago•274 comments

Sequoia COO quit over Shaun Maguire's comments about Mamdani

https://www.ft.com/content/8e6de299-3eb6-4ba9-8037-266c55c02170
11•amrrs•46m ago•8 comments

Ghostly swamp will-O'-the-wisps may be explained by science

https://www.snexplores.org/article/swamp-gas-methane-will-o-wisp-chemistry
22•WaitWaitWha•1w ago•10 comments

Distributed Ray-Tracing

https://www.4rknova.com//blog/2019/02/24/distributed-raytracing
21•ibobev•5d ago•7 comments

Starcloud

https://blogs.nvidia.com/blog/starcloud/
129•jonbaer•5h ago•168 comments

Power over Ethernet (PoE) basics and beyond

https://www.edn.com/poe-basics-and-beyond-what-every-engineer-should-know/
216•voxadam•6d ago•170 comments

rlsw – Raylib software OpenGL renderer in less than 5k LOC

https://github.com/raysan5/raylib/blob/master/src/external/rlsw.h
228•fschuett•19h ago•87 comments

Ask HN: Our AWS account got compromised after their outage

364•kinj28•1d ago•87 comments
Open in hackernews

Linux Capabilities Revisited

https://dfir.ch/posts/linux_capabilities/
74•Harvesterify•2h ago

Comments

surajrmal•1h ago
A shared global namespace ultimately makes it very difficult to have a decent capability based security system. Namespaces limited to the set of actions you have and a hierarchy of capabilities whereby children can only be given access to capabilities their parents have is required for a sane view of how things work. Much like encapsulation makes it easier to reason about abstractions in a program, this nested hierarchy of capabilities makes it easier to reason about the privilege of various parts of the system. Instead we have soup where no one can quite reason about what has access to what.
rootnod3•1h ago
Even if not super fine grained, I think that OpenBSD’s pledge is really nicely done.

Next after that I’d vote for FreeBSD’s capsicum.

hypeatei•1h ago
OpenBSDs pledge is so simple and nice to use. I really wish Linux would incorporate it. Seccomp is a nightmare to implement.
rootnod3•39m ago
I'd rather have a simple coarse-grained mechanism than whatever feverdream that seccomp, selinux and apparmor are. A convoluted mess incorporating almost Turing complete languages that are just asking to shoot yourself in the foot a mile deep.

The simplicity of pledge is good enough for 99% of use-cases I'd wager AND easy to add to existing code.

charcircuit•25m ago
I disagree. Pledge requires every app to OPT IN to security. This means that most apps won't do it, and the ones that do will likely be lazy and restrict their usage to what they use before and won't do the work of rearchitecting things.
hypeatei•12m ago
So we shouldn't provide simple hardening tools because it won't be used or applied how you'd like in 100% of software? This mindset in security circles really needs to stop.

If a piece of important or foundational software wants to lock itself down today, look at the myriad of convoluted "solutions" mentioned in a sibling comment. If you wanted to discourage progress in this area, that's how you'd design something. I'm not assuming malice, obviously, but it's certainly a product of the endless nitpicking and "not good enough, doesn't cover <niche usecase>" type of thinking.

EDIT:

> and the ones that do will likely be lazy

I'd argue the opposite, any developer taking the time to add some pledge calls to their code is probably mindful of security and wants to improve it. If you wanted to be lazy, you'd just not implement pledge at all since it'd get in your way and be too restrictive.

PaulHoule•1h ago
Note it is just a set of flags that subdivide the privileges root has which is potentially an improvement over what we had before but it's nothing like the real capability-based security

https://en.wikipedia.org/wiki/Capability-based_security

that you had in AS/400 or the iAPX 432 where a "capability" is a reference to a system object with associated privileges. It is possible to get this into a POSIX-like system

https://en.wikipedia.org/wiki/Capsicum_(Unix)

It reminds me of using a VAX-11/730 with the VMS operating system in high school where there was a long list of privileges a process could have

https://hunter.goatley.com/vax-professional-articles/vax-pro...

and it was a common game to investigate paths such as "if you have privilege A, B, and C you can get SETPRV and take over the machine"

nullpoint420•39m ago
A very similar process happens in security research for macOS and iOS w/ the mach kernel. Researchers look for open mach ports that are ripe for privilege escalation.
monocasa•42m ago
Linux capabilities are fairly unrelated to the traditional concept of object capability based security.

They're closer to apple entitlements, but inherited through through forks rather than being attached to a binary.

candiddevmike•26m ago
I don't think you can bolt something like what you're describing onto an existing kernel (like linux did with capabilities). You'd have to design it this way from the ground up. I think I've read about some experimental OSs exploring that kind of capability by design, almost like a type 1 hypervisor but for processes.
marcosdumay•4m ago
> whereby children can only be given access to capabilities their parents have

The one thing that makes capabilities usable is that they don't need to follow that rule.

If you don't have processes that let your programs get capabilities from any source other than their creation, you are better just adding your program names into your ACLs.

HugoTea•1h ago
Fascinating, thank you for sharing.