frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

You Are How You Act

https://boz.com/articles/you-are-how-you-act
27•HiPHInch•28m ago•3 comments

Rust cross-platform GPUI components

https://github.com/longbridge/gpui-component
89•xvilka•2h ago•28 comments

Recall for Linux

https://github.com/rolflobker/recall-for-linux
209•anticensor•4h ago•70 comments

WorldGrow: Generating Infinite 3D World

https://github.com/world-grow/WorldGrow
25•cdani•2h ago•12 comments

Geoutil.com – Measure distances, areas, and convert geo data in the browser

https://geoutil.com
41•FreeGuessr•6d ago•7 comments

Artifact (YC W25) is hiring engineers in NYC to build modern ECAD

1•antonysamuel•3m ago

Should LLMs just treat text content as an image?

https://www.seangoedecke.com/text-tokens-as-image-tokens/
23•ingve•6d ago•24 comments

Why I'm teaching kids to hack computers

https://www.hacktivate.app/why-teach-kids-to-hack
92•twostraws•4d ago•36 comments

Microsoft's folds losses from OpenAI into $4.7B expense line – "other"

https://www.theverge.com/news/806880/microsofts-not-very-open-about-openai
40•zerosizedweasle•44m ago•11 comments

Don't Forget These Tags to Make HTML Work Like You Expect

https://blog.jim-nielsen.com/2025/dont-forget-these-html-tags/
18•FromTheArchives•2h ago•5 comments

How I turned Zig into my favorite language to write network programs in

https://lalinsky.com/2025/10/26/zio-async-io-for-zig.html
245•0x1997•12h ago•86 comments

If Your Adversary Is the Mossad (2014) [pdf]

https://www.usenix.org/system/files/1401_08-12_mickens.pdf
128•xeonmc•3h ago•88 comments

Show HN: Write Go code in JavaScript files

https://www.npmjs.com/package/vite-plugin-use-golang
76•yar-kravtsov•6h ago•23 comments

What Happened to Running What You Wanted on Your Own Machine?

https://hackaday.com/2025/10/22/what-happened-to-running-what-you-wanted-on-your-own-machine/
98•marbartolome•3h ago•31 comments

Corrosion

https://fly.io/blog/corrosion/
12•cgb_•4d ago•0 comments

Show HN: MyraOS – My 32-bit operating system in C and ASM (Hack Club project)

https://github.com/dvir-biton/MyraOS
198•dvirbt•15h ago•41 comments

You already have a Git server

https://maurycyz.com/misc/easy_git/
557•chmaynard•1d ago•376 comments

Structure and Interpretation of Classical Mechanics

https://tgvaughan.github.io/sicm/toc.html
43•the-mitr•7h ago•15 comments

An overengineered solution to `sort | uniq -c` with 25x throughput (hist)

https://github.com/noamteyssier/hist-rs
73•noamteyssier•4d ago•48 comments

Sandhill cranes have adopted a Canada gosling

https://www.smithsonianmag.com/science-nature/these-sandhill-cranes-have-adopted-a-canadian-gosli...
107•NaOH•4d ago•24 comments

The last European train that travels by sea

https://www.bbc.com/travel/article/20251024-the-last-european-train-that-travels-by-sea
65•1659447091•3h ago•70 comments

Ken Thompson recalls Unix's rowdy, lock-picking origins

https://thenewstack.io/ken-thompson-recalls-unixs-rowdy-lock-picking-origins/
176•dxs•19h ago•26 comments

Sphere Computer – The Innovative 1970s Computer Company Everyone Forgot

https://sphere.computer/
70•ChrisArchitect•3d ago•7 comments

Are-we-fast-yet implementations in Oberon, C++, C, Pascal, Micron and Luon

https://github.com/rochus-keller/Are-we-fast-yet
69•luismedel•12h ago•18 comments

We Saved $500k per Year by Rolling Our Own "S3"

https://engineering.nanit.com/how-we-saved-500-000-per-year-by-rolling-our-own-s3-6caec1ee1143
230•mpweiher•14h ago•182 comments

A definition of AGI

https://arxiv.org/abs/2510.18212
242•pegasus•17h ago•388 comments

A bug that taught me more about PyTorch than years of using it

https://elanapearl.github.io/blog/2025/the-bug-that-taught-me-pytorch/
397•bblcla•3d ago•74 comments

Why JPEG XL Ignoring Bit Depth Is Genius (and Why AVIF Can't Pull It Off)

https://www.fractionalxperience.com/ux-ui-graphic-design-blog/why-jpeg-xl-ignoring-bit-depth-is-g...
60•Bogdanp•3h ago•37 comments

Feed the bots

https://maurycyz.com/misc/the_cost_of_trash/
235•chmaynard•23h ago•165 comments

SETL Programming Language

https://en.wikipedia.org/wiki/SETL
6•usgroup•53m ago•1 comments
Open in hackernews

If Your Adversary Is the Mossad (2014) [pdf]

https://www.usenix.org/system/files/1401_08-12_mickens.pdf
128•xeonmc•3h ago

Comments

samlinnfer•2h ago
This will always be my favourite Mikens essay (The Slow Winter): https://www.usenix.org/system/files/1309_14-17_mickens.pdf
chao-•2h ago
Mine as well.

I have a fond memory of being at a party where someone had the idea to do dramatic readings of various Mickens Usenix papers. Even just doing partial readings, it was slow going, lots of pauses to recover from overwhelming laughter. When the reading of The Slow Winter got to "THE MAGMA PEOPLE ARE WAITING FOR OUR MISTAKES", we had to stop because someone had laughed so hard they threw up. Not in an awful way, but enough to give us a pause in the action, and to decide we couldn't go on.

Good times.

eeeficus•2h ago
Sounds like you found nerd heaven. I couldn't imagine a situation like yours in my world! :)
isoprophlex•1h ago
> [...] it’s pretty clear that compilers are a thing of the past, and the next generation of processors will run English-level pseudocode directly.

hilarious AND scary levels of prescient writing...

tuzemec•2h ago
Somewhat related video: https://vimeo.com/95066828
optimalsolver•2h ago
I think fighting Israel is kind of a glimpse into what trying to fight a malevolent AGI will be like.

Expect to lose in highly surprising ways.

speedgoose•2h ago
I don't know, driving a big truck into AWS' us-east-1 power supply section sounds more than enough to take down internet for a while.
ta1243•1h ago
I would hope that data centre has multiple power supplies from multiple locations - as well as UPS and on site generators, certainly mine do.

However given AWS is so complex (which is required because they want to be a gatekeeping platform) leading the uptime to struggle to match a decent home setup, I'm not sure. I'm sure there's no 6 figure bonus for checking the generators are working, but a rounded corner on a button on an admin page?

WJW•38m ago
Of course, but that's the point. Actual AGI wouldn't need to limit itself pointlessly in ways that would make it obvious to every internet rando how to hit it. Just as you cannot kill an intelligence agency with a single strike, it could distribute itself over many secret locations.
broodbucket•2h ago
Remember, you don't have to be unhackable, just sufficiently unimportant to not be worth burning any novel capability on
INTPenis•2h ago
That's right, just keep your head down, smile and nod, do your job and nothing will ever go wrong. /s
brigandish•2h ago
A more charitable view would be to act like a zebra in a herd of zebra rather than a zebra in a herd of horses.
GreenWatermelon•2h ago
You /s but this is actually valid advice for someone who just wants to get by in life and is content.
energy123•1h ago
Downvoted, but so much evil is caused by people due to their distorted yet sincerely believed moral virtues. Not due to an absence of morality but because of it. Whatever you have in your mind as the image of quintessential evil is probably caused by those people's sincerely held moral system, a moral system they believed in as strongly as you do yours. So people who just live their lives and do not grasp on external change are fine by me.
throwaway_dang•1h ago
Do the bombs dropping in war zones avoid apolitical people? If not, when is the appropriate time to get sufficiently political to avoid having a bomb dropped on one's head?
adrianN•1h ago
Very few individuals can influence whether or not bombs drop. The best way to avoid having bombs dropped on your head is moving to a place where fewer bombs are dropped.
jimnotgym•1h ago
But many people together, although none of them individually influencial enough, certainly can influence where bombs get dropped.

When you start successfully reaching many people you can be sure that security agencies will start watching you.

INTPenis•18m ago
True enough. I'm content as long as I don't hear the news anywhere. Recently had my dad over and he can't go 5 minutes without the news on in the background. Really hard to be content then.
impossiblefork•1h ago
I don't think that's the interpretation, but make your computer systems disconnected from what you do.

If relevant adversaries don't know which computer to burn the exploit on, then they won't burn it on the right one.

aa-jv•35m ago
I think the more important maxim to follow is this: if you didn't manufacture your own sillicon, you are infinitely more hackable than if you did.

Alas, no matter how hard we try to trust our compilers, we must also adopt methods to trust our foundries.

Oh, we don't have our own foundries?

Yeah, thats the real problem. Who owns the foundries?

pydry•23m ago
When has anybody ever been hacked via a foundry?

While having your own foundry is undoubtedly a good thing from the perspective of supply chain resiliency, if hacking is what you're worried about there are probably easier ways to mitigate (e.g. a bit more rigor in QC).

shiandow•15m ago
Given that choice I'd rather choose to be unhackable.
edu•2h ago
That's a fun take, similar to the classic XKCD 538: Security. https://xkcd.com/538/
hshdhdhehd•2h ago
The 4096 bits just stops it being so easy to surveil you that it is hyper-automated. So there is some use. The $5 wrench needs a million dollar operation to get that guy to your house.
bbarnett•2h ago
Oh come on, that's way over budget! Every time I managed such an operation, we'd just rent a van and... uh, I mean, um, I heard it costs less.

<NO CARRIER>

hshdhdhehd•1h ago
Its a million dollars to the defense contractor who lobbies for more wrench attacks.
ta1243•1h ago
Depends how strong the protections of your civil society is, but it doesn't cost $1m to send a goon with a crowbar or shotgun. Sure that doesn't scale, but if you are a target you're screwed
hshdhdhehd•1h ago
The $1m is the stuff they did to the point where they knew where to send the goon.

If you are a target you are screwed. But clever crypto isn't useless.

eirini1•2h ago
Never agreed with this logic. For a lot of people (anyone that does political activism of some sort for example) the threat model can be a lot more nuanced. It might not be Mossad or the CIA gunning for you, specifically, but it might police searching you and your friend's laptops or phones. It might be burglars targetting the office of the small organization you have and the small servers you have running there.
rini17•2h ago
You did not write what you actually disagree with....
turboturbo•2h ago
The false dichotomy
rini17•2h ago
The dichotomy between what average people(including political activists) can actually handle and stuff proposed by security researchers is real.
anonym29•1h ago
The idea that average people can't handle incremental improvements like a password manager, MFA, full disk encryption, etc is unhealthy infantilization of people who are entirely capable of understanding the concepts, the benefits, the risks they address, and appreciating the benefits of them.

Most people just don't care enough until after they're hacked, at which point they care just enough to wish they'd done something more previously, which is just shy of enough to start doing something differently going forward.

It's not that normies are too stupid figure this out, it's that they make risk accept decisions on risks they don't thoroughly understand or care enough about to want to understand. My personal observation is that the concept of even thinking about potential future technology risks at all (let alone considering changing behavior to mitigate those risks) seems to represent an almost an almost pathological level of proactive preparation to normies, the same way that preppers building bunkers with years of food and water storage look to the rest of us.

coldtea•1h ago
the maximalist false dillema of "all or nothing": either it's a super-poweful super-human agency and you can't do anything, else any half-measure is fine
bell-cot•14m ago
Yep. While there might be some use cases for his ultra-simplistic "Mossad/not-Mossad duality" - say, convincing Bob Jones that "b0bj0nes" is not a great password - it's 99% fairy tale.

And even if the CIA/Mossad/NSA/whoever is "interested" in you - this is the era of mass surveillance. The chances that you're worth a Stuxnet level of effort is 0.000000001%. Vs. 99.999% chance that they'll happily hoover up your data, if you make it pretty easy for their automated systems to do that.

megous•2h ago
Not sure what audience he is talking to. Experts deal with a lot more issues that sit between choosing a good password + not falling for phishing and "giving up because mossad". The terminology that he sprinkles about suggests the audience is experts.
rini17•2h ago
The article actually addresses this -- that all these extra issues are not manageable for mere mortals anyway and/or perfectly spherical cows are involved.
megous•1h ago
It does not. It just invents a bunch of straw men, and then mocks them.
impossiblefork•2h ago
The Mossad part is a very silly element of the text. Many organizations have to defend against US intelligence, Israeli intelligence etc., and I'm sure, that they, with the exception of some very terrible countries with a lot of incompetence or full of disloyal people likely to become infiltrators, are quite successful.

Actual security is possible even against the most powerful and determined adversaries, and it's possible even for you.

lifestyleguru•2h ago
Then how it's possible Mossad didn't know about what had happened on 7 October 2023?
INTPenis•2h ago
This is exactly the type of comment that will get you mossad'd.
lifestyleguru•1h ago
ok I'll keep you updated, but I don't own any real estate they could "de-Hamasify"
ozirus•2h ago
Domestic intel = Shin Bet, not Mossad
bbarnett•2h ago
The same way the US didn't know about 9/11. Intelligence failures.

(Portions of the US intelligence apparatus knew, but that knowledge didn't transition into action)

energy123•1h ago
Israel's intelligence services (not Mossad) did collect valid signals, such as sim cards in Gaza being swapped out for Israel sim cards, but it was ignored as another false positive. What the public don't see are all the false positives (like many drills for an attack that don't materialize) that drown out valid signals when the attack is actually going to happen. There's also hesitancy to act on signals because drills are used to expose intelligence.

It's one of the many asymmetries that changes when you are the defender versus the attacker. As the defender, you have to be right 100% of the time. As the attacker, you have the luxury of being right only 30% of the time. The law of large numbers is on the side of the attacker. This applies to missile offense/defense and to usage of intelligence.

This information asymmetry is also one of the key drivers of the security dilemma, which in turn causes arms races and conflict. The defender knows they can't be perfect all the time, so they have an incentive to preemptively attack if the probability of future problems based on their assessment of current information is high enough.

In the case of Gaza there was also an assessment that Hamas were deterred, which were the tinted glasses through which signals were assessed. Israel also assumed a certain shape of an attack, and the minimal mobilisation of Hamas did not fit that expected template. So the intelligence failure was also a failure in security doctrine and institutional culture. The following principles need to be reinforced: (i) don't assume the best, (ii) don't expect rationality and assume a rival is deterred even if they should be, (iii) intention causes action, believe a rival when they say they want to do X instead of projecting your own worldview onto them, (iv) don't become fixated on a particular scenario, keep the distribution (scenario analyses) broad

throwaway_dang•1h ago
Maybe they did but it was permitted to happen to provide the pretext to expand those Greater Israel borders.
2rsf•1h ago
a. I am too lazy to search but they probably did, the problem was what was done with the information. Same with 8200 the all mighty signal intelligence corps

b. The Mossad is the equivalent of the CIA, they are not meant to act inside Israel

ta1243•1h ago
> b. The Mossad is the equivalent of the CIA, they are not meant to act inside Israel

For that purpose is Gaza inside or not inside Israel?

2rsf•1h ago
Yes (TBD)
lifestyleguru•1h ago
Israel would probably dispute it, but for most of the world Gaza in relation to Israel is "abroad" and not "domestic".
rgblambda•1h ago
Shin Bet (Israeli internal security service) have an Arab desk that covers the West Bank & Gaza.
smashah•1h ago
They didn't know about the pretense they wanted to spend the following 2+ years making unlimited fallacious justifications for committing a live-streamed holocaust of children? Who told you that?
torginus•2h ago
If your adversary is a state intelligence agency, you're probably a high ranking politician and a boomer who is clueless about computers, and has demonstrably terrible opsec, either through government incompetence of your own agencies, or not following the terribly cumbersome opsec procedures, either because of inconvenience, the policies being terrible or sheer incompetence.

The amount of examples we've seen of this is staggering.

mike_hearn•2h ago
It's hilarious, but the hilarity gets in the way of recognizing how much insight there is also there. It makes serious points. This part about the Mossad is especially astonishing given the pager attack:

> If your adversary is the Mossad, YOU’RE GONNA DIE AND THERE’S NOTHING THAT YOU CAN DO ABOUT IT. The Mossad is not intimidated by the fact that you employ https://. If the Mossad wants your data, they’re going to use a drone to replace your cellphone with a piece of uranium that’s shaped like a cellphone

It's like a Mossad agent read this paper and thought hey that's actually not a bad idea.

But the core rant is about dubious assumptions in academic cryptography papers. I was also reading a lot of academic crypto papers in 2014, and the assumptions got old real fast. Mickens mocks these ideas:

• "There are heroes and villains with fantastic (yet oddly constrained) powers". Totally standard way to get a paper published. Especially annoying were the mathematical proofs that sound rigorous to outsiders but quietly assume that the adversary just can't/won't solve a certain kind of equation, because it would be inconvenient to prove the scheme secure if they did. Or the "exploits" that only worked if nobody had upgraded their software stack for five years. Or the systems that assume a perfect implementation with no way to recover if anything goes wrong.

• "you could enlist a well-known technology company to [run a PKI], but this would offend the refined aesthetics of the vaguely Marxist but comfortably bourgeoisie hacker community who wants everything to be decentralized", lol. This got really tiresome when I worked on Bitcoin. Lots of semi-technical people who had never run any large system constantly attacking every plausible design of implementable complexity because it wasn't decentralized enough for their tastes, sometimes not even proposing anything better.

• "These [social networks] are not the best people in the history of people, yet somehow, I am supposed to stitch these clowns into a rich cryptographic tapestry that supports key revocation and verifiable audit trails" - another variant of believing decentralized cryptography and PKI is easy.

He also talks about security labels like in SELinux but I never read those papers. I think Mickens used humor to try and get people talking about some of the bad patterns in academic cryptography, but if you want a more serious paper that makes some similar points there's one here:

https://eprint.iacr.org/2019/1336.pdf

Yizahi•2h ago
> Lots of semi-technical people who had never run any large system constantly attacking every plausible design of implementable complexity because it wasn't decentralized enough for their tastes, sometimes not even proposing anything better.

And for added fun, that same radical decentralization crowd, finally settling on the extremely centralized Lightning crutch, which is not only centralized but also computationally over complicated and buggy.

ta1243•1h ago
> you could enlist a well-known technology company to [run a PKI],

If you have a single company, then that's easy enough for a group like Mossad to infiltrate. Probably easier than a distributed system.

mike_hearn•1h ago
The best known PKI (webtrust) is many companies, not a single company. So it's distributed but that makes it easier to hack not harder because you have many possible targets instead of just one.
jojobas•1h ago
It is kinda funny, but cost and benefit analysis is not foreign even to Mossad. Mossad would prefer quite a few people's data stolen, but they are not going to carry out a black abroad for most of them.
smashah•1h ago
Very true, unfortunately there's no password strong enough to stop Malaysian Airlines ground crew from loading a pallet full of Mossad-rigged walkie talkies on my flight from Kuala Lumpur to Beijing via conveniently-placed-NATO-AWACS-infested airspace.

2FA isn't going to protect me from cruising altitude walkie talkie detonation and having the debris scattered over an impossibly wide area.

I guess the best thing to do is not take an airline of a country that has recently showed public support for Gaza specifically during a humanitarian visit in the months prior to my flight.

Thankfully none of this is true and everything the mainstream media and governments tell us are true - imagine if things weren't as they seemed?.. Craziness... Back to my password manager!

gjvc•1h ago
this guy's stuff reads like word salad and people lap it up. I've never understood why.
Havoc•1h ago
Despite word salad it is entertaining and the core message is valid
EdwardDiego•1h ago
Because it's a funny rant.
ChrisMarshallNY•1h ago
I've always enjoyed Mikens' writing. He has a great sense of humor.

I like his using Mossad as the extreme. I guess "Mossad'd" is now a verb.

zkmon•1h ago
Security is a problem caused by ownership of some usefulness. Sometimes solution can be around addressing these two causes.
tarjei_huse•39m ago
Do you have a concrete example?
Havoc•1h ago
I see this on reddit a lot in self hosting context.

The range of things people do on security is wild. Everything from publicly expose everything and pray the apps login function some random threw together is solid to elaborate intrusion detection systems.

jones89176•1h ago
I enjoyed "The Night Watch" a lot:

https://scholar.harvard.edu/files/mickens/files/thenightwatc...

> A systems programmer will know what to do when society breaks down, because the systems programmer already lives in a world without law.

dnlserrano•31m ago
Mikes essays are always a good read
contrarian1234•21m ago
I think the central premise is a "wrong". The "point" of science isn't really to do useful things. Framing things from that angle is in subtle ways dangerous bc that shouldnt be part of the incentive structure.

you dont understand the mating behaviors of naked mole rats bc of some sense of "usefulness". Its just an investigation of nature and how things work. The usefulness comes out unexpectedly. Like you find out naked mole are actually maybe biologically immortal

You should just find interesting phenomena and invetigate. Capitalism figures out the usefulness side of things