frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Simple trick to increase coverage: Lying to users about signal strength

https://nickvsnetworking.com/simple-trick-to-increase-coverage-lying-to-users-about-signal-strength/
99•tsujamin•3h ago•19 comments

Facts about throwing good parties

https://www.atvbt.com/21-facts-about-throwing-good-parties/
350•cjbarber•6h ago•121 comments

Oxy is Cloudflare's Rust-based next generation proxy framework

https://blog.cloudflare.com/introducing-oxy/
25•Garbage•1h ago•3 comments

Paris had a moving sidewalk in 1900, and a Thomas Edison film captured it (2020)

https://www.openculture.com/2020/03/paris-had-a-moving-sidewalk-in-1900.html
219•rbanffy•7h ago•97 comments

Using FreeBSD to make self-hosting fun again

https://jsteuernagel.de/posts/using-freebsd-to-make-self-hosting-fun-again/
247•todsacerdoti•18h ago•67 comments

When models manipulate manifolds: The geometry of a counting task

https://transformer-circuits.pub/2025/linebreaks/index.html
22•vinhnx•4d ago•0 comments

Alleged Jabber Zeus Coder 'MrICQ' in U.S. Custody

https://krebsonsecurity.com/2025/11/alleged-jabber-zeus-coder-mricq-in-u-s-custody/
107•todsacerdoti•8h ago•24 comments

Why don't you use dependent types?

https://lawrencecpaulson.github.io//2025/11/02/Why-not-dependent.html
197•baruchel•13h ago•70 comments

Tongyi DeepResearch – open-source 30B MoE Model that rivals OpenAI DeepResearch

https://tongyi-agent.github.io/blog/introducing-tongyi-deep-research/
266•meander_water•17h ago•104 comments

How the Mayans were able to accurately predict solar eclipses for centuries

https://phys.org/news/2025-10-mayans-accurately-solar-eclipses-centuries.html
45•pseudolus•6d ago•11 comments

Lisp: Notes on its Past and Future (1980)

https://www-formal.stanford.edu/jmc/lisp20th/lisp20th.html
141•birdculture•9h ago•71 comments

Terahertz Tech Sets Stage for "Wireless Wired" Chips

https://spectrum.ieee.org/terahertz-chip-room-temperature
7•FromTheArchives•1w ago•0 comments

URLs are state containers

https://alfy.blog/2025/10/31/your-url-is-your-state.html
358•thm•17h ago•155 comments

Reproducing the AWS Outage Race Condition with a Model Checker

https://wyounas.github.io/aws/concurrency/2025/10/30/reproducing-the-aws-outage-race-condition-wi...
103•simplegeek•10h ago•18 comments

Why does Swiss cheese have holes?

https://www.usdairy.com/news-articles/why-does-swiss-cheese-have-holes
57•QueensGambit•5d ago•107 comments

Collatz-Weyl Generators: Pseudorandom Number Generators (2023)

https://arxiv.org/abs/2312.17043
11•danny00•4d ago•0 comments

Notes by djb on using Fil-C

https://cr.yp.to/2025/fil-c.html
311•transpute•23h ago•203 comments

X.org Security Advisory: multiple security issues X.Org X server and Xwayland

https://lists.x.org/archives/xorg-announce/2025-October/003635.html
151•birdculture•15h ago•114 comments

Is Your Bluetooth Chip Leaking Secrets via RF Signals?

https://www.semanticscholar.org/paper/Is-Your-Bluetooth-Chip-Leaking-Secrets-via-RF-Ji-Dubrova/c1...
84•transpute•10h ago•19 comments

FurtherAI (Series A – A16Z, YC) Is Hiring Across Software and AI

1•sgondala_ycapp•7h ago

Solar-powered QR reading postboxes being rolled out across UK

https://www.bbc.co.uk/news/articles/cgln72rgrero
40•thinkingemote•4d ago•21 comments

Syllabi – Open-source agentic AI with tools, RAG, and multi-channel deploy

https://www.syllabi-ai.com/
6•achushankar•3h ago•3 comments

The x86 Interrupt List, aka “Ralf Brown's Interrupt List” (2018)

http://www.cs.cmu.edu/~ralf/files.html
65•surprisetalk•1w ago•14 comments

Autodesk's John Walker Explained HP and IBM in 1991 (2015)

https://www.cringely.com/2015/06/03/autodesks-john-walker-explained-hp-and-ibm-in-1991/
121•suioir•4d ago•61 comments

Backpropagation is a leaky abstraction (2016)

https://karpathy.medium.com/yes-you-should-understand-backprop-e2f06eab496b
302•swatson741•23h ago•125 comments

Anti-cybercrime laws are being weaponized to repress journalism

https://www.cjr.org/analysis/nigeria-pakistan-jordan-cybercrime-laws-journalism.php
267•giuliomagnifico•10h ago•79 comments

At the end you use `git bisect`

https://kevin3010.github.io/git/2025/11/02/At-the-end-you-use-git-bisect.html
174•_spaceatom•11h ago•143 comments

I ****Ing Hate Science (2021)

https://buttondown.com/hillelwayne/archive/i-ing-hate-science/
15•todsacerdoti•5h ago•10 comments

Scents of Arabia: Interdisciplinary approaches to ancient olfactory worlds

https://www.scientificamerican.com/article/how-archaeology-is-reviving-the-smell-of-history/
23•quapster•6d ago•1 comments

Writing FreeDOS Programs in C

https://www.freedos.org/books/cprogramming/
96•AlexeyBrin•15h ago•49 comments
Open in hackernews

Is Your Bluetooth Chip Leaking Secrets via RF Signals?

https://www.semanticscholar.org/paper/Is-Your-Bluetooth-Chip-Leaking-Secrets-via-RF-Ji-Dubrova/c1d3ceb47ea6f9cc4f29929e2f97d36862a260a2
84•transpute•10h ago

Comments

vardump•8h ago
A side channel attack revealing AES key from just 90,000 traces.

Sigh, side channel attacks seem to be everywhere now.

sitzkrieg•8h ago
people are finally aware everything leaks, it's just a matter of how closely you look
boulevard•8h ago
Everything leaks if you stare at it long enough
formerly_proven•8h ago
There's a lot of signal left between you and the noise floor!
namibj•7h ago
Worse: noise floor is a matter of definition.
czbond•7h ago
Everything has data exhaust.... the exhaust type just differs.
barbegal•8h ago
That 90,000 traces did take 225 hours to capture so it is truly a huge amount of data and not a trivial attack.
karlgkk•7h ago
On the other hand, I’d argue that it’s close enough to trivial to be considered trivial. How many embedded devices transmit sensitive information?

Now, I know that pretty much every Bluetooth based credit card reading device explicitly defends against a channel such as this, but there are tons of access control solutions, and medical devices that don’t

Would you notice a raspberry pi tucked into the mess of wires beneath the security guard guards desk?

throwaway89201•6h ago
> How many embedded devices transmit sensitive information?

Every Zigbee device uses AES keys to secure the network, although the security of the protocol is pretty weak in most deployments, especially when new devices join the network. Leaking the network key would provide access to the entire network. The ARM Cortex-M4 is often used, which the side-channel attack in the article is about.

kragen•58m ago
That's less than two weeks.
3abiton•7h ago
I read the abstract, while not familiar with the topic, how would we go about limiting the inpact?
Retr0id•6h ago
Rotating keys frequently would probably help. But the best thing to do is use implementations that are less leaky in the first place (which is easier said than done).
ryukoposting•5h ago
As someone who finally recently escaped bluetooth firmware development: yes, Bluetooth is leaking secrets and it doesn't even require any silly RF shenanigans. Almost nothing actually implements LESC. Apple refuses to implement OOB pairing, so no peripherals can force you to use it, so everything is subject to MITM attacks. The entire ecosystem is a mess of consultants and underpaid devs copy-pasting Nordic sample code, with no time or financial incentive to do more than the bare minumum. Never trust any product that moves sensitive data through Bluetooth.
matthewdgreen•4h ago
Apple claims to have implemented an entire second security level for their Bluetooth apps based on iMessage, but I trust it not at all.

(To be clear, I trust the iMessage protocol with reasonable confidence. I judge the probability that Apple has applied this extra layer of security uniformly to all sensitive data to be about 8%.)

cozzyd•2h ago
Text written with a non-apple Bluetooth keyboard is green?
ggm•19m ago
8.75% surely? you need at least two digits of specious precision on that non-random number.
SXX•1h ago
Just curious if it that insecure how does Magic Keyboard with Touch ID works? Does it use some apple proprietary "magic"?
makeitdouble•1h ago
> "magic"

They're on an proprietary extension of Bluetooth, standard compatible but closed to their devices. They usually don't talk much about it, Phil Schiller was the most explicit I think (it was about the airpod's W1 but it's the same deal)

https://www.theverge.com/2016/9/7/12829190/apple-w1-chip-iph...

> Apple’s Phil Schiller described Apple’s move to a new wireless chip as “fixing the challenges” of wireless audio

Verdex•4h ago
Time for everyone to implement some variation of https://www.bluetooth.com/specifications/specs/authorization... ?