frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Supply chain attacks are exploiting our assumptions

https://blog.trailofbits.com/2025/09/24/supply-chain-attacks-are-exploiting-our-assumptions/
23•crescit_eundo•4h ago

Comments

udev4096•1h ago
Instead of securing the "chain", we should instead isolate every library we import and run it under a sandbox. We should adopt the model of QubesOS. It follows security by isolation. There are lots of native sandboxing in linux kernel. Bubblewrap, landlock, gvisor and kata (containers, not native), microVMs, namespaces (user, network), etc
whytevuhuni•39m ago
I don't know what the next programming language after Rust will look like, but it will definitely have built-in effects and capabilities.

It won't fix everything (see TARmageddon), but left-pad-rs's build.rs file should definitely not be installing a sudo alias in my .bashrc file that steals my password when I cargo build my project.

bluGill•28m ago
I hope you are right, but fear that there is no way to make such a thing that is usable. You likely end up with complex permissions that nobody understands and so you just "accept all", or programs that have things they must do under the same protection as the evil thing you want to block.
yupyupyups•10m ago
If there is a kernel level feature to throw sections of a process memory into other namespaces then yes, that may work. If you mean running a xen hypervisor for sqlite.so, then no thanks.
criemen•10m ago
> we should instead isolate every library we import and run it under a sandbox

I don't see how that'd be possible. Often we want the library to do useful things for the application, in the context of the application. What would incentivize developers to specify more fine-grained permissions per library than the union of everything their application requires?

I see more use in sandboxing entire applications, and giving them more selective access than "the entire user account" like we do these days. This is maybe more how smartphones operating systems work than desktop computers?

tharne•1h ago
This is something I've never totally understood when it comes to Rust's much loved memory safety vs. C's lack of memory safety. When it comes to replacing C code with Rust, aren't we just trading memory risk for supply chain risk?

Maybe one is more important than the other, I don't know. All the languages I use for work or hobbies are garbage collected and I'm not a security professional. But it does seem like the typical Rust program with it's massive number of "cargo adds" is an enormous attack surface.

MattPalmer1086•1h ago
It's rare not to use open source libraries no matter the language. Maybe C code tends to use fewer, I don't know.

This doesn't prove anything of course, but the only High severity vulnerability I had in production this year was a C library. And the vulnerability was a buffer overflow caused by lack of memory safety.

So I don't think it's a simple trade off of one sort of vuln for another. Memory safety is extremely important for security. Supply chain attacks also - but using C won't defend you from those necessarily.

bluGill•29m ago
The supply chain attack always existed. C because it didn't have a package manager made it slightly harder in that a dependency wouldn't be automatically updated, while Rust can do that. However this is very slight - in linux many people use libraries from a package manager which gets updated when there is a new release - it wouldn't be hard to get a bad update into a package (xz did that).

If you have packages that don't come from a package manager - windows install, phone installs, snap, docker, flatpack, and likely more you have a different risk - a library may not have been updated and so you are vulnerable to a known flaw.

There is no good/easy answer to supply chain risk. It is slightly different on Rust because you can take the latest if you want (but there is plenty of ability to stay with an older release if you want), but this it doesn't move the needle on overall risk.

Kimi K2 Thinking, a SOTA open-source trillion-parameter reasoning model

https://moonshotai.github.io/Kimi-K2/thinking.html
327•nekofneko•4h ago•111 comments

Swift on FreeBSD Preview

https://forums.swift.org/t/swift-on-freebsd-preview/83064
99•glhaynes•2h ago•45 comments

ICC ditches Microsoft 365 for openDesk

https://www.binnenlandsbestuur.nl/digitaal/internationaal-strafhof-neemt-afscheid-van-microsoft-365
330•vincvinc•2h ago•91 comments

Open Source Implementation of Apple's Private Compute Cloud

https://github.com/openpcc/openpcc
292•adam_gyroscope•1d ago•54 comments

Show HN: TabPFN-2.5 – SOTA foundation model for tabular data

https://priorlabs.ai/technical-reports/tabpfn-2-5-model-report
32•onasta•1h ago•5 comments

The Parallel Search API

https://parallel.ai/blog/introducing-parallel-search
35•lukaslevert•2h ago•14 comments

I analyzed the lineups at the most popular nightclubs

https://dev.karltryggvason.com/how-i-analyzed-the-lineups-at-the-worlds-most-popular-nightclubs/
116•kalli•6h ago•60 comments

FBI tries to unmask owner of archive.is

https://www.heise.de/en/news/Archive-today-FBI-Demands-Data-from-Provider-Tucows-11066346.html
421•Projectiboga•3h ago•234 comments

What if hard work felt easier?

https://jeanhsu.substack.com/p/what-if-hard-work-felt-easier
20•kiyanwang•1w ago•5 comments

Eating stinging nettles

https://rachel.blog/2018/04/29/eating-stinging-nettles/
128•rzk•7h ago•127 comments

Ratatui – App Showcase

https://ratatui.rs/showcase/apps/
673•AbuAssar•16h ago•189 comments

Senior BizOps at Artie (San Francisco)

https://www.ycombinator.com/companies/artie/jobs/gqANVBc-senior-business-operations
1•tang8330•2h ago

LLMs Encode How Difficult Problems Are

https://arxiv.org/abs/2510.18147
13•stansApprentice•1h ago•0 comments

Springs and Bounces in Native CSS

https://www.joshwcomeau.com/animation/linear-timing-function/
37•Bogdanp•1w ago•3 comments

Mathematical exploration and discovery at scale

https://terrytao.wordpress.com/2025/11/05/mathematical-exploration-and-discovery-at-scale/
194•nabla9•10h ago•84 comments

Benchmarking the Most Reliable Document Parsing API

https://www.tensorlake.ai/blog/benchmarks
11•calavera•1h ago•8 comments

Show HN: See chords as flags – Visual harmony of top composers on musescore

https://rawl.rocks/
89•vitaly-pavlenko•1d ago•19 comments

Mark Zuckerberg Had Illegal School at His Palo Alto Compound. Neighbors Revolted

https://www.wired.com/story/mark-zuckerberg-school-palo-alto-shut-down/
27•randycupertino•28m ago•11 comments

Cloudflare Tells U.S. Govt That Foreign Site Blocking Efforts Are Trade Barriers

https://torrentfreak.com/cloudflare-tells-u-s-govt-that-foreign-site-blocking-efforts-are-digital...
251•iamnothere•6h ago•150 comments

How often does Python allocate?

https://zackoverflow.dev/writing/how-often-does-python-allocate/
58•ingve•4d ago•41 comments

Australia has so much solar that it's offering everyone free electricity

https://electrek.co/2025/11/04/australia-has-so-much-solar-that-its-offering-everyone-free-electr...
208•ohjeez•4h ago•158 comments

IKEA launches new smart home range with 21 Matter-compatible products

https://www.ikea.com/global/en/newsroom/retail/the-new-smart-home-from-ikea-matter-compatible-251...
211•lemoine0461•6h ago•163 comments

Show HN: qqqa – A fast, stateless LLM-powered assistant for your shell

https://github.com/matisojka/qqqa
87•iagooar•8h ago•73 comments

Supply chain attacks are exploiting our assumptions

https://blog.trailofbits.com/2025/09/24/supply-chain-attacks-are-exploiting-our-assumptions/
23•crescit_eundo•4h ago•8 comments

Pico-100BASE-TX: Bit-Banged 100 MBit/s Ethernet and UDP Framer for RP2040/RP2350

https://github.com/steve-m/Pico-100BASE-TX
66•_Microft•6d ago•11 comments

I may have found a way to spot U.S. at-sea strikes before they're announced

https://old.reddit.com/r/OSINT/comments/1opjjyv/i_may_have_found_a_way_to_spot_us_atsea_strikes/
207•hentrep•15h ago•274 comments

Phantom in the Light: The story of early spectroscopy

https://chrisdempewolf.com/posts/phantom-in-the-light/
5•dempedempe•1w ago•0 comments

How I am deeply integrating Emacs

https://joshblais.com/blog/how-i-am-deeply-integrating-emacs/
181•signa11•12h ago•123 comments

End of Japanese community

https://support.mozilla.org/en-US/forums/contributors/717446
873•phantomathkg•17h ago•675 comments

Solarpunk is happening in Africa

https://climatedrift.substack.com/p/why-solarpunk-is-already-happening
1097•JoiDegn•23h ago•534 comments