frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

CBP is monitoring US drivers and detaining those with suspicious travel patterns

https://apnews.com/article/immigration-border-patrol-surveillance-drivers-ice-trump-9f5d05469ce8c...
372•jjwiseman•1h ago•276 comments

Nano Banana Pro

https://blog.google/technology/ai/nano-banana-pro/
645•meetpateltech•6h ago•402 comments

Introducing Kagi Assistants

https://blog.kagi.com/kagi-assistants
35•ingve•1h ago•18 comments

Data-at-Rest Encryption in DuckDB

https://duckdb.org/2025/11/19/encryption-in-duckdb
60•chmaynard•2h ago•10 comments

NTSB Preliminary Report – UPS Boeing MD-11F Crash [pdf]

https://www.ntsb.gov/Documents/Prelimiary%20Report%20DCA26MA024.pdf
92•gregsadetsky•3h ago•107 comments

New Glenn Update – Blue Origin

https://www.blueorigin.com/news/new-glenn-upgraded-engines-subcooled-components-drive-enhanced-pe...
9•rbanffy•15m ago•0 comments

Run Docker containers natively in Proxmox 9.1 (OCI images)

https://raymii.org/s/tutorials/Finally_run_Docker_containers_natively_in_Proxmox_9.1.html
15•jandeboevrie•31m ago•3 comments

Mozilla Says It's Finally Done with Two-Faced Onerep

https://krebsonsecurity.com/2025/11/mozilla-says-its-finally-done-with-two-faced-onerep/
51•todsacerdoti•2h ago•29 comments

The Lions Operating System

https://lionsos.org
71•plunderer•3h ago•9 comments

Microsoft makes Zork open-source

https://opensource.microsoft.com/blog/2025/11/20/preserving-code-that-shaped-generations-zork-i-i...
294•tabletcorry•3h ago•114 comments

Android and iPhone users can now share files, starting with the Pixel 10

https://blog.google/products/android/quick-share-airdrop/
272•abraham•4h ago•204 comments

Okta's NextJS-0auth troubles

https://joshua.hu/ai-slop-okta-nextjs-0auth-security-vulnerability
161•ramimac•2d ago•52 comments

Go Cryptography State of the Union

https://words.filippo.io/2025-state/
86•ingve•4h ago•37 comments

We are replacing OOP with something worse

https://blog.jsbarretto.com/post/actors
34•ibobev•1h ago•34 comments

Launch HN: Poly (YC S22) – Cursor for Files

31•aabhay•3h ago•30 comments

Free interactive tool that shows you how PCIe lanes work on motherboards

https://mobomaps.com
94•tagyro•1d ago•11 comments

Ask HN: How are Markov chains so different from tiny LLMs?

95•JPLeRouzic•3d ago•55 comments

What's in a Passenger Name Record (PNR)? (2013)

https://hasbrouck.org/articles/PNR.html
37•rzk•4d ago•10 comments

Show HN: F32 – An Extremely Small ESP32 Board

https://github.com/PegorK/f32
140•pegor•1d ago•18 comments

Freer Monads, More Extensible Effects (2015) [pdf]

https://okmij.org/ftp/Haskell/extensible/more.pdf
61•todsacerdoti•6h ago•6 comments

Two recently found works of J.S. Bach presented in Leipzig [video]

https://www.youtube.com/watch?v=4hXzUGYIL9M#t=15m19s
61•Archelaos•3d ago•39 comments

Interactive World History Atlas Since 3000 BC

http://geacron.com/home-en/
266•not_knuth•11h ago•122 comments

New Proofs Probe Soap-Film Singularities

https://www.quantamagazine.org/new-proofs-probe-soap-film-singularities-20251112/
6•tzury•5d ago•0 comments

Show HN: My hobby OS that runs Minecraft

https://astral-os.org/posts/2025/10/31/astral-minecraft.html
79•avaliosdev•2d ago•11 comments

IBM Delivers New Quantum Package

https://newsroom.ibm.com/2025-11-12-ibm-delivers-new-quantum-processors,-software,-and-algorithm-...
43•donutloop•1w ago•13 comments

Red Alert 2 in web browser

https://chronodivide.com/
341•nsoonhui•9h ago•113 comments

Show HN: A game where you invest into startups from history

https://startupgambit.com
26•vire00•5d ago•14 comments

Theft of 'The Weeping Woman' from the National Gallery of Victoria

https://en.wikipedia.org/wiki/Theft_of_The_Weeping_Woman_from_the_National_Gallery_of_Victoria
57•neom•5d ago•39 comments

50th Anniversary of BitBLT

https://mastodon.sdf.org/@fvzappa/115574872559813280
49•todsacerdoti•18h ago•8 comments

Android/Linux Dual Boot

https://wiki.postmarketos.org/wiki/Dual_Booting/WiP
259•joooscha•3d ago•146 comments
Open in hackernews

Data-at-Rest Encryption in DuckDB

https://duckdb.org/2025/11/19/encryption-in-duckdb
57•chmaynard•2h ago

Comments

kianN•1h ago
I’m just continually amazed by the DuckDB team. We had built out a naive solution with OpenSSL to encrypt duckdb files, but that lead to a 2x runtime cost for first time queries and used up a lot of ram because we were encrypting/decrypting the entire file all at once. It seems like because DuckDB is encrypting at the page level and leveraging modern processors native AES operations, they are able to perform read/writes at practically no cost.
PunchyHamster•1h ago
Why not just LUKS ? Kernel level, leverages acceleration, transparent to anything you run on top of it.

DB encryption is useful if you have multiple things that need separate ACL and encryption keys but if it is one app one DB there is no need for it

letmetweakit•33m ago
I believe it's also to protect against the occasionally "lost" DB file.
beala•19m ago
From the article:

> This allows for some interesting new deployment models for DuckDB, for example, we could now put an encrypted DuckDB database file on a Content Delivery Network (CDN). A fleet of DuckDB instances could attach to this file read-only using the decryption key. This elegantly allows efficient distribution of private background data in a similar way like encrypted Parquet files, but of course with many more features like multi-table storage. When using DuckDB with encrypted storage, we can also simplify threat modeling when – for example – using DuckDB on cloud providers. While in the past access to DuckDB storage would have been enough to leak data, we can now relax paranoia regarding storage a little, especially since temporary files and WAL are also encrypted.

notorious_pgb•46m ago
With respect, none of this sounds like "amazing" work on DuckDB's part. It's not bad work, either! It's competent work.

Comparing it to a naive approach (encrypting an entire database file in a single shot and loading it all into memory at once) is always going to make competent work seem "amazing".

I say this not to shit on DuckDB (I see no reason to shit on them); rather, I think it's important that we as professionals have realistic standards that we expect _ourselves_ to hit. Work we view as "amazing" is work we allow ourselves not to be able to replicate. But this is not in that category, and therefore, you should hold yourself to the same standard.

glenjamin•1h ago
Other than motherduck, is anyone aware of any good models for running multi-user cloud-based duckdb?

ie. Running it like a normal database, and getting to take advantage of all of its goodies

mritchie712•34m ago
For pure duckdb, you can put an Arrow Flight server in front of duckdb[0] or use the httpserver extension[1].

Where you store the .duckdb file will make a big difference in performance (e.g. S3 vs. Elastic File System).

But I'd take a good look at ducklake as a better multiplayer option. If you store `.parquet` files in blob storage, it will be slower than `.duckdb` on EFS, but if you have largish data, EFS gets expensive.

We[2] use DuckLake in our product and we've found a few ways to mitigate the performance hit. For example, we write all data into ducklake in blog storage, then create analytics tables and store them on faster storage (e.g. GCP Filestore). You can have multiple storage methods in the same DuckLake catalog, so this works nicely.

0 - https://www.definite.app/blog/duck-takes-flight

1 - https://github.com/Query-farm/httpserver

2 - https://www.definite.app/

derekhecksher•33m ago
https://github.com/gizmodata/gizmosql
jedisct1•7m ago
"Sqlite [...] encryption extension is a $2000 add-on".

SqliteMultipleCiphers has been around for ages and is free https://utelle.github.io/SQLite3MultipleCiphers/

And Turso Database supports encryption out of the box: https://docs.turso.tech/tursodb/encryption

jasonthorsness•7m ago
AES-GCM sensitivity to nonce reuse is a tricky implementation detail. Here they acknowledge it but then don’t share their solution - and in fact the header contains 16 bytes for the nonce instead of the expected 12 bytes and they do not share what bytes are random. Did I miss something, anyone know?