frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Constant-time support coming to LLVM: Protecting cryptographic code

https://blog.trailofbits.com/2025/11/25/constant-time-support-coming-to-llvm-protecting-cryptographic-code-at-the-compiler-level/
23•ahlCVA•9h ago

Comments

frabert•9h ago
This has been a sore point in a lot of discussions regarding compiler optimizations and cryptographic code, how compilers and compiler engineers are sabotaging the efforts of cryptographers in making sure there are no side-channels in their code. The issue has never been the compiler, and has always been the language: there was never a way to express the right intention from within C (or most other languages, really).

This primitive we're trying to introduce is meant to make up for this shortcoming without having to introduce additional rules in the standard.

jfindper•1h ago
>how compilers and compiler engineers are sabotaging the efforts of cryptographers

I'm not exposed to this space very often, so maybe you or someone else could give me some context. "Sabotage" is a deliberate effort to ruin/hinder something. Are compiler engineers deliberately hindering the efforts of cryptographers? If yes... is there a reason why? Some long-running feud or something?

Or, through the course of their efforts to make compilers faster/etc, are cryptographers just getting the "short end of the stick" so to speak? Perhaps forgotten about because the number of cryptographers is dwarfed by the number of non-cryptographers? (Or any other explanation that I'm unaware of?)

chowells•37m ago
It's more a viewpoint thing. Any construct cryptographers find that runs in constant time is something that could be optimized to run faster for non-cryptographic code. Constant-time constructs essentially are optimizer bug reports. There is always the danger that by popularizing a technique you are drawing the attention of a compiler contributor who wants to speed up a benchmark of that same construct in non-cryptographic code. So maybe it's not intended as sabotage, but it can sure feel that way when everything you do is explicitly targeted to be changed after you do it.
stouset•33m ago
It’s not intentional. The motivations of CPU designers and compiler writers, and optimizers are at odds with those of cryptographers. The former want to use every trick possible to squeeze out additional performance in the most common cases, while the latter absolutely require indistinguishable performance across all possibilities.

CPUs love to do branch prediction to have computation already performed in the case where it guesses the branch correctly, but cryptographic code needs equal performance no matter the input.

When a programmer asks for some register or memory location to be zeroed, they generally just want to be able to use a zero in some later operation and so it doesn’t really matter that a previous value was really overwritten. When a cryptographer does, they generally are trying to make it impossible to read the previous value. And they want to be able to have some guarantee that it wasn’t implicitly copied somewhere else in the interim.

layer8•14m ago
“Sabotage” can be used in a figurative sense that doesn’t insinuate intent. An adjacent example is “self-sabotage”, which doesn’t imply intent.
fooker•34m ago
> making sure there are no side-channels in their code

Any side effect is a side channel. There are always going to be side channels in real code running on real hardware.

Sure you can change your code, compiler, or, or even hardware to account for this but at it's core that is security by obscurity.

zzo38computer•19m ago
I think __builtin_ct_select and __builtin_ct_expr would be good ideas. (They could also be implemented in GCC in future, as well as LLVM.)

In some cases it might be necessary to consider the possibility of invalid memory accesses (and avoid the side-channels when doing so); I don't know if there is a "conditional read" instruction to deal with that situation. (The example given in the article works around this issue, but I don't know if there are any situations where this will not help.)

A new bridge links the math of infinity to computer science

https://www.quantamagazine.org/a-new-bridge-links-the-strange-math-of-infinity-to-computer-scienc...
75•digital55•3h ago•10 comments

Google Antigravity exfiltrates data via indirect prompt injection attack

https://www.promptarmor.com/resources/google-antigravity-exfiltrates-data
485•jjmaxwell4•4h ago•139 comments

Show HN: We built an open source, zero webhooks payment processor

https://github.com/flowglad/flowglad
176•agreeahmed•5h ago•117 comments

How to repurpose your old phone into a web server

https://far.computer/how-to/
135•louismerlin•3d ago•61 comments

Ilya Sutskever: We're moving from the age of scaling to the age of research

https://www.dwarkesh.com/p/ilya-sutskever-2
113•piotrgrabowski•5h ago•88 comments

Unifying our mobile and desktop domains

https://techblog.wikimedia.org/2025/11/21/unifying-mobile-and-desktop-domains/
30•todsacerdoti•5h ago•10 comments

ZoomInfo CEO blocks researcher after documenting pre-consent biometric tracking

https://github.com/clark-prog/blackout-public
53•SignalDr•2h ago•7 comments

FLUX.2: Frontier Visual Intelligence

https://bfl.ai/blog/flux-2
200•meetpateltech•7h ago•63 comments

Launch HN: Onyx (YC W24) – Open-source chat UI

156•Weves•8h ago•110 comments

Trillions spent and big software projects are still failing

https://spectrum.ieee.org/it-management-software-failures
257•pseudolus•10h ago•234 comments

Jakarta is now the biggest city in the world

https://www.axios.com/2025/11/24/jakarta-tokyo-worlds-biggest-city-population
183•skx001•16h ago•118 comments

Constant-time support coming to LLVM: Protecting cryptographic code

https://blog.trailofbits.com/2025/11/25/constant-time-support-coming-to-llvm-protecting-cryptogra...
23•ahlCVA•9h ago•8 comments

The 101 of analog signal filtering (2024)

https://lcamtuf.substack.com/p/the-101-of-analog-signal-filtering
106•harperlee•4d ago•8 comments

Python is not a great language for data science

https://blog.genesmindsmachines.com/p/python-is-not-a-great-language-for
88•speckx•6h ago•82 comments

Human brains are preconfigured with instructions for understanding the world

https://news.ucsc.edu/2025/11/sharf-preconfigured-brain/
405•XzetaU8•16h ago•275 comments

Bad UX World Cup 2025

https://badux.lol/
108•CharlesW•4h ago•28 comments

Unison 1.0

https://www.unison-lang.org/unison-1-0/
148•pchiusano•3h ago•40 comments

Stop Putting Your Passwords into Random Websites (Yes, Seriously, You Are the PR

https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are...
5•Deeg9rie9usi•1h ago•0 comments

Orion 1.0

https://blog.kagi.com/orion
323•STRiDEX•6h ago•183 comments

Inflatable Space Stations

https://worksinprogress.co/issue/inflatable-space-stations/
51•bensouthwood•4d ago•18 comments

The fall of Labubus and the mush of modern internet trends

https://www.michigandaily.com/arts/digital-culture/the-fall-of-labubus-and-the-mush-of-modern-int...
6•gnabgib•1d ago•0 comments

Making Crash Bandicoot (2011)

https://all-things-andy-gavin.com/video-games/making-crash/
181•davikr•10h ago•26 comments

This blog is now hosted on a GPS/LTE modem (2021)

https://blog.nns.ee/2021/04/01/modem-blog
42•xx_ns•3h ago•5 comments

Most Stable Raspberry Pi? Better NTP with Thermal Management

https://austinsnerdythings.com/2025/11/24/worlds-most-stable-raspberry-pi-81-better-ntp-with-ther...
277•todsacerdoti•16h ago•81 comments

Ozempic does not slow Alzheimer's, study finds

https://www.semafor.com/article/11/25/2025/ozempic-does-not-slow-alzheimers-study-finds
118•danso•6h ago•65 comments

PRC elites voice AI-skepticism

https://jamestown.org/prc-elites-voice-ai-skepticism/
124•JumpCrisscross•1d ago•68 comments

LPLB: An early research stage MoE load balancer based on linear programming

https://github.com/deepseek-ai/LPLB
27•simonpure•6d ago•0 comments

Roblox is a problem but it's a symptom of something worse

https://www.platformer.news/roblox-ceo-interview-backlash-analysis/
212•FiddlerClamp•6h ago•289 comments

Claude Advanced Tool Use

https://www.anthropic.com/engineering/advanced-tool-use
643•lebovic•1d ago•255 comments

US banks scramble to assess data theft after hackers breach financial tech firm

https://techcrunch.com/2025/11/24/us-banks-scramble-to-assess-data-theft-after-hackers-breach-fin...
93•indigodaddy•5h ago•20 comments