frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

I failed to recreate the 1996 Space Jam Website with Claude

https://j0nah.com/i-failed-to-recreate-the-1996-space-jam-website-with-claude/
229•thecr0w•6h ago•193 comments

The C++ standard for the F-35 Fighter Jet [video]

https://www.youtube.com/watch?v=Gv4sDL9Ljww
149•AareyBaba•5h ago•143 comments

Evidence from the One Laptop per Child Program in Rural Peru

https://www.nber.org/papers/w34495
52•danso•3h ago•19 comments

Mechanical power generation using Earth's ambient radiation

https://www.science.org/doi/10.1126/sciadv.adw6833
10•defrost•1h ago•4 comments

Google Titans architecture, helping AI have long-term memory

https://research.google/blog/titans-miras-helping-ai-have-long-term-memory/
344•Alifatisk•11h ago•109 comments

Dollar-stores overcharge cash-strapped customers while promising low prices

https://www.theguardian.com/us-news/2025/dec/03/customers-pay-more-rising-dollar-store-costs
185•bookofjoe•8h ago•263 comments

An Interactive Guide to the Fourier Transform

https://betterexplained.com/articles/an-interactive-guide-to-the-fourier-transform/
116•pykello•5d ago•14 comments

A two-person method to simulate die rolls

https://blog.42yeah.is/algorithm/2023/08/05/two-person-die.html
36•Fraterkes•2d ago•19 comments

XKeyscore

https://en.wikipedia.org/wiki/XKeyscore
75•belter•2h ago•57 comments

Build a DIY magnetometer with a couple of seasoning bottles

https://spectrum.ieee.org/listen-to-protons-diy-magnetometer
53•nullbyte808•1w ago•13 comments

Bag of words, have mercy on us

https://www.experimental-history.com/p/bag-of-words-have-mercy-on-us
4•ntnbr•57m ago•1 comments

The Anatomy of a macOS App

https://eclecticlight.co/2025/12/04/the-anatomy-of-a-macos-app/
168•elashri•10h ago•41 comments

The state of Schleswig-Holstein is consistently relying on open source

https://www.heise.de/en/news/Goodbye-Microsoft-Schleswig-Holstein-relies-on-Open-Source-and-saves...
495•doener•10h ago•234 comments

Scala 3 slowed us down?

https://kmaliszewski9.github.io/scala/2025/12/07/scala3-slowdown.html
154•kmaliszewski•8h ago•87 comments

Proxmox delivers its software-defined datacenter contender and VMware escape

https://www.theregister.com/2025/12/05/proxmox_datacenter_manager_1_stable/
29•Bender•2h ago•1 comments

Java Hello World, LLVM Edition

https://www.javaadvent.com/2025/12/java-hello-world-llvm-edition.html
159•ingve•11h ago•54 comments

Nested Learning: A new ML paradigm for continual learning

https://research.google/blog/introducing-nested-learning-a-new-ml-paradigm-for-continual-learning/
56•themgt•8h ago•2 comments

Estimates are difficult for developers and product owners

https://thorsell.io/2025/12/07/estimates.html
128•todsacerdoti•4h ago•149 comments

Minimum Viable Arduino Project: Aeropress Timer

https://netninja.com/2025/12/01/minimum-viable-arduino-project-aeropress-timer/
3•surprisetalk•5d ago•0 comments

iced 0.14 has been released (Rust GUI library)

https://github.com/iced-rs/iced/releases/tag/0.14.0
40•airstrike•2h ago•21 comments

Semantic Compression (2014)

https://caseymuratori.com/blog_0015
47•tosh•6h ago•5 comments

Over fifty new hallucinations in ICLR 2026 submissions

https://gptzero.me/news/iclr-2026/
434•puttycat•10h ago•338 comments

Syncthing-Android have had a change of owner/maintainer

https://github.com/researchxxl/syncthing-android/issues/16
101•embedding-shape•3h ago•23 comments

Z2 – Lithographically fabricated IC in a garage fab

https://sam.zeloof.xyz/second-ic/
327•embedding-shape•20h ago•73 comments

Context Plumbing (Interconnected)

https://interconnected.org/home/2025/11/28/plumbing
5•gmays•5d ago•0 comments

Building a Toast Component

https://emilkowal.ski/ui/building-a-toast-component
77•FragrantRiver•4d ago•28 comments

The programmers who live in Flatland

https://blog.redplanetlabs.com/2025/11/24/the-programmers-who-live-in-flatland/
69•winkywooster•1w ago•86 comments

The past was not that cute

https://juliawise.net/the-past-was-not-that-cute/
388•mhb•1d ago•476 comments

Screenshots from developers: 2002 vs. 2015 (2015)

https://anders.unix.se/2015/12/10/screenshots-from-developers--2002-vs.-2015/
435•turrini•1d ago•215 comments

How the Disappearance of Flight 19 Fueled the Legend of the Bermuda Triangle

https://www.smithsonianmag.com/history/how-the-disappearance-of-flight-19-a-navy-squadron-lost-in...
45•pseudolus•11h ago•12 comments
Open in hackernews

XKeyscore

https://en.wikipedia.org/wiki/XKeyscore
74•belter•2h ago

Comments

apt-get•1h ago
How relevant is this (and the NSA's general spying capability) in 2025?

We hear a lot about local agencies perusing the services of private companies to collect citizens' data in the US, whether that's traffic information, IoT recordings, buying information from FAANG, etc. What's the NSA's position in the current administration? (e.g. we've heard a lot of noise in the past about the FBI and CIA getting the cold shoulder internally. I wonder how this applies to the NSA.)

monerozcash•46m ago
NSAs collection capabilities have been greatly degraded. They can no longer read all internet traffic, basically everything is encrypted now.

NSA does not have magic tools to break modern encryption.

themafia•43m ago
So instead of collecting at AT&T Room 631 you now collect at Google Room Whatever.

The NSA has spent no small amount of time in the last decade obviously interfering with NIST and public encryption standards. The obvious reason is they _want_ to have the magic tools to break some modern encryption.

monerozcash•42m ago
>So instead of collecting at AT&T Room 631 you now collect at Google Room Whatever.

Even if true, significantly degraded. Probably not true though, NSA has been very leaky and such a story would be kind of devastating for Google. NSA lacks the legal capability to force Google to do so, the money to bribe Google to do so and also almost certainly lacks the political backing to put one of the biggest US companies in such a position.

I don't doubt for a second that NSA could hack Google (or just bribe employees with appropriate access) and break into specific Gmail accounts if they wanted to. Bulk collection would be far more difficult to implement.

>The NSA has spent no small amount of time in the last decade obviously interfering with NIST and public encryption standards. The obvious reason is they _want_ to have the magic tools to break some modern encryption.

They do try, they just haven't been very successful at it.

themafia•35m ago
Google, along with all other major service providers, has a legal portal so law enforcement can process warrant orders. I think all you have to do is hack that portal or process.
monerozcash•26m ago
Sure, and you could also just submit fake warrants as many criminals have successfully done.

Neither of these approaches would enable bulk collection.

I'm sure the NSA can read essentially any emails they're interested in, they just can't do so at anywhere near the scale they used to pre-Snowden.

Not only that, these days almost all chats have moved to E2EE platforms. Reading that traffic in a stealthy manner requires compromising endpoints, bulk collection simply isn't possible.

ls612•33m ago
It’s not Google room whatever, it’s Cloudflare room whatever. That’s why you don’t hear much about undermining encryption standards anymore, who needs that when you have SSL termination for 40% of the internet?
matheusmoreira•9m ago
Brief list of NSA backdoors:

https://www.ethanheilman.com/x/12/index.html

hollow-moe•34m ago
They surely don't have any kind of access to letsencrypt root certs whatsoever
monerozcash•12m ago
You can't decrypt anything with letsencrypt root certs, you can issue your own certificates but it would be impossible to use those at any significant scale.

It's also worth considering that CT makes it extremely noisy to use such certificates to attack web browsers.

notepad0x90•34m ago
1) They don't necessarily need to break all encryption, just knowing who is talking to who and then delivering a tailored payload is their M.O.; The Tailored Access Operations division exists just for this.

2) They didn't build a Yottabyte-scale datacenter for no reason

3) They have the capability to compromise certificate authorities. Pinned certs aren't universal.

4) Speculation, but, Snowden's revelations probably set off an "arms race" of sorts for developing this capability. Lots more people started using Tor, VPNs, and more, so it would almost be dereliction of duty on their part if they didn't dramatically increase their capability, because the threats they are there to stop didn't disappear.

5) ML/LLM/AI has been around for a while, machine learning analysis has been mainstream for over a decade now. All that immense data a human can never wade through can be processed by ML. I would be surprised if they aren't using an LLM to answer questions and query real-time and historical internet data.

6) You know all the concerns regarding Huawei and Tiktok being backdoored by the Chinese government? That's because we're doing it ourselves already.

7) I hope you don't think TAO is less capable than well known notorious spyware companies like the NSO group? dragnet collection is used to find patterns for follow-up tailored access.

monerozcash•15m ago
None of your proposed solutions are stealthy enough to enable bulk collection at a pre-Snowden scale.

Yeah, they can still collect lots of useful metadata.

matheusmoreira•29m ago
They don't break encryption, they circumvent it. They get into people's computers and access the stored data after it's been decrypted. They stockpile zero day vulnerabilities and use them against their targets in order to install persistent malware. They intercept equipment and literally implant hardware onto the PCBs that let them access the networks. They have access to hordes of government CCTVs. They have real time satellite imaging. They have cellphone tower data.
monerozcash•27m ago
This is all in line with significantly degraded collection capabilities.

They can easily go after specific targets, but bulk collection is no longer viable in the same way it was pre-Snowden.

matheusmoreira•24m ago
Yes but I wouldn't say their capabilities have been "greatly" degraded. It's still very much in the "push a button and have someone's entire life history up on the screen" territory.

Degraded would be "it is impossible for them to know anything about people unless they send dozens of human agents to stalk them".

monerozcash•22m ago
I think going from "lol we can read and store all the emails sent by everybody" to "lol we can hack any specific person and then read their emails" indicates a massive loss of capability.

The first approach enabled them to find targets that were not on their radar based on message contents, they can no longer do that.

matheusmoreira•13m ago
They still read emails. No doubt they're inside Google, Microsoft, Apple. They might not be inside Proton Mail, it uses PGP but keys are stored server side so I wouldn't know.

No doubt they still read texts. I think the US is still among the countries that use SMS a lot.

They no doubt have access to the data big tech's mined out of the entire world's population. That capability alone puts them into "bring everything about this guy up on the screen" territory.

monerozcash•9m ago
>They still read emails. No doubt they're inside Google, Microsoft, Apple. They might not be inside Proton Mail, it uses PGP but keys are stored server side so I wouldn't know.

I don't doubt for a second that they can read specific emails, but to suggest that they have bulk collection capabilities within Google or Microsoft is a stretch. NSA lacks the legal authority to compel that, NSA lacks the money to bribe Google or Microsoft and NSA likely lacks the political backing to put the biggest US companies in such a compromised position.

>I think the US is still among the countries that use SMS a lot.

Sure, but that's increasingly iMessage.

cperciva•6m ago
They don't break encryption, they circumvent it.

To quote a former Chief Scientist of the NSA, Rule #1 of cryptanalysis is "look for plaintext". Implementation flaws are very common.

yupyupyups•25m ago
>NSA does not have magic tools to break modern encryption.

They don't. But they have other options.

For example, Cloudflare is an American company that has plaintext access to the traffic of many sites. Cloudflare can be compelled to secretly share anything the NSA want.

monerozcash•20m ago
>Cloudflare can be compelled to secretly share anything the NSA want.

This is true given some possible interpretations, false given other possible interpretations. Cloudflare can be secretly compelled to share specific things, there's no legal mechanism to compel Cloudflare to share everything.

snorbleck•25m ago
store now... decrypt later...
monerozcash•8m ago
Sure, why not. If quantum computers capable of factoring sufficiently large numbers ever arrive, we'll be living in a very different world anyway.
ch2026•21m ago
You should read about Project Cloudflare
tehjoker•20m ago
Israel produced Pegasus for hacking smartphones and taking them over. You don't think NSA can do that? They control all the endpoints they want.
monerozcash•12m ago
So what? They can't do that at scale without making a ton of noise.

That's a very boring capability compared to what they were able to do pre-Snowden. That's also not a new capability, they were able to do that pre-Snowden too.

themafia•45m ago
You only need to look at a few headline "true crime" cases to see the obvious parallel construction that is being done.
monerozcash•43m ago
Could you be more specific? It's really hard to have an useful conversation based on a comment like this, but really easy to have one based on a comment which links to specific cases and perhaps even explains how the obvious parallel construction appears.
themafia•36m ago
It's a common "conspiracy theory" that this happened in the Luigi Mangione case even thought I don't agree he's "probably innocent":

https://www.reddit.com/r/LateStageCapitalism/comments/1hlmq3...

The FBI apparently attempted to use this in the Bryan Kohberger case:

https://www.nytimes.com/2025/02/25/us/idaho-murders-bryan-ko...

It's hard to find solid coverage of this because obviously the methods are often hidden and rarely leak out to the press at large. The press also gets confused and thinks that defending our constitutional rights will lead to criminals being acquitted.

If you spend a lot of time watching and studying these cases and how they evolve throughout the courts it becomes obvious that this is likely occurring more than most people realize.

monerozcash•30m ago
I don't think the Mangione case is a particularly good example, you wouldn't use a 911 call by a random McDonald's manager to disguise parallel construction.

The caller is easy to identify, how could the government ever trust this person to not reveal their parallel construction? If they were planted by the government, that'd be extremely difficult to hide. The government also likely wouldn't be able to compensate them in any meaningful way for telling such a lie.

The Kohlberger case also does not suggest parallel construction, the DOJ policy isn't binding and the DOJ can in fact legally violate that whenever they want.

monerozcash•1h ago
The most interesting detail about the whole XKeyscore story is that it was apparently not leaked by Snowden

https://www.schneier.com/blog/archives/2014/07/nsa_targets_p...

https://www.reuters.com/article/opinion/commentary-evidence-...

https://www.theguardian.com/us-news/2014/oct/11/second-leake...

It is possible that the "second source" and the shadow brokers are one and the same.

https://www.electrospaces.net/2017/09/are-shadow-brokers-ide...

https://www.emptywheel.net/2017/09/15/shadow-brokers-and-the...

And here's an interesting tidbit about a possible link between TSB and Guccifer 2.0

https://www.emptywheel.net/2020/11/01/show-me-the-metadata-a...

sdigf•52m ago
Probably a Russian agent like Snowden was.
monerozcash•50m ago
The USG does not seem to believe that Snowden was a Russian agent.
sallveburrpi•48m ago
You mean a Russian asset like Comrade Krasnov?
themafia•47m ago
Russia feels it has an interest in informing the American public on the depths of illegal behavior of their own government?

Why is this a problem?

i80and•42m ago
I'm not aware of there being a single lick of evidence to suggest that kookery, but even if he was a Russian agent, he certainly accidentally provided Americans a laudable service.
sdigf•37m ago
Isn't it interesting how Snowden has been so outspoken about his childish views on surveillance, but has been remarkably quiet about the Russian government's human rights abuses or its own surveillance programs.
monerozcash•35m ago
Not really, he'd be risking whats left of his life by doing so.

There's also rather little reason for Snowden to bother commenting on the very widely known abuses by Russian government, what could he possibly have to offer on that topic that hasn't already been said?

sdigf•33m ago
It demonstrates that his priorities lie with Russia and supporting their interests.
monerozcash•28m ago
Support implies action, silence is inherently passive.
codedokode•1h ago
This is a reminder why all the traffic should be encrypted and obfuscated (i.e. no SNI in clear text). Ideally, the traffic should be encrypted to resemble a random noise. If you are making an app, you can embed public keys and use those to completely encrypt traffic, without relying on CAs.

For example, Telegram does this, using a homemade encryption protocol that has no clear-text SNI like HTTPS. As I remember, WeChat also uses some home-grown form of obfuscation.

As a bonus, this makes it more difficult for telecoms to discriminate against certain sites or apps and helps enforce net neutrality no matter if they like it or not.

anonymousiam•58m ago
It's also a reminder that no mater how secure you think you are, some third party may have access.

Consider that TAO (or SSF) can probably get through your firewall and router, and maybe into the management engine on the servers with your critical data.

The only thing you've got going for you is that they will (probably) keep your data secure (for themselves).

jwpapi•50m ago
I mean if I create an offline private key and encrypt my message to be only read with my public key and I’ve learned about math and encryption. I can be assured that my receiver would need to be compromised.

I don’t like these general observation comments. This kind of makes it unappealing to learn about encryption, but it’s worth it and makes you choose either a proper encrypted software or use a key for secret messages.

saghm•36m ago
Isn't the whole issue with net neutrality that ISPs would be incentivized to prioritize their own traffic (or that of companies they collaborate with)? How does making it harder for them to identify traffic for my app/service/whatever stop them from doing that? As long as they can identify the traffic they do want to prioritize (by companies who haven't done the process you describe), it's not obvious to me why they wouldn't have trouble deprioritizing my stuff based on them at least knowing that it's not their own, effect if they don't know whose it is? "Random noise" isn't likely to look like it's their special favorite traffic.

If everyone including the priority traffic did this, then I guess it would have an effect on net neutrality, then I could see that it would make a difference, but I don't see how that could be construed as "whether they like it or not" given that they could just as easily not implement this if they didn't "like it".

That's not to say this isn't worth doing for the privacy and security benefits, but I'm struggling to see how this would have any real-world influence on net neutrality.

sdigf•51m ago
A very impressive project, with considerable positive impact, that I'm sure many of us here would be delighted to work on.
tehjoker•23m ago
What do you mean by this?
Titan2189•21m ago
Probably just forgot the /s at the end
runjake•29m ago
Being familiar with the USG classification system, I was thrown off by the beginning of this article. It doesn't sound like something that would be classified merely as Secret.

The article begins with:

> XKeyscore (XKEYSCORE or XKS) is a secret computer system used by...

This should be edited to:

> XKeyscore (XKEYSCORE or XKS) is a classified computer system used by...

The program is allegedly a Top Secret program.

Sniffnoy•25m ago
Then edit it, it's Wikipedia!
nerdsniper•24m ago
Because Wikipedia. My edit got immediately auto-bot-reverted[1] by some anti-vandalism crusader. Insert bell-curve meme[1] where "just edit wikipedia" is the middle of the bell-curve.

[0] https://en.wikipedia.org/wiki/User_talk:Discospinster#WTF_ed...?

[1] https://imgflip.com/memegenerator/533936279/Bell-Curve

viccis•6m ago
Saying something is "secret" is not the same as saying it is "classified Secret"
tehjoker•22m ago
Back in they day, it is claimed they could only store 20 TB a day, but technology has improved considerably... but so have data volumes. I wonder if they can store more content for longer now or if the volumes have increased too much.
MajesticHobo2•11m ago
I'm sure they can store far more than 20 TB now, but it is true that the content pool is much larger. I would guess it's not a favorable ratio.