frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

AMD GPU Debugger

https://thegeeko.me/blog/amd-gpu-debugging/
96•ibobev•1h ago•4 comments

Strong earthquake hits northern Japan, tsunami warning issued

https://www3.nhk.or.jp/nhkworld/en/news/20251209_02/
93•lattis•3h ago•65 comments

Hunting for North Korean Fiber Optic Cables

https://nkinternet.com/2025/12/08/hunting-for-north-korean-fiber-optic-cables/
68•Bezod•1h ago•6 comments

Let's put Tailscale on a jailbroken Kindle

https://tailscale.com/blog/tailscale-jailbroken-kindle
50•Quizzical4230•1h ago•9 comments

Launch HN: Nia (YC S25) – Give better context to coding agents

https://www.trynia.ai/
15•jellyotsiro•45m ago•11 comments

Flow: Actor-based language for C++, used by FoundationDB

https://github.com/apple/foundationdb/tree/main/flow
110•SchwKatze•4h ago•28 comments

Microsoft has a problem: nobody wants to buy or use its shoddy AI products

https://www.windowscentral.com/artificial-intelligence/microsoft-has-a-problem-nobody-wants-to-bu...
126•mohi-kalantari•1h ago•76 comments

Legion Health (YC S21) is hiring a founding engineer (SF, in-person)

1•the_danny_g•54m ago

AI should only run as fast as we can catch up

https://higashi.blog/2025/12/07/ai-verification/
8•yuedongze•17m ago•4 comments

RIP Tetsu Yamauchi (Former Free and Faces Bassist)

https://www.loudersound.com/bands-artists/former-free-and-faces-bassist-tetsu-yamauchi-dead-at-79
4•pauseandplay•47m ago•1 comments

Mac Cleaner CLI: Free and Open Source Mac Cleanup Tool

https://github.com/guhcostan/mac-cleaner-cli
16•todsacerdoti•2h ago•1 comments

Colors of Growth

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5804462
37•mhb•4h ago•11 comments

Nova Programming Language

https://nova-lang.net
27•surprisetalk•2h ago•14 comments

The "confident idiot" problem: Why AI needs hard rules, not vibe checks

https://steerlabs.substack.com/p/confident-idiot-problem
228•steerlabs•3d ago•244 comments

IBM to Acquire Confluent

https://www.confluent.io/blog/ibm-to-acquire-confluent/
201•abd12•4h ago•165 comments

Twelve Days of Shell

https://12days.cmdchallenge.com
195•zoidb•7h ago•65 comments

Turtletoy

https://turtletoy.net/
282•ustad•4d ago•52 comments

Berkshire Hathaway Announces Leadership Appointments [pdf]

https://berkshirehathaway.com/news/dec0825.pdf
46•kamaraju•2h ago•21 comments

Google Confirms Android Attacks-No Fix for Most Samsung Users

https://www.forbes.com/sites/zakdoffman/2025/12/08/google-confirms-android-attacks-no-fix-for-mos...
35•mohi-kalantari•1h ago•20 comments

Emacs is my new window manager (2015)

https://www.howardism.org/Technical/Emacs/new-window-manager.html
193•gpi•3d ago•74 comments

I failed to recreate the 1996 Space Jam website with Claude

https://j0nah.com/i-failed-to-recreate-the-1996-space-jam-website-with-claude/
522•thecr0w•1d ago•428 comments

Damn Small Linux

https://www.damnsmalllinux.org/
201•grubbs•16h ago•55 comments

Bag of words, have mercy on us

https://www.experimental-history.com/p/bag-of-words-have-mercy-on-us
280•ntnbr•19h ago•298 comments

Client-side GPU load balancing with Redis and Lua

https://galileo.ai/blog/how-we-boosted-gpu-utilization-by-40-with-redis-lua
37•lneiman•6d ago•6 comments

Dollar-stores overcharge customers while promising low prices

https://www.theguardian.com/us-news/2025/dec/03/customers-pay-more-rising-dollar-store-costs
475•bookofjoe•1d ago•652 comments

Show HN: Lockenv – Simple encrypted secrets storage for Git

https://github.com/illarion/lockenv
78•shoemann•10h ago•24 comments

Cool Facilities – The David Taylor Model Basin

https://www.navalgazing.net/David-Taylor-Model-Basin
6•eatonphil•1w ago•2 comments

Apex: Universal Markdown Processor

https://brettterpstra.com/2025/12/06/introducing-apex-universal-markdown-processor/
10•zdw•1d ago•3 comments

I wasted years of my life in crypto

https://twitter.com/kenchangh/status/1994854381267947640
532•Anon84•1d ago•752 comments

GitHub Actions has a package manager, and it might be the worst

https://nesbitt.io/2025/12/06/github-actions-package-manager.html
304•robin_reala•9h ago•187 comments
Open in hackernews

Google Confirms Android Attacks-No Fix for Most Samsung Users

https://www.forbes.com/sites/zakdoffman/2025/12/08/google-confirms-android-attacks-no-fix-for-most-samsung-users/
35•mohi-kalantari•1h ago

Comments

Squeeze2664•1h ago
Is GrapheneOS affected?
jackwilsdon•36m ago
From what I can tell, if you're running the latest security preview release[1] then it's already fixed: https://grapheneos.org/releases#2025120400

[1]: https://discuss.grapheneos.org/d/27068-grapheneos-security-p...

bramhaag•25m ago
GrapheneOS has patched this CVE back in September: https://grapheneos.social/@GrapheneOS/115647360248469626
purplehat_•49m ago
The Forbes link unfortunately doesn't say much about how it works. This link does a little better:

https://github.com/Ashwesker/Blackash-CVE-2025-48633

The text there:

                  ┌──────────────────────────┐
                  │   Attacker (C2 Server)   │
                  └────────┬─────────────────┘
                           │ 1. Delivers malicious APK
                           │    (phishing, fake app store, drive-by)
                           ▼
  ┌─────────────────────────────────────────────────────┐
  │                Victim's Android 15 Phone            │
  │  (Security patch < 2025-12-01 → still vulnerable)   │
  └─────────────────────────────────────────────────────┘
                           │
            ┌──────────────┴──────────────┐
            ▼                             ▼
     User installs & opens       Malicious app runs in background
     "Fake Game / Tool" APK      (no permissions needed for this CVE)
            │
            │ 2. App triggers vulnerable Framework API
            │    (crafted Intent / Binder transaction)
            ▼
     ┌───────────────────────────────────┐
     │   Android Framework (buggy)       │
     │   code in Parcel/Binder handling) │
     └───────────────────────────────────┘
            │
            │ 3. Information Disclosure occurs
            │    → Sensitive data leaked without user interaction
            ▼
     Leaked data examples:
     • Device ID / IMEI
     • Installed app list
     • Account tokens
     • Contacts / SMS snippets
     • Clipboard content
     • Location history fragments
            │
            │ 4. Data silently sent back
            ▼
     ┌───────────────────────────────────┐
     │   Attacker receives stolen data   │
     → Can be sold, used for             │
     └───────────────────────────────────┘        spying, or chained with
                                             other exploits (e.g. CVE-2025-48572)
pogue•41m ago
So it sounds like if you don't sideload apps you would not be at risk, correct?
nutjob2•23m ago
> The Forbes link unfortunately doesn't say much about how it works.

True, it says almost nothing of value about the exploit, but it does teach us that 30% is almost one in three.

4ndrewl•21m ago
Conveniently Google can use this to justify banning installs from unofficial stores.
da_grift_shift•12m ago
Is this guy going to make a slop repo for every new CVE in a high-profile product so he can rack up some stars and put this shit on his resume? Jesus fuck.

This is just polluting the namespace and making it harder for blue teamers and incident responders to find actionable IOCs.

charcircuit•2m ago
This isn't accurate and is just an AI hallucination.
domoregood•46m ago
https://archive.is/krzUC
xnx•46m ago
No fix yet for Samsung. Being reliant on the hardware manufacturer (or network operator?) for OS updates is the crazy world we live in.
ChocolateGod•34m ago
I hoped with a move to Fuschia, Google would attempt to fix this, but unfortunately Fuschia on mobile is dead.
bigbadfeline•10m ago
> Being reliant on the hardware manufacturer (or network operator?) for OS updates is the crazy world we live in.

Being reliant on a single OS permanently nailed to the hardware is no less crazier. I'd like to be able to install another OS on a vulnerable device, it would help tremendously and not only with the security of that specific device.

Now I've got some expensive paperweights that I can't even use as such because every time I see them I have the urge to throw them in the trash can.

Provide a way to unlock the phones and a standard BSP, it should be the law.

baal80spam•42m ago
This requires user action, right? User needs to install the APK by hand? In other words - if I don't install any crap on my phone I am safe?
rew0rk•40m ago
While the information leakage/disclosure is a big issue, It feels like its still a big jump to get users to install off-Play Store APKs?
kelnos•31m ago
> This [update] was rushed out to all Pixel users.

Pixel 8 here, still don't have the update. That's... not great.

nervysnail•4m ago
I'd suggest you to use GrapheneOS.
baaron•21m ago
My tinfoil hat might be on too tight again... but the timing of this exploit coinciding with Google's full court press on Android user rights is just a little suspect. Especially after the ongoing public education campaign about the evils of "sideloading" an Android application.
charcircuit•17m ago
>But in reality, Samsung (and the other Android OEMs) cannot compete with Google and its unique control over hardware and software.

Yes, they can. We are talking about applying provided security patches to source code, and then releasing a new version of their OS. For patches that have existed for months. The time from patch to release should be on the order l of days from receiving the patches to having a validated OS release with the fix being sent to users. It's not the control of Android which makes Google possible to patch their Pixel branch of AOSP faster than Samsung can patch their own. It's that Samsung doesn't care about prompt security fixes so they don't allocate engineers to do the work.

resist_futility•15m ago
nice list of vulnerabilities and source changes

https://source.android.com/docs/security/bulletin/2025-12-01