frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Stop Breaking TLS

https://www.markround.com/blog/2025/12/09/stop-breaking-tls/
43•todsacerdoti•2h ago

Comments

hacker_homie•47m ago
But I need to see what they are googling! /sarcasm
MathMonkeyMan•47m ago
I remember at my first job, the internet stopped working at my workstation. I got on the phone with IT, and the guy said "looks like you don't have our new certificates." I asked why I would need my employer's certificates. He said "because we MITM every connection." I asked if that was even legal, and he said yes it's legal.

At another job I was handling a support ticket where a customer was asking, in so many words, "can I get HTTP headers of requests flowing through my Envoy TLS reverse proxy?" I said that they could terminate TLS at the proxy and redo things that way, but then that wouldn't be a TLS proxy it'd be a MITM or a gateway. They could log the downstream/upstream and duration of connections, but that wouldn't help.

phoronixrly•35m ago
Hey, allowing your employees to have secure connection to websites shows up in red in some Excel spreadsheet. We can't have Excel spreadsheets showing red in fintech. /s
account42•24m ago
> Consider this - what is the likelihood of every certificate authority on the Internet having their private keys compromised simultaneously? I’d wager that’s almost at the whatever is the statistics equivalent of the Planck length level of probability.

It doesn't matter if every certificate authority is compromised or just one. One is all that is needed to sign certificates for all websites.

mark_round•18m ago
Author here, hi! Was just venting last night, but that's a very good point, I'll update it later with your correction :)
acer4666•4m ago
You should make it about CT logs. I believe you need to compromise at least three of them.
sroussey•20m ago
Lame on user machines, but sometimes needed in a server environment. Easier to detect if someone is hauling off with your database as that will be the one you can’t see what’s going on. Of course, solve one problem and introduce three more.
pimterry•12m ago
It's definitely annoying if you work in enterprise, but on the flip side: the fact that these enterprise requirements exist is the main reason that TLS certificate configurability is possible at all, without which it would be dramatically harder (or impossible) to reverse engineer or do security & privacy research on mobile apps, IoT, etc etc etc.

Enterprise control over company devices and user control over personal devices are not so different.

A few apps do use certificate pinning nowadays, which creates similar problems, but saying "you can never add your own MitM TLS cert" is not far from certificate pinning everything everywhere all the time. Good luck creating a new home assistant integration for your smart airfryer when you can't read any of the traffic from its app.

Imo: let's make it easier! Standardize TLS configuration for all tools, make easy cert configuration of devices a legal requirement (any smart device sold with hardcoded CA certificates is a device with a fixed end date, where the CA certs expire and it becomes a brick), guarantee user control over their own TLS trust, and provide good tools to check exactly who you're trusting (and expose that clearly to users). Not really practical of course (and opens all sorts of risky games with nation state interception as well) but there are upsides here as well.

Rust in the kernel is no longer experimental

https://lwn.net/Articles/1049831/
472•rascul•6h ago•257 comments

Show HN: Gemini Pro 3 hallucinates the HN front page 10 years from now

https://dosaygo-studio.github.io/hn-front-page-2035/news
2539•keepamovin•18h ago•765 comments

Revisiting "Let's Build a Compiler"

https://eli.thegreenplace.net/2025/revisiting-lets-build-a-compiler/
63•cui•3h ago•4 comments

PeerTube is recognized as a digital public good by Digital Public Goods Alliance

https://www.digitalpublicgoods.net/r/peertube
519•fsflover•16h ago•96 comments

Stop Breaking TLS

https://www.markround.com/blog/2025/12/09/stop-breaking-tls/
46•todsacerdoti•2h ago•8 comments

Putting email in its place with Emacs and Mu4e

https://eamonnsullivan.co.uk/posts-output/email-setup/2025-12-3-putting-email-in-its-place/
21•eamonnsullivan•6d ago•3 comments

Django: what’s new in 6.0

https://adamj.eu/tech/2025/12/03/django-whats-new-6.0/
268•rbanffy•12h ago•66 comments

When a video codec wins an Emmy

https://blog.mozilla.org/en/mozilla/av1-video-codec-wins-emmy/
118•todsacerdoti•4d ago•15 comments

Mistral releases Devstral2 and Mistral Vibe CLI

https://mistral.ai/news/devstral-2-vibe-cli
595•pember•18h ago•282 comments

If you're going to vibe code, why not do it in C?

https://stephenramsay.net/posts/vibe-coding.html
454•sramsay•16h ago•442 comments

Handsdown one of the coolest 3D websites

https://bruno-simon.com/
562•razzmataks•17h ago•133 comments

Pebble Index 01 – External memory for your brain

https://repebble.com/blog/meet-pebble-index-01-external-memory-for-your-brain
487•freshrap6•18h ago•464 comments

Italy's longest-serving barista reflects on six decades behind the counter

https://www.reuters.com/lifestyle/culture-current/anna-possi-six-decades-behind-counter-italys-ba...
170•NaOH•5d ago•76 comments

10 Years of Let's Encrypt

https://letsencrypt.org/2025/12/09/10-years
640•SGran•14h ago•265 comments

Donating the Model Context Protocol and establishing the Agentic AI Foundation

https://www.anthropic.com/news/donating-the-model-context-protocol-and-establishing-of-the-agenti...
221•meetpateltech•16h ago•103 comments

Are the Three Musketeers allergic to muskets?(2014)

https://www.ox.ac.uk/news/arts-blog/are-three-musketeers-allergic-muskets
16•rolph•3h ago•0 comments

Writing our own Cheat Engine in Rust

https://lonami.dev/blog/woce-1/
66•hu3•5d ago•7 comments

Distributed ID Formats Are Architectural Commitments, Not Just Data Types

https://piljoong.dev/posts/distributed-id-generation-complicated/
33•mnahkies•4d ago•6 comments

Cloudflare error page generator

https://github.com/donlon/cloudflare-error-page
43•sawirricardo•7h ago•6 comments

Cloth Simulation

https://cloth.mikail-khan.com/
9•adamch•1w ago•0 comments

So you want to speak at software conferences?

https://dylanbeattie.net/2025/12/08/so-you-want-to-speak-at-software-conferences.html
171•speckx•14h ago•84 comments

Linux CVEs, more than you ever wanted to know

http://www.kroah.com/log/blog/2025/12/08/linux-cves-more-than-you-ever-wanted-to-know/
60•voxadam•10h ago•30 comments

The stack circuitry of the Intel 8087 floating point chip, reverse-engineered

https://www.righto.com/2025/12/8087-stack-circuitry.html
105•elpocko•15h ago•50 comments

A supersonic engine core makes the perfect power turbine

https://boomsupersonic.com/flyby/ai-needs-more-power-than-the-grid-can-deliver-supersonic-tech-ca...
106•simonebrunozzi•17h ago•165 comments

Kaiju – General purpose 3D/2D game engine in Go and Vulkan with built in editor

https://github.com/KaijuEngine/kaiju
183•discomrobertul8•18h ago•87 comments

Qt, Linux and everything: Debugging Qt WebAssembly

http://qtandeverything.blogspot.com/2025/12/debugging-qt-webassembly-dwarf.html
65•speckx•12h ago•18 comments

Are We over the "Jaws Effect?"

https://nautil.us/are-we-finally-over-the-jaws-effect-1253001/
23•fleahunter•4d ago•21 comments

'Source available' is not open source (and that's okay)

https://dri.es/source-available-is-not-open-source-and-that-is-okay
91•geerlingguy•5h ago•105 comments

Operando interlayer expansion of curved graphene for dense supercapacitors

https://www.nature.com/articles/s41467-025-63485-0
24•westurner•5d ago•0 comments

30 Year Anniversary of WarCraft II: Tides of Darkness

https://www.jorsys.org/archive/december_2025.html#newsitem_2025-12-09T07:42:19Z
228•sjoblomj•1d ago•155 comments