frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Hacker News front page now, but the titles are honest

https://dosaygo-studio.github.io/hn-front-page-2035/news-honest.html
529•keepamovin•1h ago•112 comments

GotaTun -- Mullvad's WireGuard Implementation in Rust

https://mullvad.net/en/blog/announcing-gotatun-the-future-of-wireguard-at-mullvad-vpn
333•km•5h ago•74 comments

Garage – An S3 object store so reliable you can run it outside datacenters

https://garagehq.deuxfleurs.fr/
38•ibobev•44m ago•2 comments

Amazon will allow ePub and PDF downloads for DRM-free eBooks

https://www.kdpcommunity.com/s/article/New-eBook-Download-Options-for-Readers-Coming-in-2026?lang...
290•captn3m0•6h ago•155 comments

Cursor Acquires Graphite

https://graphite.com/blog/graphite-joins-cursor
18•timvdalen•17m ago•6 comments

The FreeBSD Foundation's Laptop Support and Usability Project

https://github.com/FreeBSDFoundation/proj-laptop
36•mikece•1h ago•7 comments

Beginning January 2026, all ACM publications will be made open access

https://dl.acm.org/openaccess
1883•Kerrick•1d ago•228 comments

Using AI Generated Code Will Make You a Bad Programmer

https://unsolicited-opinions.rudism.com/bad-programmer/
27•speckx•34m ago•8 comments

Show HN: Stepped Actions – distributed workflow orchestration for Rails

https://github.com/envirobly/stepped
55•klevo•5d ago•9 comments

Believe the Checkbook

https://robertgreiner.com/believe-the-checkbook/
4•rg81•33m ago•0 comments

Texas is suing all of the big TV makers for spying on what you watch

https://www.theverge.com/news/845400/texas-tv-makers-lawsuit-samsung-sony-lg-hisense-tcl-spying
1067•tortilla•2d ago•530 comments

Getting bitten by Intel's poor naming schemes

https://lorendb.dev/posts/getting-bitten-by-poor-naming-schemes/
217•LorenDB•10h ago•115 comments

We pwned X, Vercel, Cursor, and Discord through a supply-chain attack

https://gist.github.com/hackermondev/5e2cdc32849405fff6b46957747a2d28
1020•hackermondev•21h ago•367 comments

AMD officially confirms fresh next-gen Zen 6 CPU details

https://overclock3d.net/news/cpu_mainboard/amd-officially-confirms-fresh-next-gen-zen-6-cpu-details/
35•akyuu•1h ago•16 comments

1.5 TB of VRAM on Mac Studio – RDMA over Thunderbolt 5

https://www.jeffgeerling.com/blog/2025/15-tb-vram-on-mac-studio-rdma-over-thunderbolt-5
526•rbanffy•18h ago•176 comments

How to think about durable execution

https://hatchet.run/blog/durable-execution
56•abelanger•1w ago•17 comments

Building a Transparent Keyserver

https://words.filippo.io/keyserver-tlog/
16•noident•1h ago•2 comments

Is Firefox Firefucked?

https://kevquirk.com/blog/is-firefox-firefucked/
17•speckx•42m ago•16 comments

Noclip.website – A digital museum of video game levels

https://noclip.website/
350•ivmoreau•14h ago•43 comments

History LLMs: Models trained exclusively on pre-1913 texts

https://github.com/DGoettlich/history-llms
641•iamwil•17h ago•305 comments

From Zero to QED: An informal introduction to formality with Lean 4

https://sdiehl.github.io/zero-to-qed/01_introduction.html
108•rwosync•5d ago•14 comments

Does my key fob have more computing power than the Lunar lander?

https://www.buzzsprout.com/2469780/episodes/18340142-17-does-my-key-fob-have-more-computing-power...
8•jammcq•5d ago•2 comments

GPT-5.2-Codex

https://openai.com/index/introducing-gpt-5-2-codex/
539•meetpateltech•22h ago•296 comments

Graphite Is Joining Cursor

https://cursor.com/blog/graphite
28•fosterfriends•27m ago•13 comments

Pingfs: Stores your data in ICMP ping packets

https://github.com/yarrick/pingfs
61•linkdd•5d ago•20 comments

Prompt caching for cheaper LLM tokens

https://ngrok.com/blog/prompt-caching/
206•samwho•2d ago•47 comments

Designing a Passive Lidar Detector Device

https://www.atredis.com/blog/2025/11/20/designing-a-passive-lidar-detection-sensor
43•speckx•3d ago•2 comments

How China built its ‘Manhattan Project’ to rival the West in AI chips

https://www.japantimes.co.jp/business/2025/12/18/tech/china-west-ai-chips/
410•artninja1988•21h ago•492 comments

Reconstructed Commander Keen 1-3 Source Code

https://pckf.com/viewtopic.php?t=18248
126•deevus•12h ago•23 comments

Show HN: I implemented generics in my programming language

https://axe-docs.pages.dev/features/generics/
31•death_eternal•4d ago•16 comments
Open in hackernews

XZ Utils Backdoor

https://en.wikipedia.org/wiki/XZ_Utils_backdoor
16•ctrlmeta•2h ago

Comments

jqpabc123•1h ago
This really illustrates a broad security issue with open source development and methodology.

Who vets contributors, maintainers and submissions?

Answer: Unknown in many (if not most) cases. Unless you have the time and expertise to do so yourself; it is purely based on trust.

yjftsjthsd-h•1h ago
That's not unique to open source or open development.
jqpabc123•19m ago
Anonymity is the unique aspect of open source that opens the door for malicious activity without consequences.
yjftsjthsd-h•4m ago
Well, no; there's plenty of proprietary software without a human name attached (let alone a name that you could possibly verify is real), and there are FOSS projects that only take contributions from people who have identified themselves in some capacity.
nwellnhof•46m ago
Contributors and their submissions are vetted by maintainers. New maintainers are ideally vetted by existing maintainers. This can obviously break down in undermaintained projects.
jqpabc123•11m ago
New maintainers are ideally vetted by existing maintainers

This ideal obviously did not happen here.

And there are no consequences for those who fail to do so.

LunaSea•1h ago
> The Debian development team declined to remove the affected images, stating that they were development builds that should not be used on real systems in place of newer, clean container versions.

Classic Debian security management

jmclnx•1h ago
>While xz is commonly present in most Linux distributions,

Not Slackware since Slackware does not xz or many other utilities. Plus it does not use systemd. From what I remember a patch was put in to give systemd extra functionality and someone used that patch to sneak in the backdoor.

NekkoDroid•48m ago
The xz attach happened cuz systemd's library dynamically linked against xz for compression of various tools in systemd and a downstream patch for openssh (IIRC) was used to link against libsystemd to use some founctions for the sd-notify protocol.

This wasn't exactly necessary since the protocol has been stable for external use for ages (since its inception IIRC) and is relatively trivial to implement.

Since the attack happened openssh gained native support for the sd-notify protocol, the sd-notify man page has an example implementation that is freely usable and libsystemd now only loads xz (and most of its other libraries) when explicitly requested by one of the tools via `dlopen`.

pogopop77•54m ago
Given this was backdoor was likely funded by a nation-state actor and very carefully obfuscated, the fact that it was discovered within a month and never rolled out to production releases, shows that the open source process mostly worked. Not saying it couldn't be better.
mingus88•21m ago
I kinda disagree. This was luck. A dev on an unrelated project happened upon it and was diligent enough to dig in. A single change to any number of variables would have meant disaster.

I worked at a company that got red teamed. The pen testers were inside the network and were only found by a random employee who happened to be running little snitch and got a weird pop-up

Nobody celebrated the fact that the intrusion was detected. It was pure luck, too late, and the entire infosec leadership was fired as a result.

Like this xv issue, none of the usual systems meant to detect this attack seemed to work, and it was only due to the diligence of a single person unrelated to the project was it not a complete show.