frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Publish on your own site, syndicate elsewhere

https://indieweb.org/POSSE#
307•47thpresident•4h ago•70 comments

Daft Punk Easter Egg in the BPM Tempo of Harder, Better, Faster, Stronger?

https://www.madebywindmill.com/tempi/blog/hbfs-bpm/
169•simonw•2h ago•30 comments

NY Fed cash transfers to banks increase dramatically in Q4 2025

https://www.dcreport.org/2025/12/29/ny-fed-unlimited-cash-infusions-bank-crisis/
16•scythe•1h ago•1 comments

Unix v4 (1973) – Live Terminal

https://unixv4.dev/
113•pjmlp•4h ago•46 comments

Clicks Communicator

https://www.clicksphone.com/en/communicator
238•microflash•6h ago•170 comments

Ask HN: Who is hiring? (January 2026)

244•whoishiring•8h ago•146 comments

Linux kernel security work

http://www.kroah.com/log/blog/2026/01/02/linux-kernel-security-work/
41•chmaynard•2h ago•12 comments

FracturedJson

https://github.com/j-brooke/FracturedJson/wiki
490•PretzelFisch•11h ago•132 comments

IPv6 just turned 30 and still hasn't taken over the world

https://www.theregister.com/2025/12/31/ipv6_at_30/
230•Brajeshwar•9h ago•456 comments

TinyTinyTPU: 2×2 systolic-array TPU-style matrix-multiply unit deployed on FPGA

https://github.com/Alanma23/tinytinyTPU-co
77•Xenograph•5h ago•34 comments

Chain Flinger

https://nealstephenson.substack.com/p/kdk-kinetik-der-kontinua-part-1-introduction
15•roomey•5d ago•1 comments

Fighting Fire with Fire: Scalable Oral Exams

https://www.behind-the-enemy-lines.com/2025/12/fighting-fire-with-fire-scalable-oral.html
111•sethbannon•5h ago•144 comments

Jank Lang Hit Alpha

https://github.com/jank-lang/jank
84•makemethrowaway•4h ago•14 comments

10 years of personal finances in plain text files

https://sgoel.dev/posts/10-years-of-personal-finances-in-plain-text-files/
420•wrxd•13h ago•164 comments

Uxn32: Uxn Emulator for Windows and Wine

https://github.com/randrew/uxn32
27•ibobev•5d ago•2 comments

Punkt. Unveils MC03 Smartphone

https://www.punkt.ch/blogs/news/punkt-unveils-mc03
122•ChrisArchitect•7h ago•106 comments

Accounting for Computer Scientists (2011)

https://martin.kleppmann.com/2011/03/07/accounting-for-computer-scientists.html
61•tosh•5h ago•15 comments

What you need to know before touching a video file

https://gist.github.com/arch1t3cht/b5b9552633567fa7658deee5aec60453/
268•qbow883•6d ago•165 comments

Standard Ebooks: Public Domain Day 2026 in Literature

https://standardebooks.org/blog/public-domain-day-2026
338•WithinReason•15h ago•54 comments

Global software engineering job postings outlook – 2026

https://jobswithgpt.com/blog/global_software-engineering_jobs_january_2026/
22•sp1982•2h ago•5 comments

Ask HN: Who wants to be hired? (January 2026)

85•whoishiring•8h ago•157 comments

The rsync algorithm (1996) [pdf]

https://www.andrew.cmu.edu/course/15-749/READINGS/required/cas/tridgell96.pdf
71•vortex_ape•7h ago•3 comments

Assorted less(1) tips

https://blog.thechases.com/posts/assorted-less-tips/
169•todsacerdoti•11h ago•37 comments

I wrote a batch script to keep my 2011 ThinkPad alive for 24/7 streaming

https://github.com/patrick48001/ThinkPad-Stream-Sentinel-VLC-Video-Source-reset-disable-stream-sh...
19•techenthuziast•4h ago•2 comments

List, inspect and explore OCI container images, their layers and contents

https://github.com/bschaatsbergen/lix
24•bschaatsbergen•5d ago•5 comments

HPV vaccination reduces oncogenic HPV16/18 prevalence from 16% to <1% in Denmark

https://www.eurosurveillance.org/content/10.2807/1560-7917.ES.2025.30.27.2400820
486•stared•14h ago•255 comments

39th Chaos Communication Congress Videos

https://media.ccc.de/b/congress/2025
362•Jommi•10h ago•72 comments

ThingsBoard: Open-Source IoT Platform

https://github.com/thingsboard/thingsboard
58•pretext•5d ago•5 comments

Miri: Practical Undefined Behavior Detection for Rust [pdf]

https://research.ralfj.de/papers/2026-popl-miri.pdf
65•ingve•5d ago•9 comments

A small collection of text-only websites

https://shkspr.mobi/blog/2025/12/a-small-collection-of-text-only-websites/
128•danielfalbo•13h ago•55 comments
Open in hackernews

Linux kernel security work

http://www.kroah.com/log/blog/2026/01/02/linux-kernel-security-work/
41•chmaynard•2h ago

Comments

JCattheATM•1h ago
Their view that security bugs are just normal bugs remains very immature and damaging. It it somewhat mitigated by Linux having so many eyes on it and so many developers, but a lot of problems in the past could have bee avoided if they adopted the stance the rest of the industry recognizes as correct.
tptacek•1h ago
From their perspective, on their project, with the constraints they operate under, bugs are just bugs. You're free to operationalize some other taxonomy of bugs in your organization; I certainly wouldn't run with "bugs are just bugs" in mine (security bugs are distinctive in that they're paired implicitly with adversaries).

To complicate matters further, it's not as if you could rely on any more "sophisticated" taxonomy from the Linux kernel team, because they're not the originators of most Linux kernel security findings, and not all the actual originators are benevolent.

rwmj•1h ago
For sure, but you don't need to file CVEs for every regular bug.
Skunkleton•48m ago
In the context of the kernel, it’s hard to say when that’s true. It’s very easy to fix some bug that resulted in a kernel crash without considering that it could possibly be part of some complex exploit chain. Basically any bug could be considered a security bug.
SSLy•39m ago
plainly, crash = DoS = security issue = CVE.

QED.

JCattheATM•48m ago
> From their perspective, on their project, with the constraints they operate under, bugs are just bugs.

That's a pretty poor justification. Their perspective is wrong, and their constraints don't prevent them from treating security bugs differently as they should.

ada0000•43m ago
> almost any bugfix at the level of an operating system kernel can be a “security issue” given the issues involved (memory leaks, denial of service, information leaks, etc.)

On the level of the Linux kernel, this does seem convincing. There is no shared user space on Linux where you know how each component will react/recover in the face of unexpected kernel behaviour, and no SKUs targeting specific use cases in which e.g. a denial of service might be a worse issue than on desktop.

I guess CVEs provide some of this classification, but they seem to cause drama amongst kernel people.

beanjuiceII•1h ago
did you read it? because that's not their view at all
firesteelrain•1h ago
“A bug is a bug” is about communication and prioritization, not ignoring security. Greg’s post spells that out pretty clearly.
akerl_•43m ago
This feels almost too obvious to be worth saying, but “the rest of the industry” does not in fact have a uniform shared stance on this.
DebugDruid•34m ago
Sometimes I dream about a 100% secure OS. Maybe formal verification is the key, or Rust, I don’t know. But I would love to know that I can't be hacked.
jeffbee•13m ago
The problem is that for the overwhelming majority of use cases the isolation features that are violated by security bugs are not being used for real isolation, but for manageability and convenience. Virtualization, physical host segregation, etc are used to achieve greater isolation. People don't necessarily care about these flaws because they aren't actually exposed to the worst case preconditions. So the amount of contributor attention you could get behind a "100% secure OS" might not be as large as you are hoping. Anyway if you want to work on such things there are various OS development efforts floating around.