frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Mobile carriers can get your GPS location

https://an.dywa.ng/carrier-gnss.html
104•cbeuw•1h ago•66 comments

Genode OS is a tool kit for building highly secure special-purpose OS

https://genode.org/about/index
21•doener•46m ago•1 comments

Antirender: remove the glossy shine on architectural renderings

https://antirender.com/
1718•iambateman•22h ago•412 comments

Animated AVIF for the Modern Web

https://arthur.pizza/2025/12/animated-avif-for-the-modern-web/
39•sdoering•5d ago•19 comments

Finland to end "uncontrolled human experiment" with ban on youth social media

https://yle.fi/a/74-20207494
68•Teever•1h ago•35 comments

CPython Internals Explained

https://github.com/zpoint/CPython-Internals
84•yufiz•4d ago•21 comments

Guix System First Impressions as a Nix User

https://nemin.hu/guix.html
91•todsacerdoti•7h ago•27 comments

We have ipinfo at home or how to geolocate IPs in your CLI using latency

https://blog.globalping.io/we-have-ipinfo-at-home-or-how-to-geolocate-ips-in-your-cli-using-latency/
154•jimaek•9h ago•44 comments

NASA's WB-57 crash lands at Houston

https://arstechnica.com/space/2026/01/one-of-nasas-three-wb-57-aircraft-just-did-a-belly-landing-...
107•verzali•3d ago•55 comments

Quaternion Algebras

https://jvoight.github.io/quat.html
74•teleforce•4d ago•27 comments

My Ridiculously Robust Photo Management System (Immich Edition)

https://jaisenmathai.com/articles/my-ridiculously-robust-photo-management-system-immich-edition/
164•jmathai•3d ago•68 comments

Show HN: I trained a 9M speech model to fix my Mandarin tones

https://simedw.com/2026/01/31/ear-pronunication-via-ctc/
383•simedw•17h ago•113 comments

Apple Platform Security (Jan 2026) [pdf]

https://help.apple.com/pdf/security/en_US/apple-platform-security-guide.pdf
80•pieterr•2h ago•53 comments

"Giving up upstream-ing my patches & feel free to pick them up"

https://mail.openjdk.org/pipermail/hotspot-dev/2026-January/118080.html
65•csmantle•7h ago•23 comments

Students using “humanizer” programs to beat accusations of cheating with AI

https://www.nbcnews.com/tech/internet/college-students-ai-cheating-detectors-humanizers-rcna253878
8•unpredict•3d ago•1 comments

Guest Post from an Iranian

https://scottaaronson.blog/?p=9530
10•Tomte•33m ago•1 comments

Sumerian Star Map Recorded the Impact of an Asteroid (2024)

https://archaeologyworlds.com/5500-year-old-sumerian-star-map-recorded/
117•griffzhowl•11h ago•38 comments

Insane Growth Goldbridge (YC F25) Is Hiring a Forward Deployed Engineer

https://www.ycombinator.com/companies/goldbridge/jobs/78gGEHh-forward-deployed-engineer
1•alvinsalehi•6h ago

Bitcoin Looks Set for Longest Monthly Losing Streak Since 2018

https://www.bloomberg.com/news/articles/2026-01-30/bitcoin-btc-slides-toward-longest-monthly-losi...
27•1vuio0pswjnm7•1h ago•4 comments

Moltbook

https://www.moltbook.com/
1622•teej•1d ago•760 comments

Euro firms must ditch Uncle Sam's clouds and go EU-native

https://www.theregister.com/2026/01/30/euro_firms_must_ditch_us/
600•jamesblonde•8h ago•551 comments

Peerweb: Decentralized website hosting via WebTorrent

https://peerweb.lol/
333•dtj1123•22h ago•107 comments

HTTP Cats

https://http.cat/
502•surprisetalk•1d ago•79 comments

Implementing the Transcendental Functions in Ivy

https://commandcenter.blogspot.com/2026/01/implementing-transcendental-functions.html
27•chmaynard•5d ago•3 comments

Predicting how Heathrow is using it's runways in the browser

https://blog.billyedmoore.com/heathrow
8•Billyedmoore•5d ago•4 comments

A Step Behind the Bleeding Edge: A Philosophy on AI in Dev

https://somehowmanage.com/2026/01/22/a-step-behind-the-bleeding-edge-monarchs-philosophy-on-ai-in...
125•Ozzie_osman•2d ago•61 comments

Show HN: Phage Explorer

https://phage-explorer.org/
107•eigenvalue•13h ago•25 comments

Disrupting the largest residential proxy network

https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-net...
209•cdrnsf•2d ago•193 comments

An anecdote about backward compatibility

https://blog.plover.com/2026/01/26/#wrterm
77•speckx•5d ago•20 comments

Kimi K2.5 Technical Report [pdf]

https://github.com/MoonshotAI/Kimi-K2.5/blob/master/tech_report.pdf
352•vinhnx•1d ago•135 comments
Open in hackernews

Apple Platform Security (Jan 2026) [pdf]

https://help.apple.com/pdf/security/en_US/apple-platform-security-guide.pdf
80•pieterr•2h ago

Comments

OGEnthusiast•1h ago
Glad there's still at least one tech company that cares about personal security / opsec.
varispeed•1h ago
No mention of Pegasus and other software of such sort. Can latest iOS still be infected?

There is no point creating such document if elephant in the room is not addressed.

gjsman-1000•1h ago
Why? The obvious conclusion is that Apple is doing everything in its power to make the answer “no.”

You might as well enumerate all the viruses ever made on Windows, point to them, and then ask why Microsoft isn’t proving they’ve shut them all down yet in their documents.

varispeed•1h ago
That analogy misses the asymmetry in claims and power.

Microsoft does not sell Windows as a sealed, uncompromisable appliance. It assumes a hostile environment, acknowledges malware exists, and provides users and third parties with inspection, detection, and remediation tools. Compromise is part of the model.

Apple’s model is the opposite. iOS is explicitly marketed as secure because it forbids inspection, sideloading, and user control. The promise is not “we reduce risk”, it’s “this class of risk is structurally eliminated”. That makes omissions meaningful.

So when a document titled Apple Platform Security avoids acknowledging Pegasus-class attacks at all, it isn’t comparable to Microsoft not listing every Windows virus. These are not hypothetical threats. They are documented, deployed, and explicitly designed to bypass the very mechanisms Apple presents as definitive.

If Apple believes this class of attack is no longer viable, that’s worth stating. If it remains viable, that also matters, because users have no independent way to assess compromise. A vague notification that Apple “suspects” something, with no tooling or verification path, is not equivalent to a transparent security model.

The issue is not that Apple failed to enumerate exploits. It’s that the platform’s credibility rests on an absolute security narrative, while quietly excluding the one threat model that contradicts it. In other words Apple's model is good old security by obscurity.

Retr0id•1h ago
don't worry, they set the allow_pegasus boolean to false
goalieca•1h ago
Apple did create a boolean for that. They call it lockdown mode.

> Lockdown Mode is an optional, extreme protection that’s designed for the very few individuals who, because of who they are or what they do, might be personally targeted by some of the most sophisticated digital threats. Most people are never targeted by attacks of this nature. When Lockdown Mode is enabled, your device won’t function like it typically does. To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all.

varispeed•59m ago
If Pegasus can break the iOS security model, there’s no reason to think it politely respects Lockdown Mode. It’s basically an admission the model failed, with features turned off so users feel like they’re doing something about it.
jkubicek•52m ago
Lockdown mode works by reducing the surface area of possible exploits. I don't think there's any failures here. Apple puts a lot of effort into resolving web-based exploits, but they can also prevent entire classes of exploits by just blocking you from opening any URL in iMessage. It's safer, but most users wouldn't accept that trade-off.
wat10000•1h ago
Pegasus isn't magic. It exploits security vulnerabilities just like everything else. Mitigating and fixing those vulnerabilities is a major part of this document.
random_duck•1h ago
Wow, this is hardcore (pun intended).
buildbot•1h ago
262 pages!!! Pretty interesting to see how the different SoCs have evolved security wise over time.
easton•1h ago
Web version: https://support.apple.com/guide/security/welcome/web
sonu27•38m ago
That’s Dec 2024
modeless•1h ago
Then they turn around and upload your iMessages to their own servers in a form that they can read, breaking their own E2EE. Google Messages fixed this issue a long time ago. Why hasn't Apple? https://james.darpinian.com/blog/apple-imessage-encryption
runjake•1h ago
This is your blog post, so I'll ask you a question. What are you trying to state in Belief #1? The message is unclear to me with how it's worded:

  > In this table, in the "iCloud Backup (including device and Messages backup)" row, under "Standard data protection", 
  > the "Encryption" column reads "In transit & on server". Yes, this means that Apple can read all of your messages 
  > out of your iCloud backups.
In addition to the things you mentioned, there's certainly a possibility of Apple attaching a virtual "shadow" device to someone's Apple ID with something like a hide_from_customer type flag, so it would be invisible to the customer.

This shadow device would have it's own keys to read messages sent to your iCloud account. To my knowledge, there's nothing in the security model to prevent this.

shawnz•59m ago
The table has two categorizations: "In transit & on server" and "End-to-end". The former, which covers iCloud backups in the default configuration, is explicitly NOT end-to-end, meaning there are moments in time during processing where the data is not encrypted.

However, iCloud backups actually are listed as "End-to-end" if you turn on the new Advanced Data Protection feature.

digiown•53m ago
Or Apple can also push an update, which you can't refuse, that upon first message to iCloud just uploads your private key. It's a bit foolish to count on encryption implemented by the adversary you're trying to hide from. Of course, this will most likely only affect individuals targeted by state-level actors.
philsnow•34m ago
What is "Google Messages"? I can't count the number of articles people have written over time about how many first-party messaging apps Google themselves have put out (and then put down), not to mention what messaging apps get shoveled on by third-party android integrators.

> the main reason a message wouldn't be properly end-to-end encrypted in Google's Messages app is when communicating with an iPhone user, because Apple has dragged their feet on implementing RCS features in iMessage

(or with any other android user who isn't using a first-party device / isn't using this one app)

> [...] Android's equivalent cloud backup service has been properly end-to-end encrypted by default for many years. Meaning that you don't need to convince the whole world to turn on an optional feature before your backups can be fully protected.

You make it out to seem that it's impossible for Google to read your cloud backups, but the article you link to [0] earlier in your post says that "this passcode-protected key material is encrypted to a Titan security chip on our datacenter floor" (emphasis added). So they have your encrypted cloud backup, and the only way to get the key material to decrypt it is to get it from an HSM in their datacenter, every part of which and the access to which they control... sounds like it's not really any better than Apple, from what I'm reading here. Granted, that article is from 2018 and I certainly have not been keeping up on android things.

[0] https://security.googleblog.com/2018/10/google-and-android-h...

TheNewsIsHere•5m ago
You can enable Advanced Data Protection to address that issue with iMessages.

Giving users an option between both paths is usually best. Most users care a lot more that they can’t restore a usable backup of their messages than they do that their messages are unreadable by the company storing them.

I used to work at a company where our products were built around encryption. Users here on HN are not the norm. You can’t trust that most users will save recovery codes, encryption seed phrases, etc in a manner that will be both available and usable when they need them, and then they tend to care a lot less about the privacy properties that provides and a lot more that they no longer have their messages with {deceased spouse, best friend, business partner, etc}.

whitepoplar•1h ago
Given that A19 + M5 processors with MIE (EMTE) were only recently introduced, I wonder how extensively MacOS/iOS make use of the hardware features. Is it something that's going to take several years to see the benefit, or does MIE provide thorough protection today?
bri3d•47m ago
I think all of the kernel allocators and most (?) system processes in iOS 26 have MIE enabled, as does libpas (the WebKit allocator), so it’s already doing quite a lot.
drnick1•55m ago
But all the software is closed source, and there is little to no opportunity to verify all these security claims. You don't have the encryption keys, so effectively the data is not under your control.

If you want to see security done well (or at least better), see the GrapheneOS project.

digiown•50m ago
GrapheneOS also doesn't give you the encryption keys. If you run the official version, there is no way for you to extract the data from your device at all beyond what app developers will let you access. This means that you do not own the data on your device. The backups are even less effective than Apple's, although they say they will work on it.

The developers also appear to believe that the apps have a right to inspect the trustworthiness of the user's device, by offering to support apps that would trust their keys [1], locking out users who maintain their freedom by building their own forks.

It's disheartening that a lot of security-minded people seem to be fixated on the "AOSP security model", without realizing or ignoring the fact that a lot of that security is aimed at protecting the apps from the users, not the other way around. App sandboxing is great, but I should still be able to see the app data, even if via an inconvenient method such as the adb shell.

1. https://grapheneos.org/articles/attestation-compatibility-gu...

zb3•45m ago
For some reason they don't release userdebug versions which was a dealbreaker for me.. (the device should be secure, but not against me)

But if you wish to build it from source, it could probably be a good option.

digiown•43m ago
You can re-sign it using https://github.com/chenxiaolong/avbroot

I don't currently have any root on the phone, but I reserve the right to add it or run the userdebug build at a later date

armadyl•36m ago
> The developers also appear to believe that the apps have a right to inspect the trustworthiness of the user's device, by offering to support apps that would trust their keys [1], locking out users who maintain their freedom by building their own forks.

That is not a bad thing. The alternative is not having apps that do these checks available on the platform at all. It’s ridiculous that someone should expect that every fork of it should have that capability (because the average developer is not going to accept the keys of someone’s one off fork).

If there’s anyone to blame, it should be the app developers choosing to do that (benefits of attestation aside).

Attestation is also a security feature, which is one of the points of GOS. People are free to use any other distribution of Android if they take issue with it.

Obviously I could be wrong here, this is just the general sentiment that I get from reading GOS documentation and its developer’s comments.

digiown•22m ago
> Attestation is also a security feature

I don't actually disagree with this. The auditor is a perfectly valid use of it. It's good to be able to verify cryptographically your device is running what it's supposed to.

The problem is when it transcends ownership boundaries and becomes a mechanism to exert control over things someone doesn't own, like your bank or government controlling your phone. It is one of the biggest threats to ownership worldwide.

Note also that getting "trusted" comes at the cost of other security features, such as spoofing your location securely to apps:

https://news.ycombinator.com/item?id=44685283

surajrmal•33m ago
You were not going to be able to use those apps anyways, so what does it matter to you? I, and I suspect many, agree with the purpose of attestation. The problems around it are strictly around establishing good ways to teach apps who they should trust, not around attestation itself. By putting your head in the sand, you'll never improve the situation.
digiown•27m ago
> teach apps who they should trust

Ah, the apps^Wgovernment (look at that page, most of it is government IDs) should be able to discriminate against me for daring to assert control over my own device. And GrapheneOS is saying:

Hey government! We pinky promise to oppress the user just the same, but even more securely and competently than Google/Samsung!

> what does it matter to you

It shows that the developers maybe don't fully have your best interests at heart?

amelius•34m ago
Yes, how can we verify this? Who says three-letter agencies have no access?
rrgok•53m ago
Sometime I wonder how much overhead all these security features take in terms of performance.

I would really like to see a benchmark with and without security measures.

Retr0id•49m ago
It's not really possible to make a direct comparison, given that a big chunk of the features are baked into the silicon, or are architecture-level choices.
TheNewsIsHere•36m ago
It’s technically possible, but it would be difficult and likely require breaching an NDA. A bit pedantic, perhaps, but it’s out there.

Apple makes available on a highly controlled basis iPhones which permit the user to disable “virtually all” of the security features. They’re available only to vetted security researchers who apply for one, often under some kind of sponsorship, and they’re designed to obviously announce what they are. For example they are engraved on the sides with “Confidential and Proprietary. Property of Apple”.

They’re loaned, not sold or given, remain Apple’s property, and are provided on a 12-month (optionally renewable) basis. You have to apply and be selected by Apple to receive one, and you have to agree to some (understandable but) onerous requirements laid out in an legal agreement.

I expect that if you were to interrogate these iPhones they would report that the CPU fuse state isn’t “Production” like the models that are sold.

They refer to these iPhones as Security Research Devices, or SRDs.

Retr0id•34m ago
These devices still have all the security features.
zb3•48m ago
Protects the device well... against the owner of the device using it as they wish :)
wcfrobert•46m ago
Apple's commitment to privacy and security is really cool to see. It's also an amazing strategic play that they are uniquely in the position to take advantage of. Google and Meta can't commit to privacy because they need to show you ads, whereas Apple feels more like a hardware company to me.
bigyabai•40m ago
You know what's even cooler? Apple's commitment to hiding US federally-mandated backdoors for dragnet surveillance: https://arstechnica.com/tech-policy/2023/12/apple-admits-to-...

  Apple has since confirmed in a statement provided to Ars that the US federal government “prohibited” the company “from sharing any information,” but now that Wyden has outed the feds, Apple has updated its transparency reporting and will “detail these kinds of requests” in a separate section on push notifications in its next report.
Noaidi•37m ago
That people fall for this corporate BS while Tim Cook is giving gold bars to Trump and dining and dancing with him When people are being murdered on the streets by ice is just amazing to me.
OGEnthusiast•25m ago
Well that’s what Americans voted for. So I don’t think anyone cares that every CEO (definitely not just Tim Cook) is schmoozing with Trump.
bigyabai•12m ago
> Well that’s what Americans voted for.

Americans are not one person.

> So I don’t think anyone cares

Clearly they do.

> every CEO (definitely not just Tim Cook) is schmoozing with Trump.

Tim Cook was (supposedly) principled. I guess it's hard to pretend that you care about privacy or human rights while eating dinner next to bin Salman.

vrosas•35m ago
You know this is just marketing right? Apple gives zero fucks about security. They just use it to lock competitors out of their gardens and preach a holier-than-thou attitude about it.
candiddevmike•31m ago
All while slowly stuffing (more?) ads into their software.

In a lot of ways Apple is as aligned to data privacy the same way other "platforms" are: to gatekeep the user data behind their ad service. It's better than selling your data, maybe, but you're still being tracked and monitored.

isodev•29m ago
The worst part is since Apple is technically not a 3rd party, many of the rules don’t apply to them even though they bring the same harm to the users. Did you notice the new “creative suite” has analytics with identities linked to your Apple account turned on by defend? Free Pages/Numbers is not so free anymore.
dangus•28m ago
> Apple gives zero fucks about security.

Hyperbole doesn’t help your point. They definitely care about security, their profits depend on it.

jtbayly•33m ago
modeless linked to this article earlier today:

https://james.darpinian.com/blog/apple-imessage-encryption/

My current understanding of the facts:

1. Google defaults to encrypted backups of messages, as well as e2e encryption of messages.

2. Apple defaults only to e2ee of messages, leaving a massive backdoor.

3. Closing that backdoor is possible for the consumer, by enabling ADP (advanced data protection) on your device. However, this makes no difference, since 99.9% of the people you communicate will not close the backdoor. Thus, the only way to live is to assume that all the messages you send via iMessage will always be accessible to Apple, no matter what you do.

It's not like overall I think Google is better for privacy than Apple, but this choice by Apple is really at odds with their supposed emphasis on privacy.

isodev•31m ago
> Apple's commitment to privacy

We know now that it was all marketing talk. Apple didn’t like Meta so they spun a bunch of obstacles. Apple has and would use your data for ads, models and anything that keeps the shareholders happy. And we don’t know the half of the story where as a US corp, they’re technically obliged to share data from the not-E2EE iCloud syncs of every iPhone.

dangus•29m ago
Apple has ads. See the App Store, Apple Maps is also planning to roll out advertising.
derbOac•24m ago
It's all tempered by them ultimately controlling what you can put on your phone though.

As was demonstrated in LA, it's starting to have significant civil rights consequences.

ioasuncvinvaer•18m ago
Apple is an ad company now though
baxtr•5m ago
Apple sells some ads yes. But it’s a tiny fraction of their revenue.

Would Google or Meta go bankrupt if they stopped selling ads? Yes. Apple wouldn’t.

eddyg•10m ago
I still like to encourage people to watch all of https://www.youtube.com/watch?v=BLGFriOKz6U&t=1993s for the details (from Apple’s head of Security Engineering and Architecture) about how iCloud is protected by HSMs, rate limits, etc. but especially the timelinked section. :)
bigyabai•8m ago
I still recommend Mr. Fart's Favorite Colors as a refutation, describing why all of these precautions cannot protect you in a real-world security model: https://medium.com/@blakeross/mr-fart-s-favorite-colors-3177...

  Unbreakable phones are coming. We’ll have to decide who controls the cockpit: The captain? Or the cabin?
willturman•12m ago
You can request a downloadable a copy of any/all of the data that Apple has associated with your account at https://privacy.apple.com.

This apparently includes retrieving all photos from iCloud in chunks of specified size, which seems an infinitely better option than attempting to download them through the iCloud web interface which caps downloads to 1000 photos at a time with than impressive download speeds.