frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Claude Opus 4.6

https://www.anthropic.com/news/claude-opus-4-6
1611•HellsMaddy•9h ago•692 comments

It's 2026, Just Use Postgres

https://www.tigerdata.com/blog/its-2026-just-use-postgres
419•turtles3•5h ago•235 comments

GPT-5.3-Codex

https://openai.com/index/introducing-gpt-5-3-codex/
1066•meetpateltech•8h ago•408 comments

My AI Adoption Journey

https://mitchellh.com/writing/my-ai-adoption-journey
359•anurag•7h ago•97 comments

We tasked Opus 4.6 using agent teams to build a C Compiler

https://www.anthropic.com/engineering/building-c-compiler
391•modeless•7h ago•373 comments

Recreating Epstein PDFs from raw encoded attachments

https://neosmart.net/blog/recreating-epstein-pdfs-from-raw-encoded-attachments/
222•ComputerGuru•1d ago•51 comments

Animated Knots

https://www.animatedknots.com/
62•ostacke•3d ago•10 comments

Review of 1984 by Isaac Asimov (1980)

https://www.newworker.org/ncptrory/1984.htm
90•doruk101•5h ago•38 comments

Pong Cam – My ESP32S3 Thinks It's a WebCam

https://www.atomic14.com/2026/02/01/pong-cam
8•iamflimflam1•4d ago•0 comments

The RCE that AMD won't fix

https://mrbruh.com/amd/
52•MrBruh•3h ago•23 comments

Launching My Side Project as a Solo Dev: The Walkthrough

https://alt-romes.github.io/posts/2026-01-30-from-side-project-to-kickstarter-a-walkthrough.html
28•romes•4d ago•1 comments

MenuetOS – a GUI OS that boots from a single floppy disk

https://www.menuetos.net/
108•pjerem•2d ago•17 comments

LinkedIn checks for 2953 browser extensions

https://github.com/mdp/linkedin-extension-fingerprinting
303•mdp•6h ago•144 comments

C isn't a programming language anymore (2022)

https://faultlore.com/blah/c-isnt-a-language/
28•stickynotememo•2h ago•30 comments

Claude Opus 4.6 extra usage promo

https://support.claude.com/en/articles/13613973-claude-opus-4-6-extra-usage-promo
112•rob•6h ago•33 comments

What if writing tests was a joyful experience? (2023)

https://blog.janestreet.com/the-joy-of-expect-tests/
37•ryanhn•5h ago•13 comments

Show HN: Local task classifier and dispatcher on RTX 3080

https://github.com/resilientworkflowsentinel/resilient-workflow-sentinel
8•Shubham_Amb•3h ago•0 comments

Show HN: Calfkit – an SDK to build distributed, event-driven AI agents

https://github.com/calf-ai/calfkit-sdk
4•ryanyu•3h ago•0 comments

Orchestrate teams of Claude Code sessions

https://code.claude.com/docs/en/agent-teams
311•davidbarker•9h ago•174 comments

Flock CEO calls Deflock a “terrorist organization” (2025) [video]

https://www.youtube.com/watch?v=l-kZGrDz7PU
497•cdrnsf•7h ago•335 comments

What's wrong with bunny hands on dinosaurs? (2018)

https://paleoaerie.org/2018/06/13/whats-wrong-with-bunny-hands-on-dinosaurs/
27•exvi•5d ago•12 comments

There Will Come Soft Rains (1950) [pdf]

https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf
144•wallflower•4d ago•36 comments

Housman's Introductory Lecture (1892)

https://worrydream.com/refs/Housman_1892_-_Introductory_Lecture.html
8•coloneltcb•3d ago•0 comments

OpenClaw: When AI Agents Get Full System Access. Security nightmare?

https://innfactory.ai:443/en/blog/openclaw-ai-agent-security/
50•i-blis•4d ago•27 comments

Maihem (YC W24): hiring senior robotics perception engineer (London, on-site)

https://jobs.ashbyhq.com/maihem/8da3fa8b-5544-45de-a99e-888021519758
1•mxrns•9h ago

150 MB Minimal FreeBSD Installation

https://vermaden.wordpress.com/2026/02/01/150-mb-minimal-freebsd-installation/
133•vermaden•5d ago•24 comments

Ardour 9.0

https://ardour.org/whatsnew.html
243•PaulDavisThe1st•8h ago•55 comments

PsiACE/Skills – A small, shared skill library

https://github.com/PsiACE/skills
46•recrush•8h ago•4 comments

Fela Kuti First African to Get Grammys Lifetime Achievement Award

https://www.aljazeera.com/news/2026/2/1/fela-kuti-becomes-first-african-to-get-grammys-lifetime-a...
161•defrost•4d ago•38 comments

Don't rent the cloud, own instead

https://blog.comma.ai/datacenter/
1090•Torq_boi•21h ago•455 comments
Open in hackernews

The RCE that AMD won't fix

https://mrbruh.com/amd/
52•MrBruh•3h ago

Comments

NullPrefix•1h ago
>Attacks requiring physical access to a victim's computer/device, man in the middle or compromised user accounts

I love how they grouped man in the middle there

rtpg•1h ago
This is super bad right? Like anybody who has this running will be vulnerable to a super basic HTTP redirect -> installer running on their machine attack, right? And on top of that it's for something that is likely installed on _so many_ machines, right?

I don't think I've ever seen something this exploitable that is so prevalent. Like couldn't you just sit in an airport and open up a wifi hotspot and almost immediately own anyone with ATI graphics?

jMyles•1h ago
If this is true, it seems like a much more serious vulnerability than I was expecting when I clicked the link.

And it's obviously an oversight; there is no reason to intentionally opt for http over https in this situation.

bravetraveler•1h ago
Based on the policy (and my hat) I have to assume some business partner failed to maintain the 'ca-certificates' equivalent for Windows (or NTP) and was rewarded in their insane demand for plaintext.

So easy to fix, just... why? My kingdom for an 's'. One of these policies are not like the others. Consider certificates and signatures before categorically turning a blind eye to MitM, please: you "let them in", AMD. Wow.

arjie•1h ago
Why even bother with WONTFIX? Turning on an nginx LetsEncrypt in front of it would have taken as long.
testing12_12•17m ago
Ah, NGINX, that currently contains a high-sev vulnerability, allowing MITM attacks: https://cybernews.com/security/high-severity-vulnerability-a....

Coincidence?

Terr_•1h ago
So compromising one DNS lookup is sufficient, ex:

1. Home router compromised, DHCP/DNS settings changed.

2. Report a wrong (malicious) IP for ww2.ati.com.

3. For HTTP traffic, it snoops and looks for opportunities to inject a malicious binary.

4. HTTPS traffic is passed through unchanged.

__________

If anyone still has their home-router using the default admin password, consider this a little wake-up call: Even if your new password is on a sticky-note, that's still a measurable improvement.

The risks continue, though:

* If the victim's router settings are safe, an attacker on the LAN may use DHCP spoofing to trick the target into using a different DNS server.

* The attacker can set up an alternate network they control, and trick the user into connecting, like for a real coffee shop, or even a vague "Free Wifi."

tptacek•58m ago
They're not considering it not to be a vulnerability. They're simply saying it's outside the scope of their bug bounty program.
Retr0id•53m ago
Looks like there's a serious security bug in their scope document.
tptacek•51m ago
How's that? What do you think the purpose of a bug bounty is? If you think it's "to eradicate all bugs", no, very no.
Retr0id•39m ago
I don't expect an unbounded scope but I do expect it to cover the big scary headline items like RCE. Additionally, this can be exploited without MitM if you combine with e.g. a DNS cache poisoning attack. And they can still fix it even if they're not willing to pay a bounty.
tptacek•37m ago
DNS poisoning is a MITM vector; in fact, it's the most popular MITM vector.
JJJollyjim•39m ago
This is the place they direct researchers to report bugs. If they don’t want to pay out for MITM, that’s fine, but they should still be taking out-of-scope reports seriously
bravetraveler•28m ago
+1 Bounty aside, this deserves attention. I wouldn't want to award bounties for MitM either if I made it so easy. They closed the issue as 'out of scope'... with no mention of follow-up, I'm skeptical to say the least.

Industry standard has been to ignore MitM or certificates/signatures, not everything.

bb88•55m ago
It's not directly an RCE unto itself, it requires something else. A compromised DNS on the network, e.g. So no surprise they ignored it.

Also, if AMD is getting overwhelmed with security reports (a la curl), it's also not surprising. Particularly if people are using AI to turn bug bounties into income.

Lastly if it requires a compromised DNS server, someone would probably point out a much easier way to compromise the network rather than rely upon AMD driver installer.

pixl97•7m ago
As someone that works security, the whole "A compromised DNS on the network" would be a total excuse not to pay.

The fact is allowing any type of unsigned update on HTTP is a security flaw in itself.

>someone would probably point out a much easier way to compromise the networ

No, not really. That's why every other application on the planet that does security of any kind uses either signed binaries or they use HTTPSONLY. Simply put allowing HTTP updates is insecure. The network should never be by default trusted by the user.

What's even fucking dumber on AMDs part is this is just one BGP hijacking from a worldwide security incident.

b1temy•45m ago
While I don't like that the executable's update URL is using just plain HTTP, AMD does explicitly state that in their program that attacks requiring man-in-the-middle or physical access is out-of-scope.

Whether you agree with whether this rule should be out-of-scope or not is a separate issue.

What I'm more curious about is the presence of both a Development and Production URL for their XML files, and their use of a Development URL in production. While like the author said, even though the URL is using TLS/SSL so it's "safe", I would be curious to know if the executable URLs are the same in both XML files, and if not, I would perform binary diffing between those two executables.

I imagine there might be some interesting differential there that might lead to a bug bounty. For example, maybe some developer debug tooling that is only present only in the development version but is not safe to use for production and could lead to exploitation, and since they seemed to use the Development URL in production for some reason...

pixl97•3m ago
> is a separate issue.

No, just no. This is not a separate issue. It is 100% the issue.

Lets say I'm a nation state attacker with resources. I write up my exploit and then do a BGP hijack of whatever IPs the driver host resolves to.

There you go, I compromised possibly millions of hosts all at once. You think anyone cares that this wasn't AMDs issue at this point?

TacticalCoder•31m ago
> This means that a malicious attacker on your network, or a nation state that has access to your ISP can easily perform a MITM attack and replace the network response with any malicious executable of their choosing.

    http://www2.ati.com/...
I'm blocking port 80 since forever so there's that.

But now ati.com is going straight into my unbound DNS server's blocklist.

nalekberov•26m ago
> This means that a malicious attacker on your network, or a nation state that has access to your ISP can easily perform a MITM attack and replace the network response with any malicious executable of their choosing.

I am pretty sure, a nation state wanting to hack an individual's system has way more effective tools at their disposal.

yunnpp•6m ago
Presumably, all Windows installations running on AMD are auto-executing this auto-update program.
pixl97•3m ago
I guess one should keep their eyes out on the next big BGP hijack.
digiown•21m ago
One good thing we can say about Linux bundling all the drivers is that it obviates the need to run almost all of this type of low quality (if not outright spyware) driver management software. They are especially problematic because they can't be sandboxed easily like most other proprietary crap.

For whatever reason, distro maintainers working for free seem a lot more competent with security than billion dollar hardware vendors