frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Vouch

https://github.com/mitchellh/vouch
146•dboon•1h ago•28 comments

I put a real-time 3D shader on the Game Boy Color

https://blog.otterstack.com/posts/202512-gbshader/
82•adunk•2h ago•5 comments

Roundcube Webmail: SVG feImage bypasses image blocking to track email opens

https://nullcathedral.com/posts/2026-02-08-roundcube-svg-feimage-remote-image-bypass/
10•nullcathedral•17m ago•0 comments

Running Your Own As: BGP on FreeBSD with FRR, GRE Tunnels, and Policy Routing

https://blog.hofstede.it/running-your-own-as-bgp-on-freebsd-with-frr-gre-tunnels-and-policy-routing/
78•todsacerdoti•4h ago•23 comments

The Little Bool of Doom

https://blog.svgames.pl/article/the-little-bool-of-doom
8•pocksuppet•38m ago•0 comments

RFC 3092 – Etymology of "Foo" (2001)

https://datatracker.ietf.org/doc/html/rfc3092
78•ipnon•4h ago•14 comments

Billing can be bypassed using a combo of subagents with an agent definition

https://github.com/microsoft/vscode/issues/292452
107•napolux•1h ago•50 comments

Omega-3 is inversely related to risk of early-onset dementia

https://pubmed.ncbi.nlm.nih.gov/41506004/
92•brandonb•1h ago•42 comments

Bun v1.3.9

https://bun.com/blog/bun-v1.3.9
34•tosh•1h ago•11 comments

Exploiting signed bootloaders to circumvent UEFI Secure Boot

https://habr.com/en/articles/446238/
36•todsacerdoti•4h ago•6 comments

The First Sodium-Ion Battery EV Is a Winter Range Monster

https://insideevs.com/news/786509/catl-changan-worlds-first-sodium-ion-battery-ev/
45•andrewjneumann•1h ago•12 comments

GitHub Agentic Workflows

https://github.github.io/gh-aw/
100•mooreds•5h ago•58 comments

Show HN: I created a Mars colony RPG based on Kim Stanley Robinson's Mars books

https://underhillgame.com/
13•ariaalam•1h ago•2 comments

Formally Verifying PBS Kids with Lean4

https://www.shadaj.me/writing/cyberchase-lean
17•shadaj•6d ago•0 comments

Curating a Show on My Ineffable Mother, Ursula K. Le Guin

https://hyperallergic.com/curating-a-show-on-my-ineffable-mother-ursula-k-le-guin/
105•bryanrasmussen•8h ago•34 comments

Let's compile Quake like it's 1997

https://fabiensanglard.net/compile_like_1997/index.html
35•birdculture•1h ago•11 comments

Why E cores make Apple silicon fast

https://eclecticlight.co/2026/02/08/last-week-on-my-mac-why-e-cores-make-apple-silicon-fast/
164•ingve•7h ago•175 comments

Kolakoski Sequence

https://en.wikipedia.org/wiki/Kolakoski_sequence
36•surprisetalk•6d ago•10 comments

Show HN: It took 4 years to sell my startup. I wrote a book about it

https://derekyan.com/ma-book/
126•zhyan7109•4d ago•22 comments

OpenClaw is changing my life

https://reorx.com/blog/openclaw-is-changing-my-life/
114•novoreorx•12h ago•204 comments

Reverse Engineering Raiders of the Lost Ark for the Atari 2600

https://github.com/joshuanwalker/Raiders2600
64•pacod•9h ago•2 comments

Matchlock – Secures AI agent workloads with a Linux-based sandbox

https://github.com/jingkaihe/matchlock
114•jingkai_he•10h ago•46 comments

Dave Farber has died

https://lists.nanog.org/archives/list/nanog@lists.nanog.org/thread/TSNPJVFH4DKLINIKSMRIIVNHDG5XKJCM/
142•vitplister•7h ago•20 comments

Slop Terrifies Me

https://ezhik.jp/ai-slop-terrifies-me/
237•Ezhik•8h ago•224 comments

Show HN: LocalGPT – A local-first AI assistant in Rust with persistent memory

https://github.com/localgpt-app/localgpt
295•yi_wang•17h ago•141 comments

Beyond agentic coding

https://haskellforall.com/2026/02/beyond-agentic-coding
216•RebelPotato•16h ago•81 comments

DoNotNotify is now Open Source

https://donotnotify.com/opensource.html
334•awaaz•11h ago•47 comments

Rabbit Ear "Origami": programmable origami in the browser

https://rabbitear.org/book/origami.html
99•molszanski•4d ago•4 comments

Stop Using Face ID

https://www.pcmag.com/explainers/why-you-should-stop-using-face-id-right-now?test_uuid=04IpBmWGZl...
20•speckx•1h ago•2 comments

We mourn our craft

https://nolanlawson.com/2026/02/07/we-mourn-our-craft/
591•ColinWright•1d ago•703 comments
Open in hackernews

Exploiting signed bootloaders to circumvent UEFI Secure Boot

https://habr.com/en/articles/446238/
36•todsacerdoti•4h ago

Comments

ronsor•40m ago
(2019)

The biggest weakness of secure boot was always third-party vendors shipping "insecure" bootloaders. It's a lot of work to verify signatures for every bit of data that gets loaded, especially on the PC platform.

Bratmon•30m ago
It's really funny to me that Microsoft's attempt to finally stamp out desktop Linux once and for all failed because one of Microsoft's antivirus vendor partners couldn't write secure software to save their lives.

The continued Linux desktop solely relies on antivirus vendors writing crappy insecure software. So we'll be fine forever.

bri3d•16m ago
> It's really funny to me that Microsoft's attempt to finally stamp out desktop Linux once and for all failed

This conspiracy was never true and never happened. First off, note that the first version of the thing in the article you’re commenting on relied on a Fedora shim loader which Microsoft signed. Second off, note that almost all modern motherboards let you enroll your own UEFI keys and do not rely on exclusively the Microsoft keys.

The only place this is was becoming an issue for Linux was early Secure Boot implementations where the vendor was too lazy to allow key enrollment, and that era has generally passed.

invokestatic•15m ago
No, this is not true at all. Microsoft requires their system vendors (Dell, HP, etc) to allow users to enroll their own Secure Boot keys through their “Designed for Windows” certification.

Further, many distributions are already compatible with Secure Boot and work out of the box. Whether or not giving Microsoft the UEFI root of trust was a good idea is questionable, but what they DO have is a long, established history of supporting Linux secure boot. They sign a UEFI shim that allows distributions to sign their kernels with their own, distribution-controlled keys in a way that just works on 99% of PCs.

bri3d•20m ago
> Most motherboards include only Microsoft keys as trusted

Is this really true, in 2019 when this was written or today? I haven’t seen a motherboard that didn’t let me enroll my own keys in a really long time. Laptops are a different story but even there, it’s been awhile.

> Microsoft forbid to sign software licensed under GPLv3 because of tivoization restriction license rule

Ah yes, GPLv3 is now Microsoft’s fault?

mjevans•17s ago
Empowering the 'User' (hardware owner) should have always been the focus.

From that mindset what makes sense are hardware vendors including a cache of trusted third party root certificates from known other vendors. Today this would include Microsoft, the same said hardware vendor, probably various respected Linux organizations/groups (Offhand, Linux Foundation, ArchLinux, Debian, IBM/RedHat, Oracle, SUSE, etc), similar for BSD...

Crucially the end user should then be ASKED which to enable. None should be enrolled out of the box. They might also be enabled only for specific things. E.G. HW vendor could be enabled only for new system firmware signatures (load using the existing software) rather than generic UEFI boot targets. The user should also be able to enroll their own CA certs as well; multiple of them. Useful for Organization, Division Unit, and system local signatures.

It would also, really, be nice if UEFI mandated a uniform access API (maybe it does) for local blobs stored in non mass-storage space. This would be a great place to stash things like UEFI drivers for accessing additional types of hardware drivers, OS boot bits + small related files, etc. I would have said 1GB of storage would be more than sufficient for this - however Microsoft has proven that assumption incorrect. Still it'd be nice to have a standard place and a feature that says the system ships with this much reliable secondary storage included (or maybe 1-2 micro-SD card slots, etc).