frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

iPhone 17 Pro Demonstrated Running a 400B LLM

https://twitter.com/anemll/status/2035901335984611412
183•anemll•3h ago•106 comments

Trivy under attack again: Widespread GitHub Actions tag compromise secrets

https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise
13•jicea•1d ago•5 comments

Cyber.mil serving file downloads using TLS certificate which expired 3 days ago

https://www.cyber.mil/stigs/downloads
75•Eduard•2h ago•75 comments

Is it a pint?

https://isitapint.com/
79•cainxinth•1h ago•78 comments

Bombadil: Property-based testing for web UIs

https://github.com/antithesishq/bombadil
165•Klaster_1•4d ago•64 comments

Show HN: Threadprocs – executables sharing one address space (0-copy pointers)

https://github.com/jer-irl/threadprocs
24•jer-irl•1h ago•19 comments

If DSPy is so great, why isn't anyone using it?

https://skylarbpayne.com/posts/dspy-engineering-patterns/
137•sbpayne•2h ago•80 comments

An unsolicited guide to being a researcher [pdf]

https://emerge-lab.github.io/papers/an-unsolicited-guide-to-good-research.pdf
96•sebg•4d ago•13 comments

Side-Effectful Expressions in C (2023)

https://blog.xoria.org/expr-stmt-c/
11•surprisetalk•5d ago•0 comments

Migrating to the EU

https://rz01.org/eu-migration/
647•exitnode•7h ago•525 comments

I built an AI receptionist for a mechanic shop

https://www.itsthatlady.dev/blog/building-an-ai-receptionist-for-my-brother/
64•mooreds•7h ago•83 comments

PC Gamer recommends RSS readers in a 37mb article that just keeps downloading

https://stuartbreckenridge.net/2026-03-19-pc-gamer-recommends-rss-readers-in-a-37mb-article/
764•JumpCrisscross•23h ago•351 comments

POSSE – Publish on your Own Site, Syndicate Elsewhere

https://indieweb.org/POSSE
352•tosh•9h ago•76 comments

GitHub appears to be struggling with measly three nines availability

https://www.theregister.com/2026/02/10/github_outages/
332•richtr•6h ago•176 comments

Two pilots dead after plane and ground vehicle collide at LaGuardia

https://www.bbc.com/news/articles/cy01g522ww4o
92•mememememememo•10h ago•145 comments

Walmart: ChatGPT checkout converted 3x worse than website

https://searchengineland.com/walmart-chatgpt-checkout-converted-worse-472071
281•speckx•3d ago•197 comments

BIO: The Bao I/O Coprocessor

https://www.bunniestudios.com/blog/2026/bio-the-bao-i-o-coprocessor/
7•zdw•2d ago•0 comments

The gold standard of optimization: A look under the hood of RollerCoaster Tycoon

https://larstofus.com/2026/03/22/the-gold-standard-of-optimization-a-look-under-the-hood-of-rolle...
512•mariuz•22h ago•140 comments

Tin Can, a 'landline' for kids

https://www.businessinsider.com/tin-can-landline-kids-cellphone-cell-alternative-how-2025-9
268•tejohnso•3d ago•214 comments

General Motors is assisting with the restoration of a rare EV1

https://evinfo.net/2026/03/general-motors-is-assisting-with-the-restoration-of-an-1996-ev1/
59•betacollector64•2d ago•65 comments

Reports of code's death are greatly exaggerated

https://stevekrouse.com/precision
527•stevekrouse•1d ago•387 comments

The future of version control

https://bramcohen.com/p/manyana
617•c17r•1d ago•346 comments

“Collaboration” is bullshit

https://www.joanwestenberg.com/collaboration-is-bullshit/
148•mitchbob•15h ago•67 comments

Cyberattack on vehicle breathalyzer company leaves drivers stranded in the US

https://techcrunch.com/2026/03/20/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stra...
85•speckx•4h ago•100 comments

Can you get root with only a cigarette lighter? (2024)

https://www.da.vidbuchanan.co.uk/blog/dram-emfi.html
146•HeliumHydride•3d ago•30 comments

Study: 'Security Fatigue' May Weaken Digital Defenses

https://www.albany.edu/news-center/news/2026-study-security-fatigue-may-weaken-digital-defenses
67•giuliomagnifico•2h ago•40 comments

Nanopositioning Metrology, Gödel, and Bootstraps

https://www.pi-usa.us/en/tech-blog/nanopositioning-metrology-goedel-and-bootstraps
13•nill0•4d ago•2 comments

Why I love NixOS

https://www.birkey.co/2026-03-22-why-i-love-nixos.html
404•birkey•1d ago•274 comments

GoGoGrandparent (YC S16) is hiring Back end Engineers

https://www.ycombinator.com/companies/gogograndparent/jobs/2vbzAw8-backend-engineer
1•davidchl•13h ago

Project Nomad – Knowledge That Never Goes Offline

https://www.projectnomad.us
548•jensgk•1d ago•203 comments
Open in hackernews

Cyber.mil serving file downloads using TLS certificate which expired 3 days ago

https://www.cyber.mil/stigs/downloads
74•Eduard•2h ago

Comments

dmitrygr•1h ago
So what? They keep shortening the validity length of these certificates, making them more and more of a pain to deal with.
hhh•1h ago
because you need to automate it
dmitrygr•1h ago
Which is yet another chore. And it doesn’t add any security. A certificate expired yesterday proves I am who I am just as much as it did yesterday. As long as the validity length is shorter than how long it would take somebody to work out the private key from the public key, it is fine.
bombcar•1h ago
Shortening certificate periods is just their way of admitting that certification revocation lists are absolutely worthless.
nathanaldensr•1h ago
Right. It's the same debate about how long authorization cookies or tokens should last. At one point in time--only one--authentication was performed in a provable enough manner that the certificate was issued. After that--it could be seconds, hours, days, years, or never--that assumption could become invalid.
nightpool•1h ago
No, they're not useless at all. The point of shortening certificate periods is that companies complain when they have to put customers on revocation lists, because their customers need ~2 years to update a certificate. If CRLs were useless, nobody would complain about being put on them. If you follow the revocation tickets in ca-compliance bugzilla, this is the norm—not the exception. Nobody wants to revoke certificates because it will break all of their customers. Shortening the validity period means that CAs and users are more prepared for revocation events.
pas•22m ago
... what are the revocation tickets about then? how is it even a question whether to put a cert on the CRL? either the customer wants to or the key has been compromised? (in which case the customer should also want to have it revoked ASAP, no?)

can you elaborate on this a bit? thank you!

dpoloncsak•1h ago
Isn't that why certificates expire, and the expiry window is getting shorter and shorter? To keep up with the length of time it takes someone to crack a private key?
dmitrygr•1h ago
No. The sister comment gave the correct answer. It is because nobody checks revocation lists. I promise you there’s nobody out there who can factor a private key out of your certificate in 10, 40, 1000, or even 10,000 days.
dpoloncsak•1h ago
I thought I remembered someone breaking one recently, but (unless I've found a different recent arxiv page) seems like it was done using keys that share a common prime factor. Oops!

Fwiw: https://arxiv.org/abs/2512.22720

shagie•1h ago
It's also a "how much exposure do people have if the private key is compromised?"

Yes, its to make it so that a dedicated effort to break the key has it rotated before someone can impersonate it... its also a question of how big is the historical data window that an attacker has i̶f̶ when someone cracks the key?

danesparza•1h ago
An expired cert is a smell. It shows somebody isn't paying attention.

And a short expiration time absolutely increases security by reducing attack surface.

ajsnigrutin•1h ago
Or that someone asked to renewed it, one of their four bosses didn't sign off the apropriate form, the only person to take that form to whoever does the certs is on a vacation, person issuing certs needs all four of his bosses to sign it off, and one of those bosses has been DOGE-ed and not yet replaced.

expired letsencrypt cert on a raspberrypi at home smells of not paying attention... with governments, there are many, many points of failure.

hananova•6m ago
The whole point of these shorter certificate durations is to force companies to put in automation that doesn't require 14 layers of paperwork. Some companies will be stubborn, and will thus be locked in an eternal cycle of renew->get paperwork started for renew. Most will adapt.
dmitrygr•1h ago
It did until it got so short that it created a new potential attack surface — the scripts everyone is using to auto update them.
organsnyder•1h ago
Compared to the manual processes these scripts replaced, I'd put more trust in the automations.
dmitrygr•1h ago
And the original article shows you how that is going
allthetime•1h ago
"yet another chore"

use cloudflare, never think about it.

or

use certbot, never think about it.

dmitrygr•1h ago
I am curious how long the approval process in some large corp or the military would be for either of those options...

Hand over our private keys to a third party or run this binary written by some volunteers in some basements who will not sign a support contract with us...

allthetime•36m ago
In this case some manual work may need to be done.
hananova•4m ago
Well they can either automate it, or soon spend literally every waking moment in a cycle of paperwork to chase the next renewal.

The whole point was to force automation, and if corps want to be stubborn that's no skin of my back, the shorter durations are coming regardless.

fidotron•1h ago
On the one side all the users will need to prove their ID to access websites, and on the website side the site will have to ask permission to continue operating at ever increasing frequency.

That is the future we have walked into.

gslepak•1h ago
Using old compromised certificates is a legitimate MITM attack vector.
dmitrygr•1h ago
Which would make sense if they were valid for 10 years and somebody forgot about them. Not when they’re valid for, what is it now, 40 days?
smashed•1h ago
An official government source is teaching users to ignore security warnings about expired certificates.

Mistakes happen, some automation failed and the certs did not renew on time, whatever. Does not inspire confidence but we all know it happens.

But then to just instruct users to click through the warning is very poor judgement on top of poor execution.

dmitrygr•1h ago
This was the predictable outcome of shortening certificate length validity to appoint where they are now.
lynndotpy•1h ago
No, because that's not what happened here.

The certificate they failed to renew was issued 2025-Mar-20th, and expired 2026-Mar-20th. That is a 365 day cert.

The maximum length for a new cert is now 200 days, with the 47 day window coming in three years: https://www.digicert.com/blog/tls-certificate-lifetimes-will...

lynndotpy•1h ago
The certificate they failed to renew was valid for 365 days. You can check this in any modern desktop browser.
k33n•1h ago
DNSSEC+DANE will fix it. Soon we will have self-signed certificates once again!
icedchai•1h ago
I can't wait. Now I can screw up DNSSEC and take out my entire domain in the process.
SAI_Peregrinus•1h ago
And in turn making revocation less & less of a pain. Since that was more of the pain, overall it's getting easier.
lynndotpy•1h ago
Not applicable in this case. This was a certificate issued March 20th 2025 and which expired March 20th 2026. Also concerning are the instructions written in broken English instructing visitors to ignore all SSL warnings.
tuwtuwtuwtuw•1h ago
> Users on civilian network can continue downloads through the Advance tab in the error message.

Good stuff.

DANmode•1h ago
“Do you want it or not?”

…or were you referring to the piss-poor English used? ^_^

whalesalad•1h ago
"We have sent you a OTP code of 459-312 please check your device and enter this code below"
petcat•1h ago
Is there anything inherently insecure about an expired cert other than your browser just complaining about it?
Spooky23•1h ago
It's a pretty dopey thing to miss.
Manfred•1h ago
To prevent abuse, for example to prevent an old owner of domain to have a valid certificate for the domain indefinitely after transfer.
m348e912•1h ago
Not inherently, but it can introduce risk. Such as a bad actor using an old expired certificate it was able to acquire to play man-in-the-middle. But if that is happening you have bigger problems.
mr_mitm•1h ago
No, but it reflects poorly on the maintainer. Plus, any browser complaint contributes to error fatigue. Users shouldn't just ignore these, and we shouldn't encourage them to ignore them just because we fail at securing our websites.
zeroxfe•1h ago
Expiries are a defence-in-depth that exist primarily for crypt hygiene, for example to protect from compromised keys. If the private key material is well protected, the risk is very low.

However, an org (particularaly a .mil) not renewing its TLS certs screams of extreme incompetence (which is exactly what expiries are meant to protect you from.)

jp191919•1h ago
>screams of extreme incompetence

Not unheard of with the military

cozzyd•31m ago
Precision lethality, not certificate renewality.
sciencejerk•1h ago
Yes. Visitors to the site are vulnerable to Man in the Middle (MitM) attacks, IF they click past the warning (which many people do)
belter•1h ago
An expired certificate alone doesn't enable a MITM attack.
LadyCailin•1h ago
That’s not true. The encryption still works as well as it did 3 days ago, and doesn’t care if the certificate is expired.
russell_h•1h ago
I think the argument would go that if people are clicking through certificate errors and you're in a position to MITM their traffic, you can just serve them a different certificate and they'll click through the error without noticing or understanding the specifics.
sciencejerk•21m ago
Fair point, but I think the situation is a bit more complicated when a user "needs the site for work", or something urgent. You might have smart cautious users that feel like they have no choice but to proceed and click through the warnings since the site is most likely still legitimate
eli•9m ago
IMHO host mismatch is more serious than expired cert and browsers should treat it as such
austin-cheney•9m ago
That could happen either way regardless of expiry. The only reason for an expiration date is to force site owners to cycle their certs at regular intervals to defeat the long time it takes to brute force a successful forgery.
f_devd•1h ago
I think they mean that a non-observant visitor cannot tell the difference between both situations
LeifCarrotson•1h ago
It's true that the expiration doesn't mean the encryption no longer works, but if the user is under a MITM attack and is presented by their browser with a warning that the certificate is invalid, then the encryption will still work but the encrypted communication will be happening with the wrong party.

I don't trust the average user to inspect the certificate and understand the reason for the browser's rejection.

umanwizard•24m ago
Okay, but that’s not what was being asked. OP, someone who presumably understands the difference between a totally invalid cert and an expired one, was asking specifically whether clicking through the latter is dangerous.
axus•14m ago
"Visitors to the site are vulnerable to Man in the Middle (MitM) attacks, IF they click past the warning". I think it's true when there is a man in the middle.
wang_li•5m ago
It's entirely the second paragraph and not part of certificate expiration, in and of itself, lends to being MITM. Firefox tells me what the problem is, expired, wrong name, etc. So, it's not just saying "oh no, something is wrong." I can tell what is wrong before I choose to proceed.
hamdingers•22m ago
This is an infohazard. True information that can cause harm or enable some agent to cause harm.

Telling people not to worry about expired cert warnings makes them vulnerable to a variety of attacks.

ddtaylor•1h ago
MITM
gpvos•1h ago
No.
PilotJeff•1h ago
Can you live without your immune system? Sure, for a little while. It’s the defense against man in the middle and many other things.
noirscape•1h ago
Inherently, not really. An expired, self-signed or even incorrect (as in, the wrong domain is listed) certificate can be used to secure a connection just as well as a perfectly valid certificate.

Rather, the purpose of all of these systems (in theory) is to verify that the certificate belongs to the correct entity, and not some third party that happens to impersonate the original. It's not just security, but also verification: how do I know that the server that responds to example.com controls the domain name example.com (and that someone else isn't just responding to it because they hijacked my DNS.)

The expiration date mainly exists to protect against 2 kinds of attacks: the first is that, if it didn't exist, if you somehow obtained a valid certificate for example.com, it'd just be valid forever. All I'd need to do is get a certificate for example.com at some point, sell the domain to another party and then I'd be able to impersonate the party that owns example.com forever. An expiration date limits the scope of that attack to however long the issued certificate was valid for (since I wouldn't be able to re-verify the certificate.)

The second is to reduce the value of a leaked certificate. If you assume that any certificate issued will leak at some point, regardless of how it's secured (because you don't know how it's stored), then the best thing you can do is make it so that the certificate has a limited lifespan. It's not a problem if a certificate from say, a month ago, leaks if the lifespan of the certificate was only 3 days.

Those are the on paper reasons to distrust expired certificates, but in practice the discussion is a bit more nuanced in ways you can't cleanly express in technical terms. In the case of a .mil domain (where the ways it can resolve are inherently limited because the entire TLD is owned by a single entity - the US military), it's mostly just really lazy and unprofessional. The US military has a budget of "yes"; they should be able to keep enough tech support around to renew their certificates both on time and to ensure that all their devices can handle cert rotations.

Similarly, within a network you fully control, the issues with a broken certificate setup mostly just come down to really annoying warnings rather than any actual insecurity; it's hard to argue that the device is being impersonated when it's literally sitting right across from you and you see the lights on it blink when you connect to it.

Most of the issues with bad certificate handling come into play only when you're dealing with an insecure network, where there's a ton of different parties that could plausibly resolve your request... like most of the internet. (The exception being specialty domains like .gov/.mil and other such TLDs that are owned by singular entities and as a result have secondary, non-certificate ways in which you can check if the right entity owns them, such as checking which entity the responding IP belongs to, since the US government literally owns IP ranges.)

dathinab•1h ago
the idea behind expiration is:

- TLS certificates do leak, not just due to worst case bugs like heart blead

- revocation does not work well in practice

- affected operators aren't always aware if a certificate leaked

so by having expiration (and in recent years increasingly short validity duration) you reduce how the consequences of an leak, potentially to nothing if the attacker only gets their hand on the cert after it expired

this also has the unintended consequence that a long time expired certificate leaking isn't seen as a security issues, nor will you revoke it (it's already invalid).

But if you visit site with expired certificates you have the problem that you only know it had been valid in the past. You don't know if it was leaked after it became invalid or similar. I.e. you can't reasonable differentiate anymore between "forgotten to renew" and MITM attack. At which point it worth pointing out that MITM attacks aren't just about reading secrets you send, but can also inject malicious JS. And browser sandbox vulnerabilities might be rare but do exist.

A more extremem case of this dynamics are OIDC/OAuth access tokens. Which are far more prone to leak then certs, but in turn are only valid for a short time (max 5min) and due to that normally don't have a revocation system. (Thinks are different for the refresh token you use to get the access token, but the refresh token also is only ever send to the auth server which makes handling that way easier.)

lynndotpy•1h ago
I'm not actually sure if browsers validate expired certificates. I couldn't find out if an invalid cert authority and an invalid date would look different than just the error for an invalid date. Educated guess says so, but that's just a guess.

The biggest concern is you'd hope the DoD (/DoW) is on top of their stuff, especially the DISA. This is a sign they are not. This is something that should never happen.

But then, there's this message:

> DoD Cyber Exchange site is undergoing a TSSL Certification renewal resulting in download issues for some users. Users on civilian network can continue downloads through the Advance tab in the error message.

Uh oh!!! This is concerning because (1) "Ignore SSL errors" is something you should never be telling users to do and (2) this is extra concerning because whoever wrote this does not seem to have a grasp on the English language:

- "TSSL Certification renewal" should be TLS/SSL Certificate renewal. (Caveat: Defense is full of arcane internal acronyms and TSSL could just be one of them.)

- "Users on civilian network" should be "Users on civilian networks", or "Users on a civilian network".

- "Advance tab" should be "Advance button".

So, we have three glaring red flags. Expired certs, telling users to ignore cert warnings, and various spelling and grammar mistakes.

People are citing the short 40-day certificate renewal window, but that's not the problem here. It's not a case of administration transition either. This cert was issued 2025-Mar-20 and was valid for 1 year. But IdenTrust DoD certs can't be renewed after they expire, so that might be why this is so broken.

In the most generous interpretation, the once-responsible party was cut with the huge DOGE cuts back in May 2025, and this failure of web administration is just one visible sign of the internal disarray you'd expect with losing 10% of your workforce.

jl6•38m ago
“It’s an older code but it checks out.”
jcranmer•25m ago
Certificate revocations are not required to be reported after the expiration date, so you can no longer reliably check if a certificate has been revoked (e.g., because its underlying key was exfiltrated or because it was misissued).
bawolff•6m ago
Its more or less the same as using expired in person documents.

Instrinsically no, but at the same time its generally easier to source an expired identity document. If its long expired the verification standards might be different. People dont really put as much effort into destroying or revoking expired documents. The info might no longer be accurate.

The only addition in the computer context is it trains users to blindly click through warnings. If this becomes a pattern they will eventually not realize it if the error becomes something more serious.

bilekas•1h ago
> DoD Cyber Exchange site is undergoing a TSSL Certification renewal

TSSL renewal does not cause downtime.. If it's actually done of course.

amluto•1h ago
This is kind of amazing. I'm suspicious that the site operator has absolutely no idea what they're doing.

> DoD Cyber Exchange site is undergoing a TSSL Certification renewal

I'm imagining someone searching around for a consulting or testing company that will help them get a personal TSSL Certification, whatever that is (a quick search suggests that it does not exist, as one would expect). And perhaps they have no idea what TLS is or how any modern WebPKI works, which is extra amazing, since cyber.mil is apparently a government PKI provider (see the top bar).

Of course, the DoD realized that their whole web certificate system was incompatible with ordinary browsers and they wrote a memo (which you have to click past the certificate error to read):

https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/pdf/uncl...

saying that, through February 2024, unclassified DoD sites are permitted to use ordinary commercial CAs.

If the DoD were remotely competent at this sort of thing, they would (a) have CAA records (because their written policy does nothing whatsoever to tell the CA/B-compliant CAs of the world not to issue .mil certificates, (b) run their own intermediate CA that had a signature from a root CA (or was even a root CA itself), and (c) use automatically-renewed short-lived certificates for the actual websites.

cyber.mil currently uses IdenTrust, which claims to be DoD approved. They also, ahem, claim to support ACME:

> In support of the broader CA community, IdenTrust—through HID and the acquisition of ZeroSSL—actively contributes to the development and maintenance of major open-source ACME clients, including Caddy Server and ACME.sh. These efforts help promote accessibility, interoperability, and automation in certificate management.

Err... does that mean that they actually support ACME on their DoD-approved certificates or does that mean that they bought some companies that participate in the ACME ecosystem? (ACME is not amazing except in contrast to what came before and as an exercise in getting something reasonable deployed in a very stodgy ecosystem, but ACME plus a well-designed DNS-01 implementation plus CAA can be very secure.)

The offending certificate is:

    Certificate:
        Data:
            Version: 3 (0x2)
            Serial Number:
                40:01:95:b4:87:b3:a3:a9:12:e0:d7:21:f8:b3:91:61
            Signature Algorithm: sha256WithRSAEncryption
            Issuer: C=US, O=IdenTrust, OU=TrustID Server, CN=TrustID Server CA O1
            Validity
                Not Before: Mar 20 17:09:07 2025 GMT
                Not After : Mar 20 17:08:07 2026 GMT
            Subject: C=US, ST=Maryland, L=Fort Meade, O=DEFENSE INFORMATION SYSTEMS AGENCY, CN=public.cyber.mil
At least the site uses TLS 1.3.
BigTTYGothGF•24m ago
> If the DoD were remotely competent at this sort of thing

That's probably one of the things they were forced to contract out.

charcircuit•7m ago
I think you underestimate the number of people who accidentally have their https carts expire. Instead of blaming the people running these systems on why they let it expires, it would be more productive to improve the system to make this less likely to happen.
jeroenhd•12m ago
For some reason the warning icon is huge on my phone.

Someone please verify that the exclamation point inside of the warning icon has always been gold and that this website's design hasn't fallen victim to Trump's dragon-like gold hoarding obsession.

stephbook•9m ago
iOS Safari. I see a yellow banner, the navigation bar and the rest of the screen is just a warning sign image.

Is there more..?

Checked on Chrome too, I see nothing.

iOS Chrome

johnisgood•5m ago
What do you mean? You see nothing on the website?

I captured the full page, you can view it here: https://wormhole.app/MbljK6#qfysvKJOQh1whLcMz9JXxw