frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Slovenian officials catch Israeli firm Black Cube trying to manipulate vote

https://www.wsj.com/world/europe/spies-lies-and-fake-investors-in-disguise-how-plotters-tried-to-...
261•cramsession•1h ago•73 comments

My Astrophotography in the Movie Project Hail Mary

https://rpastro.square.site/s/stories/phm
349•wallflower•3d ago•110 comments

Local LLM App by Ente

https://ente.com/blog/ensu/
243•matthiaswh•4h ago•108 comments

Thoughts on Slowing the Fuck Down

https://mariozechner.at/posts/2026-03-25-thoughts-on-slowing-the-fuck-down/
139•jdkoeck•3h ago•95 comments

Jury says Meta knowingly harmed children for profit, awarding landmark verdict

https://www.latimes.com/business/story/2026-03-25/jury-says-meta-knowingly-harmed-children-for-pr...
72•1vuio0pswjnm7•1h ago•5 comments

Sony V. Cox Decision Reversed

https://supreme.justia.com/cases/federal/us/607/24-171/
47•rileymichael•1h ago•30 comments

Antimatter has been transported for the first time

https://www.nature.com/articles/d41586-026-00950-w
148•leephillips•2h ago•65 comments

TurboQuant: Redefining AI efficiency with extreme compression

https://research.google/blog/turboquant-redefining-ai-efficiency-with-extreme-compression/
387•ray__•12h ago•113 comments

Quantization from the Ground Up

https://ngrok.com/blog/quantization
28•samwho•1h ago•6 comments

Goodbye to Sora

https://twitter.com/soraofficialapp/status/2036532795984715896
973•mikeocool•21h ago•729 comments

Show HN: I built a site that maps the web from a bounty hunter's perspective

https://www.neobotnet.com/
14•caffeinedoom•1d ago•0 comments

VitruvianOS – Desktop Linux Inspired by the BeOS

https://v-os.dev
273•felixding•14h ago•176 comments

Looking at Unity made me understand the point of C++ coroutines

https://mropert.github.io/2026/03/20/unity_cpp_coroutines/
111•ingve•3d ago•94 comments

Building a coding agent in Swift from scratch

https://github.com/ivan-magda/swift-claude-code
43•vanyaland•6h ago•12 comments

Flighty Airports

https://flighty.com/airports
461•skogstokig•17h ago•162 comments

Musketeer d'Artagnan's remains believed found under Dutch church

https://www.bbc.co.uk/news/articles/cm2rew2dgzzo
35•xenocratus•1h ago•6 comments

Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised

https://github.com/BerriAI/litellm/issues/24512
857•dot_treo•1d ago•462 comments

Show HN: I took back Video.js after 16 years and we rewrote it to be 88% smaller

https://videojs.org/blog/videojs-v10-beta-hello-world-again
555•Heff•23h ago•114 comments

Miscellanea: The War in Iran

https://acoup.blog/2026/03/25/miscellanea-the-war-in-iran/
194•decimalenough•13h ago•250 comments

Data centers are transitioning from AC to DC

https://spectrum.ieee.org/data-center-dc
232•jnord•16h ago•289 comments

VNDB founder Yorhel has died

https://vndb.org/t24787
141•indrora•3d ago•24 comments

Apple Business

https://www.apple.com/newsroom/2026/03/introducing-apple-business-a-new-all-in-one-platform-for-b...
697•soheilpro•1d ago•391 comments

I wanted to build vertical SaaS for pest control, so I took a technician job

https://www.onhand.pro/p/i-wanted-to-build-vertical-saas-for-pest-control-i-took-a-technician-job...
388•tezclarke•20h ago•164 comments

Hubble Snaps a New Dazzling Photo of the Crab Nebula

https://nautil.us/hubble-snaps-a-new-dazzling-photo-of-the-crab-nebula-1279203
31•Brajeshwar•2h ago•4 comments

Supreme Court Sides with Cox in Copyright Fight over Pirated Music

https://www.nytimes.com/2026/03/25/us/politics/supreme-court-cox-music-copyright.html
122•oj2828•2h ago•73 comments

Microbenchmarking Chipsets for Giggles

https://chipsandcheese.com/p/microbenchmarking-chipsets-for-giggles
40•zdw•2d ago•2 comments

Arm AGI CPU

https://newsroom.arm.com/blog/introducing-arm-agi-cpu
391•RealityVoid•1d ago•288 comments

Why I forked httpx

https://tildeweb.nl/~michiel/httpxyz.html
213•roywashere•9h ago•153 comments

The Last Testaments of Richard II and Henry IV

https://www.historytoday.com/archive/feature/last-testaments-richard-ii-and-henry-iv
68•Petiver•3d ago•13 comments

A Eulogy for Vim

https://drewdevault.com/2026/03/25/2026-03-25-Forking-vim.html
83•mtts•1h ago•62 comments
Open in hackernews

Ubuntu wants to strip some of GRUB features in 26.10 for security purposes

https://discourse.ubuntu.com/t/streamlining-secure-boot-for-26-10/79069
28•dryarzeg•2h ago

Comments

gorgoiler•1h ago
Regarding dropping support for a LUKS encrypted /boot, one of the comments chimes in with “[but] full disk encryption is mandatory in many environments in Europe for security conformity”.

Surely some user editable data has to be stored in plaintext to be able to boot a system? Does grub.cfg need to be signed by the trust chain to be able to boot?

ahartmetz•1h ago
When I hear full disk encryption, I think of what I'm using: Using the encryption feature of the disk with a password / keyphrase prompt built into the system firmware (UEFI). It is 100% transparent to any software.

The only major downside is that you need to trust the hardware manufacturer (and their FIPS certification), which is fine for my purposes, but might not be fine for state secrets or extremely valuable trade secrets.

longislandguido•1h ago
Have they replaced it with grub-rs yet?

On a more serious note, grub is ancient bloatware, it is way overcomplicated for what it does, it's asking to be replaced by systemd-boot distro-wide.

Look at Apple and Microsoft's bootloaders, they are dead simple and have barely changed in 20 years, it makes you wonder how the hell grub was even conceived. It has config files for config files.

grub tries to do the kitchen sink. But we live in a UEFI world now. Boot is simple. None of that is necessary anymore.

plagiarist•1h ago
I'd like a better boot manager but I sure as hell do not want systemd cancer to spread any further. Especially not after Poettering has started a remote attestation company.
longislandguido•1h ago
systemd-boot is only similar to systemd in name; it started as another project and was renamed.
mirashii•1h ago
It’s been merged into the systemd project, so one must assume that the systemd maintainers have some level of influence over it.
longislandguido•1h ago
Remind me why I'm supposed to care who the maintainer is for a piece of software that runs for a few seconds then gets tf out of the way.
logicchains•45m ago
Because they're going to try to use it to make it impossible for you to run an operating system that isn't spyware.
fluffybucktsnek•32m ago
Now that's rich. Are you indirectly telling us that Arch Linux and NixOS are spyware?
ethin•11m ago
Can you actually definitively prove this, or is this just more fearmongering from the anti-systemd crowd that I at least don't at all take seriously?
drooopy•1h ago
Bring back Lilo!
gorgoiler•48m ago
Personally, I miss blessing my iBook with “holy penguin pee”:

https://github.com/jeffv03/yaboot/blob/master/ybin/ybin#L902

pixl97•42m ago
> it makes you wonder how the hell grub was even conceived

I'm wondering how much was interop with trying to boot multiple operating systems off the same disk?

Zardoz84•1h ago
I glad that I moved to green pastures... Aka Debian.
hedora•1h ago
This sort of crap keeps getting upstreamed into Debian.

Consider devuan for your next machine. I've switched almost all my linux boxes to it, and it's great.

hedora•1h ago
This comment is particularly concerning (as is the functionality regression implied by this new "more secure" approach):

> This means for example, that an encrypted system must use an ext4 /boot partition; it is no longer possible to encrypt the /boot partition.

So, they want to let attackers modify /boot, including grub.conf and the kernel command line? This is better? Look at all these fun knobs attackers will be able to turn!

https://www.kernel.org/doc/Documentation/x86/x86_64/boot-opt...

This lets you disable machine check exceptions + the iommu. That means it'll force people to use a configuration that lets attackers stick a memory probe hardware device into the system + bypass a bunch of hardware security checks. Nice!

I also found module.sig_enforce which lets the attacker disable kernel module signature verification. Sadly, I couldn't find anything that lets you directly load a kernel module from /boot.

However, init.rd lives in /boot. I wonder if its signature is verified or not. At the very least, this approach implies that attackers can piecemeal downgrade stuff early in the boot process.