frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

You can't trust macOS Privacy and Security settings

https://eclecticlight.co/2026/04/10/why-you-cant-trust-privacy-security/
145•zdw•1h ago•57 comments

WireGuard makes new Windows release following Microsoft signing resolution

https://lists.zx2c4.com/pipermail/wireguard/2026-April/009561.html
92•zx2c4•1h ago•38 comments

1D Chess

https://rowan441.github.io/1dchess/chess.html
108•burnt-resistor•1h ago•18 comments

Helium Is Hard to Replace

https://www.construction-physics.com/p/helium-is-hard-to-replace
82•JumpCrisscross•1h ago•37 comments

Industrial design files for Keychron keyboards and mice

https://github.com/Keychron/Keychron-Keyboards-Hardware-Design
39•stingraycharles•37m ago•5 comments

Bluesky April 2026 Outage Post-Mortem

https://pckt.blog/b/jcalabro/april-2026-outage-post-mortem-219ebg2
27•jcalabro•1h ago•3 comments

CPU-Z and HWMonitor compromised

https://www.theregister.com/2026/04/10/cpuid_site_hijacked/
61•pashadee•3h ago•38 comments

Mysteries of Dropbox: Testing of a Distributed Sync Service (2016) [pdf]

https://www.cis.upenn.edu/~bcpierce/papers/mysteriesofdropbox.pdf
76•JackeJR•3d ago•16 comments

Code is run more than read (2023)

https://olano.dev/blog/code-is-run-more-than-read/
89•facundo_olano•2h ago•52 comments

Clojure on Fennel Part One: Persistent Data Structures

https://andreyor.st/posts/2026-04-07-clojure-on-fennel-part-one-persistent-data-structures/
35•roxolotl•3d ago•1 comments

FBI used iPhone notification data to retrieve deleted Signal messages

https://9to5mac.com/2026/04/09/fbi-used-iphone-notification-data-to-retrieve-deleted-signal-messa...
387•01-_-•5h ago•188 comments

Peers vote to ban pornography depicting sex acts between stepfamily members

https://www.theguardian.com/society/2026/apr/10/porngraphy-depicting-sex-acts-between-stepfamily-...
21•azalemeth•25m ago•2 comments

How NASA built Artemis II’s fault-tolerant computer

https://cacm.acm.org/news/how-nasa-built-artemis-iis-fault-tolerant-computer/
546•speckx•1d ago•211 comments

France to ditch Windows for Linux to reduce reliance on US tech

https://techcrunch.com/2026/04/10/france-to-ditch-windows-for-linux-to-reduce-reliance-on-us-tech/
179•Teever•1h ago•68 comments

I still prefer MCP over skills

https://david.coffee/i-still-prefer-mcp-over-skills/
374•gmays•14h ago•313 comments

Penguin 'Toxicologists' Find PFAS Chemicals in Remote Patagonia

https://www.ucdavis.edu/health/news/penguin-toxicologists-find-pfas-chemicals-remote-patagonia
110•giuliomagnifico•10h ago•44 comments

A new trick brings stability to quantum operations

https://ethz.ch/en/news-and-events/eth-news/news/2026/04/a-new-trick-brings-stability-to-quantum-...
202•joko42•12h ago•47 comments

Deterministic Primality Testing for Limited Bit Width

https://www.jeremykun.com/2026/04/07/deterministic-miller-rabin/
16•ibobev•2d ago•1 comments

C++: Freestanding Standard Library

https://www.sandordargo.com/blog/2026/04/08/cpp-freestanding
18•ingve•2d ago•2 comments

Supply chain nightmare: How Rust will be attacked and what we can do to mitigate

https://kerkour.com/rust-supply-chain-nightmare
54•fanf2•2h ago•25 comments

Native Instant Space Switching on macOS

https://arhan.sh/blog/native-instant-space-switching-on-macos/
596•PaulHoule•21h ago•288 comments

US summons bank bosses over cyber risks from Anthropic's latest AI model

https://www.theguardian.com/technology/2026/apr/10/us-summoned-bank-bosses-to-discuss-cyber-risks...
67•ascold•3h ago•38 comments

We've raised $17M to build what comes after Git

https://blog.gitbutler.com/series-a
261•ellieh•15h ago•565 comments

DRAM has a design flaw from 1966. I bypassed it [video]

https://www.youtube.com/watch?v=KKbgulTp3FE
356•surprisetalk•2d ago•126 comments

Generative art over the years

https://blog.veitheller.de/Generative_art_over_the_years.html
213•evakhoury•3d ago•58 comments

CollectWise (YC F24) Is Hiring

https://www.ycombinator.com/companies/collectwise/jobs/Ktc6m6o-ai-agent-engineer
1•OBrien_1107•12h ago

Why I'm Building a Database Engine in C#

https://nockawa.github.io/blog/why-building-database-engine-in-csharp/
13•vyrotek•1h ago•3 comments

"Negative" views of Broadcom driving VMware migrations, rival says

https://arstechnica.com/information-technology/2026/04/nutanix-claims-it-has-poached-30000-vmware...
38•breve•2h ago•13 comments

Show HN: Marimo pair – Reactive Python notebooks as environments for agents

https://github.com/marimo-team/marimo-pair
99•manzt•2d ago•23 comments

Charcuterie – Visual similarity Unicode explorer

https://charcuterie.elastiq.ch/
290•rickcarlino•20h ago•68 comments
Open in hackernews

Supply chain nightmare: How Rust will be attacked and what we can do to mitigate

https://kerkour.com/rust-supply-chain-nightmare
54•fanf2•2h ago

Comments

lesuorac•1h ago
Eh, the only way to secure your Rust programs it the technique not described in the article.

Vendor your dependencies. Download the source and serve it via your own repository (ex. [1]). For dependencies that you feel should be part of the "Standard Library" (i.e. crates developed by the Rust team but not included into std) don't bother to audit them. For the other sources, read the code and decide if it's safe.

I'm honestly starting to regret not starting a company like 7 years ago where all I do is read OSS code and host libraries I've audited (for a fee to the end-user of course). This was more relevant for USG type work where using code sourced from an American is materially different than code sourced from non-American.

[1]: https://docs.gitea.com/usage/packages/cargo

whytevuhuni•1h ago
The only thing this leads to is that you'll have hundreds of vendored dependencies, with a combined size impossible to audit yourself.

But if you somehow do manage that, then you'll soon have hundreds of outdated vendored dependencies, full of unpatched security issues.

QuantumNomad_•1h ago
> full of unpatched security issues

If you host your own internal crates.io mirror, I see two ways to stay on top of security issues that have been fixed upstream. Both involving the use of

  cargo audit
which uses the RustSec advisory DB https://rustsec.org/

Alternative A) would be to redirect the DNS for crates.io in your company internal DNS server to point at your own mirror, and to have your company servers and laptops/workstations all use your company internal DNS server only. And have the servers and laptops/workstations trust a company controlled CA certificate that issues TLS certificates for “crates.io”. Then cargo and cargo audit would work transparently assuming they use the host CA trust store when validating the TLS certificates when they connect to crates.io. The RustSec DB you use directly from upstream, not even mirroring it and hosting an internal copy. Drawback is if you accidentally leave some servers or laptops/workstations using external DNS, and connections are made to the real crates.io instead. Because then developers end up pulling in versions of deps that have not been audited by the company itself and added to the internal mirror.

Alternative B) that I see is to set up the crates host to use a DNS name under your own control. E.g. crates dot your company internal network DNS name. And then set up cargo audit to use an internally hosted copy of the advisory DB that is always automatically kept up to date but has replaced the cargo registry they are referring to to be your own cargo crates mirror registry. I think that should work. It is already very easy to set up your own crates mirror registry, cargo has excellent support built right into it for using crates registries other than or in addition to crates.io. And then you have a company policy that crates.io is never to be used and you enforce it with automatic scanning of all company repos that checks that no entries in Cargo.toml and Cargo.lock files use crates.io.

It would probably be a good idea even to have separate internal crate registries for crates that are from crates.io and crates that are internal to the company itself. To avoid any name collisions and the likes.

Regardless if going with A) or B), you’d then be able to run cargo audit and see security advisories for all your dependencies, while the dependencies themselves are downloaded from your internal mirror of crates.io crates, and where you audit every package source code before adding it in your internal mirror registry.

echelon•37m ago
A large number of security issues in the supply chain are found in the weeks or months after library version bumps. Simply waiting six months to update dependency versions can skip these. It allows time to pass and for the dependency changes to receive more eyeballs.

Vendoring buys and additional layer of security.

When everyone has Claude Mythos, we can self-audit our supply chain in an automated fashion.

woodruffw•1h ago
> Let me rephrase this, 17% of the most popular Rust packages contain code that virtually nobody knows what it does (I can't imagine about the long tail which receives less attention).

I think this post has some good information in it, but this is essentially overstated: I look at crate discrepancies pretty often as part of reviewing dependency updates, and >90% of the time it's a single line difference (like a timestamp, hash, or some other shudder between the state of the tree at tag-time and the state at release-time). These are non-ideal from a consistency perspective, but they aren't cause for this degree of alarm -- we do know what the code does, because the discrepancies are often trivial.

ethanj8011•1h ago
Isn't the point that unless actually audited each time, the code could still be effectively anything?
woodruffw•1h ago
Yes, but that's already the case. My point was that in practice the current discrepancies observed don't represent a complete disconnect between the ground truth (the source repo) and the package index, they tend to be minor. So describing the situation as "nobody knows what 17% of the top crates.io packages do" is an overstatement.
dralley•1h ago
I think it just depends on whether or not you interpret the phrase "no one knows" neutrally or pessimistically.

Saying that there could be something there, but "no one knows" doesn't mean that there is something there. But it's still true.

woodruffw•1h ago
If that's the case, it would be a lot simpler (and equally accurate) to say that "no one knows" what the source repo is doing, either! The median consumer of packages in any packaging ecosystem is absolutely not reading the entire source code of their dependencies, in either the ground truth or index form.
dralley•1h ago
That's certainly true - and would also be true (maybe even moreso) if vendoring dependencies was widespread. Seems just as easy to hide things in a "vendored" directory that's 20x the size of the library.
echelon•35m ago
Serious consideration: Claude Mythos is going to change the risk envelope of this problem.

We're still thinking in the old mindset, whereas new tools are going to change how all of this is done.

In some years dependencies will undergo various types of automated vetting - bugs (various categories), memory, performance, correctness, etc. We need to think about how to scale this problem instead. We're not ready for it.

EGreg•1h ago
Why not pin your packages? Andnwhy not have M of N auditors sign off on releases?
bcjdjsndon•54m ago
But it's impossible to have a buffet overflow in rust
CoastalCoder•47m ago
> But it's impossible to have a buffet overflow in rust

I dunno, I can only listen to Margaritaville so many times in a row.

bluGill•6m ago
That is why you mix in "Something So Feminine About A Mandolin" in once in a while. Or if you really insist on only very well known tunes "Cheese Burger in Paradise" should still count.
amelius•48m ago
Rust should add a way to sandbox every dependency.

It's basically what we're already doing in our OSes (mobile at least), but now it should happen on the level of submodules.

petcat•15m ago
How would that work? Rust "crates" are just a compilation unit that gets linked into the resulting binary.
amelius•3m ago
This is a nice exercise for compiler researchers.

I suppose it can be done on various levels, with various performance trade-offs.

tasuki•41m ago
> In a recent analysis, Adam Harvey found that among the 999 most popular crates on crates.io, around 17% contained code that do not match their code repository.

Huh, how is this possible? Is the code not pulled from the repository? Why not?

duped•16m ago
Publishing doesn't go through GitHub or another forge, it's done from the local machine. Crates can contain generated code as well.
sudoapps•31m ago
Coding agents should help us reduce dependencies overall. I agree Go is already best positioned as a language for this. Using random dependencies for some small feature seems archaic now.
poulpy123•27m ago
I'm not really convinced that having a few more libraries in the standard library or decentralizing the library repository is going to change much the risks
kerblang•25m ago
I really like the idea of implementing the std lib separate from the language. I think that would be a huge blessing for Java, Go and others, ideally allowing faster iteration on most things given that we usually don't need a reinvention of the compiler/runtime just to make a better library.
nyc_pizzadev•17m ago
Random question, does cargo have a way to identify if a package uses unsafe Rust code?
woodruffw•16m ago
No, but you can use cargo-geiger[1] or siderophile[2] for that.

[1]: https://github.com/geiger-rs/cargo-geiger

[2]: https://github.com/trailofbits/siderophile