frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Claude for Small Business

https://www.anthropic.com/news/claude-for-small-business
36•neilfrndes•40m ago•11 comments

Scorched Earth 2000 – Web

http://www.scorch2000.com/web/
170•meshko•3h ago•66 comments

Cisco workforce reductions

https://blogs.cisco.com/news/our-path-forward
88•ahmedomran8•3h ago•54 comments

Linux gaming is faster because Windows APIs are becoming Linux kernel features

https://www.xda-developers.com/linux-gaming-is-getting-faster-because-windows-apis-are-becoming-l...
592•haunter•3d ago•396 comments

Setting up a free *.city.state.us locality domain (2025)

https://fredchan.org/blog/locality-domains-guide/
531•speckx•13h ago•166 comments

A History of IDEs at Google

https://laurent.le-brun.eu/blog/a-history-of-ides-at-google
316•laurentlb•4d ago•223 comments

Show HN: Nibble

https://github.com/glouw/nibble
17•glouwbug•2h ago•0 comments

The Emacsification of Software

https://sockpuppet.org/blog/2026/05/12/emacsification/
234•rdslw•21h ago•162 comments

Chess puzzle I found in my dad's old book

https://ardoedo.it/kempelen/
127•Eswo•2d ago•35 comments

Twin brothers wipe 96 government databases minutes after being fired

https://arstechnica.com/tech-policy/2026/05/drop-database-what-not-to-do-after-losing-an-it-job/
356•jnord•1d ago•260 comments

Princeton mandates proctoring for in-person exams, upending 133 year precedent

https://www.dailyprincetonian.com/article/2026/05/princeton-news-adpol-proctoring-in-person-exami...
289•bookofjoe•8h ago•403 comments

Avoiding and reducing microplastic false positives from dry glove contact

https://pubs.rsc.org/en/content/articlelanding/2026/ay/d5ay01801c
12•efavdb•3h ago•0 comments

Golden Testing a CAD Library

https://doscienceto.it/blog/posts/2026-04-27-golden-testing-cad.html
4•PaulHoule•2d ago•0 comments

Launch HN: Ardent (YC P26) – Postgres sandboxes in seconds with zero migration

https://www.tryardent.com/
80•vc289•11h ago•33 comments

Xs of Y – roguelike that names itself every run. Written in 4kLoC

https://github.com/nooga/xsofy
169•andsoitis•4d ago•73 comments

The US is winning the AI race where it matters most: commercialization

https://avkcode.github.io/blog/us-winning-ai-race.html
176•akrylov•14h ago•495 comments

Marco Polo: Finding a friend with only distance and motion

https://www.jackhogan.me/blog/marco-polo
50•jackhogan11•2d ago•6 comments

AEPs: API Enhancement Proposals

https://github.com/aep-dev/aeps
10•nateb2022•1d ago•4 comments

The other half of AI safety

https://personalaisafety.com/p/the-other-half-of-ai-safety
53•sofiaqt•4h ago•70 comments

Microsoft BitLocker – YellowKey zero-day exploit

https://www.tomshardware.com/tech-industry/cyber-security/microsoft-bitlocker-protected-drives-ca...
39•cookiengineer•1h ago•19 comments

S-100 Virtual Workbench

https://grantmestrength.github.io/S100/
111•rbanffy•12h ago•22 comments

Reverting the incremental GC in Python 3.14 and 3.15

https://discuss.python.org/t/reverting-the-incremental-gc-in-python-3-14-and-3-15/107014
209•curiousgal•4d ago•81 comments

Mystery Microsoft bug leaker keeps the zero-days coming

https://www.theregister.com/security/2026/05/13/disgruntled-researcher-releases-two-more-microsof...
84•e12e•3h ago•21 comments

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://github.com/cactus-compute/needle
654•HenryNdubuaku•1d ago•184 comments

A sentimental tour of late 1990s and early 2000s hacking tools

https://andreafortuna.org/2026/05/13/amarcord/
56•speckx•10h ago•20 comments

Preserving Fisher-Price Pixter

https://dmitry.gr/?r=05.Projects&proj=37.%20Pixter
217•dmitrygr•2d ago•45 comments

Tell HN: Dont use Claude Design, lost access to my projects after unsubscribing

231•pycassa•6h ago•66 comments

Meta won't let you block its AI account on Threads

https://www.theverge.com/tech/929091/meta-ai-threads-account-block
145•logickkk1•8h ago•71 comments

I moved my digital stack to Europe

https://monokai.com/articles/how-i-moved-my-digital-stack-to-europe/
908•monokai_nl•16h ago•540 comments

Can a Language Model Paint?

https://www.etive-mor.com/blog/can-a-language-model-paint/
15•liamlaverty•1d ago•7 comments
Open in hackernews

Microsoft BitLocker – YellowKey zero-day exploit

https://www.tomshardware.com/tech-industry/cyber-security/microsoft-bitlocker-protected-drives-can-now-be-opened-with-just-some-files-on-a-usb-stick-yellowkey-zero-day-exploit-demonstrates-an-apparent-backdoor
38•cookiengineer•1h ago

Comments

ungreased0675•1h ago
Remarkable. Does MS take a huge reputational hit for having a backdoor, or are they so essential to most places this won’t matter?
peroids•1h ago
I’m assuming the EU speeds up the uncoupling cause of some of this.
ranger_danger•45m ago
As far as I can tell, there's no concrete evidence that it is actually an intentional "backdoor."
AnonC•1h ago
The BitLocker exploit seems simple and very dangerous. Companies and individuals have been relying on BitLocker to protect information if the device is lost. Despite promises, Microsoft doesn’t seem to be serious about security.

What will it take for more companies to truly understand their risks with Windows and being locked into Microsoft’s platforms?

ranger_danger•44m ago
How does a bug equate to "not serious about security"?
navigate8310•37m ago
There's no way this is not a backdoor
Our_Benefactors•36m ago
Read the article. It’s pretty clear that this is a backdoor, and calling it a bug would be so generous as to be misleading.
forestry•14m ago
*in your opinion.
forestry•16m ago
The blog author calls it that but given there’s no root cause yet it’s foolish to jump to conclusions.
otterley•1h ago
Here's the primary source: https://deadeclipse666.blogspot.com/2026/05/two-more-public-...

Other links:

https://github.com/Nightmare-Eclipse/YellowKey

https://github.com/Nightmare-Eclipse/GreenPlasma

pajko•59m ago
Earlier thread: https://news.ycombinator.com/item?id=48114997
bombcar•44m ago
How is this even possible, backdoor or no? Isn't the whole point of this type of encryption that even a compromised machine can't decrypt without the passphrase? If this works it means that the key is stored unencrypted somewhere?
andrecarini•21m ago
Presumably the key is stored in the TPM
majorchord•15m ago
Most setups only have the key stored in the TPM, so all you need to get it back is a signed/trusted bootloader.

Ideally you'd want that key to be further protected with a password or some other mechanism because it's not impossible to extract TPM keys.

ranger_danger•40m ago
For those who use password (not PIN) based pre-boot authentication with BitLocker... do we know if that setup is safe?

I can't imagine there would be a way to bypass that if a password is required, unless it was a situation where like, there was originally some secret secondary key made that needs no password.

andrecarini•19m ago
The exploit developer themselves say [1] TPM+PIN is vulnerable, though no public PoC.

[1]: https://deadeclipse666.blogspot.com/2026/05/were-doing-silen...

forestry•15m ago
I’m skeptical of that claim. The key material presumably is inaccessible even to the OS without the passcode.