frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Running the second public ODoH relay

https://numa.rs/blog/posts/odoh-anonymous-dns-without-an-account.html
59•rdme•2h ago•16 comments

Claude for Small Business

https://www.anthropic.com/news/claude-for-small-business
367•neilfrndes•9h ago•321 comments

Myths about /dev/urandom (2014)

https://www.2uo.de/myths-about-urandom/
22•signa11•2h ago•17 comments

The Tree House: A voyage to the source of a backyard dream

https://www.laphamsquarterly.org/roundtable/tree-house
20•Caiero•2d ago•1 comments

USDA Projects Smallest US Wheat Harvest Since 1972 Due to Plains Drought

https://www.agweb.com/news/usda-projects-smallest-us-wheat-harvest-1972-due-plains-drought
3•littlexsparkee•17m ago•1 comments

Linux gaming is faster because Windows APIs are becoming Linux kernel features

https://www.xda-developers.com/linux-gaming-is-getting-faster-because-windows-apis-are-becoming-l...
827•haunter•3d ago•519 comments

Scorched Earth 2000 – Web

http://www.scorch2000.com/web/
307•meshko•12h ago•117 comments

The Whole Anthropic Kerfuffle

https://twitter.com/josevalim/status/2054887621336174799
17•tosh•27m ago•6 comments

Leaving the Physical World

https://www.eff.org/pages/leaving-physical-world
67•andsoitis•3d ago•23 comments

Classic 7 is a Windows 10 LTSC mod to look 1:1 to Windows 7

https://classic7.lol/
111•jandeboevrie•6h ago•96 comments

Setting up a free *.city.state.us locality domain (2025)

https://fredchan.org/blog/locality-domains-guide/
582•speckx•22h ago•180 comments

Remove .zig Files from Bun

https://github.com/oven-sh/bun/pull/30680
10•quasigloam•3h ago•3 comments

A Claude Code and Codex Skill for Deliberate Skill Development

https://github.com/DrCatHicks/learning-opportunities
109•cdrnsf•10h ago•19 comments

Saying Goodbye to one line of APL

https://homewithinnowhere.com/posts/2026-05-10-one-line.html#fnref1
21•tosh•3d ago•7 comments

MacBook Neo Deep Dive: Benchmarks, Wafer Economics, and the 8GB Gamble

https://www.jdhodges.com/blog/macbook-neo-benchmarks-analysis/
260•tosh•19h ago•314 comments

A History of IDEs at Google

https://laurent.le-brun.eu/blog/a-history-of-ides-at-google
405•laurentlb•5d ago•265 comments

The Emacsification of Software

https://sockpuppet.org/blog/2026/05/12/emacsification/
337•rdslw•1d ago•212 comments

Technical Dimensions of Live Feedback in Programming Systems

https://joshuahhh.com/dims-of-feedback/
28•tobr•3d ago•4 comments

The Siri for Families Apple Will Never Build

https://taoofmac.com/space/blog/2026/05/14/1220
29•rcarmo•1h ago•11 comments

Swift bricks to be installed on all new buildings in Scotland

https://www.theguardian.com/environment/2026/jan/28/swift-bricks-to-be-installed-in-all-new-build...
24•bookofjoe•4d ago•3 comments

Pipes, Forks, and Zombies

https://cs61.seas.harvard.edu/wiki/2017/Shell3/
5•tosh•2h ago•1 comments

Chess puzzle I found in my dad's old book

https://ardoedo.it/kempelen/
190•Eswo•2d ago•59 comments

Avoiding and reducing microplastic false positives from dry glove contact

https://pubs.rsc.org/en/content/articlelanding/2026/ay/d5ay01801c
70•efavdb•12h ago•19 comments

Extraordinary Ordinals

https://text.marvinborner.de/2026-04-09-17.html
32•marvinborner•2d ago•11 comments

Show HN: Nibble

https://github.com/glouw/nibble
71•glouwbug•11h ago•14 comments

Sam Altman's Business Dealings Under GOP Scrutiny Ahead of OpenAI's IPO

https://www.wsj.com/tech/ai/sam-altmans-business-dealings-under-gop-scrutiny-ahead-of-openais-ipo...
12•1vuio0pswjnm7•1h ago•3 comments

New York, California pension leaders oppose 'extreme' SpaceX control structure

https://www.reuters.com/legal/government/new-york-california-pension-leaders-oppose-extreme-space...
41•2OEH8eoCRo0•1h ago•56 comments

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://github.com/cactus-compute/needle
694•HenryNdubuaku•1d ago•197 comments

The Deathbed Notes of Henry James (1968)

https://www.theatlantic.com/past/docs/unbound/flashbks/james/jnote.htm
17•Hooke•1d ago•0 comments

The US is winning the AI race where it matters most: commercialization

https://avkcode.github.io/blog/us-winning-ai-race.html
216•akrylov•23h ago•610 comments
Open in hackernews

Myths about /dev/urandom (2014)

https://www.2uo.de/myths-about-urandom/
21•signa11•2h ago

Comments

NooneAtAll3•1h ago
(2014)
ape4•1h ago
Ah, I wonder what's change since then.
vbezhenar•1h ago
Here's quote from the article:

> Note from 2024: This article was published on March 16th, 2014. It is still correct in its discussion of entropy and randomness, but the Linux kernel random number generator has been reworked several times since then and does not look like this anymore. Good news: the separation between /dev/urandom and /dev/random is practically gone.

My understanding is that on modern Linux system:

At early boot phases, /dev/random can still block, because not enough entropy has been seeded yet. /dev/urandom will not block, but the random data might be of poor quality and not suitable for crypto purposes. This happens very early in the boot, so probably it's not even possible to run user stuff at this time. At least on my laptop, the message "random: crng init done" gets logged almost instantly after boot and long before even initrd starts. Might be different for exotic platforms, I guess.

Once there was enough entropy seeded, both /dev/random and /dev/urandom works identically, they don't block and they return high quality random data. So for most userspace purposes, these files can be used interchangeably, one is not better than another.

mananaysiempre•1h ago
> Might be different for exotic platforms, I guess.

Short-lived isolated VMs (like might be used for CI) are one place where entropy can be a problem. The relevant definition of “platform” here is less about the CPU architecture and more about the environment.

ChrisSD•45m ago
VMs should have VirtIO RNG set up so there is a high quality entropy source at boot time, provided by the host system.
mananaysiempre•36m ago
Should, yes. Will, perhaps, but better be aware of the potential problem and check.

Just yesterday I encountered people complaining about a VM not connecting to a cloud service when they neglected to put their DNS server’s address in the config for the DHCP server used by that particular host. And a dysfunctional RNG is much more difficult to detect.

aomix•35m ago
It started looking a whole lot like OpenBSD’s random number system. Private entropy pool from good system entropy seeds a ChaCha20 stream with random reseeds for forward secrecy in case of compromise. I think Linux is even more paranoid in the early boot environment where even in the presence of a seed file it prefers to get system entropy mixed in before confidently saying it can do crypto activities.
xiphmont•1h ago
Half the entropy is trying to figure out which pieces of this article's text are supposed to be the silly falsehoods being corrected, and which pieces are just the second or third paragraph of a preceding 'Fact'. Deadpool is easier to follow.
notnmeyer•44m ago
glad i’m not the only one. i’m more or less baffled reading that.
roter•43m ago
I saw a note from an earlier year's discussion saying the css has been changed over the years. Perhaps it was easier then to discern fact or myth, truth or fiction.
stordoff•34m ago
I pulled up a random version from 2014, and it's more readable: https://web.archive.org/web/20141023082929/https://www.2uo.d...
sph•56m ago
This is a good place as any to ask, last time I didn't get any answer: has there ever been a serious Linux exploit from manipulating/predicting bad PRNG? Apart from the Debian SSH key generation fiasco from years ago, of course.

Having a good entropy source makes mathematical sense, and you want something a bit more "random" than a dice roll, but I wonder at which point it becomes security theatre.

Of all the possible avenues for exploiting a modern OS might have, I figure kernel PRNG prediction to be very, very far down the list of things to try.

hannob•33m ago
I think this one is among the most significant findings: https://factorable.net/

I also believe there were some android ASLR issues based on the same weakness (i.e., low early boot-time entropy).

But this is all quite old, and there've been massive improvements. Basically, "don't use a very old linux kernel" is your mitigation for these issues.

vlovich123•30m ago
It’s both hard to attack but also a hugely audited system with a lot of attention paid.

That being said, [1] from 2012. The challenge with security is that structural weaknesses can take a long time to be discovered but once they are it’s catastrophic. Modern Linux finally switched to CSPRNG and proper construction and relies less on the numerology of entropy estimation it had been using (ie real security instead of theater). RDRAND has also been there for a long time on the x86 side which is useful because even if it’s insecure it gets mixed with other entropy sources like instruction execution time and scheduling jitter to protect standalone servers and iot devices.

Of course you hit the nail on the head in terms of the challenge of distinguishing security theater because you won’t know if the hardening is useful until there’s a problem, but there’s enough knowledgeable people on it that it’s less security theater than it might seem if you know what’s going on.

[1] https://www.usenix.org/system/files/conference/usenixsecurit...

throw0101c•55m ago
Original discussion from 2014:

* https://news.ycombinator.com/item?id=7359992

Also:

2020: https://news.ycombinator.com/item?id=22683627

2018: https://news.ycombinator.com/item?id=17779657

2017: https://news.ycombinator.com/item?id=13332741

2015: https://news.ycombinator.com/item?id=10149019

iamtedd•37m ago
That was hard to tell where the additional commentary on the fact ended and the next myth started.
iamtedd•32m ago
Twelve years later, if there's still so much misconception about /dev/(u)random, has the man page been fixed?

Edit: can't count.