Blog

  • Firefox Tor Vulnerability Exposed

    Firefox Tor Vulnerability Exposed

    Executive TL;DR:

    • Researchers discovered a Firefox identifier that can link private Tor identities.
    • This vulnerability compromises user anonymity and can persist across sessions.
    • Users are advised to exit Tor Browser at the end of each session to mitigate the risk.

    The Buzz Score

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Forum Reactions

    Users are concerned about the implications of this vulnerability, with some questioning the decision to disclose it to Mozilla.

    Very cool research and wonderfully written. I was expecting an ad for their product somewhere towards the end, but it wasn’t there! I do wonder though: why would this company report this vulnerability to Mozilla if their product is fingerprinting?

    Others are critical of the architecture that led to this vulnerability, suggesting alternative solutions.

    Why is this global keyed only by the database name string in the first place? The post mentions a generated UUID, why not use that instead, and have a per-origin mapping of database names to UUID somewhere?

    Mitigating the Risk

    Users can take steps to protect themselves, such as exiting Tor Browser at the end of each session and avoiding mixing different uses in one session.

    Make sure to exit Tor Browser at the end of a session. Make sure not to mix two uses in one session.


    Focus Keyword: Tor Browser

  • Building a Cloud

    Building a Cloud

    Executive TL;DR

    • Building a cloud can be cost-effective with the right strategy
    • Traditional cloud companies may charge high prices for services
    • Autoscaling and backup are key considerations for a reliable cloud setup

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Introduction to Cloud Building

    Cloud building is a complex task that requires careful planning and execution. As one forum user noted,

    i just use Hetzner. Everything which cloud companies provide just cost so much, my own postgres running with HA setup and backup cost me 1/10th the price of RDS or CloudSQL service running in production over 10 years with no downtime.

    Benefits and Challenges

    Building a cloud can be beneficial for companies that want to have control over their infrastructure. However, it also requires a significant amount of expertise and resources. Another user commented,

    Potentially useful context: OP is one of the cofounders of Tailscale. Traditional Cloud 1.0 companies sell you a VM with a default of 3000 IOPS, while your laptop has 500k.

    Despite the challenges, some users are enthusiastic about building their own cloud. As one user said,

    Hahaha! Have fun! I‘m doing the same – together with Claude Code. Since August. With https (mTLS1.3) everywhere, because i can.

    Conclusion

    Building a cloud can be a cost-effective and reliable option for companies that are willing to invest time and resources. With the right strategy and expertise, it is possible to create a scalable and secure cloud setup.


    Focus Keyword: Cloud Building

  • Firefox Tor Vulnerability Exposed

    Firefox Tor Vulnerability Exposed

    Executive TL;DR:

    • A stable Firefox identifier can link all private Tor identities.
    • This vulnerability poses a significant threat to user anonymity.
    • Users can mitigate the risk by exiting Tor Browser at the end of each session.

    The Buzz Score:

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Forum Reactions:

    Users are concerned about the implications of this vulnerability. As one user noted:

    Why would this company report this vulnerability to Mozilla if their product is fingerprinting? Isn’t it better for the business (albeit unethical) to keep the vulnerability private, to differentiate from the competitors?

    Another user emphasized the importance of proper browser hygiene:

    Make sure to exit Tor Browser at the end of a session. Make sure not to mix two uses in one session.

    Technical Implications:

    The identifier can persist as long as the Firefox process remains running. However, it does not persist past browser restart, which reduces its usefulness to attackers.

    Some users are looking for academic research on this topic, beyond activist groups like the EFF.


    Focus Keyword: Tor Browser

  • Firefox Tor Vulnerability Exposed

    Firefox Tor Vulnerability Exposed

    Executive Summary

    • Researchers discovered a stable Firefox identifier linking private Tor identities.
    • This vulnerability compromises user anonymity and can be used for fingerprinting.
    • Users can mitigate this issue by exiting Tor Browser at the end of each session.

    The Buzz Score

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Forum Reactions

    Many users are concerned about the implications of this vulnerability. As one user noted:

    why would this company report this vulnerability to Mozilla if their product is fingerprinting? Isn’t it better for the business (albeit unethical) to keep the vulnerability private, to differentiate from the competitors?

    Others emphasized the importance of proper browser hygiene:

    Make sure to exit Tor Browser at the end of a session. Make sure not to mix two uses in one session.

    Technical Implications

    The identifier can persist as long as the Firefox process remains running, highlighting the need for users to be mindful of their browsing habits.


    Focus Keyword: Tor Browser

  • Apple iPhone Bug Fix: Notification Privacy

    Apple iPhone Bug Fix: Notification Privacy

    Executive TL;DR

    • Apple fixes iPhone bug that allowed cops to extract deleted chat messages
    • Notification texts were stored on a local database outside of the messaging app
    • Users can change settings to only show notification alerts without content

    The Buzz Score

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    What’s the Issue?

    The bug allowed notifications to be retained on the device even after the app that generated them was removed.

    This was a bug that left it cached on the device. Apple and Google have put themselves in the middle of most notifications, causing the contents to pass through their servers, which means that they are subject to all the standard warrantless wiretapping directly from governments, as well as third-party attacks on the infrastructure in place to support that monitoring.

    Impact and Solution

    The impact of the bug was that notifications marked for deletion could be unexpectedly retained on the device.

    A logging issue was addressed with improved data redaction, with a CVE-2026-28950 classification.

    Oh, I was originally confused about this because I had thought the push notifications were end-to-end encrypted, so they couldn’t be cached in readable form by the push notification service, and only decrypted by the app on device upon receiving the notification. But it seems like after the notification was decrypted by the app and shown to the user using OS APIs, the notification text was then stored by the OS in some kind of notification history DB locally on the device?

    Conclusion

    Apple’s fix addresses the issue, but users should still be aware of their notification settings to maintain privacy.


    Focus Keyword: iPhone Bug

  • Alberta Startup Sells Low-Tech Tractors

    Alberta Startup Sells Low-Tech Tractors

    Executive TL;DR

    • Alberta startup sells low-tech tractors for half price
    • Tractors have no fancy technology, just basic mechanical components
    • Spark debate among farmers and tech enthusiasts about the role of technology in agriculture

    The Buzz Score

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Forum Voices

    Many people are excited about the prospect of low-tech tractors, citing the simplicity and reliability of older models.

    Up until a year ago I was regularly using a Massy Fergusson 135, made sometime in the 1970s. It was wonderful! So amazing to drive and use.

    Others are skeptical, pointing out the importance of technology in modern agriculture.

    I think this is a reaction to the incredibly locked down ecosystem that most of these mfgs are pushing. However, the tech exists for a reason and is not inherently bad, the issue is the lock-in, the lack of choice and interoperability.

    Implications

    The sale of low-tech tractors raises questions about the role of technology in agriculture. While some see it as a step backward, others see it as a way to increase accessibility and affordability.


    Focus Keyword: Low Tech Tractors

  • Google’s Eighth Generation TPUs

    Google’s Eighth Generation TPUs

    Executive Summary

    • Google’s eighth generation TPUs offer improved performance-per-watt
    • Separate inference and training focused hardware available
    • Experts predict Google’s models will surprise with a new generation beyond SOTA

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Expert Analysis

    Experts are weighing in on Google’s new TPU chips.

    I already felt that gemini 3 proved what is possible if you train a model for efficiency. If I had to guess the pro and flash variants are 5x to 10x smaller than opus and gpt-5 class models.

    Technical Specifications

    The new TPU chips deliver up to two times better performance-per-watt over the previous generation.

    TPU 8t and TPU 8i deliver up to two times better performance-per-watt over the previous generation

    Google’s vertical integration in AI gives them a unique advantage.

    Google can design their chips and engine and systems in a whole-datacenter context, centralizing some aspects that are impossible for chip vendors to centralize


    Focus Keyword: TPU Chips

  • 3.4M Solar Panels: A Comprehensive Review

    3.4M Solar Panels: A Comprehensive Review

    Executive Summary

    • 3.4M solar panels are a significant development in renewable energy
    • Experts and users discuss their potential and limitations
    • Cost and efficiency are major factors in their adoption

    The Buzz Score

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Expert Insights

    Experts are interested in seeing more detailed data on the solar panels, such as azimuths and tilt angles.

    Would be kinda interesting to see a histogram of the azimuths and/or tilt angles. In my native Netherlands I’d guess to see that peaking at ~south at say 15-30 degrees, with some lower peaks at east/west combos.

    User Reactions

    Some users are impressed by the cost and efficiency of the solar panels.

    look how cheap now, it’s crazy

    Others are skeptical, comparing the numbers to China’s daily installations.

    To put this in perspective, China installs around 3x that every single day


    Focus Keyword: Solar Panels

  • Windows 9x Subsystem for Linux

    Windows 9x Subsystem for Linux

    Executive TL;DR:

    • Windows 9x Subsystem for Linux allows running Linux binaries on Windows 9x
    • Similar to CoLinux and flinux, but with a modern Linux kernel
    • Potential use cases include development and legacy system support

    The Buzz Score

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Forum Voices

    Users are excited about the possibilities, with one commenter stating:

    So, is it like colinux, but for pre-NT windows? Neat! Back when I was still using windows (probably XP era), I used to run colinux, it was kind of amazing, setting up something like LAMP stack on the linux side was a lot easier and then using windows editors for editing made for quite nice local dev env.

    Another user notes the similarities to other solutions:

    Before WSL, the best ways to run unmodified Linux binaries inside Windows were CoLinux and flinux.

    Technical Implications

    The Windows 9x Subsystem for Linux has significant implications for development and legacy system support. One user comments on the potential for running early Linux under Windows 95.

    A unique use case is described by a user who plans to:

    run this in Windows 95 on a Sun PC card under Solaris 7.


    Focus Keyword: Windows Linux

  • Making RAM at Home

    Making RAM at Home

    Making RAM at Home

    Executive Summary:

    • Making RAM at home is a complex process.
    • It requires a clean room lab with positive pressure.
    • Experts are skeptical about the feasibility of this project.

    The Internet’s Verdict: 70% Hyped, 30% Skeptical

    Introduction to RAM Making

    Making RAM at home is not a straightforward process. As one expert notes,

    I only buy free-range artisanal DRAM at the DRAM farmer’s market.

    Technical Challenges

    Creating a clean room lab is a significant challenge.

    I saw this video yesterday and considered posting it, but I wasn’t sure if it was appropriate for HN. This channel has another video where it shows how the clean room lab is created starting from a basic backyard shed, and that was truly astounding.

    The positive pressure required to keep particles low is almost impossible to achieve in a home setup.

    Others are skeptical about the project’s practicality.

    I’m not sure this is what they meant when they said they wanted to bring manufacturing back to the USA lol

    Another expert joked,

    1999. We will have flying cars
    2024. LLMs - there will be robots
    2026. How to make your own RAM

    Focus Keyword: RAM Making