Hacker Newsnew | past | comments | ask | show | jobs | submit | lambdaone's commentslogin

For all of its ubiquity, Wikipedia is a single fragile organization in an increasingly unstable political landscape.

I hope that efforts are being made to make sure that its content is not only being archived in many places, but also that the know-how to reboot Wikipedia's hosting from its dumps (software, infrastructure deployment and all) is being actively preserved by people independent of the organization.


This would be the reality-based editorial slant, then? What are you proposing as an alternative?

“Reality-based” is rather smug, isn’t it?

Power is quite literally power, in both the physical and political senses. The Chinese know this, and Europe is catching up fast. American private enterprise knows it too.

Battery storage isn't quite where it needs to be, yet, so there's still some need for fossil and nuclear power, but when it is, decommissioning the remaining fossil power system is a no-brainer, and those with the biggest existing solar and wind estates will benefit most, and fastest.


The problem with all of these, even the most recent one, is that they have the "AI look". People have tired of this look already, even for short adverts; if they don't want five minutes of it, they really won't like two hours of it. There is no doubt the quality has vastly improved over time, but I see no sign of progress in removing the "AI look" from these things.

My feeling is the definition of the "AI look" has evolved as these models progressed.

It used to mean psychedelic weird things worthy of the strangest dreams or an acid trip.

Then it meant strangely blurry with warped alien script and fifteen fingers, including one coming out of another’s second phalanx

Now it means something odd, off, somewhat both hard to place and obvious, like the CGI "transparent" car (is it that the 3D model is too simple, looks like a bad glass sculpture, and refracts light in squares?) and ice cliffs (I think the the lighting is completely off, and the colours are wrong) in Die Another Day.

And if that’s the case, then these models have covered far more in far less time then it took computer graphics and CGI.


What changed my whole perspective on this a few months ago was Google's Genie 3 demo: https://www.youtube.com/watch?v=PDKhUknuQDg

They have really advanced the coherency of real-time AI generation.


Rust programmers are far more likely to have the vigilant mindset than C programmers, or they wouldn't be using Rust.

You can get an awful lot done very quickly in C if you aren't bothered about security - and traditionally, most of the profession has done exactly that.


And even better if someone can implement the whole massive spec securely...

Disclaimer: As a manager I led the JPEG XL design, implementation and standardization effort at Google, and as an IC I was responsible for lossy format, encoding heuristics and image quality.

JPEG XL is not that massive.

JPEG XL spec is slightly less than 100 pages, about half the size of the JPEG1 spec.

A simple implementation in j40 was around 7000 lines of code last time I looked, not sure if it is 100 % complete however.

A simple encoder at libjxl-tiny is of similar size and very attractive to be used for expressing similar coding decisions in hardware intended for digital cameras.

A complex speed optimized C++ decoder implementation is ~35000 lines of code, but much of it is not due to the spec, but getting most out of SIMD-powered multi-core computers.

The binary size increase in Chromium on arm for adding (in the past) the C++ decoder was around 200 kB in APK size, possibly around 0.1 %.


This is probably impossible and also not needed. Choose security through compartmentalization (instead of security through correctness that never works), if you really care about security.

Works for me with Qubes OS.


Do you daily drive Qubes? I'd be curious to hear about your experiences. I've been following the project from the sidelines for years, but haven't taken the leap.

Do you hate GPU acceleration? Do you hate using most hardware? Do you like using Xorg? Then Qubes is for you.

This is in jest, but those are my pain points - the AMD thinkpad I have can't run it, the Intel one melts yubikeys when decoding h264 video. The default lock screen can't read capital letters from the yubikeys static password entry. Qubes has a certain user that it caters to, I really wish they could get enough money to be able to cater to more use cases. It is not difficult to use it if it works for you.


GPU acceleration is coming: https://github.com/QubesOS/qubes-issues/issues/8552

> Do you hate using most hardware?

Nobody uses "most hardware". You may be unlucky with your hardware, then it's a problem. Or you can specifically buy hardware working with the OS you want.

> Do you like using Xorg?

What's wrong with Xorg?


> What's wrong with Xorg?

Lock screens that crash. Lock screens that can’t handle input from a yubikey?


There are no crashes on lock screen with Qubes. Concerning Yubikey, see this: https://doc.qubes-os.org/en/latest/user/security-in-qubes/mf...

Yes, I daily drive Qubes. It's an amazing feeling to feel in full control over your computing and not being afraid to open any links or attachments. Here is my Qubes OS Elevator Pitch: https://forum.qubes-os.org/t/how-to-pitch-qubes-os/4499/15

It's slow for tasks requiring GPU, but allowing GPU for chosen, trusted VMs is planned: https://github.com/QubesOS/qubes-issues/issues/8552


Just FYI, there are some people that vastly exaggerate the security it provides. For the most part, you're just as safe using flatpak versions of applications.

When was the last Flatpak escape? Last VM escape from VT-d virtualization, which Qubes uses by default, was found in 2006 by the Qubes founder, https://en.wikipedia.org/wiki/Blue_Pill_(software)

The most recent VM escape from VT-d virtualization was in 2022[0].

Escapes are not the only vulnerability. QSB-108 allows for reading the memory of other qubes running on the host[1].

[0] https://nvd.nist.gov/vuln/detail/CVE-2020-15565

[1] https://www.qubes-os.org/news/2025/07/11/qsb-108/


Apart from the fact that this is extremely rare, the first vulnerability is not a complete escape. For example, any offline vault VM storing secrets stayed secure. This is just not happening with any other security approach.

Speculative sidechannel attacks have nothing to do with OS or compartmentalization technology, since they are the problem of CPUs. Nothing can help here, so this is irrelevant to this discussion. Except that Qubes Air will save you in the future: https://www.qubes-os.org/news/2018/01/22/qubes-air/


> Apart from the fact that this is extremely rare,

So are bubblewrap escapes, which is the sandbox flatpak uses.

> the first vulnerability is not a complete escape.

It could potentially lead to one, and being able to obtain information from other VMs defeats much of the point of isolation, and so defeats much of the point of why people use qubes.

> For example, any offline vault VM storing secrets stayed secure. This is just not happening with any other security approach.

That's not true. Strong MAC would suffice, no VT-d needed.

> Speculative sidechannel attacks have nothing to do with OS or compartmentalization technology

Of course they do, in fact they have more to do with it than solutions like flatpak, which is why Qubes releases security advisories and patches to address those vulnerabilities.


>> Apart from the fact that this is extremely rare,

> So are bubblewrap escapes, which is the sandbox flatpak uses.

Not only they are much more frequent, including possibly kernel privilege escalations, not affecting Qubes, - the bubblewrap repository itself says that you have to be really careful to stay secure with it, even in the lack of vulnerabilities. This is not what people should seriously rely on. Again, my secrets in vault VM are safe since the introduction of VT-d in Qubes 4.0 in ~2021. There is no comparably secure OS in the world.

I don't understand your unsubstantiated attack on Qubes.

> and being able to obtain information from other VMs defeats much of the point of isolation

It does not. Even if a VM becomes hostile and starts reading the RAM, it will not get any privileges in any other VM. Also, it can be easily cleaned. Also, you can just stop all VMs when performing a secure operation. Tell me how you protect yourself in such case with Flatpak.


> Not only they are much more frequent, including possibly kernel privilege escalations,

No, that's simply not the case.

> not affecting Qubes,

Maybe, qubese would still be vulnerable to kernel vulnerabilities even if they didn't allow VM escape - anything in the disposable VM would be at risk.

> the bubblewrap repository itself says that you have to be really careful to stay secure with it, even in the lack of vulnerabilities.

Source? I assume they are referring to misconfigurations.

> There is no comparably secure OS in the world.

You've said before you don't have a lot of security knowledge and it continues to show. Qubes is one specific approach to a problem not suitable for all goals, it's useful for hobbyists who use browsers and such. Anything in the disposable VM is still at risk.

SEL4, ASOS and CuBit are all more secure than Qubes. Qubes doesn't offer any more security than having a bunch of different machines to do different tasks on. Not even airgapped. If the machines have a vulnerability, then whatever is on the machine is fair game.

> I don't understand your unsubstantiated attack on Qubes.

There is no attack, I'm just refuting your preposterous zealotry for it. It's fine for what it is, but you make it much more than what it is. The developers of Qubes would absolutely disagree with your claims.

> Even if a VM becomes hostile and starts reading the RAM, it will not get any privileges in any other VM.

That depends entirely on the vulnerability.


> No, that's simply not the case.

You keep repeating this without providing any actual statistics. I provided statistics about Qubes vulnerabilities, https://www.qubes-os.org/security/xsa/. Show me the numbers please.

> anything in the disposable VM would be at risk.

This just shows that you don't understand the security approach of Qubes. You do not store anything important in a disposable. You run it specifically for one task of opening something untrusted and then it's destroyed. It's in the name: Disposable. Moreover, nothing prevents you from running Bubblewrap inside Qubes. Then one single VM will be as secure as your whole setup, and in addition, you get reliable isolation.

> Source? I assume they are referring to misconfigurations

You never give any actual reference, only I have to. Here you go: https://github.com/containers/bubblewrap.

> bubblewrap is not a complete, ready-made sandbox with a specific security policy.

> As a result, the level of protection between the sandboxed processes and the host system is entirely determined by the arguments passed to bubblewrap.

> Everything mounted into the sandbox can potentially be used to escalate privileges.

This is not a robust system designed for security first. You can use this to be (much) more secure than otherwise, but it's not a security-oriented design, unlike Qubes.

> Anything in the disposable VM is still at risk.

Which means nothing. Disposable can't store anything, it's destroyed every time you stop it.

> You've said before you don't have a lot of security knowledge and it continues to show.

I see the same about you. You keep repeating some myths about Qubes OS based on misunderstandings of its security approach. I don't have to be a professional in security to understand simple concepts. Qubes is not an OS made for professionals but for users.

> Qubes doesn't offer any more security than having a bunch of different machines to do different tasks on.

Yes, it does: https://doc.qubes-os.org/en/latest/introduction/faq.html#how...

> SEL4, ASOS and CuBit are all more secure than Qubes.

Do I have to trust you on this, or do you have any reasonable reference to security people? You don't even provide your threat model when saying this, which clearly shows how amateur your approach to security is.

> I'm just refuting your preposterous zealotry for it

Relying on professionals in the field is not zealotry. In contrast, you show exactly the latter. I see no references.

> The developers of Qubes would absolutely disagree with your claims.

This is plain false:

https://doc.qubes-os.org/en/latest/introduction/faq.html#wha...

https://doc.qubes-os.org/en/latest/introduction/faq.html#how...

https://doc.qubes-os.org/en/latest/introduction/faq.html#wha...

https://doc.qubes-os.org/en/latest/introduction/faq.html#why...


> You keep repeating this without providing any actual statistics. I provided statistics about Qubes vulnerabilities, https://www.qubes-os.org/security/xsa/. Show me the numbers please.

You can find this yourself. For any software running in the guest OS, you can look up it's security history.

> This just shows that you don't understand the security approach of Qubes. You do not store anything important in a disposable. You run it specifically for one task of opening something untrusted and then it's destroyed. It

I understand it perfectly, but you seem to be missing my point. Yes, the qubes are disposable, but you need to have information in them while you are using them, yes? So, you make a new qubes to do your taxes, your tax information is in the qubes because you need it to do that. While the qube is running, if it is vulnerable, then that information is at risk. I get that it is no longer at risk once the qube is destroyed, but that is irrelevant to my point.

Consider an example, back in 2024 if you were running SSH in a Qubes for some reason, you would likely be vulnerable to the regreSSHion vulnerability. Sure, an attacker could only access what was on the disposable VM, but that could still be a lot.

> You never give any actual reference, only I have to. Here you go: https://github.com/containers/bubblewrap.

This source doesn't support your claim.

> This is not a robust system designed for security first. You can use this to be (much) more secure than otherwise, but it's not a security-oriented design, unlike Qubes.

Neither is qubes. It's designed for specific use cases, and doesn't do much to protect the information running within a qube aside from destroying it after disposing of it.

> Which means nothing. Disposable can't store anything, it's destroyed every time you stop it.

It's at risk while the VM is running, which is the point.

> Yes, it does: https://doc.qubes-os.org/en/latest/introduction/faq.html#how...

No, it doesn't. Those points are rather nonsense. Malware that can bridge airgapped systems? Sure, if you have a compromised USB stick and stupidly run something from it, I guess. The disposable VM would be at risk also.

> Do I have to trust you on this, or do you have any reasonable reference to security people? You don't even provide your threat model when saying this, which clearly shows how amateur your approach to security is.

You have no security knowledge at all, though, you just repeat your chosen solution because it's FLOSS. It makes this discussion very frustrating. Do you understand anything about capabilities, mandatory access controls or formal verification?

> Relying on professionals in the field is not zealotry.

You are exaggerating claims you can't backup in a field you don't understand due to the software meeting your only real criteria, being FLOSS. That is absolutely zealotry.

> This is plain false:

Not only do your links not support your exaggerated claims at all, meaning I am correct the author would absolutely not agree with you, but the FAQ entry dismissing formal verification and safe languages refers to a paper from 2010 - back when Rust didn't even exist. You might not know this, but the tech world moves pretty fast...

Do me a favor, spend some time with your favorite FLOSS AI and ask it why SEL4 would be considered superior to Qubes from a security perspective.


You refuse to provide any references. I don't see a reason to continue the discussion.

You also reply to my references with shallow dismissals with no substance presenting that as facts ("Not only do your links not support your exaggerated claims at all")

You give examples how Qubes can't save you from absolutely everything. It's true. Yet your original claim is that Flatpac is similarly secure and you failed to explain how it would protect from the same problems.

> spend some time with your favorite FLOSS AI

They do not exist, only open-weight ones do.


> You refuse to provide any references.

Why is there a need for references? Do you not understand how VMs work? Do you dispute that software running in the VM can be vulnerable?

> You also reply to my references with shallow dismissals with no substance presenting that as facts ("Not only do your links not support your exaggerated claims at all")

Because your 'references' don't support your claims, it's that simple. You can't just copy and paste links and act like you have provided evidence when the links don't match. Your claim doesn't appear on the Bubblewrap github page at all.

> Yet your original claim is that Flatpac is similarly secure and you failed to explain how it would protect from the same problems.

Vulnerable software running in a Bubblewrap sandbox and in a Qubes VM are both similarly vulnerable to software vulnerabilities, and it is unlikely an attacker would be able to escape the sandbox or the VM. I grant that escaping the sandbox is easier and more common, but not by much.

Your first key point was that Bubblewrap vulnerabilities happen all the time, and you've yet to support that. The only 'reference' you provided was to the Bubblewrap github page.

> They do not exist, only open-weight ones do.

And of course you don't trust anything that isn't FLOSS, right?

Still: https://en.wikipedia.org/wiki/Apertus_(LLM)


Qubes doesn't compartmentalize the image decoder in a web browser from the rest of the renderer, and if you're serving tracking pixels and can exploit image decoding, you can make serious mischief.

If you use Qubes correctly, then VM in which you go to untrusted websites is disposable and contains no personal information, so there is no mischief to make.

The web page you are visiting contains personal information, and that is where the mischief can be made. All that is required is for the website to incorrectly trust an image, either by not sanitizing a user-uploaded image or by embedding a third party image. Both trust bugs are rampant on the web, and both have caused problems in the past. Adding an improperly vetted image decoder is a sure-fire way to get exploit authors salivating.

> The web page you are visiting contains personal information, and that is where the mischief can be made.

This is a weird threat model. You trust some website with your personal information but you don't trust that images they embed are trusted and will not attack you. Nothing will save you here except switching off showing pictures, which you can also do on Qubes.

I would say, if they really embed malicious images, then they probably have other problems with security, which nothing you run can help with.


> Nothing will save you here except switching off showing pictures

Or having a trustable image decoder, which is what web browsers actually do. This is a basic requirement that you are proposing to do away with by instead not showing images at all.


> trustable image decoder

This may never exist, since all software have bugs. Instead, you can isolate opening your pictures into a different VM, keeping this VM safe.

> what web browsers actually do

Haven't we seen related vulnerabilities?


> This may never exist

It's existed for years. https://chromium.googlesource.com/chromium/src/+/HEAD/third_...

Similarly, the JPEG XL decoder Chromium integrated is written in Rust, eliminating large classes of exploitable errors.

> Haven't we seen related vulnerabilities?

Repeatedly. That's why browser vendors are careful about adding new image decoders, and no, Qubes does not solve the problem.


Python is a typed language. Perhaps you were trying to say something different?

Is it static or dynamic? Whatever rust is that python isn’t.

Rust is static. Python is optionally static.

Python type hints are static - at the moment, they are advisory only, but there is an obvious route forward to making Python an (optionally) fully statically typed language by using static type checking on programs before execution.

Didn't The Powers That Be™ say that was not going to happen?

I might be missing the point but isn’t this what we use mypy et al for today?

They clearly meant a statically typed language. Yes Python is Strongly Typed, but I think we all knew what they meant.

And we'd be wrong about that. Different domains are showing wildly different characteristics, with some ML models showing superhuman or expert level performance in some domains (chess, face and handwriting recognition for example) and promising but as yet just not good enough in other domains (radiography, self-driving cars, question answering, prose writing). Currently coding is somewhere in the middle; superhuman in some ways, disappointingly unusable in others.

I don't we can make any conclusive verdict about the promise of ML for radiography right now; the life-critical nature of the application it's in the unusable middle, but it might get better in a few years or it might not. Time will tell.


The archive link above is broken: this is an earlier archived copy of that page with content intact:

https://web.archive.org/web/20230713101725/http://bactra.org...


Some pages have 'semi-protection' or 'extended semi-protection', where a user must have a Wikipedia account which must have made a certain number of edits and be older than a specified time period.

However, this isn't one of them.

You can edit it immediately, either with or without creating an account.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: