Ask HN: Why hasn't x86 caught up with Apple M series?
419 points by stephenheron 2d ago 600 comments
Ask HN: Best codebases to study to learn software design?
100 points by pixelworm 3d ago 89 comments
Stop squashing your commits. You're squashing your AI too
4 points by jannesblobel 1d ago 9 comments
OAuth Device Flow Vulnerabilities: Analysis of 2024-2025 Attack Wave
2 guptadeepak 1 8/27/2025, 6:41:17 PM guptadeepak.com ↗
The critical issue stems from attacker exploitation of insufficient user code verification and token issuance processes, enabling device flow hijacking and abuse at scale. Notably, the challenge of securely binding device codes to legitimate users remains unresolved, especially in constrained input environments.
How are you addressing the trade-offs between user convenience and security in OAuth device flows?