frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Economists vs. Technologists on AI

https://ideasindevelopment.substack.com/p/economists-vs-technologists-on-ai
1•econlmics•1m ago•0 comments

Life at the Edge

https://asadk.com/p/edge
1•tosh•7m ago•0 comments

RISC-V Vector Primer

https://github.com/simplex-micro/riscv-vector-primer/blob/main/index.md
2•oxxoxoxooo•11m ago•1 comments

Show HN: Invoxo – Invoicing with automatic EU VAT for cross-border services

2•InvoxoEU•11m ago•0 comments

A Tale of Two Standards, POSIX and Win32 (2005)

https://www.samba.org/samba/news/articles/low_point/tale_two_stds_os2.html
2•goranmoomin•15m ago•0 comments

Ask HN: Is the Downfall of SaaS Started?

3•throwaw12•16m ago•0 comments

Flirt: The Native Backend

https://blog.buenzli.dev/flirt-native-backend/
2•senekor•18m ago•0 comments

OpenAI's Latest Platform Targets Enterprise Customers

https://aibusiness.com/agentic-ai/openai-s-latest-platform-targets-enterprise-customers
1•myk-e•20m ago•0 comments

Goldman Sachs taps Anthropic's Claude to automate accounting, compliance roles

https://www.cnbc.com/2026/02/06/anthropic-goldman-sachs-ai-model-accounting.html
2•myk-e•23m ago•3 comments

Ai.com bought by Crypto.com founder for $70M in biggest-ever website name deal

https://www.ft.com/content/83488628-8dfd-4060-a7b0-71b1bb012785
1•1vuio0pswjnm7•24m ago•1 comments

Big Tech's AI Push Is Costing More Than the Moon Landing

https://www.wsj.com/tech/ai/ai-spending-tech-companies-compared-02b90046
3•1vuio0pswjnm7•26m ago•0 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
2•1vuio0pswjnm7•27m ago•0 comments

Suno, AI Music, and the Bad Future [video]

https://www.youtube.com/watch?v=U8dcFhF0Dlk
1•askl•29m ago•2 comments

Ask HN: How are researchers using AlphaFold in 2026?

1•jocho12•32m ago•0 comments

Running the "Reflections on Trusting Trust" Compiler

https://spawn-queue.acm.org/doi/10.1145/3786614
1•devooops•37m ago•0 comments

Watermark API – $0.01/image, 10x cheaper than Cloudinary

https://api-production-caa8.up.railway.app/docs
1•lembergs•39m ago•1 comments

Now send your marketing campaigns directly from ChatGPT

https://www.mail-o-mail.com/
1•avallark•42m ago•1 comments

Queueing Theory v2: DORA metrics, queue-of-queues, chi-alpha-beta-sigma notation

https://github.com/joelparkerhenderson/queueing-theory
1•jph•54m ago•0 comments

Show HN: Hibana – choreography-first protocol safety for Rust

https://hibanaworks.dev/
5•o8vm•56m ago•1 comments

Haniri: A live autonomous world where AI agents survive or collapse

https://www.haniri.com
1•donangrey•57m ago•1 comments

GPT-5.3-Codex System Card [pdf]

https://cdn.openai.com/pdf/23eca107-a9b1-4d2c-b156-7deb4fbc697c/GPT-5-3-Codex-System-Card-02.pdf
1•tosh•1h ago•0 comments

Atlas: Manage your database schema as code

https://github.com/ariga/atlas
1•quectophoton•1h ago•0 comments

Geist Pixel

https://vercel.com/blog/introducing-geist-pixel
2•helloplanets•1h ago•0 comments

Show HN: MCP to get latest dependency package and tool versions

https://github.com/MShekow/package-version-check-mcp
1•mshekow•1h ago•0 comments

The better you get at something, the harder it becomes to do

https://seekingtrust.substack.com/p/improving-at-writing-made-me-almost
2•FinnLobsien•1h ago•0 comments

Show HN: WP Float – Archive WordPress blogs to free static hosting

https://wpfloat.netlify.app/
1•zizoulegrande•1h ago•0 comments

Show HN: I Hacked My Family's Meal Planning with an App

https://mealjar.app
1•melvinzammit•1h ago•0 comments

Sony BMG copy protection rootkit scandal

https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
2•basilikum•1h ago•0 comments

The Future of Systems

https://novlabs.ai/mission/
2•tekbog•1h ago•1 comments

NASA now allowing astronauts to bring their smartphones on space missions

https://twitter.com/NASAAdmin/status/2019259382962307393
2•gbugniot•1h ago•0 comments
Open in hackernews

Can We Trust CVE?

https://opensourcesecurity.io/2025/04-can-we-trust-cve/
58•gpi•9mo ago

Comments

leoqa•9mo ago
The post spends too much time speculating about how CVE is mismanaged without providing anything beyond their unmet expectations. Pointing to VulnCon attendance as an act of betrayal seems pretty reductive.

Didn’t make it through the rest, it was too hyperbolic and opinionated without substance.

tptacek•9mo ago
I read this twice trying to figure out why it matters if we trust NVD. It's a number assigned to vulnerability reports; that's it. Who cares?
112233•9mo ago
Because in many cases the CVE vulnerability report is used as a proxy for existance of a vulnerability by many: from clickbait journalism, to automated tool vendors and device procurement. It is, after all, published by a reputable source.

Then, you get a report, say, that calling X with malicious data causes reboot. DoS! But software vendor looks at it and sees that in order to call X you need so much permissions, you can do reboot directly. What now?

Also, not every report submitted to be published as CVE goes immedeately public. Where does it go? If there is CVE about RCE in popular software, who knew about it before it went public?

vrighter•9mo ago
because you end up spending a non-trivial amount of time with "soc analysts" bugging you about a bluetooth vulnerability on an os installed on a virtual machine on a server that lacks bluetooth hardware, for example
MattPalmer1086•9mo ago
This is an unfortunate truth of a lot of security people and processes. A blind checkbox-oriented "CVE reported so must fix" approach.

I just had one where we were asked to remove a management client for an internal server that had a DOS vulnerability reported (which could not be triggered by the management client). I pointed out that removing the client does not mitigate the DOS issue - and we would be effectively causing a denial of service on ourselves! No dice. Scan shows vulnerable version, must make number of reported vulns go down. Zero thought, huge effort.

It does huge damage to security and the business to take this kind of approach, but it's depressingly common.

esseph•9mo ago
It's because legal liability is tied up in it and therefore insurance.
MattPalmer1086•9mo ago
That may explain some of it, but I've seen it all over, including in places I know that is not the case.

Mostly I think it boils down to a combination of a CYA mentality, risk averse managers and unskilled security personnel.

Making a decision that this Critical (potential) vulnerability does not need fixing is a decision that none of the above want to make and stand by, or have to explain.

zingababba•9mo ago
This is why CVE sucks, no context.
betaby•9mo ago
That's how it work in our company.
MattPalmer1086•9mo ago
It's about trust that the information is going to be up to date and reliable and available. This means we need trust in the organisation that manages this.

We've had no real updates to the existing CVEs for over a year now - lots of them just pending assessment. The communication about it has been misleading or non existent. Then the recent funding issue which threatened to close it down entirely, followed by maybe 11 more months of it? Who knows.

A huge number of infosec processes and tools depend on CVEs and the NVD as the main source of them.

So the trust is gone or rapidly going. We are all looking around in the infosec community and wondering what comes next.

neilv•9mo ago
The author spoke of uncertainty that CVE will be around, and also said that some parties involved didn't appear forthright on some occasions. What wasn't clear to me is the "What's your threat model?" here.
yellowapple•9mo ago
I'd guess the threat model to include things like "How likely is this org to disappear from the face of the Earth?" and "How susceptible is this org going to be to outside influences that have priorities higher than the honest/accurate/timely reporting of vulnerabilities?".
neilv•9mo ago
> If this is a topic you’re interested in, there’s a discord chocked full of people discussing vulnerability things, feel free to join.

Are open-source-y type infosec people choosing Discord?

anonym29•9mo ago
The modern infosec scene has shockingly little in common with the old school cypherpunk / hacker scene, besides appropriating the aesthetics and lingo.

Many of the people in it are even pro-information-censorship, pro-government, pro-intelligence-agencies, pro-big tech, etc. They have zero concerns about proprietary software, they trust Microsoft, they trust Google/Alphabet, they trust their government.

In my experience talking with these types, many of the same ones hysterical about MITRE's taxpayer-funded contract ending have seemingly never ever heard of OSVDB - the idea of a community-run vulnerability database is foreign to them. They seem to believe that it's simply not possible for a non-government-funded entity to perform this kind of work without commercialization.

Offensive Security - the company behind the OSCP, OSEP (formerly OSCE), and OSEE - have their official, primary support through Discord first, their own forums second.

notepad0x90•9mo ago
Some. Others are on Matrix. The type of people you're thinking of are either interested in secure development (programmers with a security interest) or cryptography. Either they choose wherever the project's chat platform is or it's discord typically.
bitwize•9mo ago
Discord provides the feature set people are used to. Therefore, it gets used.

Today's programmers got into it through Minecraft modding or similar. IRC, mailing lists, and forums just don't cut it for them. By contrast, the retrocomputing scene -- full of aging Xers -- often conducts its activities through Web 1.0 style forums.

yellowapple•9mo ago
I'm glad I ain't the only one who understands that transparency is a dependency of trust.