frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

NewASM Virtual Machine

https://github.com/bracesoftware/newasm
1•DEntisT_•1m ago•0 comments

Terminal-Bench 2.0 Leaderboard

https://www.tbench.ai/leaderboard/terminal-bench/2.0
1•tosh•1m ago•0 comments

I vibe coded a BBS bank with a real working ledger

https://mini-ledger.exe.xyz/
1•simonvc•1m ago•1 comments

The Path to Mojo 1.0

https://www.modular.com/blog/the-path-to-mojo-1-0
1•tosh•4m ago•0 comments

Show HN: I'm 75, building an OSS Virtual Protest Protocol for digital activism

https://github.com/voice-of-japan/Virtual-Protest-Protocol/blob/main/README.md
3•sakanakana00•7m ago•0 comments

Show HN: I built Divvy to split restaurant bills from a photo

https://divvyai.app/
3•pieterdy•10m ago•0 comments

Hot Reloading in Rust? Subsecond and Dioxus to the Rescue

https://codethoughts.io/posts/2026-02-07-rust-hot-reloading/
3•Tehnix•10m ago•1 comments

Skim – vibe review your PRs

https://github.com/Haizzz/skim
2•haizzz•12m ago•1 comments

Show HN: Open-source AI assistant for interview reasoning

https://github.com/evinjohnn/natively-cluely-ai-assistant
3•Nive11•12m ago•4 comments

Tech Edge: A Living Playbook for America's Technology Long Game

https://csis-website-prod.s3.amazonaws.com/s3fs-public/2026-01/260120_EST_Tech_Edge_0.pdf?Version...
2•hunglee2•16m ago•0 comments

Golden Cross vs. Death Cross: Crypto Trading Guide

https://chartscout.io/golden-cross-vs-death-cross-crypto-trading-guide
2•chartscout•18m ago•0 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
3•AlexeyBrin•21m ago•0 comments

What the longevity experts don't tell you

https://machielreyneke.com/blog/longevity-lessons/
2•machielrey•22m ago•1 comments

Monzo wrongly denied refunds to fraud and scam victims

https://www.theguardian.com/money/2026/feb/07/monzo-natwest-hsbc-refunds-fraud-scam-fos-ombudsman
3•tablets•27m ago•1 comments

They were drawn to Korea with dreams of K-pop stardom – but then let down

https://www.bbc.com/news/articles/cvgnq9rwyqno
2•breve•29m ago•0 comments

Show HN: AI-Powered Merchant Intelligence

https://nodee.co
1•jjkirsch•32m ago•0 comments

Bash parallel tasks and error handling

https://github.com/themattrix/bash-concurrent
2•pastage•32m ago•0 comments

Let's compile Quake like it's 1997

https://fabiensanglard.net/compile_like_1997/index.html
2•billiob•33m ago•0 comments

Reverse Engineering Medium.com's Editor: How Copy, Paste, and Images Work

https://app.writtte.com/read/gP0H6W5
2•birdculture•38m ago•0 comments

Go 1.22, SQLite, and Next.js: The "Boring" Back End

https://mohammedeabdelaziz.github.io/articles/go-next-pt-2
1•mohammede•44m ago•0 comments

Laibach the Whistleblowers [video]

https://www.youtube.com/watch?v=c6Mx2mxpaCY
1•KnuthIsGod•45m ago•1 comments

Slop News - The Front Page right now but it's only Slop

https://slop-news.pages.dev/slop-news
1•keepamovin•50m ago•1 comments

Economists vs. Technologists on AI

https://ideasindevelopment.substack.com/p/economists-vs-technologists-on-ai
1•econlmics•52m ago•0 comments

Life at the Edge

https://asadk.com/p/edge
4•tosh•58m ago•0 comments

RISC-V Vector Primer

https://github.com/simplex-micro/riscv-vector-primer/blob/main/index.md
4•oxxoxoxooo•1h ago•1 comments

Show HN: Invoxo – Invoicing with automatic EU VAT for cross-border services

2•InvoxoEU•1h ago•0 comments

A Tale of Two Standards, POSIX and Win32 (2005)

https://www.samba.org/samba/news/articles/low_point/tale_two_stds_os2.html
4•goranmoomin•1h ago•0 comments

Ask HN: Is the Downfall of SaaS Started?

4•throwaw12•1h ago•0 comments

Flirt: The Native Backend

https://blog.buenzli.dev/flirt-native-backend/
3•senekor•1h ago•0 comments

OpenAI's Latest Platform Targets Enterprise Customers

https://aibusiness.com/agentic-ai/openai-s-latest-platform-targets-enterprise-customers
2•myk-e•1h ago•0 comments
Open in hackernews

Outdated Internet Routers a Cybersecurity Risk, FBI Says

https://www.govtech.com/security/outdated-internet-routers-a-cybersecurity-risk-fbi-says
4•rmason•8mo ago

Comments

AStonesThrow•8mo ago
I would say that any consumer router is a security risk. Yes, EOL are the worst, but the way I have seen CVEs come up for every router and just the lack of concern for this in the embedded router OS field, it is better to have no router at all.

I opted for an ISP-rented and ISP-firmware router, and that's the best I can do. Whatever nefarious hackers get on it, let my ISP worry about fighting. There was simply no way, in good conscience, I could manage my own network device anymore, because there are simply no tools to do it.

See, I had purchased a Nighthawk. I subscribed to their "Advanced Cybersecurity" service which was a joke. It didn't secure the router at all. Made things worse. A lot of theater and blinkenlights for no reason.

There are no tools for securing consumer routers. There's no good sniffer, there's no AV/antimalware suite to run on a router, the router's ports can be naked and open, there's no good protection if you make a boneheaded configuration choice.

Your router is on the edge of your network and it's not protected by NAT. Therefore it's the juiciest and easiest target to attack. The logging is shitty. Nobody reads those logs. The logs are meaningless if you read them. "Oh, blocked DDOS attack from x.x.x.x?" Like the logs are still crowing about blocking SMURF or something.

OpenWRT, DD-WRT, and Tomato - don't get me started I had a DD-WRT firmware that was pwned anyway. Where do you trustingly download these images from? Why wouldn't they have the same problems as consumer router OS? Pointless. Way too complicated! If I want security I need simplicity. Make it less possible to configure wrong. Make it less possible to run a bad service. Make the attack surface smaller. All the "open" router OS just widened my attack surface like crazy.

wmf•8mo ago
I trust a Google/Nest router (only one serious CVE in history AFAIK) over every ISP router.
AStonesThrow•8mo ago
It has been experimentally determined, and clinically proven, that immersion in a strong solution of fluoridated water will stop most router-based malware in its tracks, and prevent future intrusion by network-based threat actors. Science