frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Amazon no longer defend cloud customers against video patent infringement claims

https://ipfray.com/amazon-no-longer-defends-cloud-customers-against-video-patent-infringement-cla...
1•ffworld•18s ago•0 comments

Show HN: Medinilla – an OCPP compliant .NET back end (partially done)

https://github.com/eliodecolli/Medinilla
2•rhcm•3m ago•0 comments

How Does AI Distribute the Pie? Large Language Models and the Ultimatum Game

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6157066
1•dkga•3m ago•1 comments

Resistance Infrastructure

https://www.profgalloway.com/resistance-infrastructure/
2•samizdis•8m ago•0 comments

Fire-juggling unicyclist caught performing on crossing

https://news.sky.com/story/fire-juggling-unicyclist-caught-performing-on-crossing-13504459
1•austinallegro•8m ago•0 comments

Restoring a lost 1981 Unix roguelike (protoHack) and preserving Hack 1.0.3

https://github.com/Critlist/protoHack
2•Critlist•10m ago•0 comments

GPS and Time Dilation – Special and General Relativity

https://philosophersview.com/gps-and-time-dilation/
1•mistyvales•13m ago•0 comments

Show HN: Witnessd – Prove human authorship via hardware-bound jitter seals

https://github.com/writerslogic/witnessd
1•davidcondrey•13m ago•1 comments

Show HN: I built a clawdbot that texts like your crush

https://14.israelfirew.co
2•IsruAlpha•15m ago•1 comments

Scientists reverse Alzheimer's in mice and restore memory (2025)

https://www.sciencedaily.com/releases/2025/12/251224032354.htm
1•walterbell•18m ago•0 comments

Compiling Prolog to Forth [pdf]

https://vfxforth.com/flag/jfar/vol4/no4/article4.pdf
1•todsacerdoti•20m ago•0 comments

Show HN: Cymatica – an experimental, meditative audiovisual app

https://apps.apple.com/us/app/cymatica-sounds-visualizer/id6748863721
1•_august•21m ago•0 comments

GitBlack: Tracing America's Foundation

https://gitblack.vercel.app/
2•martialg•21m ago•0 comments

Horizon-LM: A RAM-Centric Architecture for LLM Training

https://arxiv.org/abs/2602.04816
1•chrsw•21m ago•0 comments

We just ordered shawarma and fries from Cursor [video]

https://www.youtube.com/shorts/WALQOiugbWc
1•jeffreyjin•22m ago•1 comments

Correctio

https://rhetoric.byu.edu/Figures/C/correctio.htm
1•grantpitt•22m ago•0 comments

Trying to make an Automated Ecologist: A first pass through the Biotime dataset

https://chillphysicsenjoyer.substack.com/p/trying-to-make-an-automated-ecologist
1•crescit_eundo•27m ago•0 comments

Watch Ukraine's Minigun-Firing, Drone-Hunting Turboprop in Action

https://www.twz.com/air/watch-ukraines-minigun-firing-drone-hunting-turboprop-in-action
1•breve•27m ago•0 comments

Free Trial: AI Interviewer

https://ai-interviewer.nuvoice.ai/
1•sijain2•27m ago•0 comments

FDA intends to take action against non-FDA-approved GLP-1 drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
21•randycupertino•29m ago•11 comments

Supernote e-ink devices for writing like paper

https://supernote.eu/choose-your-product/
3•janandonly•31m ago•0 comments

We are QA Engineers now

https://serce.me/posts/2026-02-05-we-are-qa-engineers-now
1•SerCe•32m ago•0 comments

Show HN: Measuring how AI agent teams improve issue resolution on SWE-Verified

https://arxiv.org/abs/2602.01465
2•NBenkovich•32m ago•0 comments

Adversarial Reasoning: Multiagent World Models for Closing the Simulation Gap

https://www.latent.space/p/adversarial-reasoning
1•swyx•32m ago•0 comments

Show HN: Poddley.com – Follow people, not podcasts

https://poddley.com/guests/ana-kasparian/episodes
1•onesandofgrain•40m ago•0 comments

Layoffs Surge 118% in January – The Highest Since 2009

https://www.cnbc.com/2026/02/05/layoff-and-hiring-announcements-hit-their-worst-january-levels-si...
13•karakoram•40m ago•0 comments

Papyrus 114: Homer's Iliad

https://p114.homemade.systems/
1•mwenge•40m ago•1 comments

DicePit – Real-time multiplayer Knucklebones in the browser

https://dicepit.pages.dev/
1•r1z4•40m ago•1 comments

Turn-Based Structural Triggers: Prompt-Free Backdoors in Multi-Turn LLMs

https://arxiv.org/abs/2601.14340
2•PaulHoule•42m ago•0 comments

Show HN: AI Agent Tool That Keeps You in the Loop

https://github.com/dshearer/misatay
2•dshearer•43m ago•0 comments
Open in hackernews

What DOGE and its affiliates are doing with government systems and data [pdf]

https://oversight.house.gov/wp-content/uploads/2025/06/Schneier-Written-Testimony.pdf
32•ripe•8mo ago

Comments

malshe•8mo ago
Gemini 2.5 summary and highlights:

[cite_start]This report, based on the expert testimony of cybersecurity specialist Bruce Schneier and supplementary documents, outlines the significant cybersecurity risks created by the Department of Government Efficiency (DOGE). [cite: 1, 2, 3, 4] [cite_start]The central argument is that DOGE's approach to data management has dangerously weakened the U.S. government's security posture, creating unprecedented threats to national security and individual privacy. [cite: 4, 119]

### Key Findings:

*DOGE's Approach to Data:* * [cite_start]*Data Consolidation:* DOGE has been exfiltrating and connecting vast government databases to create a single, comprehensive pool of data on all people in the United States. [cite: 25, 27] [cite_start]This includes highly sensitive information such as tax returns, health records, social security numbers, and military service records. [cite: 21, 27, 138, 139, 140, 144] * [cite_start]*Reduced Security:* The program has consistently bypassed and disabled critical security measures. [cite: 4] [cite_start]This includes removing access controls, failing to vet staff with the required background checks, and creating unmonitored copies of data. [cite: 28, 29, 76] * [cite_start]*Use of AI:* DOGE is processing the consolidated data with AI tools, which exposes sensitive information outside of securely monitored environments and is being used to train AI models. [cite: 30, 191, 194] * [cite_start]*Outsourcing:* Control over data access is being transferred to private companies, notably Palantir, which has been reported to be working on projects without signed contracts outlining security measures. [cite: 31, 33, 34]

*Major Cybersecurity Risks:* * [cite_start]*Attractive Target for Adversaries:* The consolidation of disparate data streams has created a massive and highly attractive target for foreign and domestic adversaries. [cite: 4, 69] [cite_start]There is evidence of near real-time login attempts by users with Russian IP addresses using correct DOGE staff credentials. [cite: 39, 40] * [cite_start]*Coercion and Blackmail:* The accessible data can be used to blackmail, threaten, or harass individuals, including public officials and their families. [cite: 43, 46, 48] [cite_start]This can be achieved by weaponizing seemingly innocuous data like home addresses or more sensitive information related to health or finances. [cite: 47, 49] * [cite_start]*Cyberwarfare Preparation:* Adversaries can use the data to prepare for future conflicts by identifying vulnerabilities and targeting critical infrastructure or key individuals. [cite: 59, 62] [cite_start]The security breaches could allow for the installation of backdoors in crucial systems like the Treasury Payments System. [cite: 65] * [cite_start]*System Manipulation and Control:* The lax security practices create risks of data exposure, system manipulation, and complete system control by external actors. [cite: 230, 232, 235] [cite_start]This could lead to the alteration of records, denial of essential services, and the installation of ransomware. [cite: 248, 252, 254]

*Specific Examples and Consequences:* * [cite_start]DOGE personnel gained extensive "read" and sometimes "edit" access to critical systems at the Treasury Department, the Consumer Financial Protection Bureau, the Center for Medicare and Medicaid Services, and Veterans Affairs, among others. [cite: 17, 18, 20, 21, 22] * [cite_start]The 2015 hack of the Office of Personnel Management (OPM) by China, which was considered a massive security threat, pales in comparison to the potential data exposure from the combined DOGE datasets. [cite: 71, 73] * [cite_start]The lack of proper security protocols means that auditing what data has been copied and by whom is nearly impossible. [cite: 93] [cite_start]The report warns that government data on U.S. citizens could gradually appear on dark networks for years to come. [cite: 94] * [cite_start]Errors in the consolidated data, whether accidental or deliberately introduced by adversaries, could propagate through the system, leading to incorrect denial of benefits or the targeting of individuals for fraud. [cite: 102, 104, 106]

*Recommendations:* [cite_start]To mitigate these risks, the report recommends immediate action, including revoking DOGE's access, conducting a full forensic analysis of the systems, treating all affected systems as potentially compromised, rebuilding critical systems, and conducting an independent security assessment. [cite: 346, 349, 350, 351, 352] [cite_start]The report stresses that continued access exacerbates the damage, making recovery more difficult and increasing the risk of irreversible harm. [cite: 96, 353]

e2le•8mo ago
https://www.youtube.com/watch?v=wKkk-uWi7HM