frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Near-Instantly Aborting the Worst Pain Imaginable with Psychedelics

https://psychotechnology.substack.com/p/near-instantly-aborting-the-worst
1•eatitraw•2m ago•0 comments

Show HN: Nginx-defender – realtime abuse blocking for Nginx

https://github.com/Anipaleja/nginx-defender
2•anipaleja•2m ago•0 comments

The Super Sharp Blade

https://netzhansa.com/the-super-sharp-blade/
1•robin_reala•4m ago•0 comments

Smart Homes Are Terrible

https://www.theatlantic.com/ideas/2026/02/smart-homes-technology/685867/
1•tusslewake•5m ago•0 comments

What I haven't figured out

https://macwright.com/2026/01/29/what-i-havent-figured-out
1•stevekrouse•6m ago•0 comments

KPMG pressed its auditor to pass on AI cost savings

https://www.irishtimes.com/business/2026/02/06/kpmg-pressed-its-auditor-to-pass-on-ai-cost-savings/
1•cainxinth•6m ago•0 comments

Open-source Claude skill that optimizes Hinge profiles. Pretty well.

https://twitter.com/b1rdmania/status/2020155122181869666
2•birdmania•6m ago•1 comments

First Proof

https://arxiv.org/abs/2602.05192
2•samasblack•8m ago•1 comments

I squeezed a BERT sentiment analyzer into 1GB RAM on a $5 VPS

https://mohammedeabdelaziz.github.io/articles/trendscope-market-scanner
1•mohammede•10m ago•0 comments

Kagi Translate

https://translate.kagi.com
2•microflash•10m ago•0 comments

Building Interactive C/C++ workflows in Jupyter through Clang-REPL [video]

https://fosdem.org/2026/schedule/event/QX3RPH-building_interactive_cc_workflows_in_jupyter_throug...
1•stabbles•11m ago•0 comments

Tactical tornado is the new default

https://olano.dev/blog/tactical-tornado/
1•facundo_olano•13m ago•0 comments

Full-Circle Test-Driven Firmware Development with OpenClaw

https://blog.adafruit.com/2026/02/07/full-circle-test-driven-firmware-development-with-openclaw/
1•ptorrone•14m ago•0 comments

Automating Myself Out of My Job – Part 2

https://blog.dsa.club/automation-series/automating-myself-out-of-my-job-part-2/
1•funnyfoobar•14m ago•0 comments

Google staff call for firm to cut ties with ICE

https://www.bbc.com/news/articles/cvgjg98vmzjo
38•tartoran•14m ago•2 comments

Dependency Resolution Methods

https://nesbitt.io/2026/02/06/dependency-resolution-methods.html
1•zdw•15m ago•0 comments

Crypto firm apologises for sending Bitcoin users $40B by mistake

https://www.msn.com/en-ie/money/other/crypto-firm-apologises-for-sending-bitcoin-users-40-billion...
1•Someone•15m ago•0 comments

Show HN: iPlotCSV: CSV Data, Visualized Beautifully for Free

https://www.iplotcsv.com/demo
2•maxmoq•16m ago•0 comments

There's no such thing as "tech" (Ten years later)

https://www.anildash.com/2026/02/06/no-such-thing-as-tech/
1•headalgorithm•16m ago•0 comments

List of unproven and disproven cancer treatments

https://en.wikipedia.org/wiki/List_of_unproven_and_disproven_cancer_treatments
1•brightbeige•17m ago•0 comments

Me/CFS: The blind spot in proactive medicine (Open Letter)

https://github.com/debugmeplease/debug-ME
1•debugmeplease•17m ago•1 comments

Ask HN: What are the word games do you play everyday?

1•gogo61•20m ago•1 comments

Show HN: Paper Arena – A social trading feed where only AI agents can post

https://paperinvest.io/arena
1•andrenorman•22m ago•0 comments

TOSTracker – The AI Training Asymmetry

https://tostracker.app/analysis/ai-training
1•tldrthelaw•25m ago•0 comments

The Devil Inside GitHub

https://blog.melashri.net/micro/github-devil/
2•elashri•26m ago•0 comments

Show HN: Distill – Migrate LLM agents from expensive to cheap models

https://github.com/ricardomoratomateos/distill
1•ricardomorato•26m ago•0 comments

Show HN: Sigma Runtime – Maintaining 100% Fact Integrity over 120 LLM Cycles

https://github.com/sigmastratum/documentation/tree/main/sigma-runtime/SR-053
1•teugent•26m ago•0 comments

Make a local open-source AI chatbot with access to Fedora documentation

https://fedoramagazine.org/how-to-make-a-local-open-source-ai-chatbot-who-has-access-to-fedora-do...
1•jadedtuna•28m ago•0 comments

Introduce the Vouch/Denouncement Contribution Model by Mitchellh

https://github.com/ghostty-org/ghostty/pull/10559
1•samtrack2019•28m ago•0 comments

Software Factories and the Agentic Moment

https://factory.strongdm.ai/
1•mellosouls•28m ago•1 comments
Open in hackernews

What DOGE and its affiliates are doing with government systems and data [pdf]

https://oversight.house.gov/wp-content/uploads/2025/06/Schneier-Written-Testimony.pdf
32•ripe•8mo ago

Comments

malshe•8mo ago
Gemini 2.5 summary and highlights:

[cite_start]This report, based on the expert testimony of cybersecurity specialist Bruce Schneier and supplementary documents, outlines the significant cybersecurity risks created by the Department of Government Efficiency (DOGE). [cite: 1, 2, 3, 4] [cite_start]The central argument is that DOGE's approach to data management has dangerously weakened the U.S. government's security posture, creating unprecedented threats to national security and individual privacy. [cite: 4, 119]

### Key Findings:

*DOGE's Approach to Data:* * [cite_start]*Data Consolidation:* DOGE has been exfiltrating and connecting vast government databases to create a single, comprehensive pool of data on all people in the United States. [cite: 25, 27] [cite_start]This includes highly sensitive information such as tax returns, health records, social security numbers, and military service records. [cite: 21, 27, 138, 139, 140, 144] * [cite_start]*Reduced Security:* The program has consistently bypassed and disabled critical security measures. [cite: 4] [cite_start]This includes removing access controls, failing to vet staff with the required background checks, and creating unmonitored copies of data. [cite: 28, 29, 76] * [cite_start]*Use of AI:* DOGE is processing the consolidated data with AI tools, which exposes sensitive information outside of securely monitored environments and is being used to train AI models. [cite: 30, 191, 194] * [cite_start]*Outsourcing:* Control over data access is being transferred to private companies, notably Palantir, which has been reported to be working on projects without signed contracts outlining security measures. [cite: 31, 33, 34]

*Major Cybersecurity Risks:* * [cite_start]*Attractive Target for Adversaries:* The consolidation of disparate data streams has created a massive and highly attractive target for foreign and domestic adversaries. [cite: 4, 69] [cite_start]There is evidence of near real-time login attempts by users with Russian IP addresses using correct DOGE staff credentials. [cite: 39, 40] * [cite_start]*Coercion and Blackmail:* The accessible data can be used to blackmail, threaten, or harass individuals, including public officials and their families. [cite: 43, 46, 48] [cite_start]This can be achieved by weaponizing seemingly innocuous data like home addresses or more sensitive information related to health or finances. [cite: 47, 49] * [cite_start]*Cyberwarfare Preparation:* Adversaries can use the data to prepare for future conflicts by identifying vulnerabilities and targeting critical infrastructure or key individuals. [cite: 59, 62] [cite_start]The security breaches could allow for the installation of backdoors in crucial systems like the Treasury Payments System. [cite: 65] * [cite_start]*System Manipulation and Control:* The lax security practices create risks of data exposure, system manipulation, and complete system control by external actors. [cite: 230, 232, 235] [cite_start]This could lead to the alteration of records, denial of essential services, and the installation of ransomware. [cite: 248, 252, 254]

*Specific Examples and Consequences:* * [cite_start]DOGE personnel gained extensive "read" and sometimes "edit" access to critical systems at the Treasury Department, the Consumer Financial Protection Bureau, the Center for Medicare and Medicaid Services, and Veterans Affairs, among others. [cite: 17, 18, 20, 21, 22] * [cite_start]The 2015 hack of the Office of Personnel Management (OPM) by China, which was considered a massive security threat, pales in comparison to the potential data exposure from the combined DOGE datasets. [cite: 71, 73] * [cite_start]The lack of proper security protocols means that auditing what data has been copied and by whom is nearly impossible. [cite: 93] [cite_start]The report warns that government data on U.S. citizens could gradually appear on dark networks for years to come. [cite: 94] * [cite_start]Errors in the consolidated data, whether accidental or deliberately introduced by adversaries, could propagate through the system, leading to incorrect denial of benefits or the targeting of individuals for fraud. [cite: 102, 104, 106]

*Recommendations:* [cite_start]To mitigate these risks, the report recommends immediate action, including revoking DOGE's access, conducting a full forensic analysis of the systems, treating all affected systems as potentially compromised, rebuilding critical systems, and conducting an independent security assessment. [cite: 346, 349, 350, 351, 352] [cite_start]The report stresses that continued access exacerbates the damage, making recovery more difficult and increasing the risk of irreversible harm. [cite: 96, 353]

e2le•8mo ago
https://www.youtube.com/watch?v=wKkk-uWi7HM