frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

How to prevent age-related macular degeneration

https://medicine.washu.edu/news/strategy-to-prevent-age-related-macular-degeneration-identified/
1•gmays•1m ago•0 comments

Xenohumanism Against Shoggoth Belief

https://sofiechan.com/p/2730
1•anon_wyly•1m ago•0 comments

Context Engineering Realized: Context Window Architecture

https://mrhillsman.com/posts/context-engineering-realized-context-window-architecture/
1•mrhillsman•1m ago•1 comments

Exlcom: Play a Strategy Game – In Excel

https://exlcom.jimdofree.com/
1•baal80spam•3m ago•0 comments

Figma S-1

https://www.sec.gov/Archives/edgar/data/1579878/000162828025033742/figma-sx1.htm
4•mfiguiere•4m ago•0 comments

White House works to ground NASA science missions before Congress can act

https://arstechnica.com/space/2025/07/trump-administration-moves-to-tighten-the-noose-around-nasa-science-missions/
2•01-_-•4m ago•0 comments

Figma Files Registration Statement for Proposed Initial Public Offering

https://www.figma.com/blog/s1-public/
2•kualto•5m ago•0 comments

Bay Area tech firms legal battle with McDonalds broken ice cream machines ends

https://www.bizjournals.com/sanjose/news/2025/06/17/kytch-startup-mcdonalds-ice-cream-lawsuit.html
2•randycupertino•5m ago•1 comments

Cursor hired two former Claude Code leaders: Boris Cherny and Cat Wu

https://twitter.com/btibor91/status/1940125489311752306
1•tosh•7m ago•0 comments

Content Signals

https://contentsignals.org
1•mfiguiere•8m ago•0 comments

Graph-Code: A Multi-Language Graph-Based RAG System

https://github.com/vitali87/code-graph-rag
1•vitali87•8m ago•0 comments

Show HN: Promptle – The Daily AI Prompt Challenge

https://promptle.quest/
1•nithyags•12m ago•0 comments

Android Apps in Swift: Getting Started with Skip [video]

https://www.youtube.com/watch?v=AWRPubyQ9V8
2•wahnfrieden•15m ago•0 comments

Developing an Internal Tool for Our Puzzle Editor

https://open.nytimes.com/developing-an-internal-tool-for-our-puzzle-editor-d5dc7a9a6464
1•Tomte•17m ago•0 comments

Busting the top myths about the Big Bang

https://bigthink.com/starts-with-a-bang/busting-5-myths-big-bang/
1•jparise•18m ago•0 comments

I tried to hire a North Korean scammer [video]

https://www.youtube.com/watch?v=Y7x0gvfFa0Q
1•SeenNotHeard•18m ago•0 comments

Airbus – A Statistical Analysis of Commercial Aviation Accidents 1958-2024 [pdf]

https://accidentstats.airbus.com/wp-content/uploads/2025/02/20241325_A-Statistical-analysis-of-commercial-aviation-accidents-2025-links.pdf
1•uijl•24m ago•0 comments

uv2nix

https://pyproject-nix.github.io/uv2nix/
1•tosh•25m ago•0 comments

Indiana public colleges cut or merge a fifth of degree programs, more could come

https://www.indystar.com/story/news/politics/2025/06/30/indiana-colleges-cut-merge-400-degree-programs-ahead-of-new-state-law/84422023007/
2•inverted_flag•26m ago•0 comments

What Tech Debt Means for Startups (and When It's Good)

http://www.damiangalarza.com/posts/2025-06-26-tech-debt-for-startups/
1•dgalarza•27m ago•0 comments

Show HN: Cronus – Context-aware AI time tracker for macOS

https://cronushq.com/
7•arnestrickmann•29m ago•3 comments

FAQ and Answers About AI Evals [pdf]

https://www.dropbox.com/scl/fi/vkskh8b6mbkmdb5vwub6q/evals-faq.pdf
1•nkko•31m ago•0 comments

Using Nix with Dockerfiles (2023)

https://mitchellh.com/writing/nix-with-dockerfiles
1•tosh•32m ago•0 comments

How your data pulls in billions for app and social media companies

https://theconversation.com/the-hidden-cost-of-convenience-how-your-data-pulls-in-hundreds-of-billions-of-dollars-for-app-and-social-media-companies-251698
1•rntn•34m ago•0 comments

What are you getting paid in? (2024)

https://www.approachwithalacrity.com/what-are-you-getting-paid-in/
1•venkii•34m ago•0 comments

New MacBook with A18 Pro Chip Spotted in Apple Code

https://www.macrumors.com/2025/06/30/new-macbook-with-a18-chip-spotted/
3•nkko•35m ago•0 comments

The AI-Native Software Engineer

https://addyo.substack.com/p/the-ai-native-software-engineer
1•twapi•35m ago•0 comments

Ask HN: Why do HN programmers seem happy about losing their jobs to AI?

2•trwhite•38m ago•4 comments

AMC now warns moviegoers to expect '25-30 minutes' of ads and trailers

https://www.theverge.com/news/695611/amc-theatres-movie-preshow-ads-warning
2•speckx•39m ago•2 comments

First Human-Centric, Superior AI Ethics and Safety Firewall Rejected by Big Tech

https://archive.org/details/public-documentation-the-world-froze
1•AthenaAIEthics•39m ago•2 comments
Open in hackernews

Drug cartel hacked FBI official's phone to track and kill informants

https://arstechnica.com/security/2025/06/mexican-drug-cartel-hacked-fbi-officials-phone-to-track-informant-report-says/
34•makeitdouble•4h ago

Comments

makeitdouble•4h ago
This happens in Mexico, but the level of access they got is pretty staggering IMHO:

> The hired hacker [...] was able to use the [attache's] mobile phone number to obtain calls made and received, as well as geolocation data, associated with the [attache's] phone."

> the hacker also used Mexico City's camera system to follow the [attache] through the city and identify people the [attache] met with

bilbo0s•3h ago
It is kind of interesting that military, law enforcement and intelligence types wouldn't simply assume going in that well funded adversaries have these sorts of capabilities.

It's like the advice I would give to anyone, assume anything you put into a networked digital device, your voice, text, gps trails, oven temperature, anything.. is public, with an unknown publish date. Full stop. Plan your organization's operations in accordance with that assumption.

trod1234•50m ago
The military understands COMSEC well, but they are slow moving and the threat landscape is made unnecessarily intractable by relying on private industry who are willing to lie about security guarantees with few if any repercussions.

The issues we are having today are also the direct consequential result of collection in those treasure troves of security exploits; instead of fixing them, and their subsequent leaking.

Technically speaking for most common devices and software today, an AS# level attacker can transparently terminate encryption early to MITM with no indicator of compromise.

They can also disrupt interrupt driven communications with similar level of access (where a communication is strategically not sent without either parties awareness of the occurrence except as indirect after-action backscatter).

Princeton wrote a paper on it related to Tor back in 2014 iirc (the Raptor attack or something like that). The structure can easily be applied to more than just Tor, and that level of access would be quite valuable to well funded adversaries.

The incentives toward profit and power along with lack of liability for security, prevent many of the mfg companies involved from having effective security.

I can't remember where but there was a comment in either a talk or -con presentation where someone said the paper suggests TLS fails completely to these type of attacks; and there has been some speculation online as to if there is a connection between this and why leaked guidelines from various places say to never trust TLS.

The lack of security as an outcome can be seen as caused by government regulation mandates for the ISP industry, as thoroughly called out in this talk:

https://cyphercon.com/portfolio/exposing-the-threat-uncoveri...

You can find it available on youtube if they no longer have the direct link on the site.

Security has always had an issue with usability being compromised as security requirements increase. Organizations can't really compete on an even field with their competitors if the competitors have a technological edge because they happen to not be being attacked.

m3kw9•3h ago
FBI opsec involves cell phone to communicate? lol. That stuff has been hacked forever and they all should know
neilv•3h ago
I'll propose an additional recommendation:

"5. Reduce the UTS threat by outlawing most domestic surveillance capitalism. Including having severe criminal penalties for companies found illegally capturing, compiling, retaining, selling, sharing, or leaking what has been designated as rightfully private data."

moose333•3h ago
Sounds like the hacker got access to call logs and tower pings, but probably didn't hack the actual phone. I'm assuming FBI-issued cell phones are pretty hard to break into, Mexican cell service providers probably less so
ChrisArchitect•3h ago
Earlier: https://news.ycombinator.com/item?id=44407029
bb88•3h ago
IIRC, something similar happened in the 1980's/90's with the phone landlines.

The FBI/DEA made an anonymous toll-free tip line for people to call with tips on the cartel activity. The cartel was able to get the phone records for people who called the tip line through bribes, extortion, or violence to the telco employees. They identified the people who called the tip lines, and then one-by-one eliminated them all.