frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Micro-Front Ends in 2026: Architecture Win or Enterprise Tax?

https://iocombats.com/blogs/micro-frontends-in-2026
1•ghazikhan205•2m ago•0 comments

Japanese rice is the most expensive in the world

https://www.cnn.com/2026/02/07/travel/this-is-the-worlds-most-expensive-rice-but-what-does-it-tas...
1•mooreds•2m ago•0 comments

These White-Collar Workers Actually Made the Switch to a Trade

https://www.wsj.com/lifestyle/careers/white-collar-mid-career-trades-caca4b5f
1•impish9208•2m ago•1 comments

The Wonder Drug That's Plaguing Sports

https://www.nytimes.com/2026/02/02/us/ostarine-olympics-doping.html
1•mooreds•2m ago•0 comments

Show HN: Which chef knife steels are good? Data from 540 Reddit tread

https://new.knife.day/blog/reddit-steel-sentiment-analysis
1•p-s-v•3m ago•0 comments

Federated Credential Management (FedCM)

https://ciamweekly.substack.com/p/federated-credential-management-fedcm
1•mooreds•3m ago•0 comments

Token-to-Credit Conversion: Avoiding Floating-Point Errors in AI Billing Systems

https://app.writtte.com/read/kZ8Kj6R
1•lasgawe•3m ago•1 comments

The Story of Heroku (2022)

https://leerob.com/heroku
1•tosh•3m ago•0 comments

Obey the Testing Goat

https://www.obeythetestinggoat.com/
1•mkl95•4m ago•0 comments

Claude Opus 4.6 extends LLM pareto frontier

https://michaelshi.me/pareto/
1•mikeshi42•5m ago•0 comments

Brute Force Colors (2022)

https://arnaud-carre.github.io/2022-12-30-amiga-ham/
1•erickhill•8m ago•0 comments

Google Translate apparently vulnerable to prompt injection

https://www.lesswrong.com/posts/tAh2keDNEEHMXvLvz/prompt-injection-in-google-translate-reveals-ba...
1•julkali•8m ago•0 comments

(Bsky thread) "This turns the maintainer into an unwitting vibe coder"

https://bsky.app/profile/fullmoon.id/post/3meadfaulhk2s
1•todsacerdoti•9m ago•0 comments

Software development is undergoing a Renaissance in front of our eyes

https://twitter.com/gdb/status/2019566641491963946
1•tosh•9m ago•0 comments

Can you beat ensloppification? I made a quiz for Wikipedia's Signs of AI Writing

https://tryward.app/aiquiz
1•bennydog224•10m ago•1 comments

Spec-Driven Design with Kiro: Lessons from Seddle

https://medium.com/@dustin_44710/spec-driven-design-with-kiro-lessons-from-seddle-9320ef18a61f
1•nslog•10m ago•0 comments

Agents need good developer experience too

https://modal.com/blog/agents-devex
1•birdculture•12m ago•0 comments

The Dark Factory

https://twitter.com/i/status/2020161285376082326
1•Ozzie_osman•12m ago•0 comments

Free data transfer out to internet when moving out of AWS (2024)

https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/
1•tosh•13m ago•0 comments

Interop 2025: A Year of Convergence

https://webkit.org/blog/17808/interop-2025-review/
1•alwillis•14m ago•0 comments

Prejudice Against Leprosy

https://text.npr.org/g-s1-108321
1•hi41•15m ago•0 comments

Slint: Cross Platform UI Library

https://slint.dev/
1•Palmik•19m ago•0 comments

AI and Education: Generative AI and the Future of Critical Thinking

https://www.youtube.com/watch?v=k7PvscqGD24
1•nyc111•19m ago•0 comments

Maple Mono: Smooth your coding flow

https://font.subf.dev/en/
1•signa11•20m ago•0 comments

Moltbook isn't real but it can still hurt you

https://12gramsofcarbon.com/p/tech-things-moltbook-isnt-real-but
1•theahura•24m ago•0 comments

Take Back the Em Dash–and Your Voice

https://spin.atomicobject.com/take-back-em-dash/
1•ingve•24m ago•0 comments

Show HN: 289x speedup over MLP using Spectral Graphs

https://zenodo.org/login/?next=%2Fme%2Fuploads%3Fq%3D%26f%3Dshared_with_me%25253Afalse%26l%3Dlist...
1•andrespi•25m ago•0 comments

Teaching Mathematics

https://www.karlin.mff.cuni.cz/~spurny/doc/articles/arnold.htm
2•samuel246•28m ago•0 comments

3D Printed Microfluidic Multiplexing [video]

https://www.youtube.com/watch?v=VZ2ZcOzLnGg
2•downboots•28m ago•0 comments

Abstractions Are in the Eye of the Beholder

https://software.rajivprab.com/2019/08/29/abstractions-are-in-the-eye-of-the-beholder/
2•whack•28m ago•0 comments
Open in hackernews

Drug cartel hacked FBI official's phone to track and kill informants

https://arstechnica.com/security/2025/06/mexican-drug-cartel-hacked-fbi-officials-phone-to-track-informant-report-says/
38•makeitdouble•7mo ago

Comments

makeitdouble•7mo ago
This happens in Mexico, but the level of access they got is pretty staggering IMHO:

> The hired hacker [...] was able to use the [attache's] mobile phone number to obtain calls made and received, as well as geolocation data, associated with the [attache's] phone."

> the hacker also used Mexico City's camera system to follow the [attache] through the city and identify people the [attache] met with

bilbo0s•7mo ago
It is kind of interesting that military, law enforcement and intelligence types wouldn't simply assume going in that well funded adversaries have these sorts of capabilities.

It's like the advice I would give to anyone, assume anything you put into a networked digital device, your voice, text, gps trails, oven temperature, anything.. is public, with an unknown publish date. Full stop. Plan your organization's operations in accordance with that assumption.

trod1234•7mo ago
The military understands COMSEC well, but they are slow moving and the threat landscape is made unnecessarily intractable by relying on private industry who are willing to lie about security guarantees with few if any repercussions.

The issues we are having today are also the direct consequential result of collection in those treasure troves of security exploits; instead of fixing them, and their subsequent leaking.

Technically speaking for most common devices and software today, an AS# level attacker can transparently terminate encryption early to MITM with no indicator of compromise.

They can also disrupt interrupt driven communications with similar level of access (where a communication is strategically not sent without either parties awareness of the occurrence except as indirect after-action backscatter).

Princeton wrote a paper on it related to Tor back in 2014 iirc (the Raptor attack or something like that). The structure can easily be applied to more than just Tor, and that level of access would be quite valuable to well funded adversaries.

The incentives toward profit and power along with lack of liability for security, prevent many of the mfg companies involved from having effective security.

I can't remember where but there was a comment in either a talk or -con presentation where someone said the paper suggests TLS fails completely to these type of attacks; and there has been some speculation online as to if there is a connection between this and why leaked guidelines from various places say to never trust TLS.

The lack of security as an outcome can be seen as caused by government regulation mandates for the ISP industry, as thoroughly called out in this talk:

https://cyphercon.com/portfolio/exposing-the-threat-uncoveri...

You can find it available on youtube if they no longer have the direct link on the site.

Security has always had an issue with usability being compromised as security requirements increase. Organizations can't really compete on an even field with their competitors if the competitors have a technological edge because they happen to not be being attacked.

m3kw9•7mo ago
FBI opsec involves cell phone to communicate? lol. That stuff has been hacked forever and they all should know
neilv•7mo ago
I'll propose an additional recommendation:

"5. Reduce the UTS threat by outlawing most domestic surveillance capitalism. Including having severe criminal penalties for companies found illegally capturing, compiling, retaining, selling, sharing, or leaking what has been designated as rightfully private data."

trod1234•7mo ago
There are already severe criminal penalties, the issue is its impossible to enforce except in retrospect in most cases. The attack surface is extremely porous because of money-printing with the government as a customer and every major company lining up to the trough.

For an example, its quite well known you can do a lot with an off the shelf SDR.

Technically those receivers can capture cell phone signals and other data passively. It would be almost trivial to set up an overlay network in target regions, its not much harder than putting together a local LAN/point to point connection.

There is no indicator its happening because its not active. This also applies to collectors that operate on TEMPEST principles (i.e. the emissions from your device displays).

Active MITM poses worse outcomes, but not strictly needed for these things. Encryption prevents most of this, if its secure but security comes from the visible industry, and visible industry lags behind where the landscape actually is.

There are companies and nations who put satellites in orbit that collect this data who may offer it as a service. Technically you can passively collect any raw signals with an appropriate length of wire for an antenna so there isn't much of a manufacturing bottleneck authorities could exploit.

Without immediate and existential level of consequence, no criminal penalty will ever be enough. Incarceration isn't an existential consequence.

The laws in effect only keep the honest people honest, and equally punish honest people for pointing out the emperor has no clothes.

moose333•7mo ago
Sounds like the hacker got access to call logs and tower pings, but probably didn't hack the actual phone. I'm assuming FBI-issued cell phones are pretty hard to break into, Mexican cell service providers probably less so
ChrisArchitect•7mo ago
Earlier: https://news.ycombinator.com/item?id=44407029
bb88•7mo ago
IIRC, something similar happened in the 1980's/90's with the phone landlines.

The FBI/DEA made an anonymous toll-free tip line for people to call with tips on the cartel activity. The cartel was able to get the phone records for people who called the tip line through bribes, extortion, or violence to the telco employees. They identified the people who called the tip lines, and then one-by-one eliminated them all.