frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Cloudflare declares war on AI crawlers

https://www.zdnet.com/article/cloudflare-declares-war-on-ai-crawlers-and-the-stakes-couldnt-be-higher/
1•CrankyBear•1m ago•0 comments

Show HN: Country Guessing Game

https://www.guessthatcountry.com/
1•kamakaya•2m ago•0 comments

British IT worker sentenced to seven months after trashing company network

https://www.theregister.com/2025/06/30/british_rogue_admin/
1•jnord•4m ago•0 comments

Most cited scientists stop falsely claiming to work in Saudi Arabia

https://english.elpais.com/science-tech/2024-12-05/dozens-of-the-worlds-most-cited-scientists-stop-falsely-claiming-to-work-in-saudi-arabia.html
1•perihelions•5m ago•0 comments

The great MicroSD card survey

https://www.bahjeez.com/the-great-microsd-card-survey/
1•zdw•5m ago•0 comments

AI: The New Aesthetics of Fascism

https://newsocialist.org.uk/transmissions/ai-the-new-aesthetics-of-fascism/
1•BigglesB•6m ago•0 comments

Hematopoietic stem cell clonal evolution p autologous stem cell transplantation

https://www.nature.com/articles/s41588-025-02235-w
1•bookofjoe•6m ago•0 comments

Show HN: tapable-tracer Trace the connections and flows between tapable hooks

https://github.com/ertgl/tapable-tracer
1•-ertgl•6m ago•0 comments

Pangu Pro Moe: Mixture of Grouped Experts for Efficient Sparsity

https://arxiv.org/abs/2505.21411
1•diggan•6m ago•0 comments

Digital IDs for AI ensure security, accountability, and trust

https://subramanya.ai/2025/07/01/securing-ai-assistants-digital-ids-for-ai/
1•subramanya1997•8m ago•1 comments

How AI on Microcontrollers Works: Operators and Kernels

https://danielmangum.com/posts/ai-microcontrollers-operators-kernels/
2•hasheddan•12m ago•0 comments

Show HN: I built a enterprise level SaaS kit

https://www.launchkitaws.com/
1•UpbeatFix•13m ago•0 comments

I'm a physicist by trade, not by training, and that matters

https://csferrie.medium.com/im-a-physicist-by-trade-not-by-training-and-that-matters-70cd0e66b2c8
1•MaysonL•14m ago•0 comments

"Explosive increase" of ticks that cause meat allergy in US

https://www.theguardian.com/us-news/2025/jun/29/lone-star-ticks-increase-climate-crisis
2•sowbug•15m ago•0 comments

Large-Scale Deployment of Ray in Tencent's Weixin AI Infrastructure

https://www.anyscale.com/blog/tencent-weixin-ray-large-scale-deployment
1•robertnishihara•18m ago•0 comments

Show HN: Tacho – CLI tool to benchmark LLM speeds across providers

https://tacho.sh/
1•pietz•20m ago•0 comments

Fintech platform Wealthfront files for IPO

https://www.reuters.com/technology/wealthfront-corporation-confidentially-files-go-public-us-2025-06-23/
2•sowbug•21m ago•0 comments

GenesisAI raises $105M to build foundation models for robots with synthetic data

https://techcrunch.com/2025/07/01/genesis-ai-launches-with-105m-seed-funding-from-eclipse-khosla-to-build-ai-models-for-robots/
1•elmazout•21m ago•0 comments

Show HN: Optimization for LLM App

https://www.llmcheck.app
1•sansreal•23m ago•1 comments

Trump team threatens to prosecute CNN over reporting on Ice-tracking app

https://www.theguardian.com/us-news/2025/jul/01/trump-kristi-noem-cnn-threat
8•vinni2•23m ago•0 comments

Ask HN: What does Cloudflare's pay-per-crawl mean for web scrapers?

1•jjangkke•25m ago•0 comments

Neuromancer is in production

https://bsky.app/profile/greatdismal.bsky.social/post/3lswfukkn3k2z
1•SeenNotHeard•29m ago•0 comments

Amp: A text editor for your terminal

https://github.com/jmacdonald/amp
1•chaosprint•30m ago•0 comments

Ligeti – Musica ricercata No.7 – Cantabile – ARR. for theremin and analog synths [video]

https://www.youtube.com/watch?v=IRQiiPDXTGo
1•didacusc•32m ago•1 comments

[nl-ams-1] degraded performances due to abnormal temperature

https://status.scaleway.com/incidents/1vz4xfgy2gcl
3•martinald•33m ago•1 comments

Study Reveals That Internet Searches Can Hinder Creativity

https://www.cmu.edu/news/stories/archives/2025/july/study-reveals-that-internet-searches-can-hinder-creativity
2•Improvement•42m ago•0 comments

Specter of dams and diversion looms over Southeast Asia's Salween River

https://news.mongabay.com/2025/06/specter-of-dams-and-diversion-looms-over-southeast-asias-salween-river/
1•PaulHoule•42m ago•0 comments

What is automatable and who is replaceable? Thoughts from my morning commute

http://togelius.blogspot.com/2025/06/what-is-automatable-and-who-is_22.html
1•vinni2•45m ago•0 comments

Recursive factorial in 14 characters (2023)

https://mvanier.github.io/blog/posts/factorial/
1•tehnub•47m ago•0 comments

V-JEPA 2: Self-Supervised Video Models Enable Understanding,Prediction,Planning

https://github.com/facebookresearch/vjepa2
2•johlo•48m ago•0 comments
Open in hackernews

Border search safe TOTP authenticator app?

9•jakedata•3h ago
While crossing international borders, a traveler may be legitimately asked to provide access to their devices. Such a person is often not in a position to refuse.

I am searching for a dual-pin TOTP app that looks like it is working whether it is or not. Entering the wrong PIN might cause the app to generate invalid codes while optionally wiping the real config.

Actually attempting to use the invalid code could potentially trigger all kinds of actions on the server that received the bogus login request. Sending an SOS email might be one such action.

I am not sure such a thing exists in either major app store. Thoughts?

Comments

xxpor•2h ago
Be very careful with your threat model here. If an agent attempts to use the codes and they don't work, and they find out there's a dual pin mechanism, you could end up in more trouble than with whatever they'd have seen in the first place.
mrsilencedogood•2h ago
Yeah, people love to LARP being Snowden but never actually have anything even theoretically worth being sent to border-jail over protecting.

And, if you do, and you're really asking hacker news for opsec advice, I would suggest you abandon your career as a super-spy or whatever you're doing, because you're doing it very wrong.

jakedata•2h ago
Not a superspy. Oblig: https://xkcd.com/705
ectospheno•2h ago
Have a phone just for travel. Different account. Only have things you actually need during travel on it. Turn on a cheap plan when you need it. If they ask for something just say you can't remember and let them keep it.
altairprime•2h ago
Memorize one TOTP key for a cloud offering; then store the rest in it. 1password, Lastpass, etc. It’s not that much longer than a Windows product key, and I still know one of those.

The secret key is just an RNG output so you could also take it in 4 byte chunks and memorize 16 PRNG inputs that generate each the 4 bytes.

Or you could memorize a passphrase, take a sha2 hash of it, and then memorize a single PRNG input that spits out the bitstring diff between the hash output and the TOTP key. That way you aren’t wholly dependent on memorizing numbers and you can still safely use a more predictable and weak ‘PRNG’ that can amplify the bitstring salt out of an input.

etc.

jasonpeacock•2h ago
FYI, you're asking about duress codes[1] - it may help your search to use that term.

[1] https://en.wikipedia.org/wiki/Duress_code

esbranson•2h ago
Lying to US officials is 5 years in prison. Per instance. One assumes other countries have similar laws, but I doubt anyone knows what actually happens in courts outside the US.
slau•1h ago
Just store the TOTPs you actually care about on a Yubikey. Leave a few “worthless” TOTP in whatever TOTP app you use. Remove the Yubico Authenticator app before crossing the border.
Elfener•1h ago
This post came to mind: https://blog.singleton.io/posts/2022-10-17-otp-on-wrist/

I doubt anyone wants to search a f-91w.

Nextgrid•1h ago
You need to re-evaluate your threat model and change your approach. As others have said here, a TOTP that doesn't work would attract more attention that one that does or one that outright doesn't exist, all the way up to escalating the encounter from casual privacy-conscious user to alleged spy.

The best way is to legitimately not have anything on the phone or your online presence that would cause problems, and then just be transparent (honestly, they're not after your nudes or embarrassing texts). A lot of border checks are based on feelings and if you look the part they'll quickly flick through the phone for obvious stuff they're after and will let you go once they don't find it.

If you are actually doing something that would cause issues, then you keep this off the local device and onto a remote one. Use a YubiKey or other dual-use authenticator (that gives you plausible deniability for having it - you can use the same key on benign social media accounts, etc) to access it from a secure device once you're through.