frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

South Korean crypto firm accidentally sends $44B in bitcoins to users

https://www.reuters.com/world/asia-pacific/crypto-firm-accidentally-sends-44-billion-bitcoins-use...
1•layer8•32s ago•0 comments

Apache Poison Fountain

https://gist.github.com/jwakely/a511a5cab5eb36d088ecd1659fcee1d5
1•atomic128•2m ago•0 comments

Web.whatsapp.com appears to be having issues syncing and sending messages

http://web.whatsapp.com
1•sabujp•2m ago•1 comments

Google in Your Terminal

https://gogcli.sh/
1•johlo•4m ago•0 comments

Shannon: Claude Code for Pen Testing

https://github.com/KeygraphHQ/shannon
1•hendler•4m ago•0 comments

Anthropic: Latest Claude model finds more than 500 vulnerabilities

https://www.scworld.com/news/anthropic-latest-claude-model-finds-more-than-500-vulnerabilities
1•Bender•9m ago•0 comments

Brooklyn cemetery plans human composting option, stirring interest and debate

https://www.cbsnews.com/newyork/news/brooklyn-green-wood-cemetery-human-composting/
1•geox•9m ago•0 comments

Why the 'Strivers' Are Right

https://greyenlightenment.com/2026/02/03/the-strivers-were-right-all-along/
1•paulpauper•10m ago•0 comments

Brain Dumps as a Literary Form

https://davegriffith.substack.com/p/brain-dumps-as-a-literary-form
1•gmays•10m ago•0 comments

Agentic Coding and the Problem of Oracles

https://epkconsulting.substack.com/p/agentic-coding-and-the-problem-of
1•qingsworkshop•11m ago•0 comments

Malicious packages for dYdX cryptocurrency exchange empties user wallets

https://arstechnica.com/security/2026/02/malicious-packages-for-dydx-cryptocurrency-exchange-empt...
1•Bender•11m ago•0 comments

Show HN: I built a <400ms latency voice agent that runs on a 4gb vram GTX 1650"

https://github.com/pheonix-delta/axiom-voice-agent
1•shubham-coder•12m ago•0 comments

Penisgate erupts at Olympics; scandal exposes risks of bulking your bulge

https://arstechnica.com/health/2026/02/penisgate-erupts-at-olympics-scandal-exposes-risks-of-bulk...
4•Bender•12m ago•0 comments

Arcan Explained: A browser for different webs

https://arcan-fe.com/2026/01/26/arcan-explained-a-browser-for-different-webs/
1•fanf2•14m ago•0 comments

What did we learn from the AI Village in 2025?

https://theaidigest.org/village/blog/what-we-learned-2025
1•mrkO99•14m ago•0 comments

An open replacement for the IBM 3174 Establishment Controller

https://github.com/lowobservable/oec
1•bri3d•17m ago•0 comments

The P in PGP isn't for pain: encrypting emails in the browser

https://ckardaris.github.io/blog/2026/02/07/encrypted-email.html
2•ckardaris•19m ago•0 comments

Show HN: Mirror Parliament where users vote on top of politicians and draft laws

https://github.com/fokdelafons/lustra
1•fokdelafons•19m ago•1 comments

Ask HN: Opus 4.6 ignoring instructions, how to use 4.5 in Claude Code instead?

1•Chance-Device•21m ago•0 comments

We Mourn Our Craft

https://nolanlawson.com/2026/02/07/we-mourn-our-craft/
1•ColinWright•23m ago•0 comments

Jim Fan calls pixels the ultimate motor controller

https://robotsandstartups.substack.com/p/humanoids-platform-urdf-kitchen-nvidias
1•robotlaunch•27m ago•0 comments

Exploring a Modern SMTPE 2110 Broadcast Truck with My Dad

https://www.jeffgeerling.com/blog/2026/exploring-a-modern-smpte-2110-broadcast-truck-with-my-dad/
1•HotGarbage•27m ago•0 comments

AI UX Playground: Real-world examples of AI interaction design

https://www.aiuxplayground.com/
1•javiercr•28m ago•0 comments

The Field Guide to Design Futures

https://designfutures.guide/
1•andyjohnson0•28m ago•0 comments

The Other Leverage in Software and AI

https://tomtunguz.com/the-other-leverage-in-software-and-ai/
1•gmays•30m ago•0 comments

AUR malware scanner written in Rust

https://github.com/Sohimaster/traur
3•sohimaster•33m ago•1 comments

Free FFmpeg API [video]

https://www.youtube.com/watch?v=6RAuSVa4MLI
3•harshalone•33m ago•1 comments

Are AI agents ready for the workplace? A new benchmark raises doubts

https://techcrunch.com/2026/01/22/are-ai-agents-ready-for-the-workplace-a-new-benchmark-raises-do...
2•PaulHoule•38m ago•0 comments

Show HN: AI Watermark and Stego Scanner

https://ulrischa.github.io/AIWatermarkDetector/
1•ulrischa•38m ago•0 comments

Clarity vs. complexity: the invisible work of subtraction

https://www.alexscamp.com/p/clarity-vs-complexity-the-invisible
1•dovhyi•39m ago•0 comments
Open in hackernews

Is anybody using this private key?

https://isanybodyusingthisprivatekey.com/
93•black6•7mo ago

Comments

joemazerino•7mo ago
A "dumbass" counter on this site would be interesting.
kekebo•7mo ago
w/ signed counts
cryptonym•7mo ago
It shows on the response, when you send your genuine private key.
skrebbel•7mo ago
Can confirm
benmmurphy•7mo ago
Very strange. I sent a test key and didn't get that response but when I sent my real key it did. How did it know the difference between the dummy key and the real key?
inetknght•7mo ago
probably checking the corresponding public key against known public keys in various places
didgeoridoo•7mo ago
It doesn’t, only you see that. The owner of the site just sees *****.
mondobe•7mo ago
You only see hunter2 because I copied and pasted your stars. I just see ****.
DonHopkins•7mo ago
He should install Wordpress! It has lots of dumbass counters.

https://wordpress.com/plugins/browse/counter

smidgeon•7mo ago
Thank goodness, now I know my private keys have not been leaked ...
qualeed•7mo ago
"256 bits AES Encryption" should really have a "Military Grade" stamp on it. Perhaps with a metal background and some rivets or whatever for emphasis.
mdaniel•7mo ago
I guess it's to be expected, but the IPv6 Ready is bogus, too

  ; <<>> DiG 9.10.6 <<>> AAAA isanybodyusingthisprivatekey.com.
  ;isanybodyusingthisprivatekey.com. IN AAAA
ignoramous•7mo ago
Do not give out your private keys anywhere except where they're needed. They are meant to be private for a reason.

If this service was serious, it'd instead rely on fingerprints (sha256/sha512) and not the key itself.

mr_toad•7mo ago
Is there any case where they ever need to be shared? If you need a login, generate a new one.
chrisweekly•7mo ago
Yeah, I'd strike "except where they're needed". Never share a private key.
IgorPartola•7mo ago
One of the best things you can do is generate a key per device, not per person. That way if you lose your phone you just revoke that key and not the one that you use on your tablet, work laptop, home desktop, etc.

Bonus points: monkeysphere and certificate based auth are two other great solutions for making sure the ssh server you log into is not doing a MITM on initial connection (you know, the part where it asks you to manually verify the fingerprint of the server key and you likely just hit y instead).

Forwarding your ssh agent to a host that you don’t know for certain is not doing a MITM attack on you can be devastating, as is entering a password into same.

munchler•7mo ago
But that way you can only use each key on that one device. E.g. No starting a private conversation on your phone and then continuing it on your desktop later.
IgorPartola•7mo ago
The service you use should allow you to add more than one key and create a symmetric encryption key for the conversion. Your private key identifies your device, the service should know that you own multiple devices.
msgodel•7mo ago
Are there really people who don't do this? Copying private keys around just feels gross like copying binaries around.
nisegami•7mo ago
My company's system admins don't know how to do that unfortunately.
bornfreddy•7mo ago
No worries, I'm sure there are lots of webpages that will generate private keys for them. For free.
hinkley•7mo ago
There is not. I worked on a code signing project, and there was this guy who I as already warned had a bit of Dunning Kruger going on, but would later discover was also a bit of an ineffectual bully as well, when he got into an argument with both me and a customer.

Not long after the first milestone of a project with lots of milestones he announced he intended to have me to generate ‘real’ keys for the project and send him the key pairs over Outlook Encryption. For a project with public safety concerns written all over it, and would later have me pick multiple Hardware Security Modules for different steps of a multi-signature chaining process.

He tried to get me into trouble for telling him, politely, that he could fuck right off. And then had to talk to everyone he tried to tattle to about why he was a dumbass and that we were at least a year (turned out to be three) before we needed “real” keys - we were actually about four months from even needing fake keys for integration testing, let alone real keys. And I was be writing up runbooks for doing that rather than doing it for people.

The thing I would soon discover about signing keys is that everyone thinks they are a magic incantation of math. They’re just math. The magic is not inside the box, the magic is the box. It’s like a clean room: It’s a room full of nothing. What makes it special is all the work you do trying to prevent something from happening to it.

I stayed on that project almost a year past where there was any code they needed me to write (except for one bad bug I would find in my code a few months later), but they still needed me to teach them behavior, to lock in that clean room mindset.

uniqueusername7•7mo ago
How would I get my ssh keys to the remote server from a new machine? To me, the easiest way seems to be either sharing private keys from a different machine, or having some way to deterministically generate keys from a password or keyphrase, and the latter seems more secure to me because I don't have to trust a middle man to do the transferring.
mr_toad•7mo ago
Generate a new private/public key pair on the new machine and then copy the public key (from the new machine) into the authorised keys (on the server) using a login that already has access (e.g. from the old machine).
mightysashiman•7mo ago
Wouldn't it being making the matter worse? You wouldn't know if it's a collision of the hash or of the keys themselves
nativeit•7mo ago
Assuming for the sake of argument this were a real service checking for matches, the chances of a hash collision with SHA256 is effectively 0.[1] I entered the limit for BIGINT (9223372036854775807), and the approximation of the probability of a hash collision after generating 9223372036854775807 items in SHA256 is zero. The exact probability would probably take eons to calculate, but it's vanishingly close to zero.

1. https://kevingal.com/apps/collision.html

goopypoop•7mo ago
"Never unless necessary" is unhelpful for anything
FearNotDaniel•7mo ago
Yeah reminds me of the time a real UK bank employee insisted that I should give him an SMS onetime code, even telling me to ignore the part of the message that I should never give the code to anyone else, not even a bank employee. I verified by other means that both he and the transaction were genuine but absolutely refused to give him that code no matter how he tried to spin it, and solved the issue a different way. Whatever manager created that ad hoc process needs to get fired.
gblargg•7mo ago
Scammer: your private key is needed.

Oh, OK.

ivanjermakov•7mo ago
> Guys this is just a meme website. Please do not submit your real private key and do not report phishing.

Exactly what a phishing website would say.

yieldcrv•7mo ago
I would also provide an open source version that also was backdoored
abcd_f•7mo ago
The repo needs to be clean, but pre-built release binaries backdoored. It's classier this way.
nativeit•7mo ago
Written in Rust or Go.
IAmBroom•7mo ago
Perfect implementation case for LLM coding.
comrade1234•7mo ago
lol. You're kidding me...
BenjiWiebe•7mo ago
Cloudflare's 1.1.1.1 for families blocks this is phishing. No sense of humor I guess?
StefanBatory•7mo ago
On my home PC Avast blocks it too.
actinium226•7mo ago
Hahahaha, this is hilarious!
DonHopkins•7mo ago
Nicely done! It worked flawlessly for me the first time. Does this support bulk upload?
alberth•7mo ago
Instead of HaveIbeenPwned.com, maybe the name of this site should be HaveIbeenKeyed.com
gblargg•7mo ago
> Is anybody using this private key?

They are now!

TheRealPomax•7mo ago
If this is just a meme website, just... take it back down? People are dumb, they are going to fill in real keys, and you knew this before you clicked "deploy".
nailer•7mo ago
My private key came from Debian, they patched the issues reported by Valgrind and now OpenSSL is more secure than ever.
thasso•7mo ago
Wait why did it say the key was unused when I submitted the first time, but now it shows the key is already taken?
isoprophlex•7mo ago
It could be a bad actor pretending to be a meme actor pretending to be a bad actor
nativeit•7mo ago
Presumably, they took it.
gnyman•7mo ago
I'm confused by this one. It says it's a joke but it still submits the key to a server.

These joke pages have been around since http://ismycreditcardstolen.com/

And I even made my own version https://hasmypasswordbeenstolen.net/

The difference is that neither the original nor mine actually submits the secret to the server. I went to great lengths to avoid actually doing it, it's still a bad idea to send a password to my page but at least you can check the source and network traffic and see that it's only checked with JavaScript and a hash is checked against the HIPB password site.

This supposed joke site sends and processes the key on their backend. At least it looks like that, I have not tried with a real key.

Arcuru•7mo ago
Yea..sending it to the server makes it look sketchy. Even for my joke site[1] I make sure everything stays client side.

[1]: https://faxyourballs.com

knowitnone•7mo ago
Generate and send it every possible key
nativeit•7mo ago
> The maximum cycle length is 2256 ≈ 1.16×10^77 iterations. If you can evaluate 10^12 hashes per second, then working your way through all possible hashes would take you about 10^65 seconds (about one quindecillion times the age of the earth). Even if you're fortunate enough find a loop in a tiny fraction of that time, you're still liable to be waiting for trillions of years.

https://stackoverflow.com/a/43636715

Edit: fixed missing exponent notation

nullc•7mo ago
Hey, that's not the wallet inspector...
ghusto•7mo ago
The word you're looking for is "joke" not "meme", but that isn't hip enough, right?
daft_pink•7mo ago
I got invalid captcha :(