frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: An AI coding tool for unserious projects

https://crazycontext.com/
1•liszper•39s ago•0 comments

Why opposing Israel's genocide got me arrested for terrorism

https://www.middleeasteye.net/opinion/why-opposing-israels-genocide-got-me-arrested-terrorism
1•thisislife2•49s ago•0 comments

Verizon down for users across the US

https://www.dailymail.co.uk/news/article-15050499/Verizon-goes-tens-thousands-users-US.html
2•storf45•4m ago•1 comments

Simple link aggregation and bookmarking site

https://bkmk.ing
1•fullstacking•7m ago•0 comments

Ask HN: Claude code subscription vs. API, which is cheaper?

1•totisjosema•9m ago•0 comments

Six Months into Tariffs, Businesses Have No Idea How to Price Anything

https://www.wsj.com/business/retail/trump-tariff-business-price-impact-37b630c8
4•JumpCrisscross•9m ago•0 comments

Show HN: Sometimes GitHub is boring, so I made a CLI tool to fix it

https://github.com/nathbns/gitact
3•nathbns•9m ago•0 comments

Bernie Sanders: Kennedy Must Resign

https://www.nytimes.com/2025/08/30/opinion/bernie-sanders-robert-f-kennedy-jr-resign-hhs.html
3•csheehan10•9m ago•0 comments

Ask HN: Any Android Engineers Here?

1•gooob•10m ago•0 comments

Company behind Jack Daniel's says Canadian sales drop 62%

https://www.cbc.ca/news/canada/nova-scotia/brown-forman-jack-daniels-quarterly-sales-american-alc...
2•geox•14m ago•0 comments

D as a Better C (2017)

https://dlang.org/blog/2017/08/23/d-as-a-better-c/
1•vram22•16m ago•0 comments

Hollow Knight Running in the Browser

https://www.npa.lol/games/37
1•ilostmysoul•18m ago•0 comments

Put a ring on it: a lock-free MPMC ring buffer

https://h4x0r.org/ring/
1•fanf2•23m ago•0 comments

Running the Gauntlet: How AI's Toughest Bootcamp Is Shaping Your Next Dev Hires

https://austinbusinessreview.com/running-the-gauntlet-how-ais-toughest-bootcamp-is-shaping-your-n...
1•EthanDBrooks•27m ago•0 comments

Show HN: Fur – a Git-like CLI for branching your chats and ideas

https://github.com/andrewrgarcia/fur-cli
1•andrewrg•30m ago•0 comments

Why did books start being divided into chapters? A new history

https://sydneyreviewofbooks.com/reviews/just-a-little-longer
4•cacher•39m ago•0 comments

An Open Letter to Everyone I've Butted Heads With

https://andrewkelley.me/post/open-letter-everyone-butted-heads.html
3•signa11•40m ago•0 comments

Anti-vaccine myths surged online ahead of the CDC shooting

https://www.nbcnews.com/tech/internet/cdc-shooting-anti-vaccine-myths-surged-online-depression-rc...
7•Anon84•42m ago•0 comments

US has invasive bullfrog problem spreading in west: Scientists alarmed

https://www.vox.com/down-to-earth/422353/bullfrogs-invasive-west-native-species
1•bookofjoe•45m ago•0 comments

After researchers unmasked a prolific SMS scammer, a new operation has emerged

https://techcrunch.com/2025/08/10/after-researchers-unmasked-a-prolific-sms-scammer-a-new-operati...
2•PaulHoule•46m ago•0 comments

Collapse of critical Atlantic current is no longer low-likelihood, study finds

https://www.theguardian.com/environment/2025/aug/28/collapse-critical-atlantic-current-amoc-no-lo...
2•pseudolus•48m ago•1 comments

U.S. guided-missile cruiser crosses Panama Canal, warships deployed to Venezuela

https://www.cbsnews.com/news/us-guided-missile-cruiser-panama-canal-warships-deployed-venezuela/
20•MilnerRoute•54m ago•28 comments

Ask HN: Is building a Google Maps alternative from scratch bad idea?

2•piratesAndSons•1h ago•3 comments

Show HN: I built a free worldwide holiday and disruption tracker

https://alarms.global/en/
1•reverseblade2•1h ago•0 comments

Show HN: Wispbit – Keep codebase standards alive

https://wispbit.com
2•dearilos•1h ago•0 comments

Apple Lightning Adapter Audio Quality (2017)

https://www.kenrockwell.com/apple/lightning-adapter-audio-quality.htm
2•tehnub•1h ago•0 comments

Tradeoffs of Highly-Expressive Types

https://jnkr.tech/blog/expressive-types-tradeoffs
2•pscanf•1h ago•1 comments

Sleeper AI agents and how Anthropic detects them [video]

https://www.youtube.com/watch?v=Z3WMt_ncgUI
14•gidellav•1h ago•0 comments

Ask HN: If burnout tells you that you are in the wrong job/career, why avoid it?

3•amichail•1h ago•3 comments

American capitalism is being remade by state power

https://theconversation.com/american-capitalism-is-being-remade-by-state-power-263881
4•rntn•1h ago•1 comments
Open in hackernews

FBI cyber cop: Salt Typhoon pwned 'nearly every American'

https://www.theregister.com/2025/08/28/fbi_cyber_cop_salt_typhoon/
210•Bender•8h ago

Comments

roscas•7h ago
Meanwhile in Europe, dump politics do nothing to stop USA and PRC spy.

The ban for anti-social networks to less 16yo is a good start but it does not fix the smartphone or telecommunication spy.

The need to ban twitter, tiktok, facebook and many others is a must.

bilbo0s•5h ago
Hey, do what you have to do.

We will.

Can't speak for every American, but I won't take offense. It's our job to protect our infrastructure, corporations and data. Not at all the responsibility of Europe, India or China. It's your job to protect yours.

ronsor•5h ago
Don't think that'll stop the NSA/CIA or CCP hackers much.
roscas•4h ago
It does not stop, that is correct. But it is a first important step to start breaking some bad ones.
impossiblefork•1h ago
This is one of the most humiliating aspects of living here:

That the government is unwilling to genuinely protect its own interests, for example, by preventing ordinary people's data from leaking abroad or ensuring real internet privacy, because without these things we are so unbelievably vulnerable, not just to influence operations designed with this data, but they'll know literally the whole economic structure of the EU, how many people work where, where a particular person works, etc.

They're not even preventing foreign countries from getting access to bank transactions.

When they're denied they cry terrorism, but reality is that if you have this knowledge you can say 'Oh, impossibleFork just moved to X, and he's an expert in Y, he's probably doing Z and W. Let's hire some guys to try the exact same thing, so that it'll be a business here instead of there'.

I don't understand how a government can expect the country it governs to have an economy when it allows this kind of data leakage.

737min•7h ago
A better title would be “Chinese Communist Party” or “China” pwned nearly every American… This is a state, not a school computer club.
MSFT_Edging•5h ago
More like "US government demands doors be left unlocked, Chinese Communist Party walked in"
mensetmanusman•3h ago
US government demands doors exist. CCP finds keys.
MSFT_Edging•22m ago
and Technologists scream "we told you not to install the doors!"
2OEH8eoCRo0•5h ago
Then it would be flagged removed for having forbidden words in the title.
knotimpressed•4h ago
Titles can’t contain “China”?
Citizen8396•5h ago
"Salt Typhoon" specifically refers to Microsoft's observations of malicious activity, which they believe to be associated with the Ministry of State Security.

They are obviously different from other official Chinese components, and the private sector actors that support them. The distinction is also made because other firms sometimes have differing assessments and visibility.

voidfunc•6h ago
Oh goodie
fidotron•6h ago
The CISA announcement, which contains a lot more substance, was posted https://news.ycombinator.com/item?id=45065458
mullingitover•4h ago
Man, good thing Doge and MAGA gutted 30% of that agency[1]. We certainly don't need a bunch of bureaucrats doing (checks notes) cybersecurity and infrastructure security right now.

[1] https://archive.is/20250603190111/https://www.axios.com/2025...

DaSHacka•4h ago
I mean, clearly they weren't very effective anyway.
qnleigh•3h ago
These were intrusions into private companies.
beeflet•2h ago
So what is funding the government going to do then? At some point you have to make people responsible for their own computer systems.
conception•3h ago
So we definitely should just give up and not do anything instead. That makes sense.
beeflet•2h ago
Yeah, defund the government spying apparatus if it isn't useful
mensetmanusman•3h ago
Agencies aren’t allowed to fix private company security.
mullingitover•1h ago
Really? CISA isn't allowed to work with any private companies on a problem that impacts critical infrastructure and thus national security? Do you have any sources for this claim?

Nobody's saying that CISA would break down Verizon's doors and go to their keyboards and start pushing commits, but they sure as hell are working with the telecom industry.

baq•4h ago
direct link: https://www.cisa.gov/news-events/cybersecurity-advisories/aa...
user_7832•6h ago
> This indiscriminate targeting, as the FBI and White House security officials have previously noted, allowed Beijing’s snoops to geo-locate millions of mobile phone users, monitor their internet traffic, and, in some cases, record their phone calls. Victims reportedly included President Donald Trump and Vice President JD Vance.

Welp... that's quite a capable piece of surveillance.

I imagined it involved tapping to cell towers/cell infrastructure, but the details at the wikipedia page [1] suggest servers were hacked instead? Did they hack AT&T servers or something?

Side note, are there any ways to not get your data stolen in such cases? I would imagine using only a VPN might help, but if they're getting data from triangulation you couldn't do much short of turning off your phone, right?

1 - https://en.wikipedia.org/wiki/Salt_Typhoon#Methodology

tgsovlerkhgsel•5h ago
Almost as if having GDPR to keep at least the worst of the data-brokering/selling industry out is a good thing.

The more detailed report someone posted does sound like this was hacked at the source, but a lot of the data can be bought legally on the open, not-even-too-grey market. Some journalists bought one of the location data sets and used it to demonstrate that you can identify intelligence agency employees from it (if someone spends almost every workday at one site belonging to the agency, occasionally visits the other one... the other place that "anonymous" user spends a lot of time at is likely the home of an intelligence agency employee).

If the industry wasn't selling it to anyone who asks, they'd still likely keep it in easily hacked places.

MSFT_Edging•5h ago
Having any piece of the "Data Broker" industry not completely dismantled is not only a security risk but an affront to humanity.
fsagx•4h ago
> Victims reportedly included President Donald Trump and Vice President JD Vance

I wish the journalist had been a little cheeky and tried to get a quote from Angela Merkel.

phyzome•6h ago
Presumably this includes SMS-based MFA codes.
mrtesthah•6h ago
Salt Typhoon used govt-mandated backdoors to spy on Americans. As a result the govt told Americans to use Signal rather than rely on the phone system.

https://www.npr.org/2024/12/17/nx-s1-5223490/text-messaging-...

rozab•5h ago
Relevant excerpt:

>The FBI and CISA raised the alarm two months after The Wall Street Journal reported that hackers linked to the Chinese government have broken into systems that enable U.S. law enforcement agencies to conduct electronic surveillance operations under the Communications Assistance for Law Enforcement Act (CALEA).

>"These are for legitimate wiretaps that have been authorized by the courts," Hong says. But in hackers' hands, he says, the tools could potentially be used "to surveil communications and metadata for lots of people. And it seems like the [hackers'] focus is primarily Washington, D.C."

DrillShopper•5h ago
Just like they were warned repeatedly and loudly by the cypherpunks and anybody who had two functioning brain cells to rub together.
oa335•5h ago
> What this really underscores is that what the PRC is doing through these proxy actors is really reckless and unbounded, in a way that is significantly outside of the norms of what we see in the espionage space,"

What norms are he referring to?

drob518•5h ago
Yea, I wasn’t aware that there was a rule book for spies. I thought the only rule was “anything goes, but don’t get caught.” But perhaps I’m uninformed.
Telemakhos•5h ago
Given that the US intelligence community, with PRISM and Upstream and the like, hoovers up all the world's communications, I think the "norms" must be "nobody except the US was able to do this until now." Now China has shown that it can compete in the same space.
hammock•4h ago
Western intelligence plus Israel*

And yeah pretty much. I don’t know anything about anything but it feels like there is a hierarchy (norm? At least what they are trying to enforce) of US > Five Eyes > other Western Intel (France, etc) > Pakistan/Russia/Etc > China/North Korea/Iran; and Israel falls somewhere in that mix as a maverick. Of course in practice it doesn’t work out this way.

Reminds me of the recent news that the US will ban Chinese components from undersea cables, globally: https://asia.nikkei.com/content/99550c9ade243fe057e8a2ba6f29...

mensetmanusman•3h ago
Israel is a part of western intelligence. Adding them as your main response is strange.
lazide•2h ago
Notably, Israel is not actually located anywhere near the physical ‘west’.
kasey_junk•2h ago
Neither is Australia but you’d almost universally call it the west. Because western in this instance is a cultural qualifier not a geographic one.

Objecting to calling Israel the west is at least as weird as including it in the context of this conversation.

Dylan16807•2h ago
How are you defining West here? If we go by the international date line they're not all that far away and if you zag left as you go further south it works quite well. You need a similar shape on the other side too to get Europe but exclude Africa, so it makes for a pretty reasonable cut of the planet overall.

It's a tilted west.

impossiblefork•2h ago
It has very different values than the west.

Imagine if there were movements in Switzerland to move to certain areas to push out the speakers of some local dialect, and literally organized home-buying in groups to get them out?

hammock•1h ago
By what measure?
nbngeorcjhe•5h ago
He's referring to the norm that only the American government is allowed to conduct unlawful mass surveillance of American citizens. Who do these Chinese think they are???
eviks•5h ago
The ones that are in his head, just as soft, curvy, and flexible as the matter inside
kevindamm•2h ago
Indiscriminate targeting. It's clarified at the end of that paragraph, and was part of the article's lead-in:

   "There's a thought among the public that if you don't work in a sensitive area that the PRC might be interested in for its traditional espionage activities, then you are safe, they will not target you," [deputy assistant director for the FBI's cyber division] said, during a Thursday interview with The Register. "As we have seen from Salt Typhoon, this is no longer an assumption that anyone can afford to make."
nekitamo•5h ago
This is what we get for installing mandatory government backdoors all over our communications infrastructure. Unbelievable that such a critical piece of infrastructure wasn't secured properly. But after the OPM hack and the bungled implementation of CIA "drop sites" online, nothing about our government's cyber incompetence surprises me anymore.
dlcarrier•5h ago
I'm really tempted to stop using phone numbers, altogether. The security is really bad, and phone numbers are used for identification almost as often as social security numbers, but there's no requirement to have one.
jacquesm•5h ago
Technically not. But not having a working phone number will quickly become a problem when you need to interact with authorities, banks, insurance companies, the legal system etc. I remember when cell phones were becoming affordable and I thought I was clever by ditching my land line. That got me no end of trouble, then bit by bit it became more normalized to the point that if you have a landline now people look at you a little funny. Not having a phone number today would be the same as not having a landline would have been in the early 90's, and probably much worse than not having a phone was back then.
latchkey•4h ago
Even worse is that a lot of these services block the google voice VoIP numbers, so you can't even get away with that.
jkestner•4h ago
Imagine if they could block the banks of numbers that bad actors use.
jacquesm•2h ago
This is one of the more annoying things I'm dealing with at the moment. Some bad actor (a Belgian company called Voxbone) that has thousands of numbers in NL keeps calling me with all kinds of obviously scammy proposals. They're abusive, rude and just won't get lost and they just keep switching to new numbers.
reaperducer•1h ago
This can't be happening.

There are easily hundreds of comments on HN from people in Europe who assure us all that this is solely an American problem, and that it never happens anywhere else.

hyperman1•58m ago
That's what it is? As a Belgian, I've got these calls for a few months now, from France or the Netherlands. Some robotic french female voice says something incomprehensible, then the call stops. Got about 8 of these in the last 2 months. I assumed this was mostly a US problem, but it appears over here now.
mjevans•3h ago
Which is crazy, since that's the only service that even PARTLY filters some of the insane level of spam that gets sent to my unused prepaid number that everyone contacting is clearly an automated spambot.
Waterluvian•2h ago
Six years ago when I obtained a mortgage I tested just this. Correct email and address but no phone number. What happened is that the documentation and all that with the lender was submitted fine without one. And my broker didn’t need one (we used email after our first in-person visit). But once I logged in to manage the mortgage (after a few payments already) it insisted on a number. I put in a null number and it was fine.

This only became a problem when the mortgage was paid off last year and despite getting emails about it, I got a registered letter saying they must talk to me and that haven’t been answering my phone. So I call them as instructed and it was just a “you’re done. We’ll be mailing you documents to send to your insurer. Thanks for your business.”

FWIW: I’ve never personally owned a land line. The last time I ever lived somewhere with one was 19 years ago.

krisbolton•4h ago
Top tier state-sponsored actors don't need backdoors, their skill, resources, and persistance mean they can penetrate almost any system. Ascrbing this to mandatory backdoors distracts from the fact we need to improve cyber resilence and build better offense.

Reading the Atlantic Council's recent paper on what the US can do to counter the system China has created which funnels exploits to their government shows how mistatched the West is versus China. Paper here: https://www.atlanticcouncil.org/wp-content/uploads/2025/06/C...

hammock•3h ago
You are being downvoted by anti-backdoor people, which is fine, but you highlight an interesting new facet of the discussion:

How do we build a functioning world where secrets are not required? By this I don’t mean “everyone behaves good and therefore has nothing to hide/fear” but rather, how do we function in a world in which secrets are simply not possible?

christophilus•3h ago
Locally.
ptero•3h ago
It is not black and white. There is a continuum of difference between my whole life being discoverable by a targeted effort of a major state (for which there were always very few defenses) and "we have no privacy" world where my whole life is being easily seen by anyone: employers, coworkers, neighbors, potential dates, etc.

I think sliding down towards "I have no privacy" end of the spectrum is bad for both the citizens and the society. Stopping the this slide is a worthwhile goal. My 2c.

lazide•2h ago
Generally? Lots and lots of lying and bullshit, so people stop knowing or caring what the actual truth is as long as people do x specific thing they need.
hammock•1h ago
Yes
impossiblefork•2h ago
What do you mean, 'secrets are not possible'? You can still have secrets, you just stop writing things down, stop talking and literally start whispering or using other anti-eavesdropping techniques.
hammock•1h ago
It’s a thought experiment , as I observe that it is becoming harder and harder to have secrets. Even your examples (whispering, speaking behind a closed wall, even private thoughts) are either no longer safe or have promising technology being actively developed to counter them
zargon•3h ago
I think your point is we need deeper security improvements than only patching back doors. But it does come across like saying “hackers don’t need to guess passwords to get in, therefore just use hunter2.”
mensetmanusman•3h ago
Computers can never be 100% secure. It’s just a matter of how many zeros one is willing to spend, especially when physical access to the hardware is so easy (for nation states).
Veserv•3h ago
You only need to spend barely 7 zeros to defeat any organization in the world. About half of a single tank to defeat any commercial IT system no matter how much they spend on “security”.
beeflet•2h ago
Then let them spend it instead of giving your data away for free
busterarm•2h ago
It's a lot cheaper to just kidnap and interrogate someone with the access you need.

And that's only if blackmail didn't work.

beeflet•1h ago
Okay then make them do that instead of giving your data away for free
Veserv•1h ago
That is what they did. Salt Typhoon is what they got. This will continue to happen until critical software systems are secure against state actors and requires tens to hundreds of billions of dollars to compromise instead of millions to tens of millions (in the hardest cases).
JumpCrisscross•3h ago
> when physical access to the hardware is so easy (for nation states)

So where is our deep, persistent infiltration of China?

tlb•2h ago
Unknown to the public. The NSA doesn't announce when it has pwned other countries (except sometimes much later) and China doesn't reveal intrusions the way US agencies and companies are required to.
beeflet•2h ago
>Computers can never be 100% secure.

This is ridiculous defeatism. You are going to need more 0's than exist in the global economy to crack many cryptosystems.

bongodongobob•2h ago
I don't need to crack crypto, I just need to find an admin that can be blackmailed.
beeflet•2h ago
Then design the system so that there is not a single source of administrative failure.
breppp•1h ago
and also make sure to design a system without any bugs
toofy•5h ago
do we have other sources for this other than just this government’s?

i absolutely believe it may have happened, but due to overwhelming and well documented history of lies from this regime, i’d feel like i was standing on more solid footing with this if we had some reputable 3rd party sources. ideally someone who is far away from the hysterical levels of partisanship our current leaders have planted themselves.

again, i’m not in denial that it couldnt have happened, it’s just that unfortunately i think it would be unreasonable to trust anything from this regime’s people. and to reiterate, they have a long and very well documented history of outright lying. not even typical politician half truths, but shoving it in our face lying.

bb88•5h ago
Verizon says they targeted certain politicians.

https://www.verizon.com/about/salt-typhoon-matter-update

christophilus•3h ago
Anecdote, but I have a friend in cybersecurity in Australia, and he was telling me a few months ago that China basically has almost all the data they could want on almost all of the US.
michael1999•5h ago
The security community warned that making Lawful Access easy and automated would guarantee that bad people would penetrate the network.

And now we have China using CALEA-crippled systems to slurp up the entire USA network. Exactly as predicted.

And this - "outside of the norms of what we see in the espionage space" - LOL. ROTFL even. The NSA tapped Google's backbone! Have we forgotten Room 641A? MAINWAY? Poindexter and TIA? Palantir?

The NSA used to play defence and offence, and has gone full-offence for a generation. Did anyone really believe that only the USA could play offence?

Morons.

dvno42•4h ago
So what was the actual point of compromise? Was it a CALEA supporting software vendor? My guess is a common MD (Mediator device) vendor was targeted that was used by many carriers but that's speculation on my part.

Context for others, there's a small number of software vendors that make these MD devices that handle initiating a capture of a flow (a wiretapping request) and managing the chain of custody for a pcap. MDs usually sends an SNMP poll to a router/switch to start a (r)span port and the MD device slurps up all data and saves it.

Anyway, what I'm curious about is if it's the MDs that were taken over and if it was one manufacturer but I'm not seeing much technical info on all these reports.

Here's some context for "LI" for those interested: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9...

aftbit•2h ago
Most protocols that I use day-to-day are secure against simple passive interception. Either SSH or TLS encrypts just about every packet that leaves my network. This got much better with DNS over HTTPS (or TLS before that). Of course these protocols are sometimes susceptible to downgrade attacks, man in the middle compromises, etc, but none of that would be available to someone who was running a pcap without modifying the traffic streams.

So how would a simple MD attack affect me? Any sort of CALEA attack on a higher protocol layer (e.g. compromising Gmail at Google instead of capturing their traffic) would make sense, but not a pcap.

dvno42•2h ago
Definitely, I would hope these kinds of systems become less useful with more encryption. I imagine, these kinds of collections I mentioned above are just one of many angles used in an investigation with this particular angle being for correlation and supporting evidence against a request to bookface, cloudflare, etc.

edit these network devices probably also carry voip/voice trunks from enterprise and possibly carriers such as VZW. No telling if those are encrypted or not. If China is able to tap that using these CALEA systems, I could see how that would be a big deal for stealing IP/secrets.

tempodox•4h ago
Maybe this idiocy could be explained by the idea that the powers that be are more afraid of their own citizens than of any foreign threat.
themafia•1h ago
Take it one step further. Foreign threats are often manufactured or overplayed for their value in convincing American citizens to hand over even more power to their government.
breppp•1h ago
Hardly, for your own citizens you need lawful interception systems because... of the law.

While for foreign citizens you can pretty much capture anything at will, without any need for FISA or warrants

throwawayqqq11•3h ago
... morons with moral superiority complex.

They havent forgotten their offensive operations, they never knew about it or never cared.

vaxman•2h ago
IMHO, the real "morons" (your word) are those deploying Chinese-fabricated SoCs (like the latest ESP32, LinkStar, etc) and mainboards with Chinese-written BIOS/EFI/UEFI (like Zima) on what an increasing number of "influencers" deem "Raspberry Pi alternatives". Even when you cite the websites about things like "Moonbounce", there is a generation of workers in the Business now that become outwardly enraged and irrational about the risk and otherwise stick their head firmly in the sand while quietly knowing what they have done and will therefore likely continue to do is costing us the Country. Even if this effort wasn't part of VOLT, it certainly is consistent with the LAW in China that all companies must have CCP management and implement all requests required of them by that management. The worst part is that when you publicly confront these companies with this fact, for example, in Discord, they don't even deny it, they simply respond solemnly that "the other side does it too." (True, but our guys don't currently sell prisoner kidneys.)

Hey, I'll bet you never look at that WiFi-"enabled" power bank or HEPA/AC unit again the same way (or my favorite AI response du jour "Some Chinese scooters come with a microphone integrated into a GPS tracker or helmet, while others can be customized with aftermarket solutions. There is no single model called "Chinese scooter with microphone," but rather multiple products and approaches that fit this description.") Errbody worried about the talking LLM parrot AI and your vehicle dashboard always listening (or even watching), but that's not the most serious threat we face now.

donkeybeer•1h ago
Unfortunately the problem is that your government is the one that has natural powers to inflict violence on you, but Chinese can't. (And vice versa for Chinese citizens)
vaxman•1h ago
PS: I've been downvoted on HN for years and years for mentioning this topic. Once, someone even summoned dang. One would think that by now, with this being out in the open (why did "China H2Oh" fail again? lol) but no..threat actors gone act.. Those smart enough to listen to words of someone with nearly five decades in the Business might not lose as much money as those who don't.
donkeybeer•46m ago
Can a Chinese cop arrest you or kill you in America?
Bender•12m ago
Not the person you are asking but there are indeed Chinese cops in the USA that harass and threaten Chinese expats and even threaten to hurt or arrest their family members back in the mainland. It is a violation of our nation's sovereignty but some cities are very slow to arrest them if they even try.

Here [1] is one example of a couple Chinese police in NYC but I can not find the links to the groups in Los Angeles.

[1] - https://www.pbs.org/newshour/politics/2-men-arrested-on-char...

sugarpimpdorsey•1h ago
Celebrated programming genius and de facto leader of the GNU project Richard Stallman very publicly used a Loongson for many years. Case closed.
iknowstuff•1h ago
Discord is banned in China and uses GCP. What is the point you are making against it exactly?
idiotsecant•5h ago
It turns out blowing a giant hole in your security model so that uncle sam can spy on your users also makes it easier for bad guys to spy on your users! Shocking!!

China is the last group we should blame for this. Our government did this to us and must be held accountable or this will happen again, and again, and again.

gosub100•4h ago
Why is it suddenly a problem when it's a foreign government?
fwip•4h ago
Exactly. China can't do much with my data, compared to the US government or my insurance company.
mensetmanusman•3h ago
They have skillfully used it for IP theft which OECD estimates is worth about $500B annually in lost revenue. Destroying the mechanism for R&D funding is actually a great strategy by China. Props
shigawire•2h ago
Unnecessary, this administration destroys R&D funding on its own.
christophilus•3h ago
I’d prefer neither. But my prediction is that when we have a conflict with China, their digital access is going to be a game changer.
impossiblefork•1h ago
Business requires security. If you can do anything physical in the US, or in Europe etc. then you must be doing something so clever that secrecy is warranted.
metalman•4h ago
For China a data set like this is only usefull if it can be validated, which it seems from reading between the lines, they have/are doing. The only use China has for this data set it to guage a competitors true capacity, VS there own capacity. It is highly likely that this data set will not be used to access any individuals information in any way that could lead to a situation that then could be back tracked, and that the copy that China has is hermeticaly sealed off in some inner sanctum of the secret squirles. Any posture that China takes will use many other sources of information beside this one. And of course, it's Chinas posture that has some strategists concerned right now, which is compounded by what looks like a perfect job, done completly online that has left a dead end trail, and zero proof of anything. So classic spy craft, with no possibility of a hollywood movie.
baq•4h ago
how is this not a total shitstorm on twitter and in media is beyond me. nobody cares since nobody got hurt?
aydyn•3h ago
Yes. Have you not yet learned that normal people dont care about privacy?
baq•2h ago
Right. Until their nudes get leaked that is.
kogasa240p•4h ago
And of course the only thing that the US government will do is double down on surveillance even harder.
hereme888•3h ago
Once upon a time, problems like these were solved with definitive measures; cut the cable, or send a bullet.

But state-sponsored cyber-war and other such aggressions are now considered normal daily life. Just as bad, U.S. MSM rarely reports American aggression towards others.

oasisbob•3h ago
I live in a state, Washington, with mandatory breach reporting and notifications.

Haven't seen anything from this. Any idea why? Low compliance in general? Telcos think they're big enough to ignore state regs?

mensetmanusman•3h ago
China pwned nearly every Chinese as well. The CCP can only kill American spies operating in China with this information.
hungmung•2h ago
China has secret police operating in America right now.
loteck•3h ago
Any discussion of Salt Typhoon should start with the unusual fact that it is still an active and uncontained incident, despite having been widely revealed in 2024. Typically we are accustomed to discussing lessons learned during a post mortem. This particular mortem has not yet posted. We are still owned and data continues to be compromised.

https://www.theregister.com/2025/08/28/china_salt_typhoon_al...

ivape•3h ago
I honestly don't believe China is doing something that America itself didn't start. The US did this too most likely.
narrator•2h ago
I think one unprecedented thing about how China operates is every single company is like a private military contractor with letters of marque and reprisal to do whatever the heck they feel like in the name of CCP world dominance. As long as it's patriotic, you can do absolutely whatever the heck you want to the other guys. Harvest their organs for profit, sabotage major infrastructure, hack absolutely everything, fund and supply and launder money for fentanyl production, etc. The kinds of things only the dirty tricks department of intelligence agencies are allowed to do in Western countries that they get called out and scandalized about when people find out about that.

Likewise, if you're Jack Ma and they don't like what poem you quoted, all your stuff is now theirs and there aren't any silly laws to protect yourself. Absolutely 100% goal oriented to the steady increase in power of the communist party and absolutely no higher principles apply.

jofla_net•1h ago
Realpolitik
__turbobrew__•1h ago
And yet my bank still only supports SMS 2fa, god help us all.
Zigurd•1h ago
I wrote the lawful intercept spec for a 3G GGSN node. So keep in mind that my knowledge of present day systems might be outdated. The spec was derived from pre-existing specifications for telephone equipment. One of the interesting things about lawful intercept is that it was supposed to hide from network management. Intercepts aren't logged at the network operator. The node being used in an intercept gives no indication that the intercept is happening.

IIRC the standard at the time was to enable intercepting up to 3% of traffic, without the surveillance target of course knowing, but also without their carrier knowing. Law-enforcement agencies used LI consoles on their own premises to order intercepts.

So it's not that lawful intercept was particularly easy to hack, it's that once it's compromised, detecting that it's being used nefariously is especially difficult. I would question whether anyone knows for sure when the compromise began, and how long it lasted.