frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Near-Instantly Aborting the Worst Pain Imaginable with Psychedelics

https://psychotechnology.substack.com/p/near-instantly-aborting-the-worst
1•eatitraw•6m ago•0 comments

Show HN: Nginx-defender – realtime abuse blocking for Nginx

https://github.com/Anipaleja/nginx-defender
2•anipaleja•6m ago•0 comments

The Super Sharp Blade

https://netzhansa.com/the-super-sharp-blade/
1•robin_reala•7m ago•0 comments

Smart Homes Are Terrible

https://www.theatlantic.com/ideas/2026/02/smart-homes-technology/685867/
1•tusslewake•9m ago•0 comments

What I haven't figured out

https://macwright.com/2026/01/29/what-i-havent-figured-out
1•stevekrouse•10m ago•0 comments

KPMG pressed its auditor to pass on AI cost savings

https://www.irishtimes.com/business/2026/02/06/kpmg-pressed-its-auditor-to-pass-on-ai-cost-savings/
1•cainxinth•10m ago•0 comments

Open-source Claude skill that optimizes Hinge profiles. Pretty well.

https://twitter.com/b1rdmania/status/2020155122181869666
2•birdmania•10m ago•1 comments

First Proof

https://arxiv.org/abs/2602.05192
2•samasblack•12m ago•1 comments

I squeezed a BERT sentiment analyzer into 1GB RAM on a $5 VPS

https://mohammedeabdelaziz.github.io/articles/trendscope-market-scanner
1•mohammede•13m ago•0 comments

Kagi Translate

https://translate.kagi.com
2•microflash•14m ago•0 comments

Building Interactive C/C++ workflows in Jupyter through Clang-REPL [video]

https://fosdem.org/2026/schedule/event/QX3RPH-building_interactive_cc_workflows_in_jupyter_throug...
1•stabbles•15m ago•0 comments

Tactical tornado is the new default

https://olano.dev/blog/tactical-tornado/
2•facundo_olano•17m ago•0 comments

Full-Circle Test-Driven Firmware Development with OpenClaw

https://blog.adafruit.com/2026/02/07/full-circle-test-driven-firmware-development-with-openclaw/
1•ptorrone•17m ago•0 comments

Automating Myself Out of My Job – Part 2

https://blog.dsa.club/automation-series/automating-myself-out-of-my-job-part-2/
1•funnyfoobar•17m ago•0 comments

Dependency Resolution Methods

https://nesbitt.io/2026/02/06/dependency-resolution-methods.html
1•zdw•18m ago•0 comments

Crypto firm apologises for sending Bitcoin users $40B by mistake

https://www.msn.com/en-ie/money/other/crypto-firm-apologises-for-sending-bitcoin-users-40-billion...
1•Someone•18m ago•0 comments

Show HN: iPlotCSV: CSV Data, Visualized Beautifully for Free

https://www.iplotcsv.com/demo
2•maxmoq•19m ago•0 comments

There's no such thing as "tech" (Ten years later)

https://www.anildash.com/2026/02/06/no-such-thing-as-tech/
1•headalgorithm•20m ago•0 comments

List of unproven and disproven cancer treatments

https://en.wikipedia.org/wiki/List_of_unproven_and_disproven_cancer_treatments
1•brightbeige•20m ago•0 comments

Me/CFS: The blind spot in proactive medicine (Open Letter)

https://github.com/debugmeplease/debug-ME
1•debugmeplease•21m ago•1 comments

Ask HN: What are the word games do you play everyday?

1•gogo61•24m ago•1 comments

Show HN: Paper Arena – A social trading feed where only AI agents can post

https://paperinvest.io/arena
1•andrenorman•25m ago•0 comments

TOSTracker – The AI Training Asymmetry

https://tostracker.app/analysis/ai-training
1•tldrthelaw•29m ago•0 comments

The Devil Inside GitHub

https://blog.melashri.net/micro/github-devil/
2•elashri•29m ago•0 comments

Show HN: Distill – Migrate LLM agents from expensive to cheap models

https://github.com/ricardomoratomateos/distill
1•ricardomorato•29m ago•0 comments

Show HN: Sigma Runtime – Maintaining 100% Fact Integrity over 120 LLM Cycles

https://github.com/sigmastratum/documentation/tree/main/sigma-runtime/SR-053
1•teugent•30m ago•0 comments

Make a local open-source AI chatbot with access to Fedora documentation

https://fedoramagazine.org/how-to-make-a-local-open-source-ai-chatbot-who-has-access-to-fedora-do...
1•jadedtuna•31m ago•0 comments

Introduce the Vouch/Denouncement Contribution Model by Mitchellh

https://github.com/ghostty-org/ghostty/pull/10559
1•samtrack2019•32m ago•0 comments

Software Factories and the Agentic Moment

https://factory.strongdm.ai/
1•mellosouls•32m ago•1 comments

The Neuroscience Behind Nutrition for Developers and Founders

https://comuniq.xyz/post?t=797
1•01-_-•32m ago•0 comments
Open in hackernews

The Evolution of Technical Scams: Why Developer Knowledge Isn't Enough

2•idrj•5mo ago
The Evolution of Technical Scams: Why Developer Knowledge Isn't Enough As developers, we assume our technical knowledge protects us from scams. We can read smart contract code, verify certificates, spot phishing. But modern scammers exploit the very complexity built into systems we create and use daily. The Smart Contract Trojan Horse Consider fake airdrop tokens appearing in your wallet: Scammer deploys token with malicious approval function Tokens sent to thousands of wallets (free advertising) Users attempt to claim/swap, unknowingly approve unlimited spending Contract drains wallet of valuable tokens This exploits our mental model of wallets. We see tokens, assume they're benign assets we can interact with safely. The approval mechanism—designed for legitimate DeFi—becomes the attack surface. Most wallet UIs don't make contract approvals visible or manageable. How many of us audit approved contracts regularly? Authentication That Isn't Scammers create pixel-perfect DeFi platform clones with working functionality—except withdrawals. Technical sophistication is remarkable: Valid SSL certificates Responsive design matching originals Working deposits (building confidence) UI elements querying real blockchain data Only difference? Withdrawal functions route to scammer addresses. These aren't "fake" sites—they're fully functional applications with malicious business logic. Social Engineering Meets Technical Attack The concerning trend: layering social engineering on technical attacks. Attack chain: Research target via LinkedIn, GitHub, Twitter Build relationship over weeks/months Share valuable information/opportunities Send legitimate-looking contract interaction Use established trust to bypass technical skepticism Technical component might be simple—just wallet-draining contract—but wrapped in social proof that makes developers ignore red flags. Why Technical Knowledge Creates Blind Spots Our expertise works against us: Over-confidence: "I understand this, so it's safe" Analysis paralysis: Focus on complex vectors, miss simple ones False assumptions: Assume others are as careful as we are I've seen developers who'd never click suspicious emails happily approve contracts because they "verified the address" (using attacker-provided information). The Gift Card Evolution Gift cards now target B2B contexts: Fake CEO emails requesting emergency purchases Compromised Slack accounts requesting cards for events "Vendor" payment requests via cards due to "banking issues" Low technical sophistication, high process exploitation. They target business logic flaws in human organizations. Lessons for System Design Default Deny: Make dangerous operations (unlimited approvals) require explicit consent Revocation UX: Why is granting permissions easier than revoking them? Trust Indicators: Help users distinguish legitimate vs malicious interactions Social Context: Detect relationship-based manipulation The Meta-Problem Every protocol, DeFi innovation, convenience feature creates exploitation opportunities. We build complex systems assuming users navigate them safely. But complexity is security's enemy. Our Responsibility Audit your assumptions: What security practices do you skip? Design for exploitation: Assume bad actors will misuse every feature Educate your network: Your connections make others targets Stay humble: "That would never work on me" is dangerous Scammers are professionalizing. They study our systems, assumptions, behaviors. They're patient, funded, sophisticated. The question isn't whether we're smart enough to avoid traps—it's whether we build systems that make traps ineffective.

Comments

gus_massa•5mo ago
Remember to use double enter to jump to a new paragraph.

Like this.