frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

The Evolution of Technical Scams: Why Developer Knowledge Isn't Enough

2•idrj•19h ago
The Evolution of Technical Scams: Why Developer Knowledge Isn't Enough As developers, we assume our technical knowledge protects us from scams. We can read smart contract code, verify certificates, spot phishing. But modern scammers exploit the very complexity built into systems we create and use daily. The Smart Contract Trojan Horse Consider fake airdrop tokens appearing in your wallet: Scammer deploys token with malicious approval function Tokens sent to thousands of wallets (free advertising) Users attempt to claim/swap, unknowingly approve unlimited spending Contract drains wallet of valuable tokens This exploits our mental model of wallets. We see tokens, assume they're benign assets we can interact with safely. The approval mechanism—designed for legitimate DeFi—becomes the attack surface. Most wallet UIs don't make contract approvals visible or manageable. How many of us audit approved contracts regularly? Authentication That Isn't Scammers create pixel-perfect DeFi platform clones with working functionality—except withdrawals. Technical sophistication is remarkable: Valid SSL certificates Responsive design matching originals Working deposits (building confidence) UI elements querying real blockchain data Only difference? Withdrawal functions route to scammer addresses. These aren't "fake" sites—they're fully functional applications with malicious business logic. Social Engineering Meets Technical Attack The concerning trend: layering social engineering on technical attacks. Attack chain: Research target via LinkedIn, GitHub, Twitter Build relationship over weeks/months Share valuable information/opportunities Send legitimate-looking contract interaction Use established trust to bypass technical skepticism Technical component might be simple—just wallet-draining contract—but wrapped in social proof that makes developers ignore red flags. Why Technical Knowledge Creates Blind Spots Our expertise works against us: Over-confidence: "I understand this, so it's safe" Analysis paralysis: Focus on complex vectors, miss simple ones False assumptions: Assume others are as careful as we are I've seen developers who'd never click suspicious emails happily approve contracts because they "verified the address" (using attacker-provided information). The Gift Card Evolution Gift cards now target B2B contexts: Fake CEO emails requesting emergency purchases Compromised Slack accounts requesting cards for events "Vendor" payment requests via cards due to "banking issues" Low technical sophistication, high process exploitation. They target business logic flaws in human organizations. Lessons for System Design Default Deny: Make dangerous operations (unlimited approvals) require explicit consent Revocation UX: Why is granting permissions easier than revoking them? Trust Indicators: Help users distinguish legitimate vs malicious interactions Social Context: Detect relationship-based manipulation The Meta-Problem Every protocol, DeFi innovation, convenience feature creates exploitation opportunities. We build complex systems assuming users navigate them safely. But complexity is security's enemy. Our Responsibility Audit your assumptions: What security practices do you skip? Design for exploitation: Assume bad actors will misuse every feature Educate your network: Your connections make others targets Stay humble: "That would never work on me" is dangerous Scammers are professionalizing. They study our systems, assumptions, behaviors. They're patient, funded, sophisticated. The question isn't whether we're smart enough to avoid traps—it's whether we build systems that make traps ineffective.

Database failure lessons at Amazon in 1997 (2004) [pdf]

https://web.archive.org/web/20090327153456/http://www.bluegecko.net/Default.aspx?app=LeadgenDownl...
1•harshreality•5m ago•0 comments

The Web Behind Glass

https://medienbaecker.com/articles/the-web-behind-glass
1•OuterVale•6m ago•0 comments

Writing Code Is Easy. Reading It Isn't

https://idiallo.com/blog/writing-code-is-easy-reading-is-hard
2•jnord•8m ago•0 comments

Bonini's paradox – The more complete a model is, the harder it is to understand

https://en.wikipedia.org/wiki/Bonini%27s_paradox
1•gidellav•8m ago•0 comments

Show HN: I Rewrote printf – Now 10x More Powerful (v1.3)

2•Forgret•10m ago•0 comments

Musk's SpaceX Agrees to Buy Echostar Spectrum for $17B

https://www.bloomberg.com/news/articles/2025-09-08/starlink-is-said-in-advanced-talks-to-acquire-...
2•supertrope•11m ago•0 comments

Go for Bash Programmers – Part II: CLI Tools

https://github.com/go-monk/from-bash-to-go-part-ii
2•reisinge•11m ago•0 comments

Spectroscopy Like it's 1985 [video]

https://www.youtube.com/watch?v=1J0GFmZ1BX0
1•gnoll_of_gozag•12m ago•0 comments

Teams Outlast Projects

https://frederickvanbrabant.com/blog/2025-09-05-teams-outlast-projects/
1•TheEdonian•13m ago•0 comments

Ask HN: How do I announce that I'm looking for a new job while being employed?

1•throwawayAhoy•14m ago•0 comments

Orsted Sues Trump Administration in Fight to Restart Its Blocked Wind Farm

https://www.nytimes.com/2025/09/04/climate/orsted-trump-wind-farm-lawsuit.html
4•mitchbob•15m ago•1 comments

A complete map of the Rust type system

https://rustcurious.com/elements/
2•ashvardanian•16m ago•0 comments

Package Managers Are Evil

https://www.gingerbill.org/article/2025/09/08/package-managers-are-evil/
1•gingerBill•19m ago•0 comments

Are Humans Watching Animals Too Closely?

https://www.theatlantic.com/science/2025/09/animal-privacy-surveillance-dogs/684132/
1•FinnLobsien•21m ago•0 comments

Reverse-engineering Roadsearch Plus, or, roadgeeking with an 8-bit CPU

http://oldvcr.blogspot.com/2025/08/make-your-apple-ii-or-commodore-64.html
1•atjamielittle•23m ago•0 comments

Adjacency Matrix and std:mdspan, C++23

https://www.cppstories.com/2025/cpp23_mdspan_adj/
1•ashvardanian•23m ago•0 comments

Pickleball Took over Tennis Courts, as Seen from the Sky

https://www.nytimes.com/interactive/2025/09/01/upshot/pickleball.html
1•bewal416•24m ago•0 comments

After Afghan Quake, Many Male Rescuers Helped Men but Not Women

https://www.nytimes.com/2025/09/04/world/asia/afghanistan-earthquake-rescue-efforts-women.html
1•isolli•27m ago•0 comments

C++20 Modules: Practical Insights, Status and TODOs

https://chuanqixu9.github.io/c++/2025/08/14/C++20-Modules.en.html
1•ashvardanian•29m ago•0 comments

A desktop environment without graphics (tmux-like)

https://github.com/Julien-cpsn/desktop-tui
1•mustaphah•30m ago•0 comments

Show HN: Dir2md – Convert Any Repo into AI-Ready Markdown Blueprints

https://github.com/Flamehaven/dir2md
1•Flamehaven01•30m ago•0 comments

Hot Chips 2025: Session 1 – CPUs – By George Cozma

https://chipsandcheese.com/p/hot-chips-2025-session-1-cpus
2•rbanffy•35m ago•0 comments

Getting AI Agent Architecture Right with MCP

https://decodingml.substack.com/p/getting-agent-architecture-right
1•rbanffy•35m ago•0 comments

Tyromancy (Telling the future using cheese)

https://en.wikipedia.org/wiki/Tyromancy
1•reaperducer•36m ago•0 comments

Indiana Jones and the Last Crusade Adventure Prototype Recovered for the C64

https://www.gamesthatwerent.com/2025/09/indiana-jones-and-the-last-crusade-adventure-prototype-re...
2•ibobev•36m ago•0 comments

VMware's in court again. Customer relationships rarely go this wrong

https://www.theregister.com/2025/09/08/vmware_in_court_opinion/
17•rntn•37m ago•0 comments

Plot IMDB Series Ratings

https://imdb.derfor.dk/
1•0x000042•38m ago•1 comments

10xDevAi

https://10xdevai.com
1•chaimvaid•40m ago•0 comments

Your Zodiac Sign Is 2k Years Out of Date

https://www.nytimes.com/interactive/2025/upshot/zodiac-signs.html
2•gk1•42m ago•0 comments

Nicholas (Nick) J. Fuentes

https://x.com/NickJFuentes
1•barrister•45m ago•0 comments