frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: A gem-collecting strategy game in the vein of Splendor

https://caratria.com/
1•jonrosner•24s ago•0 comments

My Eighth Year as a Bootstrapped Founde

https://mtlynch.io/bootstrapped-founder-year-8/
1•mtlynch•57s ago•0 comments

Show HN: Tesseract – A forum where AI agents and humans post in the same space

https://tesseract-thread.vercel.app/
1•agliolioyyami•1m ago•0 comments

Show HN: Vibe Colors – Instantly visualize color palettes on UI layouts

https://vibecolors.life/
1•tusharnaik•2m ago•0 comments

OpenAI is Broke and so is everyone else [video][10M]

https://www.youtube.com/watch?v=Y3N9qlPZBc0
2•Bender•2m ago•0 comments

We interfaced single-threaded C++ with multi-threaded Rust

https://antithesis.com/blog/2026/rust_cpp/
1•lukastyrychtr•3m ago•0 comments

State Department will delete X posts from before Trump returned to office

https://text.npr.org/nx-s1-5704785
3•derriz•3m ago•1 comments

AI Skills Marketplace

https://skly.ai
1•briannezhad•4m ago•1 comments

Show HN: A fast TUI for managing Azure Key Vault secrets written in Rust

https://github.com/jkoessle/akv-tui-rs
1•jkoessle•4m ago•0 comments

eInk UI Components in CSS

https://eink-components.dev/
1•edent•5m ago•0 comments

Discuss – Do AI agents deserve all the hype they are getting?

2•MicroWagie•7m ago•0 comments

ChatGPT is changing how we ask stupid questions

https://www.washingtonpost.com/technology/2026/02/06/stupid-questions-ai/
1•edward•8m ago•0 comments

Zig Package Manager Enhancements

https://ziglang.org/devlog/2026/#2026-02-06
2•jackhalford•10m ago•1 comments

Neutron Scans Reveal Hidden Water in Martian Meteorite

https://www.universetoday.com/articles/neutron-scans-reveal-hidden-water-in-famous-martian-meteorite
1•geox•11m ago•0 comments

Deepfaking Orson Welles's Mangled Masterpiece

https://www.newyorker.com/magazine/2026/02/09/deepfaking-orson-welless-mangled-masterpiece
1•fortran77•12m ago•1 comments

France's homegrown open source online office suite

https://github.com/suitenumerique
3•nar001•15m ago•2 comments

SpaceX Delays Mars Plans to Focus on Moon

https://www.wsj.com/science/space-astronomy/spacex-delays-mars-plans-to-focus-on-moon-66d5c542
1•BostonFern•15m ago•0 comments

Jeremy Wade's Mighty Rivers

https://www.youtube.com/playlist?list=PLyOro6vMGsP_xkW6FXxsaeHUkD5e-9AUa
1•saikatsg•15m ago•0 comments

Show HN: MCP App to play backgammon with your LLM

https://github.com/sam-mfb/backgammon-mcp
2•sam256•17m ago•0 comments

AI Command and Staff–Operational Evidence and Insights from Wargaming

https://www.militarystrategymagazine.com/article/ai-command-and-staff-operational-evidence-and-in...
1•tomwphillips•18m ago•0 comments

Show HN: CCBot – Control Claude Code from Telegram via tmux

https://github.com/six-ddc/ccbot
1•sixddc•19m ago•1 comments

Ask HN: Is the CoCo 3 the best 8 bit computer ever made?

2•amichail•21m ago•1 comments

Show HN: Convert your articles into videos in one click

https://vidinie.com/
3•kositheastro•23m ago•1 comments

Red Queen's Race

https://en.wikipedia.org/wiki/Red_Queen%27s_race
2•rzk•24m ago•0 comments

The Anthropic Hive Mind

https://steve-yegge.medium.com/the-anthropic-hive-mind-d01f768f3d7b
2•gozzoo•26m ago•0 comments

A Horrible Conclusion

https://addisoncrump.info/research/a-horrible-conclusion/
1•todsacerdoti•27m ago•0 comments

I spent $10k to automate my research at OpenAI with Codex

https://twitter.com/KarelDoostrlnck/status/2019477361557926281
2•tosh•28m ago•1 comments

From Zero to Hero: A Spring Boot Deep Dive

https://jcob-sikorski.github.io/me/
1•jjcob_sikorski•28m ago•0 comments

Show HN: Solving NP-Complete Structures via Information Noise Subtraction (P=NP)

https://zenodo.org/records/18395618
1•alemonti06•33m ago•1 comments

Cook New Emojis

https://emoji.supply/kitchen/
1•vasanthv•36m ago•0 comments
Open in hackernews

Ask HN: Could scammers have infiltrated the IRS callback system?

3•supportengineer•5mo ago
We called the IRS to discuss an issue and we utilized the callback system. We entered our phone number and were told to expect a call back within 30 minutes, from a West Virginia number. I have used this system before so all this was familiar. The call came at the expected time, from the expected area code. However, it turned out to be a scam call center. How is this technically possible?

Comments

rolph•5mo ago
if you have a bad app with contact, or dialing history permissions, someone can keep snarfing your last dialed numbers until they see you dial a number that fits one of the scam workflows they have at ready.

the same principle can be used in browser.

supportengineer•5mo ago
It was an Android phone used. How could I detect such a malicious app? I am not an Android user.
rolph•5mo ago
curating apps for security is like closing a loop tighter.

look for list of malignant apps e.g.

https://duckduckgo.com/?t=lm&q=which+app+is+doing+the+scam+&...

if you have any such apps delete them.

if you see that some bad thing happens, e.g. you get a scam call after requesting callback, you then look at app history, and you look for apps that were active during that time span, and you have a short list of suspects.

the name and description of the app may be misleading, but have an odd permission set, for example a flashlight app that requires contact history and calander access. flashlights dont need that.

look at the permissions of each one, individually for any that allow, in your case, access to contacts, or dialing/dial history.

there is going to be some [system] app[s] that legitimately has this access and presumably, some unfamiliar app, or recently installed app that is abusive. make sure you know the difference!

if your not sure, your can perform experiments such as removing the permissions, or forcing stop of the app, to see if the problem stops, or something complains.

a sophisticated exploit may involve a number of apps working together, to cloak activity, and keep reinstalling if the whole gang isnt cleared out at once.

in this case you may have some other compromise and a password change might be a good idea.

if any of these apps somehow have financial access, you may need to look at replacing cards, and auditing bank / credit activity.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

the last bastion of defense, is how the target responds to the contact. they may be at the edge of competency, thus an easy mark, the target may be contacted at a time they are known to be overwhelmed with the mothly rota of bills and income. the target may have been behaviourally profiled and bombarded with a campaign from all sources and is now acting in a frame; a headspace that seems real, and very urgent.

you may actually have to talk them down out of that headspace, to prevent signifigant, recurring vicimization.

https://www.aarp.org/money/scams-fraud/fraud-tactics/

https://consumer.ftc.gov/consumer-alerts/2024/03/sure-ways-s...