frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Framing an LLM as a safety researcher changes its language, not its judgement

https://lab.fukami.eu/LLMAAJ
1•dogacel•1m ago•0 comments

Are there anyone interested about a creator economy startup

1•Nejana•3m ago•0 comments

Show HN: Skill Lab – CLI tool for testing and quality scoring agent skills

https://github.com/8ddieHu0314/Skill-Lab
1•qu4rk5314•3m ago•0 comments

2003: What is Google's Ultimate Goal? [video]

https://www.youtube.com/watch?v=xqdi1xjtys4
1•1659447091•3m ago•0 comments

Roger Ebert Reviews "The Shawshank Redemption"

https://www.rogerebert.com/reviews/great-movie-the-shawshank-redemption-1994
1•monero-xmr•5m ago•0 comments

Busy Months in KDE Linux

https://pointieststick.com/2026/02/06/busy-months-in-kde-linux/
1•todsacerdoti•6m ago•0 comments

Zram as Swap

https://wiki.archlinux.org/title/Zram#Usage_as_swap
1•seansh•19m ago•0 comments

Green’s Dictionary of Slang - Five hundred years of the vulgar tongue

https://greensdictofslang.com/
1•mxfh•20m ago•0 comments

Nvidia CEO Says AI Capital Spending Is Appropriate, Sustainable

https://www.bloomberg.com/news/articles/2026-02-06/nvidia-ceo-says-ai-capital-spending-is-appropr...
1•virgildotcodes•23m ago•2 comments

Show HN: StyloShare – privacy-first anonymous file sharing with zero sign-up

https://www.styloshare.com
1•stylofront•24m ago•0 comments

Part 1 the Persistent Vault Issue: Your Encryption Strategy Has a Shelf Life

1•PhantomKey•28m ago•0 comments

Show HN: Teleop_xr – Modular WebXR solution for bimanual robot teleoperation

https://github.com/qrafty-ai/teleop_xr
1•playercc7•31m ago•1 comments

The Highest Exam: How the Gaokao Shapes China

https://www.lrb.co.uk/the-paper/v48/n02/iza-ding/studying-is-harmful
2•mitchbob•35m ago•1 comments

Open-source framework for tracking prediction accuracy

https://github.com/Creneinc/signal-tracker
1•creneinc•37m ago•0 comments

India's Sarvan AI LLM launches Indic-language focused models

https://x.com/SarvamAI
2•Osiris30•38m ago•0 comments

Show HN: CryptoClaw – open-source AI agent with built-in wallet and DeFi skills

https://github.com/TermiX-official/cryptoclaw
1•cryptoclaw•41m ago•0 comments

ShowHN: Make OpenClaw respond in Scarlett Johansson’s AI Voice from the Film Her

https://twitter.com/sathish316/status/2020116849065971815
1•sathish316•43m ago•2 comments

CReact Version 0.3.0 Released

https://github.com/creact-labs/creact
1•_dcoutinho96•45m ago•0 comments

Show HN: CReact – AI Powered AWS Website Generator

https://github.com/creact-labs/ai-powered-aws-website-generator
1•_dcoutinho96•46m ago•0 comments

The rocky 1960s origins of online dating (2025)

https://www.bbc.com/culture/article/20250206-the-rocky-1960s-origins-of-online-dating
1•1659447091•51m ago•0 comments

Show HN: Agent-fetch – Sandboxed HTTP client with SSRF protection for AI agents

https://github.com/Parassharmaa/agent-fetch
1•paraaz•52m ago•0 comments

Why there is no official statement from Substack about the data leak

https://techcrunch.com/2026/02/05/substack-confirms-data-breach-affecting-email-addresses-and-pho...
10•witnessme•56m ago•3 comments

Effects of Zepbound on Stool Quality

https://twitter.com/ScottHickle/status/2020150085296775300
2•aloukissas•1h ago•1 comments

Show HN: Seedance 2.0 – The Most Powerful AI Video Generator

https://seedance.ai/
2•bigbromaker•1h ago•0 comments

Ask HN: Do we need "metadata in source code" syntax that LLMs will never delete?

1•andrewstuart•1h ago•1 comments

Pentagon cutting ties w/ "woke" Harvard, ending military training & fellowships

https://www.cbsnews.com/news/pentagon-says-its-cutting-ties-with-woke-harvard-discontinuing-milit...
6•alephnerd•1h ago•2 comments

Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? [pdf]

https://cds.cern.ch/record/405662/files/PhysRev.47.777.pdf
1•northlondoner•1h ago•1 comments

Kessler Syndrome Has Started [video]

https://www.tiktok.com/@cjtrowbridge/video/7602634355160206623
2•pbradv•1h ago•0 comments

Complex Heterodynes Explained

https://tomverbeure.github.io/2026/02/07/Complex-Heterodyne.html
4•hasheddan•1h ago•0 comments

MemAlign: Building Better LLM Judges from Human Feedback with Scalable Memory

https://www.databricks.com/blog/memalign-building-better-llm-judges-human-feedback-scalable-memory
1•superchink•1h ago•0 comments
Open in hackernews

Ask HN: Could scammers have infiltrated the IRS callback system?

3•supportengineer•5mo ago
We called the IRS to discuss an issue and we utilized the callback system. We entered our phone number and were told to expect a call back within 30 minutes, from a West Virginia number. I have used this system before so all this was familiar. The call came at the expected time, from the expected area code. However, it turned out to be a scam call center. How is this technically possible?

Comments

rolph•5mo ago
if you have a bad app with contact, or dialing history permissions, someone can keep snarfing your last dialed numbers until they see you dial a number that fits one of the scam workflows they have at ready.

the same principle can be used in browser.

supportengineer•5mo ago
It was an Android phone used. How could I detect such a malicious app? I am not an Android user.
rolph•5mo ago
curating apps for security is like closing a loop tighter.

look for list of malignant apps e.g.

https://duckduckgo.com/?t=lm&q=which+app+is+doing+the+scam+&...

if you have any such apps delete them.

if you see that some bad thing happens, e.g. you get a scam call after requesting callback, you then look at app history, and you look for apps that were active during that time span, and you have a short list of suspects.

the name and description of the app may be misleading, but have an odd permission set, for example a flashlight app that requires contact history and calander access. flashlights dont need that.

look at the permissions of each one, individually for any that allow, in your case, access to contacts, or dialing/dial history.

there is going to be some [system] app[s] that legitimately has this access and presumably, some unfamiliar app, or recently installed app that is abusive. make sure you know the difference!

if your not sure, your can perform experiments such as removing the permissions, or forcing stop of the app, to see if the problem stops, or something complains.

a sophisticated exploit may involve a number of apps working together, to cloak activity, and keep reinstalling if the whole gang isnt cleared out at once.

in this case you may have some other compromise and a password change might be a good idea.

if any of these apps somehow have financial access, you may need to look at replacing cards, and auditing bank / credit activity.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

the last bastion of defense, is how the target responds to the contact. they may be at the edge of competency, thus an easy mark, the target may be contacted at a time they are known to be overwhelmed with the mothly rota of bills and income. the target may have been behaviourally profiled and bombarded with a campaign from all sources and is now acting in a frame; a headspace that seems real, and very urgent.

you may actually have to talk them down out of that headspace, to prevent signifigant, recurring vicimization.

https://www.aarp.org/money/scams-fraud/fraud-tactics/

https://consumer.ftc.gov/consumer-alerts/2024/03/sure-ways-s...