frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

I made the most unique Chrome extension

https://chromewebstore.google.com/detail/dibby-chrome-extension/nofijfmdhnkgjnhbacagmodmcpdnlmde
1•DylanWain•45s ago•1 comments

Show HN: Mermaid-animate, GSAP animations for Mermaid sequence and flow diagrams

https://jameshealyio.github.io/mermaid-animate/
1•apimade•1m ago•0 comments

Reuters withdraws Xi, Putin longevity video after China pulls permission to use

https://www.reuters.com/business/media-telecom/reuters-withdraws-xi-putin-longevity-video-after-c...
2•jnord•4m ago•0 comments

Breakthrough Cancer Therapy Moves to Phase 2 Trials

https://news.gsu.edu/research-magazine/breakthrough-cancer-therapy-moves-to-phase-2-trials
1•geox•4m ago•0 comments

BatteryScope Device Health Checker

https://batteryscope.com
1•jmillnerdev•7m ago•2 comments

Google admits the open web is in 'rapid decline'

https://www.theverge.com/news/773928/google-open-web-rapid-decline
1•maxeda•8m ago•0 comments

Show HN: Personalized Learning Pathways

https://eigenarc.com
1•sridhar87•9m ago•0 comments

Open Source Game Clones

https://osgameclones.com/
1•klaussilveira•11m ago•0 comments

The Unseen Cost of Custom Domains: Why Manual SSL Management Is Hurting You

https://www.vanitycert.com/blog/the-unseen-cost-of-custom-domains
1•lulceltech•13m ago•0 comments

Geoffrey Huntle Is Cursed: Making a GenZ slang programming language with Claude

https://simonwillison.net/2025/Sep/9/cursed/
2•kposehn•15m ago•0 comments

A Mercedes EQS with solid-state batteries drove 750 miles with range to spare

https://electrek.co/2025/09/09/mercedes-eqs-with-solid-state-ev-batteries-drove-750-miles/
2•breve•15m ago•0 comments

ADL-CLI – Generate enterprise-grade AI agents from a YAML spec

https://github.com/inference-gateway/adl-cli
1•edenr•22m ago•2 comments

Hypertension Alerts Coming to Older Apple Watch Models

https://www.macrumors.com/2025/09/09/hypertension-alerts-older-apple-watch-models/
1•tosh•22m ago•0 comments

All vibe coding tools are selling a get rich quick scheme

https://varunraghu.com/all-vibe-coding-tools-are-selling-a-get-rich-quick-scheme/
2•Varun08•23m ago•0 comments

Perceived Age

https://sdan.io/blog/perceived-age
1•jxmorris12•23m ago•0 comments

Mercedes-Benz and Alpitronic to roll out 600 kW fast charging in 2026

https://electrek.co/2025/09/08/mercedes-benz-alpitronic-to-roll-out-600-kw-fast-charging-in-2026/
1•breve•23m ago•0 comments

K2 Think

https://www.k2think.ai/k2think
2•mayukh•23m ago•0 comments

The Worst Air Disaster You've Never Heard Of

https://longreads.com/2025/09/04/zeppelin-navy-aircraft-disaster/
1•mooreds•24m ago•0 comments

A uniform, planned, and practiced response is the foundation of a safe school

https://iloveuguys.org/The-Standard-Response-Protocol.html
1•mooreds•24m ago•0 comments

The case of the crash on a null pointer even though we checked it for null

https://devblogs.microsoft.com/oldnewthing/20250905-00/?p=111560
1•mooreds•25m ago•0 comments

Agentic AI MOOC (9/15) –Taught by Experts from Google DeepMind, OpenAI, and More

1•rdi_berkeley•26m ago•0 comments

Apple's biggest announcement today was Memory Integrity Enforcement

https://victorwynne.com/memory-integrity-enforcement/
7•underwoods•31m ago•2 comments

The U.S. is losing manufacturing jobs, analysis finds

https://www.cbsnews.com/news/jobs-manufacturing-trump-tariffs-economy/
3•01-_-•34m ago•0 comments

Get Started Using Generative AI for Content Creation with ComfyUI

https://blogs.nvidia.com/blog/rtx-ai-garage-comfyui-wan-qwen-flux-krea-remix/
1•01-_-•36m ago•0 comments

CLI-based multi-agent trading system using LLMs

https://github.com/TauricResearch/TradingAgents
1•mustaphah•37m ago•0 comments

Marko 6

https://markojs.com/
2•pier25•39m ago•0 comments

How does controlling a robot work? [video]

https://www.youtube.com/shorts/xXUxtqlDDXI
1•cgreerrun•39m ago•1 comments

The Most Frustrating Customer Service Call of All Time [video]

https://www.youtube.com/watch?v=nUpZg-Ua5ao
1•duck•40m ago•0 comments

All You Need Is SSH

https://wrongthink.link/posts/all-you-need-is-ssh/
8•Bogdanp•42m ago•1 comments

5000 Podcasts. 3000 Episodes/Week. $1 Per Episode

https://www.hollywoodreporter.com/business/digital/ai-podcast-start-up-plan-shows-1236361367/
2•kawera•44m ago•0 comments
Open in hackernews

Ask HN: Could scammers have infiltrated the IRS callback system?

2•supportengineer•5h ago
We called the IRS to discuss an issue and we utilized the callback system. We entered our phone number and were told to expect a call back within 30 minutes, from a West Virginia number. I have used this system before so all this was familiar. The call came at the expected time, from the expected area code. However, it turned out to be a scam call center. How is this technically possible?

Comments

rolph•5h ago
if you have a bad app with contact, or dialing history permissions, someone can keep snarfing your last dialed numbers until they see you dial a number that fits one of the scam workflows they have at ready.

the same principle can be used in browser.

supportengineer•4h ago
It was an Android phone used. How could I detect such a malicious app? I am not an Android user.
rolph•4h ago
curating apps for security is like closing a loop tighter.

look for list of malignant apps e.g.

https://duckduckgo.com/?t=lm&q=which+app+is+doing+the+scam+&...

if you have any such apps delete them.

if you see that some bad thing happens, e.g. you get a scam call after requesting callback, you then look at app history, and you look for apps that were active during that time span, and you have a short list of suspects.

the name and description of the app may be misleading, but have an odd permission set, for example a flashlight app that requires contact history and calander access. flashlights dont need that.

look at the permissions of each one, individually for any that allow, in your case, access to contacts, or dialing/dial history.

there is going to be some [system] app[s] that legitimately has this access and presumably, some unfamiliar app, or recently installed app that is abusive. make sure you know the difference!

if your not sure, your can perform experiments such as removing the permissions, or forcing stop of the app, to see if the problem stops, or something complains.

a sophisticated exploit may involve a number of apps working together, to cloak activity, and keep reinstalling if the whole gang isnt cleared out at once.

in this case you may have some other compromise and a password change might be a good idea.

if any of these apps somehow have financial access, you may need to look at replacing cards, and auditing bank / credit activity.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

the last bastion of defense, is how the target responds to the contact. they may be at the edge of competency, thus an easy mark, the target may be contacted at a time they are known to be overwhelmed with the mothly rota of bills and income. the target may have been behaviourally profiled and bombarded with a campaign from all sources and is now acting in a frame; a headspace that seems real, and very urgent.

you may actually have to talk them down out of that headspace, to prevent signifigant, recurring vicimization.

https://www.aarp.org/money/scams-fraud/fraud-tactics/

https://consumer.ftc.gov/consumer-alerts/2024/03/sure-ways-s...