frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

In the AI age, 'slow and steady' doesn't win

https://www.semafor.com/article/01/30/2026/in-the-ai-age-slow-and-steady-is-on-the-outs
1•mooreds•25s ago•0 comments

Administration won't let student deported to Honduras return

https://www.reuters.com/world/us/trump-administration-wont-let-student-deported-honduras-return-2...
1•petethomas•34s ago•0 comments

How were the NIST ECDSA curve parameters generated? (2023)

https://saweis.net/posts/nist-curve-seed-origins.html
1•mooreds•1m ago•0 comments

AI, networks and Mechanical Turks (2025)

https://www.ben-evans.com/benedictevans/2025/11/23/ai-networks-and-mechanical-turks
1•mooreds•1m ago•0 comments

Goto Considered Awesome [video]

https://www.youtube.com/watch?v=1UKVEUGEk6Y
1•linkdd•3m ago•0 comments

Show HN: I Built a Free AI LinkedIn Carousel Generator

https://carousel-ai.intellisell.ai/
1•troyethaniel•5m ago•0 comments

Implementing Auto Tiling with Just 5 Tiles

https://www.kyledunbar.dev/2026/02/05/Implementing-auto-tiling-with-just-5-tiles.html
1•todsacerdoti•6m ago•0 comments

Open Challange (Get all Universities involved

https://x.com/i/grok/share/3513b9001b8445e49e4795c93bcb1855
1•rwilliamspbgops•7m ago•0 comments

Apple Tried to Tamper Proof AirTag 2 Speakers – I Broke It [video]

https://www.youtube.com/watch?v=QLK6ixQpQsQ
2•gnabgib•9m ago•0 comments

Show HN: Vibe as a Code / VaaC – new approach to vibe coding

https://www.npmjs.com/package/@gace/vaac
1•bstrama•10m ago•0 comments

Show HN: More beautiful and usable Hacker News

https://twitter.com/shivamhwp/status/2020125417995436090
3•shivamhwp•10m ago•0 comments

Toledo Derailment Rescue [video]

https://www.youtube.com/watch?v=wPHh5yHxkfU
1•samsolomon•12m ago•0 comments

War Department Cuts Ties with Harvard University

https://www.war.gov/News/News-Stories/Article/Article/4399812/war-department-cuts-ties-with-harva...
5•geox•16m ago•0 comments

Show HN: LocalGPT – A local-first AI assistant in Rust with persistent memory

https://github.com/localgpt-app/localgpt
1•yi_wang•17m ago•0 comments

A Bid-Based NFT Advertising Grid

https://bidsabillion.com/
1•chainbuilder•21m ago•1 comments

AI readability score for your documentation

https://docsalot.dev/tools/docsagent-score
1•fazkan•28m ago•0 comments

NASA Study: Non-Biologic Processes Don't Explain Mars Organics

https://science.nasa.gov/blogs/science-news/2026/02/06/nasa-study-non-biologic-processes-dont-ful...
2•bediger4000•31m ago•2 comments

I inhaled traffic fumes to find out where air pollution goes in my body

https://www.bbc.com/news/articles/c74w48d8epgo
2•dabinat•32m ago•0 comments

X said it would give $1M to a user who had previously shared racist posts

https://www.nbcnews.com/tech/internet/x-pays-1-million-prize-creator-history-racist-posts-rcna257768
4•doener•34m ago•1 comments

155M US land parcel boundaries

https://www.kaggle.com/datasets/landrecordsus/us-parcel-layer
2•tjwebbnorfolk•38m ago•0 comments

Private Inference

https://confer.to/blog/2026/01/private-inference/
2•jbegley•42m ago•1 comments

Font Rendering from First Principles

https://mccloskeybr.com/articles/font_rendering.html
1•krapp•45m ago•0 comments

Show HN: Seedance 2.0 AI video generator for creators and ecommerce

https://seedance-2.net
1•dallen97•49m ago•0 comments

Wally: A fun, reliable voice assistant in the shape of a penguin

https://github.com/JLW-7/Wally
2•PaulHoule•50m ago•0 comments

Rewriting Pycparser with the Help of an LLM

https://eli.thegreenplace.net/2026/rewriting-pycparser-with-the-help-of-an-llm/
2•y1n0•52m ago•0 comments

Lobsters Vibecoding Challenge

https://gist.github.com/MostAwesomeDude/bb8cbfd005a33f5dd262d1f20a63a693
2•tolerance•52m ago•0 comments

E-Commerce vs. Social Commerce

https://moondala.one/
1•HamoodBahzar•53m ago•1 comments

Avoiding Modern C++ – Anton Mikhailov [video]

https://www.youtube.com/watch?v=ShSGHb65f3M
2•linkdd•54m ago•0 comments

Show HN: AegisMind–AI system with 12 brain regions modeled on human neuroscience

https://www.aegismind.app
2•aegismind_app•58m ago•1 comments

Zig – Package Management Workflow Enhancements

https://ziglang.org/devlog/2026/#2026-02-06
1•Retro_Dev•1h ago•0 comments
Open in hackernews

As many as 2M Cisco devices affected by actively exploited 0-day

https://arstechnica.com/security/2025/09/as-many-as-2-million-cisco-devices-affected-by-actively-exploited-0-day/
146•duxup•4mo ago

Comments

duxup•4mo ago
When I worked at a company that made some networking equipment SNMP was a constant problem, security, bugs that crash the device and so on.

It became clear to me over time that the pattern at that company was to direct the less great engineering resources to SNMP...

hylaride•4mo ago
SNMP is one of those good ideas in theory, bad ideas in practice.

Anyways, Cisco hasn’t done great engineering pretty much since the dotcom bust. They’re now essentially a giant PE firm that grows through acquisitions and then milks them dry. It’s a classic case of the accountants took over.

FuriouslyAdrift•4mo ago
Cisco's old model (which worked very well for them) was to develop an outside startup and see if they gain traction while keeping at least some financial/control stake to democratize the risk and spend and then spin-in if it is succesful (or sell off).
Our_Benefactors•4mo ago
I interviewed with Cisco once. They wanted me to do a take home interview. Implement an api, make a web app, host the GitHub repo somewhere, host the web app so it was publicly available for them to test, make sure I included full documentation and test suite. A fully tested and deployed full stack application, from scratch, as a “take home test”. I said “no, I don't work for free”.

That was by far the most egregious example I’ve encountered of “we are trying to get unpaid labor from our interview process.”

FuriouslyAdrift•4mo ago
Yeah, that's ridiculous. It's not just FAANGs that pull this crap.
lawlessone•4mo ago
FAANGS often start it and then everyone else thinks it's going to make their company great if they do it too.
chuckadams•4mo ago
I think it's reasonable if one's applying as a full-stack developer, the app is something like a simple TODO list that isn't anything they'd actually use, and there isn't a high expectation of polish. Few hours of work at most, not days, and definitely not a first-interview thing. Expecting you to host it yourself is definitely unreasonable: they can build and run it themselves if they care that much, but eyeballing the source ought to be good enough in most cases.
jacquesm•4mo ago
It's only ok if they pay you for your time.
stuff4ben•4mo ago
Ah good ole MPLS (Mario, Prem, Luca, and I can't remember who was S)...
lima•4mo ago
Soni
themafia•4mo ago
Sounds like something an equity or financial firm should do. I'm not sure why a networking company decided to make that their core competency.
MangoToupe•4mo ago
Selfishly, I'm happy and grateful they bought out chez scheme, opened it up, and funded development. Do I understand why? No, and I'm not going to question it!

EDIT: it seems like it was an acquihire of Dybvig and the team working on chez for something under NDA.

rubymancer•4mo ago
Cisco employee here, this is spot on.

I was at a startup they acquired ~4 years ago, by now it's just about milked completely dry.

Even though our product is close to industry-leading, they laid off our product manager, then another one, the QA team, and half of the devs. Unsurprisingly the product is falling apart.

It's not a company that attempts to produce value, as with so many others the product is the stock price.

The MBAs are showing some kind of savings on a spreadsheet somewhere though, so I suppose all the sacrifices are worth it.

downrightmike•4mo ago
That's what MBAs did to Intel too
neuroelectron•4mo ago
American tech sector is being destroyed so it can be replaced by _____ and their surveillance state. It's death by a thousand cuts, labor supply, education, taxes, regulation, finance, dependencies, versioning, operating systems, etc. all are being made obfuscated, complex and frustrating to slow advancement and ultimately unstable and impossible to maintain. Most of our tech stack already has surveillance built in and that is already being co-opted and we're well on our way of having it outsourced to a foreign state.
iwontberude•4mo ago
and couldn't even get the stock to be worth anything
FuriouslyAdrift•4mo ago
SNMP v3 at least has some security in mind, but a lot of devices are just v1 or v2c which are basically unsecured. Allowing ANY write access via SNMP is a bad idea in my opinion, unless you segment it out into it's own secured management or out-of-band network. Even then... I'd be worried.

Network infrastructure security has a lot of unsolved gotchas and not a lot of industry desire to fix. Most of what everyone interacts with is in an abstracted or virtualized layer on top of the old plumbing.

elevation•4mo ago
SNMP v2c is still common in the embedded world because it's protected with a simple password so it just works out of the box. SNMPv3 requires key management and an established PKI, and there's no equivalent of Let's Encrypt for isolated use cases in small orgs.
ay•4mo ago
SNMPv3 absolutely doesn’t require PKI nor key management, it works fine with shared keys.

You can take a look at an implementation of that, which I had built for entertainment: https://github.com/ayourtch/oside/blob/main/examples/snmpwal...

mkipper•4mo ago
I never looked into the guts of how this was implemented, but I worked on a product which had an SNMPv3 agent that was only restricted by a username and password. I could flash a PC with a fresh Ubuntu image, apt install Net-SNMP and start sending SNMPv3 requests without every futzing with any keys.

If I remember right, handling SNMPv3 traps required some messy key stuff so the agent still sent SNMPv2 traps, but there was no requirement for keys for GET/SET.

Group_B•4mo ago
You're secure if you don't expose SNMP. Can't believe there are that many devices out there with that exposed though.
FuriouslyAdrift•4mo ago
good old SNMP v1 private/private
duxup•4mo ago
It's damned if you do damned if you don't.

For smaller operations I think just disabling SNMP is safer due to constant bugs and issues.

On the other hand bigger operations, you gotta monitor your devices. But now you’re open to the can of worms.

EvanAnderson•4mo ago
> You're secure if you don't expose SNMP.

Depends what you mean by "expose". Some people could read that as "exposed to the Internet". I'm reading it as "exposed to anything".

This looks like a good fun for doing lateral movement inside a network. I know of lots of environments with SNMPv2 wide open for "internal" networks to access.

Plus SNMP is UDP-based, so likely the exploit will work with a one-way path and spoofed source addresses.

wil421•4mo ago
There’s no way ISPs can function without SNMP. I think network management is like a 1/3 of all traffic. We process billions and billions of traps daily. These are not on internet connected networks and some have dedicated channels.

How did the attacker get the community string?

commandersaki•4mo ago
1/3 is a absurd, more like 1/3000.
ronsor•4mo ago
Most people never change it from "public" you know.

Bonus: if the "private" community is exposed on Cisco IOS, you can read and write the router's configuration.

bell-cot•4mo ago
The "yet another mortal security flaw in Cisco..." stories never seem to end.

Daydream: Journalists start ending such articles with "This is the Nth critical security flaw for Cisco in just the past year. Network security professionals we spoke to agree that network equipment vendors X, Y, and Z all have far better track records than Cisco."

fwipsy•4mo ago
The last paragraph of the article doesn't serve that purpose?
bell-cot•4mo ago
1/4 of "yes", for this particular article. The regular "brands X, Y and Z are better" part would get more traction in the C-suites. And hopefully on Wall Street.
er4hn•4mo ago
Speaking (unofficially) as someone who works at one of the "other brands" that reeks of journalists having a bias.
bell-cot•4mo ago
If a magazine for parents of severe-peanut-allergy children ended every "may contain undisclosed peanut" recall article with a "Here's our current top 3 brands for child peanut safety: ...", would anyone refer to that as reeking of journalistic bias?

How 'bout if Consumer Reports published a "We Tested 17 kitchen garbage disposals" article, and their 1-paragraph summary of the worst-rated model said "buy one of our 3 top-rated models instead"?

(Yes, I know you're giving a "proper" response. And that very few journalists might say "buy X, Y, or Z instead" about a 900 lbs. gorilla like Cisco. Recall my "Daydream" disclaimer.)

forinti•4mo ago
Cisco hasn't yet rolled out a version of Webex that runs on Ubuntu 24.
buggeryorkshire•4mo ago
When I worked for Cisco via an acquisition every single person I knew refused to use Webex in lieu of Google Meet etc
lkuty•4mo ago
I guess that `no snmp-server` is enough to be protected. Well, I hope so.
morpheuskafka•4mo ago
A few years ago North Korea had some Cisco routers with all ports open to the Internet, wonder if they are vulnerable.
Hikikomori•4mo ago
Sounds more like a honeypot.
ajmurmann•4mo ago
Since a single, angry dude brought down much of their internet I'd not be certain
varispeed•4mo ago
Are they baiting Winnie the Pooh?
michaelcampbell•4mo ago
Isn't that China?
recursive•4mo ago
That's the reference.
nubinetwork•4mo ago
I haven't seen a large increase in snmp scanning, but I'll keep watching... it's pretty low activity, usually.
happycube•4mo ago
SNMP: It's an acronym and a homonym.
Noumenon72•4mo ago
SNMP does not sound the same as any other word nor is it spelled the same as some different word. I can't figure out what you mean.
happycube•4mo ago
Sound out the first three letters. I find it a very fitting description myself.

I guess that makes it a hononym of a different acronym.

Noumenon72•4mo ago
Thanks for explaining!
mleonhard•4mo ago
I think Cisco SNMP vulnerabilities have been appearing for 20 years or more. I wish someone would add a fuzzer to their release testing script.
selinkocalar•4mo ago
2M devices is a maaaaassive attack surface.

This is why zero trust networking makes sense. You can't assume the network layer is secure when the infrastructure itself is compromised.