frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenAI, Nvidia Fuel $1T AI Market with Web of Circular Deals

https://www.bloomberg.com/news/features/2025-10-07/openai-s-nvidia-amd-deals-boost-1-trillion-ai-...
2•1vuio0pswjnm7•6m ago•1 comments

How the AI Bubble Bursts

https://insights.som.yale.edu/insights/this-is-how-the-ai-bubble-bursts
1•zerosizedweasle•8m ago•0 comments

Solving Double Booking at Scale: System Design Patterns from Top Tech Companies

https://animeshgaitonde.medium.com/solving-double-booking-at-scale-system-design-patterns-from-to...
1•birdculture•8m ago•0 comments

Apple removed an app that archives videos of ICE arrests

https://www.engadget.com/apps/apple-removed-an-app-that-archives-videos-of-ice-arrests-212946540....
1•nh43215rgb•10m ago•0 comments

C++ Reflection and Qt MOC

https://wiki.qt.io/C%2B%2B_reflection_(P2996)_and_moc
1•coffeeaddict1•12m ago•0 comments

Show HN: I made an ASCII Art rust server that serves its own source code

https://github.com/Blourvim/boo/blob/main/src/main.rs
1•blourvim•14m ago•0 comments

University caught out using AI to wrongly accuse students of cheating with AI

https://www.abc.net.au/news/2025-10-09/artificial-intelligence-cheating-australian-catholic-unive...
2•aussieguy1234•16m ago•0 comments

Why Circular AI Deals Among OpenAI, Nvidia, AMD Are Raising Eyebrows

https://www.bloomberg.com/news/articles/2025-10-08/the-circular-openai-nvidia-and-amd-deals-raisi...
4•1vuio0pswjnm7•23m ago•1 comments

WebSockets vs. HTTP: Stop Choosing the Wrong Protocol

https://medium.com/@shivangsharma6789/websockets-vs-http-stop-choosing-the-wrong-protocol-fd0e92b...
1•thunderbong•29m ago•2 comments

All in on MatMul? Don’t Put All Your Tensors in One Basket!

https://www.sigarch.org/dont-put-all-your-tensors-in-one-basket-hardware-lottery/
1•matt_d•30m ago•0 comments

Collectives: Nextcloud App for projects to organize together

https://github.com/nextcloud/collectives
1•vpt•30m ago•0 comments

The current status of 8K movies

https://www.flatpanelshd.com/news.php?subaction=showfull&id=1759823393
2•indigodaddy•31m ago•2 comments

New study sheds light on how exercise helps lose weight

https://medicalxpress.com/news/2025-09-weight.html
2•PaulHoule•32m ago•1 comments

14 years later, Siri is again the key to Apple's future

https://www.macworld.com/article/2935321/siri-is-key-to-apples-future.html
2•CharlesW•32m ago•0 comments

Human Error Is the Point: On Teaching College During the Rise of AI

https://therumpus.net/2025/10/02/human-error-is-the-point-on-teaching-college-during-the-rise-of-ai/
1•CharlesW•35m ago•0 comments

AI at Play – Lessons from a silly benchmark

https://andreasthinks.me/posts/ai-at-play/
1•fragmede•35m ago•0 comments

Joan Kennedy, Who Married into a Dynasty, Dies at 89

https://www.nytimes.com/2025/10/08/us/joan-kennedy-dead.html
1•whack•36m ago•0 comments

Trump says he 'took the freedom of speech away' on flag burning

https://www.usatoday.com/story/news/nation/2025/10/08/trump-flag-burning-first-amendment-portland...
14•saubeidl•45m ago•4 comments

CryptoBanc, BancCrypto, Cryptofficium Consortium

https://www.instagram.com/banccrypto/
1•CryptoBanc•45m ago•0 comments

Show HN: Identiqwe – Collect Deterministic pixel art avatars from any text

https://identiqwe.maxcomperatore.com/
1•maxcomperatore•49m ago•0 comments

Show HN: A new platform for devs, hackers, and crypto folks

https://hashmate.app
1•DeveloperOne•49m ago•1 comments

Show HN: We turned browser screen recordings into customizable AI agents

https://gabrieloperator.com
1•vipin-tanna•51m ago•0 comments

AI and Deep Learning Accelerators Beyond GPUs in 2025

https://www.bestgpusforai.com/blog/ai-accelerators
1•javaeeeee•52m ago•1 comments

Visibility Engine for AI Models

https://twitter.com/alexmdees/status/1975607272123605484
1•sert_121•59m ago•0 comments

Show HN: A better way to run Bazel in Docker

https://github.com/ouillie/bazel-docker
1•bloppe•1h ago•0 comments

Scientists develop first accurate blood test to detect chronic fatigue syndrome

https://www.theguardian.com/society/2025/oct/08/scientists-say-they-have-first-blood-test-to-diag...
2•ryangibb•1h ago•2 comments

The Orphan Tsunami of 1700 [pdf]

https://pubs.usgs.gov/pp/pp1707/pp1707.pdf
1•oliverkwebb•1h ago•0 comments

Show HN: I Made Strava for Habits

https://www.trackwme.com/
1•jvmeshan•1h ago•0 comments

Internet Archive Ordered to Block Books in Belgium

https://torrentfreak.com/internet-archive-ordered-to-block-books-in-belgium-after-talks-with-publ...
2•gslin•1h ago•0 comments

Exploring a Self-Hosted Community Edition of Athenic AI (BYO-LLM)

1•AthenicDataOps•1h ago•0 comments
Open in hackernews

Kurt Got Got

https://fly.io/blog/kurt-got-got/
99•tabletcorry•2h ago

Comments

jryio•1h ago
I'm always glad to see when companies, developers and CEOs make a heartfelt and humanistic mae culpa.

We would like to think that we're the smart ones and above such low level types of exploits, but the reality is that they can catch us at any moment on a good or bad day.

Good write up

herval•1h ago
Great writeup, but also gotta say that’s some excellent phishing
tptacek•1h ago
This exact phish has been going around lately and we're not the only ones who got bit. But we didn't know that before it happened.
ChrisMarshallNY•57m ago
I enjoyed the self-deprecating humor behind it.

I have been almost got, a couple of times. I'm not sure, but I may have realized that I got got, about 0.5 seconds after clicking[0], and was able to lock down, before they were able to grab it.

[0] https://imgur.com/EfQrdWY

tptacek•1h ago
I want to say again that the key thing in this post is that anything "serious" at Fly.io couldn't have gotten phished: your SSO login won't work if you don't have mandatory phish-resistant 2FA set up for it. What went wrong here is that Twitter wasn't behind that perimeter, because, well, we have trouble taking Twitter seriously.

We shouldn't have, and we do take it seriously now.

latchkey•44m ago
[deleted]
tptacek•43m ago
Twitter isn't an operational dependency of ours and we don't attest to it at all. It also doesn't require we do that: what SOC2 actually demands of vendor security practices is much more complicated (and performative) than that. If Twitter were a real vendor dependency of ours, most of what we'd need would be a SOC2 attestation from them.
stavros•1h ago
Ever since I almost got phished (wasn't looking closely enough at the domain to notice a little stress mark over the "s" in the domain name, thankfully I was using a hardware wallet that prevented the attack entirely), I realized that anyone can get phished. They just rely on you being busy, or out, or tired, and just not checking closely enough.

Use passkeys for everything, like Thomas says.

ChrisMarshallNY•54m ago
If you grok Apple, I wrote up a tutorial on very basic PassKey implementation (for iOS apps), here: https://littlegreenviper.com/series/passkeys/
stavros•52m ago
Very nice, thanks! By the way, the preferred capitalization is "passkeys", like "passwords". It's not supposed to be capitalized like a proper noun.
ChrisMarshallNY•29m ago
I prefer all lowercase. Not sure where I got the CamelCase version, but it may have been from the Apple or FIDO docs.

I’d like to write a follow-up that covers authentication apps/devices, but I need to do some research, and find free versions.

Y_Y•52m ago
Counterpoint: don't use passkeys, they're a confused mess and add limitations while not giving any benefits over a good long password in a password manager.
bigyabai•49m ago
Yep. A technical half-baked solution to a problem that has been solved since it's inception. Really just feels like FAANG exists to invent new ways to charge rent...
akerl_•38m ago
What’s the solution for preventing this kind of phishing attack?
dewey•49m ago
They prevent you from being one of these, and copy pasting the password from password manager into the wrong input field. Something that still happens often with many websites not properly auto-filling from password managers.

> They just rely on you being busy, or out, or tired, and just not checking closely enough

o11c•28m ago
If you are "copy-pasting" you are not using your password manager correctly.
dewey•25m ago
As I said in my comment above, sometimes it’s necessary as websites break the auto fill, or mobile apps don’t offer the password manager sheet.
otterley•23m ago
This very story illustrates how people will override their password manager's builtin protections when panic ensues.
madeofpalk•17m ago
If only everyone did everything perfectly all the time, we wouldn't have any issues!
corndoge•48m ago
Yes, PKC authentication is good, but the way passkeys have been implemented is not great. Way too much trust built into the protocol; way too much power granted to relying parties; much harder for users to form a correct mental model.
tptacek•46m ago
This whole story is about us getting zapped because we relied on a good long password in a password manager!
dilyevsky•31m ago
So what happened exactly? Did Kurt enter his twitter password manually after clicking on that phishing link? Did he not get his sus detector going off after the password manager didn't suggest the password?
stavros•28m ago
That happened to me as well, I put it down to "fucking password manager, it's broken again".

For example, BitWarden has spent the past month refusing to auto fill fields for me. Bugs are really not uncommon at all, I'd think my password manager is broken before I thought I'm getting phished (which is exactly how they get you).

dilyevsky•24m ago
Yeah i could totally see how someone in a bind working off of phone could get p0wned like that
stavros•20m ago
For me it wasn't even a phone, it was on the desktop, I'm just so used to everything being buggy that it didn't trigger any alarms for me.

Luckily the only things I don't use passkeys or hardware keys for are things I don't care about, so I can't even remember what was phished. It goes to show, though, that that's what saved me, not the password manager, not my strong password, nothing.

otterley•22m ago
Yes, that's exactly what happened. The nature of panic is that it overrides people's better judgment.
kgeist•41m ago
>I realized that anyone can get phished

A few years ago, I managed to get our InfoSec head phished (as a test). No one is safe :)

x0x0•1h ago
... could we get webauthn / yubikeys prioritized for fly? afaik (don't want to disable 2fa to find out), it only supports totp.

For everyone reading though, you should try fly. Unaffiliated except for being a happy customer. 50 lines of toml is so so much better than 1k+ lines of cloudformation.

tptacek•55m ago
We don't like TOTP, at all, for reasons even more obvious now, but our standard answer for advanced MFA has been OIDC, which is what most people should do rather than setting up bespoke U2F/FIDO2/Passkeys.

We will get to this though.

https://fly.io/blog/tokenized-tokens/

tgsovlerkhgsel•59m ago
This is why properly working password managers are important, and why as a web site operator you should make sure to not break them. My password not auto-filling on a web site is a sufficient red flag to immediately become very watchful.

Code-based 2FA, on the other hand, is completely useless against phishing. If I'm logging in, I'm logging in, and you're getting my 2FA code (regardless of whether it's coming from an SMS or an app).

akerl_•33m ago
How does this square with the fact that the tech savvy person in the post was phished despite using a password manager.
otterley•25m ago
Precisely. 1Password's browser integration would have noticed a domain mismatch and refused to autofill the password -- but in a panic, Kurt apparently opened 1Password and then copied/pasted the credentials manually.
akerl_•23m ago
Which is why a properly working password manager is not a strong defense against phishing.
otterley•19m ago
Correct. The moral of the story is that hardware MFA and/or passkeys are a necessity in today's world. An infinitely complex password and 2FA are no match for attacks that leverage human psychology.
onionisafruit•15m ago
It's a strong defense that this guy decided not to use
akerl_•13m ago
User security that doesn’t meet real users where they are is just nerd theatre.
onionisafruit•11m ago
It works for me. I’m unconcerned if it works for anybody else.
otterley•9m ago
It works for lots of people, until it doesn't. You may well fall victim to such a scheme someday.
onionisafruit•5m ago
That’s almost guaranteed now that I made such a confident statement that it works for me.
sergiotapia•19m ago
This is how they got my Steam account credentials, although I realized the stupid shit I did the second I clicked submit form, and reset my password to random 32 characters using bitwarden. Me! Someone who is deeply technical AND paranoid.

The key here is the hacker must create the most incisive, scary email that will short circuit your higher brain functions and get you to log in.

I should have realized the fact that bitwarden did not autofill and take that as a sign.

stavros•13m ago
Same thing happened to me (not with Steam), but it's also the thought that "this could never happen to me" that leads you to assign an almost zero probability to the problem being a phishing attempt.
rtpg•12m ago
Because CEOs at startups are notorious for trying to problem solve aggressively by "just" doing the thing rather than throwing it at a person who _might_ have made the same mistake, but might be more primed to be confused as to why they are not logged into x dot com and why 1password's password prompt doesn't show up and why the passkey doesn't work or whatever.

It's always possible to have issues, of course, and to make mistakes. But there's a risk profile to this kind of stuff that doesn't align well with how certain people work. Yet those same people will jump on these to fix it up!

akerl_•8m ago
It’s a bold move to typecast all CEOs as uniquely vulnerable to a problem that the evidence shows every single one of us is vulnerable to.

Blaming some attribute about user as why they fell for a phishing attempt is categorically misguided.

dgl•8m ago
The post calls this out:

> the 1Password browser plugin would have noticed that “members-x.com” wasn’t an “x.com” host.

But shared accounts are tricky here, like the post says it's not part of their IdP / SSO and can't be, so it has to be something different. Yes, they can and should use Passkeys and/or 1password browser integration, but if you only have a few shared accounts, that difference makes for a different workflow regardless.

bradgessler•56m ago
When we did annual pen testing audits for my last company, the security audit company always offered to do phishing or social engineering attacks, but advised against it because they said it worked every single time.

One of the most memorable things they shared is they'd throw USB sticks in the parking lot of the company they were pentesting and somebody would always put the thing into a workstation to see what as on it and get p0wned.

Phishing isn't really that different.

Great reminder to setup Passkeys: https://help.x.com/en/managing-your-account/how-to-use-passk...

dilyevsky•27m ago
The stray USB stick is how Stuxnet allegedly got deployed. Tbh I doubt that works in this day and age.
stavros•23m ago
Hah, watch me.
roblabla•22m ago
A USB can pretend to be just about any type of device to get the appropriate driver installed and loaded. They can then send malformed packets to that driver to trigger some vulnerability and take over the system.

There are a _lot_ of drivers for devices on a default windows install. There are a _lot more_ if you allow for Windows Update to install drivers for devices (which it does by default). I would not trust all of them to be secure against a malicious device.

I know this is not how stuxxnet worked (instead using a vulnerability in how LNK files were shown in explorer.exe as the exploit), but that just goes to show how much surface there is to attack using this kind of USB stick.

And yeah, people still routinely plug random USBs in their computers. The average person is simultaneously curious and oblivious to this kind of threat (and I don't blame them - this kind of threat is hard to explain to a lay person).

amenghra•22m ago
If you are getting powned by running random executables found on usb drives, passkeys aren’t going to save you. Same if the social engineering is going to get you to install random executables.
silexia•46m ago
CEO here, I also almost got taken by a fake legal notice about a Facebook post. My password manager would not auto enter my password so I tried manually entering it like a dummy. Fortunately, it was the wrong one.
latchkey•33m ago
This is exactly why I turned off auto enter.
akerl_•29m ago
Isn’t turning off auto enter exacerbating the problem?

The avenue for catching this is that the password manager’s autofill won’t work on the phishing site, and the user could notice that and catch that it’s a malicious domain

tptacek•26m ago
Yes. This is the problem with the "just use a password manager" answer to phishing-resistance. They can be a line of defense, situationally, but you have to have them configured just right, and if you're using phishing-resistant authentication you don't need that line of defense in the first place.
rtpg•10m ago
Isn't this backwards? If the autocomplete doesn't show up that's a flag that the password is going somewhere it doesn't belong. If you're always copy-pasting from a password manager then you're not getting that check "for free".

Obviously SSO-y stuff is _better_, but autofill seems important for helping to prevent this kind of scam. Doesn't prevent everything of course!

tptacek•7m ago
None of this password manager configuration stuff matters; we've just got Passkeys set up for the account now, which is what we should have done, but didn't, because we spent the last 2 years with one foot out the door on Twitter altogether.

Since this attack happened despite Kurt using 1Password, I'm really not all that receptive to the idea that 1Password is a good answer to this problem.

rtpg•6m ago
I guess I'm just saying "1Password with autofill" will help more than "1Password without autofill".

We can always make mistakes of course. And yeah, sometimes we just haven't done something.

tptacek•5m ago
I'm saying: an intervention was required here, and that intervention was not changing how we use auto-fill. Doing that would be playing to lose.
latchkey•24m ago
Autofill doesn't always work for every site. So, now you're having to store in your mind where it works and where it doesn't. By disabling it, it forces you to go the extra step (command-shift-L) every time.
akerl_•17m ago
Autofill and the hotkey use the same mechanism, and neither is going to work on a phishing site.
latchkey•13m ago
You're right. The point is that hotkey makes me think and observe more. Again, I don't have to remember if the site previous worked with autofill, or not.
akerl_•11m ago
Sure. Except this is a story about the user manually copying the credential into a phishing site after the password manager didn’t fill it in.

Whether that’s via a hotkey or not seems totally irrelevant.

OkayPhysicist•21m ago
No, that's the opposite of the moral of that story. If the person you responded to had listened to the fact that the auto-enter didn't auto-enter, they wouldn't have been at any risk. Likewise in the article, the problem was that the CEO copy-pasted the password into the phishing page's password field, NOT that the auto-enter prompted him to do so.
latchkey•19m ago
As I mention below: Autofill doesn't always work for every site. So, now you're having to store in your mind where it works and where it doesn't. By disabling it, it forces you to go the extra step (command-shift-L) every time.
dyauspitr•45m ago
When did fly.io create their own crypto?
__jonas•33m ago
That's some impressive work on the attackers part having that whole fake landing page ready to go, and a pretty convincing phishing email.

I'm don't know much about crypto so I'm not sure what makes them call the scam 'not very plausible' and say it 'probably generated $0 for the attackers', is that something that can be verified by checking the wallet used in that fake landing page?

paxys•29m ago
> This is, in fact, how all of our infrastructure is secured at Fly.io; specifically, we get everything behind an IdP (in our case: Google’s) and have it require phishing-proof MFA.

Every system is only as secure as its weakest link. If the company's CEO is idiotic enough to pull credentials from 1Password and manually copy-past them on a random website whose domain does not match the service that issued it, what is to say they won't do the same for an MFA token?

tptacek•27m ago
The. whole. point. of. phishing-resistant. MFA. is. that. you. can't. do. the. same. thing.
akerl_•27m ago
FIDO2 won’t send an authentication to a fake site, no matter what the human does.

That’s what makes it phishing-resistant.

roblabla•26m ago
They literally explain in the article they're using FIDO MFA that is phishing proof as the key authenticates the website (it's not your run-of-the-mill sms 2FA, it's using WebAuthn to talk to your MFA).

With this setup, you can't fuck up.

nofriend•27m ago
> But if we’d actually done an ICO, you’d have lost all your money anyways.

tru tru

theturtle•26m ago
It's so easy to spot fucking dildos.

The instant they use the shitty non-word "impactful," every other wordlike noise that comes out of their mouth or anus can and should be ignored.

roughly•26m ago
I was reading this and wondering why it was posted so high (I didn’t recognize the company name), and then I got to the name at the bottom. I think the lesson here is “if it could happen to Kurt, it could happen to anyone.” Yeah, the consequences here were pretty limited, but everyone’s got Some vulnerability, and it’s usually in the junk pile in the corner that you’re ignoring. If the attacker were genuinely trying to do damage (as opposed to just running a two-bit crypto scam), assuming the company’s official account is a fine start to leverage for some social engineering.
akerl_•25m ago
I think you mean Kurt.
stavros•23m ago
It would help if they mentioned his name anywhere in the post, title, or subtitle.
roughly•21m ago
Yeah, that was definitely a pebkac on my part.
stavros•16m ago
It's ok, I just couldn't pass up a good opportunity for snark!
roughly•21m ago
You’re right - I flagged on Thomas’s name in the signature and because I’ve seen him around here, well, forever, but Kurt is also extremely savvy.
tptacek•18m ago
No he's not! He got taken by this dumb phishing thing!
pants2•25m ago
This "content violation on your X post" phishing email is so common, we get about a dozen of those a week, and had to change the filters many times to catch them (because it's not easy to just detect the letter X and they keep changing the wording).

We also ended up dropping our email security provider because they consistently missed these. We evaluated/trialed almost a dozen different providers and finally found one that did detect every X phishing email! (Check Point fyi, not affiliated)

It was actually embarrassing for most of those security companies because the signs of phishing are very obvious if you look.

rtpg•16m ago
Fly has consistently surprised me at how late they have been to doing the "standard company" stuff. Their sort of lack of support engineering teams for a while affected me way more though.

You gotta take the Legos away from the CEO! Being CEO means you stop doing the other stuff! Sorry!

And yes they have their silly disclaimer on their blog, but this is Yet Another "oh lol we made a whoopsie" tone that they've taken in the past several times for "real" issues. My favorite being "we did a thing, you should have read the forums where we posted about it, but clearly some of you didn't". You have my e-mail address!

Please.... please... get real comms. I'm tired of the "oh lol we're just doing shit" vibes from the only place I can _barely_ recommend as an alternative to Heroku. I don't need the cuteness. And 60% of that is because one of your main competitors has a totally unsearchable name.

Still using fly, just annoyed.

tptacek•10m ago
We've had an unusually large security team for the size of our company since 2021. I'm sorry if you don't like the way I communicate about it but I have no plans to change that. We take security extremely seriously. We just didn't take Twitter that seriously.

The "CEO" thing is just a running joke. Kurt's an engineer. Any of us could have been taken by this. I joke about this because I assume everybody gets the subtext, which is that anything you don't have behind phishing-resistant authentication is going to get phished. You apparently took it on the surface level, and believe I'm actually dunking on Kurt. No.