frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Running the "Reflections on Trusting Trust" Compiler

https://spawn-queue.acm.org/doi/10.1145/3786614
1•devooops•5m ago•0 comments

Watermark API – $0.01/image, 10x cheaper than Cloudinary

https://api-production-caa8.up.railway.app/docs
1•lembergs•6m ago•1 comments

Now send your marketing campaigns directly from ChatGPT

https://www.mail-o-mail.com/
1•avallark•10m ago•1 comments

Queueing Theory v2: DORA metrics, queue-of-queues, chi-alpha-beta-sigma notation

https://github.com/joelparkerhenderson/queueing-theory
1•jph•22m ago•0 comments

Show HN: Hibana – choreography-first protocol safety for Rust

https://hibanaworks.dev/
5•o8vm•24m ago•0 comments

Haniri: A live autonomous world where AI agents survive or collapse

https://www.haniri.com
1•donangrey•24m ago•1 comments

GPT-5.3-Codex System Card [pdf]

https://cdn.openai.com/pdf/23eca107-a9b1-4d2c-b156-7deb4fbc697c/GPT-5-3-Codex-System-Card-02.pdf
1•tosh•37m ago•0 comments

Atlas: Manage your database schema as code

https://github.com/ariga/atlas
1•quectophoton•40m ago•0 comments

Geist Pixel

https://vercel.com/blog/introducing-geist-pixel
2•helloplanets•43m ago•0 comments

Show HN: MCP to get latest dependency package and tool versions

https://github.com/MShekow/package-version-check-mcp
1•mshekow•51m ago•0 comments

The better you get at something, the harder it becomes to do

https://seekingtrust.substack.com/p/improving-at-writing-made-me-almost
2•FinnLobsien•52m ago•0 comments

Show HN: WP Float – Archive WordPress blogs to free static hosting

https://wpfloat.netlify.app/
1•zizoulegrande•54m ago•0 comments

Show HN: I Hacked My Family's Meal Planning with an App

https://mealjar.app
1•melvinzammit•54m ago•0 comments

Sony BMG copy protection rootkit scandal

https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
2•basilikum•57m ago•0 comments

The Future of Systems

https://novlabs.ai/mission/
2•tekbog•57m ago•1 comments

NASA now allowing astronauts to bring their smartphones on space missions

https://twitter.com/NASAAdmin/status/2019259382962307393
2•gbugniot•1h ago•0 comments

Claude Code Is the Inflection Point

https://newsletter.semianalysis.com/p/claude-code-is-the-inflection-point
3•throwaw12•1h ago•1 comments

Show HN: MicroClaw – Agentic AI Assistant for Telegram, Built in Rust

https://github.com/microclaw/microclaw
1•everettjf•1h ago•2 comments

Show HN: Omni-BLAS – 4x faster matrix multiplication via Monte Carlo sampling

https://github.com/AleatorAI/OMNI-BLAS
1•LowSpecEng•1h ago•1 comments

The AI-Ready Software Developer: Conclusion – Same Game, Different Dice

https://codemanship.wordpress.com/2026/01/05/the-ai-ready-software-developer-conclusion-same-game...
1•lifeisstillgood•1h ago•0 comments

AI Agent Automates Google Stock Analysis from Financial Reports

https://pardusai.org/view/54c6646b9e273bbe103b76256a91a7f30da624062a8a6eeb16febfe403efd078
1•JasonHEIN•1h ago•0 comments

Voxtral Realtime 4B Pure C Implementation

https://github.com/antirez/voxtral.c
2•andreabat•1h ago•1 comments

I Was Trapped in Chinese Mafia Crypto Slavery [video]

https://www.youtube.com/watch?v=zOcNaWmmn0A
2•mgh2•1h ago•1 comments

U.S. CBP Reported Employee Arrests (FY2020 – FYTD)

https://www.cbp.gov/newsroom/stats/reported-employee-arrests
1•ludicrousdispla•1h ago•0 comments

Show HN: I built a free UCP checker – see if AI agents can find your store

https://ucphub.ai/ucp-store-check/
2•vladeta•1h ago•1 comments

Show HN: SVGV – A Real-Time Vector Video Format for Budget Hardware

https://github.com/thealidev/VectorVision-SVGV
1•thealidev•1h ago•0 comments

Study of 150 developers shows AI generated code no harder to maintain long term

https://www.youtube.com/watch?v=b9EbCb5A408
2•lifeisstillgood•1h ago•0 comments

Spotify now requires premium accounts for developer mode API access

https://www.neowin.net/news/spotify-now-requires-premium-accounts-for-developer-mode-api-access/
2•bundie•1h ago•0 comments

When Albert Einstein Moved to Princeton

https://twitter.com/Math_files/status/2020017485815456224
1•keepamovin•1h ago•0 comments

Agents.md as a Dark Signal

https://joshmock.com/post/2026-agents-md-as-a-dark-signal/
2•birdculture•1h ago•1 comments
Open in hackernews

Hackers leak Qantas data on 5M customers after ransom deadline passes

https://www.theguardian.com/business/2025/oct/11/hackers-leak-qantas-data-containing-5-million-customer-records-after-ransom-deadline-passes
104•breve•3mo ago

Comments

Workaccount2•3mo ago
>customers’ email addresses, phone numbers, birth dates and frequent flyer numbers

So all things that have likely been leaked 30 times already? Perhaps except the fly miles

amelius•3mo ago
Yes, it's a sad situation we're in. We need am indirection step in addresses. So companies don't have our actual address but instead have a handle they can use to interact with that address. And then the actual addresses should be guarded with more responsibility.
sidpatil•3mo ago
Japan Post is rolling out such a system: https://news.ycombinator.com/item?id=44117779
ceejayoz•3mo ago
Apple also does it via “hide my email”.
dns_snek•3mo ago
But that's just an identifier which you can easily update when you move, like a domain=>IP mapping? Businesses still have your physical address.

A system where they didn't get our address at all would be great but I think we would also need alternative payment providers that don't share any billing-related address information with the business.

atonse•3mo ago
I love this idea, but then doesn’t it create a centralized target for hackers?

I suppose that’s still better cuz then it also creates a centralized point and resources for securing the database.

LPisGood•3mo ago
It’s weird to think that just a few years ago your phone number and address were shared with tens of thousands of people in a massive book.

I feel like if you have someone’s name, it’s not hard at all to find their birthday

djmips•3mo ago
I bet the a White Pages publishers are kicking themselves that they never thought of extortion!
makeitdouble•3mo ago
And you paid every year to not be listed. The core principle was indeed similar.
esseph•3mo ago
More details further in there, but they also leaked passport data.
bn-l•3mo ago
Is this from the Salesforce breach?
edm0nd•3mo ago
Yes
linhns•3mo ago
Haven’t they sold that to some dubious partners already?
Noumenon72•3mo ago
I don't see why a company would pay a ransom to protect their customers from identity theft -- the losses are public, while the costs to them are a very small number of customers that read about this, think they're likely to lose the data again, didn't already lose their data in this leak, remember this story at the time of purchase, and value that more than things like ticket time or ticket price. I don't think the hackers should be making any money this way.
bwfan123•3mo ago
We have public agencies like the police that are paid for by the tax-payers for securing property. Are there similar agencies who are incentivized to stop these situations. During the pipeline breaches several years back, I recall aggressive action to disrupt the money-trail.
dablya•3mo ago
To the extent these situation are as illegal as property theft, public agencies tasked with law enforcement, like the police, are in the same position to secure your data as they are to secure your property, no?
Bairfhionn•3mo ago
The only thing that would prevent this from happening would be if the companies make their stuff safe.

You can't police the world.

shiandow•3mo ago
I think ransom is also a bit of a misnomer that the hackers deliberately use to frame the transaction in a more positive light.

I mean, it's just extortion. Nothing is being ransomed, you don't get something back and you can't really secure something already lost. It suffers from the same problems as other forms of extortion, namely that you can't really trust the other party to do what you want and really they have no incentive to do so.

chii•3mo ago
but the parent post's point still stands - extortion (or ransom) requires something important to be held. If the private data of customers is not actually important, it cannot be used as a threat in the extortion.
praash•3mo ago
I don't think data leak extortioners have any incentive to even pretend they won't keep asking further payment.

Why not just offer a monthly subscription "service"?

LadyCailin•3mo ago
At that point, the company should just pay for an actual security team.
naldb•3mo ago
Security is not a binary state. You can pay as much as you want but there’s no assurance that you won’t be hacked.
gessha•3mo ago
Great, now even crime groups are following consultancy advice. \s
baobabKoodaa•3mo ago
And the best part? The ransomware startup can now mark the income as MRR extending to infinity, thereby significantly increasing the startup's valuation! If you want to learn more about B2B sales, hit that like button and click on this .exe file to subscribe for more updates.
southernplaces7•3mo ago
thanks for the laugh, gave me a good chuckle by ".exe file"
jacquesm•3mo ago
It's much simpler: paying will result in more crime like this.
hmottestad•3mo ago
You never know. Pay them enough and they might retire to an island somewhere instead.
lotsofpulp•3mo ago
Islands are pretty expensive to live on. If anything, retiring on the island will require more crime.
billy99k•3mo ago
The only reason these persist is because companies pay out and they can receive it in untraceable crypto currency in countries that are nearly to prosecute them in.

Appeasement has never worked.

anonym29•3mo ago
Ransomware existed before cryptocurrency, and BTC is extremely traceable - far more traceable than cash, for instance.

The only factor that matters is the adversaries residing in a jurisdiction with a lack of enforcement.

makeitdouble•3mo ago
> The only reason these persist

You make it sound like a simplistic game with set rules. There will be myriads of other reasons to breach companies, and even strictly sticking to the money part, doing ransom/extortion can have secondary and tertiary effects worth enough to do it even if the ransom fails.

If you look at it as a market, the victim is only one actor among many.

gnfargbl•3mo ago
The current groups, sure, but the existence of a functioning market tends to bring in more participants. Or to put it another way, there are plenty of smart people in the world who found themselves born in a less-than-ideal country and are willing to solve their problems through crime.

The only sustainable solution is to make crime no longer pay. Nothing else will work.

clayhacks•3mo ago
The other solution is making those “less than ideal” countries have more attractive legal economic opportunities so that crime isn’t an attractive alternative.

Basically making crime no longer pay best

naldb•3mo ago
That requires cultural changes through a timescale of generations, so it’s not a feasible solution.
Razengan•3mo ago
Or let those smart people easily move to little-bit-more-ideal countries.
anonym29•3mo ago
Fun fact: emigration laws in despotic third-world shitholes ruled by autocrats aren't the same emigration laws that privileged westerners enjoy.
bilekas•3mo ago
If you send me 200 million I will put that to the test for you.
hollerith•3mo ago
He wrote "more crime like this", not "more crime like this committed by the same group".
JumpCrisscross•3mo ago
> Pay them enough and they might retire to an island somewhere instead.

Why wouldn't they do that and sell the data?

makeitdouble•3mo ago
That's the official stance, but if it really mattered they'd pay.

And there's of course paths to pay without losing face, like hiring a negociator or a recovery firm that acts like a bridge for the money[0]. We came to accept that companies don't act ethically and will only maximize profit, yet the narrative is still stuck on that weird assumption they care about the future of society regarding ransomware.

[0] https://zendata.security/2025/07/08/ransomware-negotiator-sc...

spwa4•3mo ago
Shouldn't the company be punished for the security failure in the first place?

It might even be helpful: you could prevent the incentive to pay for security breaches regardless of the negotiation outcome.

jacquesm•3mo ago
> Shouldn't the company be punished for the security failure in the first place?

Yes. The GDPR has provisions for this. But enforcement is still relatively light.

cakealert•3mo ago
Tragedy of the commons. It's irrelevant to the extorted company whether or not it becomes more common in the future, they have a much bigger problem now.

The reason they didn't pay is because they conducted a cost benefit analysis and decided it's not worth it to them.

bigbadfeline•3mo ago
> It's irrelevant to the extorted company whether or not it becomes more common in the future, they have a much bigger problem now.

No, it's not irrelevant because that future might be tomorrow. The criminals remain in possession of the data whether they get paid or not, that is, the extortion can be restarted the next day (or hour) after payment.

There's no way to trust an anonymous group you know nothing about, be it to keep their word or to keep your data safe from individual members or splintering groups.

cakealert•3mo ago
That would be part of the cost benefit analysis. And you would be surprised how "trustworthy" these ransomware groups are. Probably because publishing the data is a hassle they would rather do without, and finding actual buyers for such data is hard (corporations don't tend to have black budgets).

No, whenever they decide not to pay it's because they made the decision to absorb the damage rather than pay criminals who may or not be sanctioned (and that fact may later emerge) creating additional liability. So you know that when they pay the damage would have been very great indeed. In this instance the damage is likely minor or more likely, off-sourced.

Nobody is not going to pay because that will be better for the collective to let the ransomware industry die. They may however choose to publicly state that as the reason.

ohyoutravel•3mo ago
It’s even more dystopian than that. In Australia itself, Qantas is the only carrier between many cities. So if you decide to not book Qantas, you’re potentially driving across the Outback.
chronci739•3mo ago
Pay the ransom, hackers then sell the data privately

Don’t pay the ransom, hackers release a subset to the public for free, then sell the rest privately

Good on Quantas for not negotiating, bad on them for shit security.

chii•3mo ago
> Good on Qantas for not negotiating

they probably didnt feel that there was a threat, as privacy of their customer's data wasn't very high on their priority list - after all, they didnt secure that data very well in the first place leading to the stolen data!

stevetron•3mo ago
I'd never heard of Quantas. I have heard of Salesforce. Nothing particularly glowing, though.
edm0nd•3mo ago
That just means you arent Australian. Every Australian has heard of Quantas.
sammy2255•3mo ago
Qantas*
hitarpetar•3mo ago
Kwantas*
ruszki•3mo ago
Or if you visit Australia, there is a high chance to get to know it. At least, it was impossible for me to avoid it when I planned my visit there.
OccamsMirror•3mo ago
Or if you've seen Rainman.
nomilk•3mo ago
> The Qantas data, which was stolen from a Salesforce database in a major cyber-attack in June, included customers’ email addresses, phone numbers, birth dates and frequent flyer numbers. It did not contain credit card details, financial information or passport details.

Curious, what's the worst a bad actor do with name, email address, phone number and birth date?

jacquesm•3mo ago
Apply for a credit card.
geor9e•3mo ago
still need more info. SSN for one.
smallstepforman•3mo ago
No SSN in Australia, who are the bulk of Qantas customers.
andsoitis•3mo ago
To apply for a credit card in Australia, you need to supply at least two forms of ID, such as an Australian driver's license, passport, or Medicare card.
fph•3mo ago
Do the banks actually check that the documents are legit? I'm sure your favorite LLM can generate pictures of all these documents in the blink of an eye.
andsoitis•3mo ago
Yes. Why do you think they wouldn’t?
monerozcash•3mo ago
Because they usually don't, and they certainly don't in Australia where it's essentially impossible. The government run IDMatch DVS can verify that the biographic information is correct, but can not verify the authenticity of the document.

This kind of fraud is not special in Australia, it happens thousands of times every single day. There is currently no way to prevent it.

ivanvanderbyl•3mo ago
The last time I applied for a credit card (about 4 years ago) in Australia, the bank used an app that read the photo page and chip of my passport to verify that it was a real document. That process does verify the authenticity of the document.
monerozcash•3mo ago
There are IDs in Australia which can be verified this way. There are also more than enough accepted IDs that can not, rendering such verification mechanisms rather pointless.

On another note, it's important to keep in mind that this is really the bank's problem. It's not something consumers should worry about.

pedalpete•3mo ago
Not only that, it seems to me that credit cards in Australia aren't handed out like candy, as they are in the US/Canada.
Ozarkian•3mo ago
SSN is available for everyone on databases available over torrents or on the darknet. You should assume your SSN is public knowledge.
andsoitis•3mo ago
Don’t you get correspondence or insights into credit card applications in your name?
spwa4•3mo ago
Authenticate to phone banking in the name of a customer and request a personal loan. And in general, open a large line of credit in someone else's name.
SteveNuts•3mo ago
Where can you do all that without a social security number?
whatevaa•3mo ago
It's not like those numbers haven't already been leaked elsewhere.
sammy2255•3mo ago
There's no concept of social security number in Australia
esseph•3mo ago
I feel like I get about a notification every 2 months now for a service I used maybe once 5 or 10 years ago getting breached/extorted/leaked.
airstrike•3mo ago
A SSN should never be used as a "password".
anonzzzies•3mo ago
This you can do somewhere? My bank asks me 20 questions (many like my first pet name, the last transaction I did etc) and then calls me back on the registered phone number. That data alone should get you nothing really. For credit here , small or large, you have to prove you are you or you get a nice police escort. Most of these apps, even if you are already registered, want you to tap your passport to nfc and scan your face for anything serious.
LadyCailin•3mo ago
Your bank, sure. But what about all the other banks? Just need to target the weakest link.
jvvw•3mo ago
Surely name, email, phone and date of birth aren't enough to do this at any bank? That's not quite public info but near enough. I've filled that in on hundreds of forms during my life and it's info that any of my friends have.
anonzzzies•3mo ago
Not at any bank here and don't think anywhere: AML KYC rules would cut that down at least everywhere I know.
spwa4•3mo ago
Pretty easy at stores for example.
pards•3mo ago
And yet later in the article it states:

> global data was stolen between April 2024 and September 2025 and includes personal and contact information of the companies’ customers and employees, including dates of birth, purchase histories and passport numbers.

which contradicts the previous statement

zzzeek•3mo ago
scam call you with further fake extortions like "I'm in jail mom you need to bail me out!" since they have birthdates they can target older people for this. my mom has received at least four of these calls, since I always get the "ARE YOU OK? WAS THAT A SCAM?" phone call afterwards. the first time it happened, they were about to go to the bank to wire money when dad said, "let's try calling his cell!"

we'd like to think these scams are stupid but unfortunately they work

esseph•3mo ago
The breach included passport details ;)
hmottestad•3mo ago
Phishing. Super easy now to send a fake email with a great offer, and have your name and loyalty programme number right there in the email. Much easier to trick someone when your email contains a bunch of personal info that you wouldn’t assume others to have.

«Happy birthday! As a loyal Quantas customer, we would like to offer you a sneak peek of our upcoming Black Friday deals. Consider it a little birthday present from us.»

bilekas•3mo ago
This topic is always a mixed bag for me, on the one hand I don't think you should pay ransom groups as it encourages more, but also their security should be better.

> “No company wants to see, you know, hundreds of thousands, or, millions of records of their customers just on the internet,” Kirk said. “That’s awful. It’s awful for the companies. It’s awful for the people affected.”

This reads to me like : "Well yeah sorry to our customers, but we're not taking a loss for our incompetance"

There's no winners here.

asdefghyk•3mo ago
I see a class action coming against Qantas .....
realaaa•3mo ago
I mean seriously - how the heck are they doing such social engineering??

meanwhile I am struggling to confirm my identity to Google, what the .. :`)