frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The emulator's gambit: Executing code from non-executable memory

https://redops.at/en/blog/the-emulators-gambit-executing-code-from-non-executable-memory
1•atilimcetin•41s ago•0 comments

The Internet's Too Fast

https://junejuice.bearblog.dev/the-internets-too-fast/
1•busymom0•1m ago•0 comments

The Calculated Typer – Haskell Symposium (ICFP⧸SPLASH'25) [video]

https://www.youtube.com/watch?v=uCPJ22aj_kI
1•matt_d•2m ago•1 comments

Fixing a MongoDB Replication Protocol Bug with TLA+ [video]

https://www.youtube.com/watch?v=x9zSynTfLDE
1•we6251•3m ago•0 comments

A Royal Gold Medal

https://daniel.haxx.se/blog/2025/10/21/a-royal-gold-medal/
1•leephillips•4m ago•0 comments

Stop buying cloud products: When your "smart home" suddenly turns into e-waste

https://www.wespeakiot.com/stop-buying-cloud-products-when-your-smart-home-suddenly-turns-into-el...
1•speckx•4m ago•0 comments

Thirty Year Operational Experience of the Jet Flywheel Generators [pdf]

https://scientific-publications.ukaea.uk/wp-content/uploads/Preprints/pre-CCFE-PR1728.pdf
1•zeristor•4m ago•0 comments

Joe Brockmeier (jzb) on LWN's 'Vintage' Style

https://hachyderm.io/@jzb/115413478341532720
1•phoronixrly•5m ago•0 comments

Michael Levin – Aging as a Loss of Goal-Directedness

https://advanced.onlinelibrary.wiley.com/doi/10.1002/advs.202509872?af=R
2•myth_drannon•7m ago•0 comments

The Gnome Way

https://blogs.gnome.org/aday/2017/08/08/the-gnome-way/
1•airhangerf15•7m ago•0 comments

My wife gave me 100 days to make it as an indie creator

https://blog.jacobstechtavern.com/p/my-wife-gave-me-100-days
2•jakey_bakey•10m ago•0 comments

Open AI launches browser Vibe Check

https://every.to/vibe-check
2•sam1r•11m ago•2 comments

NAT traversal improvements, pt. 2: Challenges in cloud environments

https://tailscale.com/blog/nat-traversal-improvements-pt-2-cloud-environments
1•CharlesW•12m ago•0 comments

Rare Earths Recovery from Ewaste

https://arstechnica.com/science/2025/10/breaking-down-rare-earth-element-magnets-for-recycling/
1•DaveZale•13m ago•0 comments

AWS outage: Are we relying too much on US big tech?

https://www.bbc.com/news/articles/c0jdgp6n45po
5•devonnull•14m ago•0 comments

Hammurabi Currency Converter

https://justine.lol/inflation/
2•jart•15m ago•0 comments

Use Cursor agent inside any ACP compatible IDE

https://github.com/roshan-c/cursor-acp
1•parting0163•15m ago•0 comments

OpenAI Looks to Replace the Drudgery of Junior Bankers' Workload

https://www.bloomberg.com/news/articles/2025-10-21/openai-looks-to-replace-the-drudgery-of-junior...
1•megacorp•17m ago•0 comments

Show HN: Playbook AI – knowledge base for using AI in product development

https://aidevplaybook.com/en
1•greatgenby•18m ago•0 comments

MIT Maritime Consortium Releases "Nuclear Ship Safety Handbook"

https://news.mit.edu/2025/mit-maritime-consortium-nuclear-ship-safety-handbook-1020
1•gnabgib•18m ago•0 comments

Sora 2 Go – Make pro videos using OpenAI's Sora 2, no invite needed

https://sora2go.lovable.app/
1•vannventures•20m ago•1 comments

The Slack-O-lantern says back to woooOOOoooOOOrk [video]

https://www.youtube.com/shorts/Ouu0oi0mcY4
2•ohjeez•21m ago•0 comments

MinIO Goes Source-Only Distribution

https://github.com/minio/minio/issues/21647
1•tiri•21m ago•1 comments

Do we need to be saying 'please' and 'thanks' to AI?

https://www.rnz.co.nz/life/lifestyle/do-we-need-to-be-saying-please-and-thanks-to-ai
4•billybuckwheat•23m ago•0 comments

Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical

https://eprint.iacr.org/2025/1910
1•nabla9•23m ago•0 comments

OpenAI Is Building a Banker

https://www.bloomberg.com/opinion/newsletters/2025-10-21/openai-is-building-a-banker
2•ioblomov•26m ago•1 comments

Modal editing is a weird historical contingency we have through sheer happensta

https://buttondown.com/hillelwayne/archive/modal-editing-is-a-weird-historical-contingency/
1•todsacerdoti•26m ago•0 comments

Show HN: I scraped 10k+ remote tech jobs into one feed

https://jobdit.co
1•imadbkr•26m ago•0 comments

'Sean Dummy': Musk and Duffy Brawl over the Future of NASA

https://www.politico.com/news/2025/10/21/elon-musk-sean-duffy-nasa-future-00616827
1•JumpCrisscross•26m ago•0 comments

Israeli flag found on hacked Malaysian water company website

https://aseannow.com/topic/1376426-israeli-flag-on-hacked-malaysian-website/
3•jataget•27m ago•0 comments
Open in hackernews

Apple alerts exploit developer that his iPhone was targeted with gov spyware

https://techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware/
124•speckx•2h ago

Comments

scheeseman486•2h ago
You swim with sharks...
duxup•2h ago
>Gibson, who until recently built surveillance technologies for Western government hacking tools maker Trenchant, may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.

Leopards ate my face moment?

They're not developing these tools to NOT use them...

alephnerd•2h ago
Based on the article, it sounds like a bit of a "he said - she said" article after Gibson was terminated at Trenchant/L3Harris.
duxup•2h ago
I'm not entirely sure how that applies to my post.
alephnerd•1h ago
What I mean is:

1. Most of us in this segment of the industry recognize the risks

2. He is absolutely not the first person targeted by this

3. This article sounds like it's part of a wrongful termination suit by Gibson based on the context provided

duxup•1h ago
Is there a lawsuit?
alephnerd•1h ago
Not sure, but the phrasing around this article and the entire second half of it definitely sounds like similar articles I've seen during these kinds of suits.
altairprime•1h ago
To clarify with the final paragraphs of context, “He said, Corp said, 3 of 3 coworkers asked corroborated what He said”.
tptacek•1h ago
For at least 2 decades now exploit developers have been rather infamously prime targets for spyware, so whoever wrote this piece isn't read in at all to the industry.
ghostly_s•7m ago
Oddly it seems to echo the feelings of the spyware developer in question.
runjake•30m ago
"Leopards ate my face" reference for others not in the know: https://knowyourmeme.com/memes/leopards-eating-peoples-faces...
throw0101c•26m ago
The original tweet just had its tenth anniversary (2015-10-16):

> 'I never thought leopards would eat MY face,' sobs woman who voted for the Leopards Eating People's Faces Party.

* https://twitter.com/Cavalorn/status/654934442549620736

CaptainOfCoit•18m ago
What happened with "reap what one sows", did it go out of fashion? Seems the same.
tgv•11m ago
Too biblical and old-fashioned, probably. I would say that at least half the people who've used "leopards ate my face" don't even know the meaning of reap. The simplicity and visual character of the modern expression make it memier.
svnt•10m ago
Leopards ate my face is only negative, and has been more political, typically someone voting to weaponize the government against their peer-level enemies but hypocritically, only to later realize they are not a party to the benefits, only the consequences.

It is really about a perceptual flaw in pre-fascist democratic behavior: people believing themselves to be a part of the protected class because they voted for it.

It seems to apply here because someone profiting from the creation of tools used on others by people with money/power has them used on him by the government.

tldr; it is a subset of you reap what you sow, with more specificity and punch

ranger_danger•2h ago
> I went immediately to buy a new phone.

Why does he think that will help against a state-backed adversary?

perching_aix•2h ago
>> I went immediately to buy a new phone.

> Why does he think that will help against a state-backed adversary?

What are his alternatives?

ranger_danger•1h ago
Not using a phone anymore
pinkmuffinere•1h ago
Is this a serious response? It is nearly impossible to live without a phone, short of pulling a Christ Mccandless. I understand that means this _is_ an option, but it is an option in the same way that cutting off your leg for fun is always an option.
majorchord•1h ago
Well if you're knowingly being targeted by a government, your choices are basically go off the grid... or continue having every inch of your life tracked so they can find any tiny little thing to construe as probable cause to take you in.

I don't really see any alternatives. Do you?

kergonath•25m ago
Going off the grid does not really prevent the alternative. It also presents convenient opportunities for accidents, depending on how far you go.
majorchord•8m ago
What do you suggest then?
BeetleB•56m ago
> It is nearly impossible to live without a phone,

There's a whole continuum.

Other than 2FA, text messaging is easy to get rid of.

You still use it to make calls, so yeah, they can track you that way. You can keep the phone off most of the time, though. People close to me know that they're more likely to reach me by calling my home phone.

What else does one really need a phone for?

Navigation? Do what I did: Get another phone that never has a SIM card and use an offline app.

Camera? The same. But really, life is very doable without a camera to begin with!

The only reason I need a phone is 2FA.

criddell•47m ago
Get a new iPhone and immediately turn on lockdown mode.
mrandish•27m ago
I'm not in this field but I was under the impression that people who know they are likely to be individually targeted use two (or more) phones and the one they use for their (target-worthy activity) is kept heavily locked down. Inconvenient to be sure but it seems like an unavoidable cost of being in that business.
duxup•2h ago
I don't think he thinks it is a state.
ranger_danger•1h ago
But the title says gov spyware?
duxup•1h ago
It's spyware that govs buy, but clearly the article goes in another direction as to who might have an interest in this guy.
freehorse•1h ago
meaning gov-grade spyware, most likely
bink•1h ago
There is some amount of protection until the adversary discovers the new number. But since they've already compromised his phone they likely have his dad's number and can compromise that phone to find him again. It's dystopian.

If he's running iOS he can also enabled Lockdown Mode on the new phone to block most types of attacks.

fn-mote•6m ago
This doesn’t make sense… of course it will help. It gives you a clean slate, not compromised when you pick it up.
rs186•2h ago
> “I was panicking,” Jay Gibson, who asked that we don’t use his real name over fears of retaliation, told TechCrunch.

And later,

> Without a full forensic analysis of Gibson’s phone ... it’s impossible to know why he was targeted or who targeted him.

> But Gibson told TechCrunch that he believes the threat notification he received from Apple is connected to the circumstances of his departure from Trenchant ...

I find it funny that (1) this guy never thought this would happen to him (2) this guy has the balls to talk to media about this but fears retaliation

I mean, seriously, those who want to know your real name already know it.

asadm•2h ago
any guesses for the state here?
duxup•2h ago
The article notes that the target's former employer makes hackng tools and they separated on bad terms. Seems like it easily could just be the target's former employer.
iamnothere•1h ago
I would be more surprised if these employers didn’t target their employees to prevent leaks of trade secrets, union activity, or other internal dissent. Having the power would be too tempting to resist, and besides, there is some degree of legitimate concern; it would be easy enough for rogue employees to sell exploits on the side for millions (there are plenty of buyers).

Another reason not to work at places like this.

duxup•1h ago
Yeah I think the sensibilities inside orgs like that filters out folks with some values and the result would be ... not a lot of trust.
bink•1h ago
I'm not disagreeing with you, but doing so would open them up to criminal charges and liability. Rightly or wrongly, selling exploits is not illegal. Hacking your employees devices is.
iamnothere•1h ago
True, but most governments probably aren’t interested in pressing charges against critical vendors, as long as the product is delivered.
arthurcolle•1h ago
I'm going to go out on a limb here and say it's a state in the DMV.. L3Harris HQ is in Arlington if I'm not mistaken
tptacek•1h ago
If it's actually a state, it's unlikely to be a NATO or FVEY country, since L3Harris is one of the largest defense contractors in the world and most of those countries are customers. The piece is kind of all over the place but the vibe it lands on is that his work phone may have been owned up by his employers.
amelius•2h ago
Maybe it went like this:

- Exploit developer makes and plays with exploits on their phone

- Apple notices this, warns them that there is spyware on their phone

- Exploit developer somehow thinks it is governments hacking into their phone

freehorse•2h ago
> I have mixed feelings of how pathetic this is, and then extreme fear because once things hit this level, you never know what’s going to happen

Interesting kind of payback. What does he think happens to the people whom the exploits he develops target?

thesuitonym•1h ago
Sounds like he naively believes only governments use these, and only against legitimate criminals.
markus_zhang•1h ago
What is the surprise? If I'm in his shoe I'd expect the gov knows everything about me including how often I make sex.
jeffhuys•1h ago
Nullable column I guess?

I’m kidding of course

markus_zhang•16m ago
0 is not NULL!
bink•1h ago
I've interviewed with these types of companies (not the ones in the article). I've even caught them using their exploits on me after they made me an offer and that seems to be the most likely explanation for what happened here. I don't know how anyone can develop exploits for resale in good conscience.

If these companies have no qualms using their exploits against their own employees they'll have absolutely no problem using them against members of Congress, the Courts, investment banks, tech leaders, and anyone with any sort of power. This gives them the ability to blackmail some of the most powerful people in the world.

edit: And that's not even mentioning their reported "intended use" against dissidents and journalists.

Ms-J•24m ago
That's outrageous that they tried to attack you like that. How exactly did it happen? Did they send a link via SMS to your phone, or some other way?
bink•10m ago
I don't wanna give away too much in case they're reading, but they didn't use their stealthiest exploit. It was pretty obvious, especially if you monitor your network traffic.
yachad•1h ago
Live by the sword, die by the sword.
antonymoose•57m ago
If an engineer at Ford dies in a car crash does he really deserve it?

We live in a world full of threat-actors. We need exploits just like we need firearms and tanks and fighters and jets.

To mock the guy is just naive.

kuhsaft•44m ago
An engineer at Ford isn’t developing cars that actively harms passengers.

If you develop weapons, physical or digital, don’t be surprised if you end up on the receiving end.

just_steve_h•38m ago
Well, they’re certainly developing cars that kill and maim pedestrians, disperse clouds of microplastics, and contribute excess CO2 to our atmosphere…
kuhsaft•28m ago
Right. I was talking about passenger safety. But sure, if you purposefully designed a vehicle that has poor pedestrian visibility and end up getting hit by that same vehicle due to that poor visibility, you shouldn't be surprised.
lawlessone•12m ago
Not the best analogy, more like a man who develops car mounted harpoons being hit by a car mounted harpoon.
tptacek•16m ago
I know people involved at Trenchant and have trouble believing that anybody who worked there was shocked by this threat. Maybe things have changed post-L3Harris but "it" (it's more than one company) was an incredibly paranoid IT shop prior to the acquisition.
r_lee•1h ago
This guy is pretty naive if he thinks they (or their biggest customers) won't verify whether he really was leaking something or not if they've got the tools to do that lol and to maybe send a message to not think about it
CaptainOfCoit•54m ago
> Gibson .. may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.

> But the ex-Trenchant employee may not be the only exploit developer targeted with spyware .. there have been other spyware and exploit developers in the last few months

eimrine•51m ago
I would like to see the screenshot or the photo of display with that kind of alert.
netruk44•29m ago
Apple usually documents stuff like this on their support website.

In this case there is an article [0], but there’s no screenshot of the message as seen on iOS. But it does mention that the notification comes in via iMessage, so it probably looks like any other text.

[0]: https://support.apple.com/en-us/102174

runjake•28m ago
Here's what it looks like: https://c.ndtvimg.com/2024-04/30p8264g_apple-notification_62...
ajross•29m ago
This framing seems weird:

> Two days after receiving the Apple threat notification, Gibson contacted a forensic expert with extensive experience investigating spyware attacks.

Surely as a professional "exploit developer", Gibson himself should have been about as expert at this particular niche as any human being on the planet already.

I mean, sure, absolutely he should have called in his friends in the community and gotten more eyes on the device. But the way that's written it sounds like he took it into the local Genius Bar.

It also, in context, feels a little obfuscatory. Like he's trying to flag the involvement of senior folks who he can't name.

tptacek•14m ago
I agree it reads weird, but I am leaving room for the idea that there are a lot of very gifted people who work on this stuff as an intellectual challenge, have a sort of straight up systemsy computer science background, and don't have or care about a bigger picture of where they fit into the industry. But still: the companies that became Trenchant were notoriously paranoid about state-sponsored CNE threats! It would still be weird to be surprised by them.