frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Knowledge-Bank

https://github.com/gabrywu-public/knowledge-bank
1•gabrywu•3m ago•0 comments

Show HN: The Codeverse Hub Linux

https://github.com/TheCodeVerseHub/CodeVerseLinuxDistro
3•sinisterMage•4m ago•0 comments

Take a trip to Japan's Dododo Land, the most irritating place on Earth

https://soranews24.com/2026/02/07/take-a-trip-to-japans-dododo-land-the-most-irritating-place-on-...
1•zdw•4m ago•0 comments

British drivers over 70 to face eye tests every three years

https://www.bbc.com/news/articles/c205nxy0p31o
1•bookofjoe•4m ago•1 comments

BookTalk: A Reading Companion That Captures Your Voice

https://github.com/bramses/BookTalk
1•_bramses•5m ago•0 comments

Is AI "good" yet? – tracking HN's sentiment on AI coding

https://www.is-ai-good-yet.com/#home
1•ilyaizen•6m ago•1 comments

Show HN: Amdb – Tree-sitter based memory for AI agents (Rust)

https://github.com/BETAER-08/amdb
1•try_betaer•7m ago•0 comments

OpenClaw Partners with VirusTotal for Skill Security

https://openclaw.ai/blog/virustotal-partnership
2•anhxuan•7m ago•0 comments

Show HN: Seedance 2.0 Release

https://seedancy2.com/
1•funnycoding•8m ago•0 comments

Leisure Suit Larry's Al Lowe on model trains, funny deaths and Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
1•thelok•8m ago•0 comments

Towards Self-Driving Codebases

https://cursor.com/blog/self-driving-codebases
1•edwinarbus•8m ago•0 comments

VCF West: Whirlwind Software Restoration – Guy Fedorkow [video]

https://www.youtube.com/watch?v=YLoXodz1N9A
1•stmw•9m ago•1 comments

Show HN: COGext – A minimalist, open-source system monitor for Chrome (<550KB)

https://github.com/tchoa91/cog-ext
1•tchoa91•10m ago•1 comments

FOSDEM 26 – My Hallway Track Takeaways

https://sluongng.substack.com/p/fosdem-26-my-hallway-track-takeaways
1•birdculture•10m ago•0 comments

Show HN: Env-shelf – Open-source desktop app to manage .env files

https://env-shelf.vercel.app/
1•ivanglpz•14m ago•0 comments

Show HN: Almostnode – Run Node.js, Next.js, and Express in the Browser

https://almostnode.dev/
1•PetrBrzyBrzek•14m ago•0 comments

Dell support (and hardware) is so bad, I almost sued them

https://blog.joshattic.us/posts/2026-02-07-dell-support-lawsuit
1•radeeyate•15m ago•0 comments

Project Pterodactyl: Incremental Architecture

https://www.jonmsterling.com/01K7/
1•matt_d•15m ago•0 comments

Styling: Search-Text and Other Highlight-Y Pseudo-Elements

https://css-tricks.com/how-to-style-the-new-search-text-and-other-highlight-pseudo-elements/
1•blenderob•17m ago•0 comments

Crypto firm accidentally sends $40B in Bitcoin to users

https://finance.yahoo.com/news/crypto-firm-accidentally-sends-40-055054321.html
1•CommonGuy•18m ago•0 comments

Magnetic fields can change carbon diffusion in steel

https://www.sciencedaily.com/releases/2026/01/260125083427.htm
1•fanf2•18m ago•0 comments

Fantasy football that celebrates great games

https://www.silvestar.codes/articles/ultigamemate/
1•blenderob•18m ago•0 comments

Show HN: Animalese

https://animalese.barcoloudly.com/
1•noreplica•19m ago•0 comments

StrongDM's AI team build serious software without even looking at the code

https://simonwillison.net/2026/Feb/7/software-factory/
3•simonw•19m ago•0 comments

John Haugeland on the failure of micro-worlds

https://blog.plover.com/tech/gpt/micro-worlds.html
1•blenderob•20m ago•0 comments

Show HN: Velocity - Free/Cheaper Linear Clone but with MCP for agents

https://velocity.quest
2•kevinelliott•20m ago•2 comments

Corning Invented a New Fiber-Optic Cable for AI and Landed a $6B Meta Deal [video]

https://www.youtube.com/watch?v=Y3KLbc5DlRs
1•ksec•22m ago•0 comments

Show HN: XAPIs.dev – Twitter API Alternative at 90% Lower Cost

https://xapis.dev
2•nmfccodes•22m ago•1 comments

Near-Instantly Aborting the Worst Pain Imaginable with Psychedelics

https://psychotechnology.substack.com/p/near-instantly-aborting-the-worst
2•eatitraw•28m ago•0 comments

Show HN: Nginx-defender – realtime abuse blocking for Nginx

https://github.com/Anipaleja/nginx-defender
2•anipaleja•29m ago•0 comments
Open in hackernews

Apple alerts exploit developer that his iPhone was targeted with gov spyware

https://techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware/
290•speckx•3mo ago

Comments

scheeseman486•3mo ago
You swim with sharks...
duxup•3mo ago
>Gibson, who until recently built surveillance technologies for Western government hacking tools maker Trenchant, may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.

Leopards ate my face moment?

They're not developing these tools to NOT use them...

alephnerd•3mo ago
Based on the article, it sounds like a bit of a "he said - she said" article after Gibson was terminated at Trenchant/L3Harris.
duxup•3mo ago
I'm not entirely sure how that applies to my post.
alephnerd•3mo ago
What I mean is:

1. Most of us in this segment of the industry recognize the risks

2. He is absolutely not the first person targeted by this

3. This article sounds like it's part of a wrongful termination suit by Gibson based on the context provided

duxup•3mo ago
Is there a lawsuit?
alephnerd•3mo ago
Not sure, but the phrasing around this article and the entire second half of it definitely sounds like similar articles I've seen during these kinds of suits.
altairprime•3mo ago
To clarify with the final paragraphs of context, “He said, Corp said, 3 of 3 coworkers asked corroborated what He said”.
tptacek•3mo ago
For at least 2 decades now exploit developers have been rather infamously prime targets for spyware, so whoever wrote this piece isn't read in at all to the industry.
ghostly_s•3mo ago
Oddly it seems to echo the feelings of the spyware developer in question.
tptacek•3mo ago
I agree that developer, as quoted, has an odd vibe.
jsonBorn•3mo ago
"..if you are a state or federal enforcement authority, and you have suspicion of any criminal activity of `Jay Gibson', be encouraged to immediately contact: Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.
runjake•3mo ago
"Leopards ate my face" reference for others not in the know: https://knowyourmeme.com/memes/leopards-eating-peoples-faces...
throw0101c•3mo ago
The original tweet just had its tenth anniversary (2015-10-16):

> 'I never thought leopards would eat MY face,' sobs woman who voted for the Leopards Eating People's Faces Party.

* https://twitter.com/Cavalorn/status/654934442549620736

CaptainOfCoit•3mo ago
What happened with "reap what one sows", did it go out of fashion? Seems the same.
tgv•3mo ago
Too biblical and old-fashioned, probably. I would say that at least half the people who've used "leopards ate my face" don't even know the meaning of reap. The simplicity and visual character of the modern expression make it memier.
svnt•3mo ago
Leopards ate my face is only negative, and has been more political, typically someone voting to weaponize the government against their peer-level enemies but hypocritically, only to later realize they are not a party to the benefits, only the consequences.

It is really about a perceptual flaw in pre-fascist democratic behavior: people believing themselves to be a part of the protected class because they voted for it.

It seems to apply here because someone profiting from the creation of tools used on others by people with money/power has them used on him by the government.

tldr; it is a subset of you reap what you sow, with more specificity and punch

CaptainOfCoit•3mo ago
You know what? Thank you for explaining that!
ta1243•3mo ago
That gives positive outcomes.

People vote for "leopards eating face" party because they want leopards to eat other peoples faces. You're relying on that party to do something they didn't say (it's not "leopards eat everyone else's face but not yours" party)

If you vote for a party to build a monument, then they build a monument, that's reaping what you sow.

ranger_danger•3mo ago
> I went immediately to buy a new phone.

Why does he think that will help against a state-backed adversary?

perching_aix•3mo ago
>> I went immediately to buy a new phone.

> Why does he think that will help against a state-backed adversary?

What are his alternatives?

ranger_danger•3mo ago
Not using a phone anymore
pinkmuffinere•3mo ago
Is this a serious response? It is nearly impossible to live without a phone, short of pulling a Christ Mccandless. I understand that means this _is_ an option, but it is an option in the same way that cutting off your leg for fun is always an option.
majorchord•3mo ago
Well if you're knowingly being targeted by a government, your choices are basically go off the grid... or continue having every inch of your life tracked so they can find any tiny little thing to construe as probable cause to take you in.

I don't really see any alternatives. Do you?

kergonath•3mo ago
Going off the grid does not really prevent the alternative. It also presents convenient opportunities for accidents, depending on how far you go.
majorchord•3mo ago
What do you suggest then?
BeetleB•3mo ago
> It is nearly impossible to live without a phone,

There's a whole continuum.

Other than 2FA, text messaging is easy to get rid of.

You still use it to make calls, so yeah, they can track you that way. You can keep the phone off most of the time, though. People close to me know that they're more likely to reach me by calling my home phone.

What else does one really need a phone for?

Navigation? Do what I did: Get another phone that never has a SIM card and use an offline app.

Camera? The same. But really, life is very doable without a camera to begin with!

The only reason I need a phone is 2FA.

at-fates-hands•3mo ago
I had Ubuntu Touch installed on an older OnePlus phone. It did everything, but they haven't figured out how to work with VoLTE. I considered just saying "screw it" and using it anyways, but then remembered that my Mum calls twice a week to chat me up so I went back.

But 100% you can still find alternatives, its just about how much stuff you wanna carry around with you right?

criddell•3mo ago
Get a new iPhone and immediately turn on lockdown mode.
mrandish•3mo ago
I'm not in this field but I was under the impression that people who know they are likely to be individually targeted use two (or more) phones and the one they use for their (target-worthy activity) is kept heavily locked down. Inconvenient to be sure but it seems like an unavoidable cost of being in that business.
hsbauauvhabzb•3mo ago
It depends what the use case is, does the adversary want to read your email, tap your microphone or track your location?
folmar•3mo ago
You need to consider your location known to the government at all times if they know they'd want it beforehand. Most places are either surveilled heavily or sparsely populated, i.e. good for satellite-based observation. Maybe also to big enough corporations if they really want.

This does not imply that it is easy to track everyone everywhere at all times. I guess most targeted ones would like to protect their communication, and even meetings in person are possible if you keep some safeguards.

hsbauauvhabzb•3mo ago
You’re assuming America, and on local soil. There are plenty of places where your statements are inaccurate.
duxup•3mo ago
I don't think he thinks it is a state.
ranger_danger•3mo ago
But the title says gov spyware?
duxup•3mo ago
It's spyware that govs buy, but clearly the article goes in another direction as to who might have an interest in this guy.
freehorse•3mo ago
meaning gov-grade spyware, most likely
bink•3mo ago
There is some amount of protection until the adversary discovers the new number. But since they've already compromised his phone they likely have his dad's number and can compromise that phone to find him again. It's dystopian.

If he's running iOS he can also enabled Lockdown Mode on the new phone to block most types of attacks.

fn-mote•3mo ago
This doesn’t make sense… of course it will help. It gives you a clean slate, not compromised when you pick it up.
ranger_danger•3mo ago
Maybe but if we're talking on the level of targeted government surveillance, I think all options are on the table, i.e. they should assume they are being watched everywhere they go, and that all their communications, including their close friends/family (or anyone they have already been talking to lately) are likely being monitored as well, in which case, getting a new phone may not do much of anything.

Does that really not make sense?

ActorNightly•3mo ago
If there are zero click, unknown yet zero days against Apple devices, it won't help.

If you are actually security conscious, the only setup that works is have a public facing phone and a private phone that is custom rooted, de googled, and you control everything that runs on it.

rs186•3mo ago
> “I was panicking,” Jay Gibson, who asked that we don’t use his real name over fears of retaliation, told TechCrunch.

And later,

> Without a full forensic analysis of Gibson’s phone ... it’s impossible to know why he was targeted or who targeted him.

> But Gibson told TechCrunch that he believes the threat notification he received from Apple is connected to the circumstances of his departure from Trenchant ...

I find it funny that (1) this guy never thought this would happen to him (2) this guy has the balls to talk to media about this but fears retaliation

I mean, seriously, those who want to know your real name already know it.

ActorNightly•3mo ago
This honestly smells really strong like made up shit. Or the guy is very much a low key player.

Generally, if you develop exploits, you should be completely aware of every single possible attack vector. If you are working for a company like Trenchant, and you know what you are doing, the last thing you do is use Apple devices (at least fully, most of the time you have a public phone and much more secure private phone)

The reason is, when you take an Apple phone, connect it to a router that proxies through a computer so you can inspect traffic, you can see the vast amounts of shit being sent back to Apple which you have no control of.

Meanwhile, if you do the same with my custom rooted, de-googled android phone that I take overseas, you will see only ntp traffic, and that is only so I don't have to deal with cert issues because my clock is wrong.

saagarjha•3mo ago
Trenchant employees use iPhones just like everyone else. What else would they use?
rekttrader•3mo ago
Apple SRD devices.
saagarjha•3mo ago
> The SRD is intended for use in a controlled setting for security research only…The SRD isn't meant for personal use or daily carry, and must remain on the premises of program participants at all times.

(From https://security.apple.com/research-device)

commandersaki•3mo ago
Doubtful, if you find exploits using an SRD then you're expected to disclose them to Apple. None of these shops would have SRDs.
ActorNightly•3mo ago
For anything that can be considered compromising, you dont use a smartphone.
ElevenLathe•3mo ago
Going public is presumably part of his strategy for trying not to be disappeared.
asadm•3mo ago
any guesses for the state here?
duxup•3mo ago
The article notes that the target's former employer makes hackng tools and they separated on bad terms. Seems like it easily could just be the target's former employer.
iamnothere•3mo ago
I would be more surprised if these employers didn’t target their employees to prevent leaks of trade secrets, union activity, or other internal dissent. Having the power would be too tempting to resist, and besides, there is some degree of legitimate concern; it would be easy enough for rogue employees to sell exploits on the side for millions (there are plenty of buyers).

Another reason not to work at places like this.

duxup•3mo ago
Yeah I think the sensibilities inside orgs like that filters out folks with some values and the result would be ... not a lot of trust.
bink•3mo ago
I'm not disagreeing with you, but doing so would open them up to criminal charges and liability. Rightly or wrongly, selling exploits is not illegal. Hacking your employees devices is.
iamnothere•3mo ago
True, but most governments probably aren’t interested in pressing charges against critical vendors, as long as the product is delivered.
arthurcolle•3mo ago
I'm going to go out on a limb here and say it's a state in the DMV.. L3Harris HQ is in Arlington if I'm not mistaken
tptacek•3mo ago
If it's actually a state, it's unlikely to be a NATO or FVEY country, since L3Harris is one of the largest defense contractors in the world and most of those countries are customers. The piece is kind of all over the place but the vibe it lands on is that his work phone may have been owned up by his employers.
zzrrt•3mo ago
> his work phone may have been owned up by his employers

First line says "personal phone". I presume MDM on a work phone could do most of the things they'd be interested in, without the risk of setting off an alarm like this. Anyone have speculation about a reason for an employer to pwn a phone that's already on their MDM?

KoftaBob•3mo ago
When it comes to state-sponsored cyber-spying like this, take your pick between USA, Israel, Russia, China.
amelius•3mo ago
Maybe it went like this:

- Exploit developer makes and plays with exploits on their phone

- Apple notices this, warns them that there is spyware on their phone

- Exploit developer somehow thinks it is governments hacking into their phone

saagarjha•3mo ago
These exploits get developed on airgapped devices
freehorse•3mo ago
> I have mixed feelings of how pathetic this is, and then extreme fear because once things hit this level, you never know what’s going to happen

Interesting kind of payback. What does he think happens to the people whom the exploits he develops target?

thesuitonym•3mo ago
Sounds like he naively believes only governments use these, and only against legitimate criminals.
markus_zhang•3mo ago
What is the surprise? If I'm in his shoe I'd expect the gov knows everything about me including how often I make sex.
jeffhuys•3mo ago
Nullable column I guess?

I’m kidding of course

markus_zhang•3mo ago
0 is not NULL!
bink•3mo ago
I've interviewed with these types of companies (not the ones in the article). I've even caught them using their exploits on me after they made me an offer and that seems to be the most likely explanation for what happened here. I don't know how anyone can develop exploits for resale in good conscience.

If these companies have no qualms using their exploits against their own employees they'll have absolutely no problem using them against members of Congress, the Courts, investment banks, tech leaders, and anyone with any sort of power. This gives them the ability to blackmail some of the most powerful people in the world.

edit: And that's not even mentioning their reported "intended use" against dissidents and journalists.

Ms-J•3mo ago
That's outrageous that they tried to attack you like that. How exactly did it happen? Did they send a link via SMS to your phone, or some other way?
bink•3mo ago
I don't wanna give away too much in case they're reading, but they didn't use their stealthiest exploit. It was pretty obvious, especially if you monitor your network traffic.
cj•3mo ago
How obvious would it be to someone being hired as an office manager or janitor or similar?
cobertos•3mo ago
Monitoring your network traffic on your local PC (ala Little Snitch or Open Snitch) or monitoring it at the gateway/router level?
bink•3mo ago
At the router level. I turned off cellular data to be sure, but I don't even think that was necessary since it was on wifi.
matheusmoreira•3mo ago
I gotta admit I'm not in the habit of monitoring my network traffic... Gotta wonder if it's even possible to protect ourselves against this surveillance without going full OPSEC mode.
throwaway48476•3mo ago
If you're developing tools you're likely testing against vendor network monitoring apps and in the habit of using them.
Ms-J•3mo ago
Ok guessing against a computer of yours and not a phone (which of course is still possible) thanks. Hope it can help all of us stay safe.
commandersaki•3mo ago
I really don't want to belittle what you say, but this just looks like misplaced paranoia.
tptacek•3mo ago
You don't know how any of these could be developed in good conscience? How about: anti-proliferation intelligence work is going to happen whether it requires human intelligence or CNE, and CNE is less costly and harmful?

I get where you're probably coming from: this same technology is used all over the world to target journalists and dissidents in countries with and without the rule of law. A very real concern. I wouldn't do this kind of work either (also, it's been over a decade since I had the chops even to apprentice at it).

But there are very coherent reasons people are comfortable doing this work for NATO countries. Our reflexive distrust of law enforcement and intelligence work is a fringe belief: a lot of families are very proud to include people working in these fields.

The most important thing I guess I'd have to say here is: our opinion of this stuff doesn't matter. At current market rates every country in the world can afford CNE technology, and it's a market well served by vendors outside of NATO.

Ms-J•3mo ago
"our opinion of this stuff doesn't matter."

It very much does matter. If more people refuse to do this type of work, it eventually won't be done to the required standard. People would cut family ties and this would stop fast.

tptacek•3mo ago
That's an incredibly blinkered view of the ecosystem that assumes that the only talent capable of delivering this work is people you talk to or share cultural ties with. There are ultra-skilled people in developing countries who could not give less of a fuck about how uncomfortable this stuff makes people in the west.
GauntletWizard•3mo ago
There are tons of people in the West who have no qualms about doing this for pure crime purposes; many of them are the ones who espouse most ardently that doing this work for the government is immoral.
philipallstar•3mo ago
> many of them are the ones who espouse most ardently that doing this work for the government is immoral

How do you know this?

GauntletWizard•3mo ago
An opinion, based on meeting people like https://www.nbcnews.com/news/us-news/capital-one-hacking-sus...
fruitworks•3mo ago
so what? As GP suggests, they are not nessisary for the development of exploits.
pixl97•3mo ago
>If more people refuse to do this type of work

This is kind of like saying "if people wouldn't murder other people then..."

"Bad" kind of work always finds bodies to fill it's spots. Boycotts of a particular business might work, but a type of work won't, especially when there is decent money on the table. And then when you start adding in people that had previous run ins with law enforcement and find it hard to get a "legit" job and get a decent offer from a place like this, they'll have no problem taking it.

diffeomorphism•3mo ago
It would stop in your country but not globally. That means your country loses all expertise and will be much worse off to defend itself.

Case in point: In 2007 Germany passed a "hacking law" (§202c). On its face, it was supposed to prevent black hat work. Except it very predictably also did enormous damage to security research.

bigyabai•3mo ago
> At current market rates every country in the world can afford CNE technology

Slippery slopes don't justify anything. You might not care enough to make a difference, but many people do and your justification rings hollow to everyone that's potentially a victim. You wouldn't say this about nuclear proliferation, so why make a carveout for digital mercenary work? Because it's "harmless"?

I don't know what your goal is with this statement but it certainly doesn't make me feel any better. If you're this emotionally invested in the topic, it might be best for your own optics to not chime in.

tptacek•3mo ago
I'm not justifying anything. I'm saying a very large number of people don't share the premise in the parent comment. It's one thing to disagree with a practice; it's another thing to suggest that disagreement with it is universal. It is not.
fruitworks•3mo ago
The difference is that it's completely plausible to protect against a cyberattack, but completely implausible to protect against a nuclear attack.

The onus is on Apple and their userbase to protect their own computers, not the rest of society to patrol and regulate unstoppable "information crime" against them

sakisv•3mo ago
I think I agree with what I think you're trying to say.

However I don't agree with the repercussions of this, which are the same ones that make all reasonable people, security experts included, oppose EU's ChatControl or the UK's backdoor requests: There is no way to ensure and protect the people that need protection, as there is no way to ensure that only "the good guys" have it.

We tend to bullshit ourselves into believing that because spyware software like Predator are weapons, meaning that only countries would be allowed to buy them and use them (same way that Jeff Bezos cannot buy and use an F-35 for example). We see though, that certain individuals _can_ get their hands on these things and use them however they want.

For example, 3 years ago someone adjacent to the greek government bought and used Predator against MEPs, journalists, army generals, mafia bosses, MPs of opposing parties and even MPs of their own, ruling, party. The greek government of course denied that they did it, and they said that this individual did not act under the instructions of the government (though they then changed the law to prevent anyone for learning details about it, but that's a different story).

So, apart from adopting the same approach as with ChatControl and encryption backdoors, i.e. banning them, I don't know how we could protect ourselves against them.

tptacek•3mo ago
I'm an American and am glad of my personal belief that the American system would not allow something like ChatControl by state mandate. I also wouldn't participate in commercial exploit development (even if I was capable of doing so competitively). But I don't think the two things are at all comparable.
adastra22•3mo ago
ChatControl has almost happened here in the USA multiple times, and they will try again.
tptacek•3mo ago
If you say so. Either way: not comparable to CNE operations.
1659447091•3mo ago
> You don't know how any of these could be developed in good conscience?

The OP did say "...for resale in good conscience."

I personally read that as the commercial companies that allows anyone to buy the product off the shelf for the right price -- including governments, but also rogue elements. Bad actors, groups, or even people engaged in abusive domestic practices (customers without the time, experience, or resources to do it in-house). Not the people who work directly under government agencies developing these things for State level intelligence/ops

1oooqooq•3mo ago
humans create myths which shape their world.

you, sadly, internalized a state humanity adopted after wwii, were the anti red propaganda told everyone that of you could illegally burn a forest down to then buy a Ferrari, it was the best course of action because if you didn't do it, someone would.

thankfully people like you are being ostracized, albeit too slow, and pointed out as what you really are: agentless weak oportunists.

duxup•3mo ago
I think by default these companies kinda filter out people with values that would impede unrestricted use of their tools. And at worse possibly attract people who think "I'd sure like to spy on other people". That's scary.
gessha•3mo ago
That or they mask their activity with layers of management and vague and abstract products.
saagarjha•3mo ago
Maybe that was just a phase of your interview.
neilv•3mo ago
I figured security researchers were always targets of multiple APT actors and random individuals. However...

> I've even caught them using their exploits on me after they made me an offer

Not only for exploit companies that eat their own dog food, nor only cybersecurity jobs, but I've heard of this happening to people interviewing for other tech area considered strategic.

The noticed ones weren't that subtle, and were presumably noticed because the attacker wasn't using the best methods, but maybe more routine SOP for lower-value targets.

I have no idea what the actors and motivations actually were. Speculation:

* the hiring company or its country, vetting the candidate by spying on them, including for corporate/national counterintelligence reasons (it's really not much different than a lot of the sneaky surveillance capitalism vetting that many companies quietly do, just unambiguously illegal in this case);

* the hiring company, spying to monitor the competitive offer situation (e.g., what counteroffers or concerns does the candidate have);

* other state, individual, and possibly corporate actors, for whom the imminent offer flagged the target as worth keeping an eye on (for, e.g., advance access to research they do individually, knowledge of attacks they do individually, possible technical entry point to the job-offering organization or others, or kompromat for getting access/actions); or

* random associated individuals acting on their own, recreationally enjoying the power over others that their cracking toys give them (which at least used to be not too uncommon, before cybersecurity was professionalized, when there were proportionally much more teens and alienated people, and they hadn't yet been told about color-coded hats for prefabricated codes of behavior from which they could choose; now, most people with skillz have the carrot of a lucrative job or respected status as researcher that they can pursue, instead of seeking power/status other ways and without guidelines).

Personally, I try not to work on strategic target areas, since I like to save my very limited guts for fighting product concepts and reliable systems into shape, not for being helplessly violated by lawless authoritarian institutions. Good luck.

jokoon•3mo ago
This is why I don't want to work in cybersecurity

This is too dangerous, it's the wild west

hopelite•3mo ago
Forget blackmail, people wildly overestimate the value of blackmail. Far more predictable and lucrative is just to use exploits for insider information, including as favors and bribes, and selling them to governments willing to pay immense amounts of money. Blackmail is far too messy. Grease works way better.
throwaway48476•3mo ago
Plata o plomo. Usually a combination of threats and bribery is most effective. The truly dangerous groups usually have the ability and willingness to pay well.
hopelite•3mo ago
Sorry, that’s just not how it is practices and at least has not for a long time. You’ve heard the saying, you catch more flies with honey than vinegar, right. If you have unlimited funds and you are the giver and bringer and provider, there is no need for blackmail. It’s just the nuclear option, so to say.

At the political level things don’t operate like some cartel, sort of certain places and certain rather narrow regions of the world where it may take some additional motivating to do the right thing for themselves.

throwaway48476•3mo ago
"It's the implication"
octoberfranklin•3mo ago
Forget blackmail

Tell that to Epstein.

hopelite•3mo ago
Ironically that actually applies to him too. Sure, he likely had all kinds of stuff on people, but frankly bribery still always works far more effectively unless you encounter some resistance. It’s a rather established practice. The “blackmail” material is really just an insurance, not actual leverage.
yachad•3mo ago
Live by the sword, die by the sword.
antonymoose•3mo ago
If an engineer at Ford dies in a car crash does he really deserve it?

We live in a world full of threat-actors. We need exploits just like we need firearms and tanks and fighters and jets.

To mock the guy is just naive.

kuhsaft•3mo ago
An engineer at Ford isn’t developing cars that actively harms passengers.

If you develop weapons, physical or digital, don’t be surprised if you end up on the receiving end.

just_steve_h•3mo ago
Well, they’re certainly developing cars that kill and maim pedestrians, disperse clouds of microplastics, and contribute excess CO2 to our atmosphere…
kuhsaft•3mo ago
Right. I was talking about passenger safety. But sure, if you purposefully designed a vehicle that has poor pedestrian visibility and end up getting hit by that same vehicle due to that poor visibility, you shouldn't be surprised.
moritzwarhier•3mo ago
I agree that car analogies should be taken seriously.

Sure, cars are useful. But aiming to sell as many cars as possible is no more ethical than selling as many yachts as you can, especially if it involves making the living conditions worse for anyone who doesn't own a yacht, for example by bribing politicians, or destroying non-yacht-capable waterways.

at-fates-hands•3mo ago
> An engineer at Ford isn’t developing cars that actively harms passengers.

Maybe not at Ford?

https://www.popsci.com/technology/tesla-lock-issue/

Firefighters recently resorted to breaking a Tesla’s window to free a 20-month-old child locked inside after one of the vehicle’s batteries died. The emergency rescue is the second of such incidents reported on this week by Arizona CBS news affiliate KPHO and reiterates the potential dangers of the EV company’s ongoing, under-addressed battery issues in extreme heat.

In July 2023, a 73-year-old man was reportedly forced to kick out a window in his Model Y after becoming trapped. A similar emergency occurred for a mother and her daughter in Illinois a few weeks later after renting a Tesla, while a California driver last month claimed she found herself stuck in her EV while waiting on an over-the-air software update that shut down her car. In the 40 minutes it took to complete the update, outside temperatures rose to 115-degrees Fahrenheit.

And yeah, if you know how, and can go through multiple steps: The only other workaround to battery issues appears to be a step-by-step solution in the owner’s manual that only opens a dead Tesla’s front hood by ostensibly hotwiring the car using external jumper cables. If this is the case, then people who find themselves locked out of their EV may need to continue relying on EMS—and their axes—until Tesla decides to address the glaring safety hazard.

xenophonf•3mo ago
In the cases of the adults stuck inside the cars, aren't there mechanical unlocking handles inside Teslas?
lawlessone•3mo ago
Not the best analogy, more like a man who develops car mounted harpoons being hit by a car mounted harpoon.
tptacek•3mo ago
I know people involved at Trenchant and have trouble believing that anybody who worked there was shocked by this threat. Maybe things have changed post-L3Harris but "it" (it's more than one company) was an incredibly paranoid IT shop prior to the acquisition.
commandersaki•3mo ago
I read this article with a healthy amount of scepticism and read two separate stories:

1. This guy was targeted by spyware.

2. This guy was an iOS 0-day exploit developer and is involved with a bit of drama with his previous employer.

Everyone seems eager (including himself) on connecting the two, but why would the ex-employer go after him using illegal methods when they've agreed to a settlement and termination? Unless there's more to the story (which I strongly doubt) it seems to be combined mix of legitimate but misplaced paranoia and lashing out.

r_lee•3mo ago
This guy is pretty naive if he thinks they (or their biggest customers) won't verify whether he really was leaking something or not if they've got the tools to do that lol and to maybe send a message to not think about it
CaptainOfCoit•3mo ago
> Gibson .. may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.

> But the ex-Trenchant employee may not be the only exploit developer targeted with spyware .. there have been other spyware and exploit developers in the last few months

eimrine•3mo ago
I would like to see the screenshot or the photo of display with that kind of alert.
runjake•3mo ago
Here's what it looks like: https://c.ndtvimg.com/2024-04/30p8264g_apple-notification_62...
veeti•3mo ago
> Apple detected a targeted mercenary spyware attack against your iPhone

Not going to lie, this subject line would fit right in with the phishing messages and 419 scams in my Spam folder.

internetter•3mo ago
Indeed, however the notification also comes via iMessage and appears at the top of your Apple account, plus contains no external links
aspenmayer•3mo ago
I wouldn’t be surprised if Apple’s malware notification comes via the same or similar mechanism as Apple 2FA codes on iOS, as iMessage itself is a common vector for these kinds of malware being warned of, such as Pegasus. Apple also notifies you of this kind of malware via the email used for your AppleID, in addition to on-device, though I wouldn’t be surprised if that same malware would attempt to monitor for these messages from Apple to prevent them from being received and/or read.

The Apple Support app, for example, has capabilities which when triggered from the Apple side, allow screen-sharing and logging to be shared with Apple. I don’t know if this functionality relies on iMessage being enabled either, but I do know that the Apple Support app seemingly still works in Lockdown Mode.

I’d be curious if the person in TFA had their device in Lockdown Mode, which supposedly is supposed to make these kinds of exploits harder to install. If they were using Lockdown Mode, and they still got exploited, that isn’t great news for the rest of us, but the fact that Apple notified them is better than the alternative of Apple not being aware of the breach and/or Apple being aware and not notifying them for reasons.

hsbauauvhabzb•3mo ago
An email? If they can breach your phone, surely email is the least trustworthy mechanism you can use - it’s high latency, shared across systems, etc

A better mechanism would surely be a push notification to the device, or one of the alert-based notifications used for earthquakes etc

saagarjha•3mo ago
A push notification that you receive…on the phone? There isn’t really a good solution here.
aspenmayer•3mo ago
Apple has the capability to remotely disable iPhones, which has been used when large numbers of iPhones were looted during riots in the US. I’m not sure if that capability relies on the devices not already being activated or not, but I’ve seen credible screenshots of the message when iPhones are so disabled.

If I got a message in my iPhone saying it had been remotely disabled, I would take it to an Apple Store or authorized Apple Service Center, where they could tell me what should happen next. This would be inconvenient, to be sure, but it would be preferable to continuing to use the device.

hsbauauvhabzb•3mo ago
Well, it blocked the exploit. If the adversary knows the exploits blocked, their cover is burnt. What do they do?

push notification + out of band comms would be more ideal, time sensitivity is significantly important.

ajross•3mo ago
This framing seems weird:

> Two days after receiving the Apple threat notification, Gibson contacted a forensic expert with extensive experience investigating spyware attacks.

Surely as a professional "exploit developer", Gibson himself should have been about as expert at this particular niche as any human being on the planet already.

I mean, sure, absolutely he should have called in his friends in the community and gotten more eyes on the device. But the way that's written it sounds like he took it into the local Genius Bar.

It also, in context, feels a little obfuscatory. Like he's trying to flag the involvement of senior folks who he can't name.

tptacek•3mo ago
I agree it reads weird, but I am leaving room for the idea that there are a lot of very gifted people who work on this stuff as an intellectual challenge, have a sort of straight up systemsy computer science background, and don't have or care about a bigger picture of where they fit into the industry. But still: the companies that became Trenchant were notoriously paranoid about state-sponsored CNE threats! It would still be weird to be surprised by them.
felsokning•3mo ago
I think you're conflating two precepts. Just because you can write an exploit, it doesn't - inherently - mean that you have the skills/knowledge/tools of where to look for all signs of exploit having occurred on your device(s).

From the inference of that logic, every developer should be able to use gdb or Windbg to ascertain where they shot themselves in the foot - but we know that this specific set of skills isn't inherently required to be a developer.

So, the same logic would be true here: Just because you can write a hand full of exploits, it doesn't inherently mean that you have the tools/know-how to be able to ascertain if any of all of the available exploits in the wild (or in private, re: tools for Trenchat) have been used on your phone.

Edit: gbd != gdb

ajross•3mo ago
You're arguing at the wrong side of the problem. Obviously yes, everyone can't be a perfect expert on everything and when doing anything complicated you should ask for help. Duh, as it were. I think I even said as much.

The point was at this level of expertise and size of market ("detection of iOS zero day rootkits"), there simply isn't a pool of "experts" you can draw on to do this a-la contract work. It's a tiny world and everyone is fumbling around and asking for help independently. And as a member of that tiny world, Gibson surely knew who he needed to call already.

But that's not the way the article framed the interaction, which implies to me that there's more context at work here.

2OEH8eoCRo0•3mo ago
Why is it not computer crime? It wasn't done by the govt, they suspect it was done clandestinely by Trenchant.

Sue them!

kuhsaft•3mo ago
There's still no proof that it was Trenchant, and there was no evidence on the device. It's unlikely that it will ever be identified as an attack from Trenchant. Trenchant/L3Harris is a supplier for Five Eyes, and any attribution of their exploits will likely be concealed.
ta1243•3mo ago
Normally with crime we arrest people. Half the problems in the world seem to stem from the fact companies are unaccountable.
stego-tech•3mo ago
I can kinda sympathize with the guy, as I got fucked over in Defense contracting in a not-dissimilar fashion a lifetime ago. These companies reel you in with decently-sized (or even outrageously-large) pay packages and promises of doing “good work”, bleed you of your energy and time for their profits, then shove you out the door and blame you for anything that went wrong (especially if you try to act honestly and report wrongdoing - that’s a one-way ticket out the fucking door and into blackball territory).

Nobody should be doing work for these scumbags, but people will always fall for their spiels and grifts, unfortunately, out of some naive sense of “doing good” or “getting the bad guys”. It’s always just “leopards ate my face”, though.

spelk•3mo ago
Enlist and get your top secret clearance managing LANs and teaching officers how to add images into PowerPoints, they said. You’ll never be unemployed. Then you realize the “job” mostly involves being a disposable cog in some ex-colonel’s endless PowerPoint war. Every meeting feels like a high-stakes reenactment of “Yes, sir,” where accountability is optional and speaking up is career suicide. Billion-dollar mistakes are brushed off as “lessons learned,” while you get a lecture about integrity. It’s the world’s most expensive game of “the emperor has no clothes,” except everyone’s wearing lanyards and classified guilt.
midtake•3mo ago
I'm more interested in how Apple makes this determination than I am about the drama between this dev and his former employer.
rekttrader•3mo ago
His former employer sandbox over wifi or use stingray like devices. Apple can see that this went over the public iMessage/PushNotification channels.
flux3125•3mo ago
>“I was panicking,” Jay Gibson, who asked that we don’t use his real name over fears of retaliation, told TechCrunch.

I lol'd for a second imagining this is his actual name but the writer didn't realise it

jokoon•3mo ago
This is why I don't want to work in cybersecurity

This is too dangerous, it's the wild west

justinclift•3mo ago
So basically it was probably someone in his chain of command leaking the Chrome exploits, and this guy was the scapegoat used to cover that up for now.

Though the whole thing sounds more made up than legit.

kstrauser•3mo ago
I had to read "Apple alerts exploit developer" several times to understand what it meant.

First read: "Apple's alerts somehow exploit a developer".

nth read: "Apple's alerts tell a developer of exploits that..."

seba_dos1•3mo ago
So Apple told them of exploits? :)
rekttrader•3mo ago
As a former researcher in this space, anyone who develops commercial exploits knows what they are doing and that their work if they happen to be in the US is subject to ITAR level restrictions.

I stopped when it became a game at that level. I refuse to be a government contractor…. It’s about not using software like this to kill people like Jamal Khashoggi.

F the dipshits at NSO and the turds at Corellium.