frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Toto forever: Africa to play 'for all eternity' in Namib desert (2019)

https://www.theguardian.com/world/2019/jan/15/toto-africa-desert-installation-play-for-all-eternity
2•doener•2m ago•0 comments

I build an ultra minimal Android launcher

https://github.com/coolvegan/ultra-minimal-launcher
1•evlute•3m ago•1 comments

EPA Rule Would Drastically Curb Protections for Wetlands

https://www.nytimes.com/2025/11/17/climate/epa-curbs-protections-for-wetlands.html
1•JumpCrisscross•3m ago•0 comments

Make any database NLP Queryable

1•edihasaj•4m ago•0 comments

ParallelKittens: Simple and Fast Multi-GPU AI Kernels

https://hazyresearch.stanford.edu/blog/2025-11-17-pk
2•pella•7m ago•0 comments

I built a music visualizer (10 visualizers) with record mode and 6 modifier keys

https://www.ProVisHD.com
1•tudormol•8m ago•1 comments

China's 'army of humanoid robots' – viral video of mass delivery sparks fears

https://www.notebookcheck.net/China-s-army-of-humanoid-robots-viral-video-of-mass-delivery-sparks...
2•fcpguru•11m ago•0 comments

Broom Grandpa still sweeping at 98

https://www.taipeitimes.com/News/taiwan/archives/2025/09/06/2003843333
1•mooreds•12m ago•0 comments

The man who held his breath for 24 minutes

https://www.outsideonline.com/outdoor-adventure/water-activities/budimir-sobat-breath-hold/
1•bookofjoe•13m ago•0 comments

Principles of Instruction [pdf]

https://www.aft.org/sites/default/files/Rosenshine.pdf
1•harperlee•13m ago•0 comments

Anbernic RG DS dual-screen handheld launches for under $100

https://liliputing.com/anbernic-rg-ds-dual-screen-handheld-launches-for-under-100/
1•PaulHoule•13m ago•0 comments

Los Angeles limits rent hikes in historic vote

https://www.politico.com/news/2025/11/12/los-angeles-limits-rent-hikes-in-historic-vote-00649997
3•mhb•14m ago•0 comments

Nomor Layanan Telepon Tokopedia

1•smrincare•14m ago•0 comments

Email Security: Where We Are and What the Future Holds

https://www.privacyguides.org/articles/2025/11/15/email-security/
2•agrmohit•16m ago•0 comments

Lovable Is Down

https://status.lovable.dev
1•nikasakana•16m ago•3 comments

Show HN: PrinceJS – 19,200 req/s Bun framework in 2.8 kB (built by a 13yo)

https://princejs.vercel.app
2•lilprince1218•16m ago•0 comments

I built a library that follows Cloudfare's CodeMode implentation

https://github.com/universal-tool-calling-protocol/code-mode
1•juanviera23•18m ago•0 comments

HDD-based disks at AWS are worser than at GCP

https://twitter.com/valyala/status/1990475098583629847
3•valyala•18m ago•0 comments

Everyday Clean Air

https://www.jefftk.com/p/everyday-clean-air
1•mhb•18m ago•0 comments

Show HN: SynthonGPT – Drug Discovery LLM with 0% Hallucinations

https://synthongpt.mireklzicar.com/
2•mireklzicar•19m ago•0 comments

Most of the Dark Web is Fake [video]

https://www.youtube.com/watch?v=_KzObeom88Y
1•fortran77•21m ago•0 comments

Donald Trump privately invested in companies that benefit from his policies [pdf]

https://extapps2.oge.gov/201/Presiden.nsf/PAS+Index/4EC9A8E6DD078F2985258CA9002C9377/$FILE/Trump%...
4•doener•23m ago•2 comments

6 years after too much crypto

https://bfswa.substack.com/p/6-years-after-too-much-crypto
2•oconnor663•24m ago•0 comments

Apple Unveils iOS 26.2 Beta 3 with Enhanced Features

https://techlife.blog/posts/apple-releases-ios-26-2-beta-3-for-iphone/
2•clarkmaxwell•25m ago•0 comments

Global internet freedom declined for the 15th consecutive year

https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet
2•pseudolus•27m ago•0 comments

China proposes 5-second 0-100 km/h acceleration limit on vehicles

https://carnewschina.com/2025/11/13/china-proposes-5-second-0-100-km-h-acceleration-limit-on-vehi...
4•doener•27m ago•0 comments

Bangladesh's ousted PM Sheikh Hasina sentenced to death for protest crackdown

https://www.npr.org/2025/11/17/g-s1-98112/bangladesh-sheikh-hasina-verdict
2•donsupreme•28m ago•0 comments

Jeff Bezos takes co-CEO role at secretive AI startup Project Prometheus

https://www.geekwire.com/2025/jeff-bezos-takes-co-ceo-role-at-secretive-ai-startup-project-promet...
2•johanam•30m ago•1 comments

Building Startups

1•Zachabdelilah•30m ago•0 comments

Private Markets Are the New Securities Fraud

https://www.bloomberg.com/opinion/newsletters/2025-11-17/private-markets-are-the-new-securities-f...
3•ioblomov•32m ago•1 comments
Open in hackernews

Azure hit by 15 Tbps DDoS attack using 500k IP addresses

https://techcommunity.microsoft.com/blog/azureinfrastructureblog/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack/4470422
75•speckx•2h ago
https://www.bleepingcomputer.com/news/microsoft/microsoft-ai...

Comments

ChrisArchitect•1h ago
Source: https://techcommunity.microsoft.com/blog/azureinfrastructure...
dang•1h ago
Switched above. Thanks!
shoddydoordesk•35m ago
FWIW I think this is a bad practice.

The Microsoft article reads like a corporate press release. The original link contained additional pertinent information and research which is good for discussion.

TZubiri•1h ago
We should make residential proxies illegal
teeray•1h ago
...and suddenly no one is allowed to VPN back through their home router.
dongttebayo•1h ago
We really shouldn’t - this seems like perhaps one of the worst ideas one could propose in an era of rising authoritarian rule. Seems like a bad time to be putting silly restrictions on how folks route their traffic.
derwiki•39m ago
Tinfoil hat says it’s the gov’t doing it for those reasons /s
meowface•34m ago
I will disregard your cowardly "/s" and say: no, I bet it isn't.
TZubiri•11m ago
ok greenie
jeroenhd•35m ago
Making them illegal seems far-fetched, but at this point something like email blacklists but for web services is becoming inevitable.

At the moment, that's what Cloudflare is doing. They're just not obvious enough, leading to people on forums (and here) asking "why do I constantly need to fill out captchas to enter websites".

kachapopopow•15m ago
breaking the law by using wireguard to access my home network, hmm, great idea.
TZubiri•8m ago
Ok, I'll be a bit more specific, banning businesses and the trade of proxies that are purposefully marked as residential, in order to evade firewall blocks, and even to evade proxy blocks.

You gotta draw the line in the sand somewhere, VPNs are already morally dubious, but if you ban the most shady of VPNs, residential proxies, then you can at least guarantee service providers the right to deny service to proxy users, while allowing proxy users to use the proxy everwhere they are welcome in.

drcongo•1h ago
Imagine how much of that traffic was just the bots following the endless redirects.
siva7•1h ago
Those redirects would crash Azure, i'm betting a grand
dang•1h ago
Related. Others?

Cloudflare scrubs Aisuru botnet from top domains list - https://news.ycombinator.com/item?id=45857836 - Nov 2025 (34 comments)

Aisuru botnet shifts from DDoS to residential proxies - https://news.ycombinator.com/item?id=45741357 - Oct 2025 (59 comments)

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS - https://news.ycombinator.com/item?id=45574393 - Oct 2025 (142 comments)

alpb•1h ago
Funny enough just got an error trying to reach to the blog

        Proxy Error
        The proxy server received an invalid response from an upstream server.
        The proxy server could not handle the request
        Reason: Error reading from remote server
bluedino•59m ago
IoT is just wave after wave of unsecure devices. There's gotta be a better way.
rdtsc•48m ago
The "S" in IoT stands for "security".
heresie-dabord•26m ago
> There's gotta be a better way.

Until then... There's gonna be a bigger wave.

kachapopopow•19m ago
fun fact, part of the reason this botnet exists is because europe required the ability to install security updates unattended that you cannot disable and they compromised one of the servers that had the capability to push these updates compromising hundreds of thousands of routers.
esafak•57m ago
Is this Aisuru growing? How can it be dismantled?
SLWW•46m ago
Yes.

Only way is to secure your IoT devices/routers/cameras/etc.

esafak•25m ago
You mean through personal responsibility? That is not scalable; look at how many compromised devices there are. We need a better solution as an industry.
rollcat•8m ago
Yep. Manufacturers / distributors should be held responsible. Aligning the incentives is half the battle.
dainiusse•42m ago
/sarcasm Another ai crawler...
m00x•37m ago
Anthropic agent went a little haywire on the tool use
supportengineer•39m ago
I will never understand why there isn’t an international law enforcement agency with teeth, which can get rid of the bad actors.
trollbridge•38m ago
I mean, America can’t do anything about scam phone calls aimed at seniors who forge caller ID of local hospitals.
morkalork•37m ago
Can't or won't?
m00x•37m ago
How would you even enforce this if the offending country doesn't agree?
dijit•36m ago
Limit their upstream connection to the rest of the internet via allied countries.

Literally the same as economic sanctions. The internet is a network of peers “trading” bits and bytes after all.

m00x•25m ago
This won't do anything. The attacks are not from the offending countries they're from botnets of compromised devices.

North Korea doesn't care if you limit their internet they already allow people to go outside their own.

dijit•16m ago
perfect, then we just nullroute at source with Flowspec, even if we change the goalposts a thousand times in this thread there does exist a technical solution to this problem.

Just not enough economic or political incentive to pay for it.

immibis•15m ago
America already limits its upstream to China and Russia through a private companies such as Cloudflare and Spamhaus. It's often the case that for Chinese users seeking to escape censorship, once they've worked their way through the Chinese Great Firewall, they find themselves in front of the American one.
morkalork•37m ago
I'm sure you could come up with at least few ideas why it hasn't happened
Hikikomori•36m ago
America gonna allow someone else to regulate them?
Thaxll•35m ago
Because it's not technicaly possible, I mean we're on HN, we all know how internet works.
dijit•32m ago
You should talk to a network engineer before making claims like this. There are mechanisms to curtail DDOS attacks at origin.

For a few reasons (political, economical) there’s little will to enact them, these attacks are so few and far between and you can pay your way out of them in most cases, so the incentives aren’t there for ISPs (whom are a commodity judged primarily on price and bandwidth)

m00x•24m ago
How exactly would you keep the origin from sending a command to a botnet?
dijit•17m ago
you don’t stop the message to the botnet, thats impossible:

You detect the behaviour downstream and send a signal to the ISP that there is traffic that needs to he rate limited.

One mechanism for this is called RTBH (Remote Triggered BlackHole) which relies on community tagged prefixes of addresses exceeding rate limited to be blackholed from forwarding traffic further in to the internet.

There’s also things like flowspec but a lot of things rely on proper trust between ASNs.

SirMaster•18m ago
I heard it's a series of tubes.
Y_Y•34m ago
The international organisation for stopping wars, human trafficking, money laundering, drug distribution etc. however capable they might be, haven't managed to stamp out any of those things.

I'd say a putative UN NetWatch would suffer from the same issues of funding and corruption and politics, but still we might have something better than this wild west lawlessness.

halapro•22m ago
> have something better than this wild west lawlessness.

Careful what you wish for. Before you know it you can't have an IP without your ID.

immibis•17m ago
This is already the case in Germany and many other countries. Same for phone numbers. On the other hand, I get no spam calls, and I can't access the sites on https://cuiiliste.de/domains - censorship is amazing.
c0balt•19m ago
> putative UN NetWatch

But who will suppress attempts to go beyond the blackwall then?

sva_•32m ago
Since this is a distributed attack, I'm not really sure how that enforcement would look like? Am I missing something, are all these bots/zombies easily selectable and blockable?
toast0•15m ago
Investigative powers should be able to at least find and seize the command and control servers, and hopefully track down people operating the command and control servers.

Some sort of international clearing house for ISPs to help identify and sequester compromised customers might be nice, too; but that doesn't need law enforcement powers; and maybe it already exists?

poszlem•29m ago
Perhaps because, in many cases, the very governments responsible for enforcing it include the bad actors themselves.
Aurornis•18m ago
International DDoS busts and arrests do happen all the time.

Law enforcement takes time. The perpetrators of these attacks aren't hanging out in the open with their full names shielded only by the hope that their country won't extradite for political favor.

By the time the perpetrators are identified and a case is built, getting them charged isn't bottlenecked on the lack of an international agency. Any international law enforcement agency would be beholden to each country's own political wills and ideals, meaning any "teeth" they had would be no more effective than what we currenly have for extraditing people or cooperating with foreign police organizations.

kachapopopow•11m ago
the real reason why these are a problem in the first place is because of cgnat and transit providers not implementing flowspec.

but these bad actors are not possible to track down in the first place since internet is unfortunately decentralized and things as simple as transactions submitted to bitcoin or etherium blockchain can be used as c&c

shoddydoordesk•38m ago
> it suddenly ballooned in size in April 2025 after its operators breached a TotoLink router firmware update server and infected approximately 100,000 devices

This is scary. Everyone lauds open source projects like OpenWRT but... who is watching their servers?

I imagine you can't run an army of security people on donations and a shoestring budget. Does OpenWRT use digital signing to mitigate this?

sam_lowry_•31m ago
This is exactly why OpenWRT has no unattended updates by default )
shoddydoordesk•26m ago
You are dismissing the seriousness of this. Their package manager is widely used. One would only need to compromise their build servers to wreak havoc.

Didn't they have a vulnerability in their firmware download tool like a minute ago?

The difference between OpenWRT and Linux distros is the amount of testing and visibility. OpenWRT is loaded on to residential devices and forgotten about, it doesn't have professional sysadmins babysitting it 24/7.

Remember the xz backdoor was only discovered because some autist at Microsoft noticed a microsecond difference in performance testing.

jacobgkau•20m ago
I'm confused why you're so honed in on OpenWRT as a third-party open-source project here when the vulnerability you quoted (TotoLink) was the official firmware update server of a brand of devices.

Is it "scary" to think about OpenWRT potentially getting hacked? If you get scared by theoretical possibilities in software, sure. Is it relevant? Not exactly. Are companies' official servers more secure than an open-source project's servers? In this case, apparently not.

whatshisface•29m ago
As always, hundreds watch the open repositories, maybe one watches a company's build servers, if they're lucky. :-)
TylerE•19m ago
Hundreds watch, but how closely?

Plenty of stories of fairly major projects having evil commits snuck in that remain for months.

immibis•17m ago
This is why OpenWRT will soon be declared illegal. See the Cyber Resilience Act.
tempest_•16m ago
I don't follow.

> run an army of security people

Do you think these private companies do this? They don't. They pay as little as humanly possible to cover their ass.

Botnets comprised of compromised routers is common and commercial/consumer routers are a far juicer target than openwrt.

nine_k•8m ago
Why, OpenWRT firmware and packages are both signed, of course. You can manually and independently check the image signature before flashing an update.

The build infrastructure is, of course, a juicy target: infect the artifact after building but before signing, and pwn millions of boxes before this is detected.

This is why bit-perfect reproducible builds are so important. OpenWRT in particular have that: https://openwrt.org/docs/guide-developer/security#reproducib...

null_deref•36m ago
I don’t mean to cast any doubt, but are those short articles the standard, or why was there almost no data provided?
sva_•35m ago
I feel like posting the traffic output of the network might not be a great idea because they might do these attacks on purpose to market their network's capability.
kachapopopow•20m ago
it's an open secret at that point and the attacks are far larger than that are causing congestion world-wide from the time they wake up to the time they go to sleep.
Y_Y•30m ago
Cui bono?

There is a big (opportunity) cost to this kind of thing, How is this worthwhile for anyone? I assume that its's not just a competitor. Is it really worth <insert evil country>'s time to temporarily upset one of of three big cloud providers? Is there a ransom behind the scenes?

kachapopopow•22m ago
nope, there's really no cost to it - they've been hitting with attacks double or even triple the size towards random minecraft hosts for months now.
imglorp•28m ago
> it targeted a single endpoint in Australia.

It would really help to understand why attack one endpoint with "the largest DDoS attack ever observed in the cloud". If it was important, it would be redundant in its CDN. Who paid for this attack and what did they gain?

kachapopopow•24m ago
we were getting hit with attacks like this daily at some point and were forced to use cloudflare magic transit it's pretty random and you shouldn't read too deep into it as nearly every anti-ddos solution, host and isp has been hit with this botnet by now.
estearum•22m ago
but why? For fun?
kachapopopow•17m ago
yep, there's no consistency to their actions - basically hit a target and keep it down for as long as possible causing heavy business loss. to my knowledge none of the target servers have ever received a ransom request.
toast0•7m ago
I used to run servers for a very popular service. I'm 99% sure people DDoSed our www for lolz and also to kick the tires on DDoS as a service vendors. We would get DDoS on a pretty regular basis, for exactly 90 seconds, +/- a few nodes that had bad clock sync and were 2 seconds off; which was exactly what you get from a free trial at DDoS as a service. I feel like we got a ransom request like once; but I can't remember if it actually corresponded to an attack, if it did, I don't think it was consequential.

Thankfully, it was almost always targetted at our www servers, which were not important for our service. Very occasionally, we'd get hit on the machines that we actually ran our service on, but between the consistent DDoS on www, and our own self-inflicted DDoS from defects in the client code we wrote for our users, our service was well prepared... if the DDoS went over line rate for the server, our hosting provider would null route it [1], but otherwise, we could manage line rate of udp reflection or tcp syn floods and what have you. From what I could tell, most attackers didn't retarget to our other servers when one got null routed.

[1] They did try a DDoS scrubbing service, but having our servers behind the scrubber was way worse than just null routing. Maybe the scrubbing could have been tuned, but as it was, it was better for us to just have the attacked servers lose connectivity to the public network.

perfmode•27m ago
A DDoS attack is often used to distract a company's security team. While the security staff is scrambling to get the website back online, the attackers use the chaos to conduct a more serious, stealthy attack.