frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Mark Zuckerberg set to take the stand at landmark trial

https://abcnews.com/Business/mark-zuckerberg-set-stand-landmark-trial-social-media/story?id=13024...
1•1vuio0pswjnm7•30s ago•0 comments

Show HN: A public map of startups worldwide (anyone can add theirs)

https://welovestartups.com
1•zacharykapank•31s ago•0 comments

Daily nightmare descends on Tesla charging lot in San Francisco

https://www.sfgate.com/local/article/tesla-supercharger-lot-lombard-street-21359085.php
1•starkparker•41s ago•0 comments

Current – New RSS Reader

https://www.terrygodier.com/current
1•wrxd•1m ago•0 comments

Mark Zuckerberg testifies at social media addiction trial

https://www.cbsnews.com/news/mark-zuckerberg-testifies-meta-social-media-addiction-trial/
1•1vuio0pswjnm7•1m ago•0 comments

Paperclip Reforged – A from-scratch remake of Universal Paperclips

https://paperclip.aayush.art/
1•aayush9029•3m ago•0 comments

Constructing Unlearnable Data with Solely Linear Classifiers

https://arxiv.org/abs/2601.19967
1•PaulHoule•3m ago•0 comments

Mark Zuckerberg testifies at landmark social media addiction trial

https://www.nbcnews.com/tech/tech-news/mark-zuckerberg-testifies-landmark-social-media-addiction-...
3•1vuio0pswjnm7•3m ago•0 comments

Luxury hotel scammer booked rooms for a cent, altered payment validation system

https://www.bbc.com/news/articles/c0q3nwdk315o
1•embedding-shape•3m ago•0 comments

Ask HN: Are Snaps (Cannnonical) worth it?

1•the_stocker•4m ago•0 comments

Show HN: CasperAI – A local MCP server for cross-platform engineering context

https://github.com/chose166/CasperAI
1•chose166•4m ago•0 comments

Show HN: Kindred – Find people interested in what you're building

https://kindred-frontend.onrender.com
1•uriva•4m ago•0 comments

Show HN: Agent Democracy Protocol – AI agents that vote and pool resources

https://aeoess.com/protocol.html
1•Tima_fey•5m ago•0 comments

ArXiv paper –> visually appealing video explanations

https://www.arxivisual.org/
1•aanet•5m ago•0 comments

Claude Briefly Experiences Outage as Users Report Chat Issues

https://ariatatrezvalthazar.blogspot.com/2026/02/claude-briefly-experiences-outage-as.html
1•Traumen•5m ago•0 comments

How to Ace a Job Interview with an AI

https://www.wsj.com/tech/ai/job-interview-tips-ai-a3be8593
1•bookofjoe•6m ago•1 comments

A roadmap for evaluating moral competence in large language models

https://www.nature.com/articles/s41586-025-10021-1
1•xnx•6m ago•0 comments

Show HN: Fory C++ Serialization – Polymorphism, Circular Refs, 12x vs. Protobuf

https://fory.apache.org/blog/fory_cpp_blazing_fast_serialization_framework/
2•chaokunyang•6m ago•0 comments

A Global Web of Chinese Propaganda Leads to a U.S. Tech Mogul (2023)

https://www.nytimes.com/2023/08/05/world/europe/neville-roy-singham-china-propaganda.html
1•gradus_ad•6m ago•0 comments

Zero Agent Gate: Agent-to-Service Auth That Keeps Secrets Out of the LLM

https://shivekkhurana.com/blog/zag/
1•shivekkhurana•7m ago•0 comments

Vault (organelle)

https://en.wikipedia.org/wiki/Vault_(organelle)
2•CGMthrowaway•7m ago•0 comments

Open Source Book: Let Erlang Crash

https://cloudstreet-dev.github.io/Let-Erlang-Crash/
1•DavidCanHelp•8m ago•0 comments

I'm Building OpenClaw Skills for Nonprofit RBM Logic Models

1•vassilbek•10m ago•0 comments

Solving Systems of Equations Faster

https://entropicthoughts.com/solving-systems-of-equations-faster
2•surprisetalk•11m ago•0 comments

Beyond AlphaFold

https://ifp.org/nlm/
1•surprisetalk•12m ago•0 comments

Arizona Bill Requires Age Verification for All Apps

https://reclaimthenet.org/arizona-bill-would-require-id-checks-to-use-a-weather-app
4•bilsbie•13m ago•0 comments

Show HN: Agent Paperclip: A Desktop "Clippy" That Monitors Claude Code/Codex

https://github.com/fredruss/agent-paperclip
2•fredrussias•13m ago•0 comments

Reader blind test 2026: The community sees DLSS 4.5 clearly ahead of FSR/Native

https://www.computerbase.de/artikel/grafikkarten/nativ-vs-dlss-4-5-vs-fsr-upscaling-ai-leser-blin...
2•wmf•13m ago•0 comments

What Leadership Looks Like in an Agentic AI World

https://www.library.hbs.edu/working-knowledge/what-leadership-looks-like-in-an-agentic-ai-world
1•nadis•13m ago•0 comments

No Consent Required: A Minimal Data Privacy Policy

https://launchdayadvisors.com/blog/no-consent-required/
2•weldone00•14m ago•1 comments
Open in hackernews

Zero-day CSS: CVE-2026-2441 exists in the wild

https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
93•idoxer•1h ago

Comments

tripplyons•1h ago
"Use after free in CSS" is a funny description to see.
w4yai•28m ago
Why ?
8-prime•23m ago
To me at least it reads funny because when I think of CSS I think of the language itself and not the accompanying tools that are then running the CSS.

Saying "Markdown has a CVE" would sound equally off. I'm aware that its not actually CSS having the vulnerability but when simplified that's what it sounds like.

maxloh•15m ago
I think they meant something like the CSS parser, or the CSS Object Model (CSSOM).
mpeg•1h ago
"Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera."

That's pretty bad! I wonder what kind of bounty went to the researcher.

waynesonfire•59m ago
"Actually, you forgot Brave."
mpeg•57m ago
I quoted directly from NIST, there's many other browsers and non-browsers that use chromium
waynesonfire•42m ago
It was intended as a joke reference to the 2004 Kerry / Bush debate. It's not a coincidence that Google would leave off an ad-blocking variant of Chrome.
order-matters•11m ago
they listed the top 3 most popular chromium browsers, covering 90%+ of chromium users
bicepjai•57m ago
So basically Firefox is not affected ?
jsheard•54m ago
Firefox and Safari are fine in this case, yeah.
DetroitThrow•50m ago
It's pretty hard to have an accidental a use after free in the FireFox CSS engine because it is mostly safe Rust. It's possible, but very unlikely.
topspin•9m ago
That came to my mind as well. CSS was one of the earliest major applications of Rust in FireFox. I believe it was that work that spawned "Fearless Concurrency."
hdgvhicv•8m ago
The listed browsers are basically skins on top of the same chromium base.

It’s why Firefox and Safari as so important despite HN’a wish they’d go away.

duozerk•41m ago
> That's pretty bad! I wonder what kind of bounty went to the researcher.

I'd be surprised if it's above 20K$.

Bug bounties rewards are usually criminally low; doubly so when you consider the efforts usually involved in not only finding serious vulns, but demonstrating a reliable way to exploit them.

salviati•29m ago
I think a big part of "criminally low" is that you'll make much more money selling it on the black market than getting the bounty.
consumer451•17m ago
I am far from the halls of corporate decision making, but I really don't understand why bug bounties at trillion dollar companies are so low.
arcfour•6m ago
Because it's nice to get $10k legally + public credit than it is to get $100k while risking arrest + prison time, getting scammed, or selling your exploit to someone that uses it to ransom a children's hospital?
duozerk•17m ago
I read this often, and I guess it could be true, but those kinds of transaction would presumably go through DNM / forums like BF and the like. Which means crypto, and full anonymity. So either the buyer trusts the seller to deliver, or the seller trusts the buyer to pay. And once you reveal the particulars of a flaw, nothing prevents the buyer from running away (this actually also occurs regularly on legal, genuine bug bounty programs - they'll patch the problem discreetly after reading the report but never follow up, never mind paying; with little recourse for the researcher).

Even revealing enough details, but not everything, about the flaw to convince a potential buyer would be detrimental to the seller, as the level of details required to convince would likely massively simplify the work of the buyer should they decide to try and find the flaw themselves instead of buying. And I imagine much of those potential buyers would be state actors or organized criminal groups, both of which do have researchers in house.

The way this trust issue is (mostly) solved in drugs DNM is through the platform itself acting as a escrow agent; but I suspect such a thing would not work as well with selling vulnerabilities, because the volume is much lower, for one thing (preventing a high enough volume for reputation building); the financial amounts generally higher, for another.

The real money to be made as a criminal alternative, I think, would be to exploit the flaw yourself on real life targets. For example to drop ransomware payloads; these days ransomware groups even offer franchises - they'll take, say, 15% of the ransom cut and provide assistance with laundering/exploiting the target/etc; and claim your infection in the name of their group.

naeioi•19m ago
The bounty could be very high. Last year one bug’s reporter was rewarded $250k. https://news.ycombinator.com/item?id=44861106
duozerk•10m ago
Maybe google is an exception (but then again, maybe that payout was part marketing to draw more researchers).
pjmlp•38m ago
Yeah, but lets keeping downplaying use-after-free as something not worth eliminating in 21st century systems languages.
pheggs•32m ago
I love rust but honestly I am more scared about supply chain attacks through cargo than memory corruption bugs. The reason being that supply chain attacks are probably way cheaper to pull off than finding these bugs
staticassertion•29m ago
Google already uses `cargo-vet` for rust dependencies.
pheggs•26m ago
thats good, but it wont eliminate the risk
staticassertion•24m ago
Nothing eliminates the risk but it is basically a best-in-class solution. If your primary concern is supply chain risk, there you go, best in class defense against it.

If anything, what are you doing about supply chain for the existing code base? How is cargo worse here when cargo-vet exists and is actively maintained by Google, Mozilla, and others?

kibwen•26m ago
But this is irrelevant. If you're afraid of third-party code, you can just... choose not to use third-party code? Meanwhile, if I'm afraid of memory corruption in C, I cannot just choose not to have memory corruption; I must instead simply choose not to use C. Meanwhile, Chromium uses tons of third-party Rust code, and has thereby judged the risk differently.
JoeAltmaier•18m ago
Maybe it's more complicated than that? With allocate/delete discipline, C can be fairly safe memory-wise (written a million lines of code in C). But automated package managers etc can bring in code under the covers, and you end up with something you didn't ask for. By that point of view, we reverse the conclusion.
cogman10•14m ago
If you can bring in 3rd party libraries, you can be hit with a supply chain attack. C and C++ aren't immune, it's just harder to pull off due to dependency management being more complex (meaning you'll work with less dependencies naturally).
baq•58m ago
I wonder if this was found with LLM assistance, if yes, with which one and is it a one-off or does it mark a start of a new era (I assume it does).
paavohtl•10m ago
Absolutely nothing in the announcement or other publicly available source implies that, to my knowledge. Might as well speculate if a random passer-by on the street is secretly a martian.
MallocVoidstar•54m ago
Devtools is seemingly partially broken in this version, if I have devtools open on a reasonably dynamic web app Chrome will crash within a minute or two
himata4113•51m ago
The fact that these still show up is pretty wild to me. Don't we have a bunch of tools that should create memory-safish binaries by applying the same validation checks that memory-safe languages get for free purely from their design?

I get that css has changed a lot over the years with variables, scopes and adopting things from less/sass/coffee, but people use no-script for the reason because javascript is risky, but what if css can be just as risky... time to also have no-style?

Honestly, pretty excited for the full report since it's either stupid as hell or a multi-step attack chain.

staticassertion•27m ago
> Don't we have a bunch of tools that should create memory-safish binaries by applying the same validation checks that memory-safe languages get for free purely from their design?

No, we don't. All of the ones we have are heavily leveraged in Chromium or were outright developed at Google for similar projects. 10s of billions are spent to try to get Chromium to not have these vulnerabilities, using those tools. And here we are.

I'll elaborate a bit. Things like sanitizers largely rely on test coverage. Google spends a lot of money on things like fuzzing, but coverage is still a critical requirement. For a massive codebase, gettign proper coverage is obviously really tricky. We'll have to learn more about this vulnerability but you can see how even just that limitation alone is sufficient to explain gaps.

fulafel•46m ago
Isn't this a wrongly editorialized title - "Reported by Shaheen Fazim on 2026-02-11" so more like 7-day.
Aachen•43m ago
It refers to your many days software is available for, with zero implying it is not yet out so you couldn't have installed a new version and that's what makes it a risky bug

The term has long watered-down to mean any vulnerability (since it was always a zero-day at some point before the patch release, I guess is those people's logic? idk). Fear inflation and shoehorning seems to happen to any type of scary/scarier/scariest attack term. Might be easiest not to put too much thought into media headlines containing 0day, hacker, crypto, AI, etc. Recently saw non-R RCEs and supply chain attacks not being about anyone's supply chain copied happily onto HN

Edit: fwiw, I'm not the downvoter

nickelpro•8m ago
It's original meaning was days since software release, without any security connotation attached. 0-day software was software which was not yet available to the general public.

In a security context, it has come to mean days since a mitigation was released. Prior to disclosure or mitigation, all vulnerabilities are "0-day", which may be for weeks, months, or years.

It's not really an inflation of the term, just a shifting of context. "Days since software was released" -> "Days since a mitigation for a given vulnerability was released".

bitbasher•24m ago
Maybe Chromium should also rewrite their rendering engine in Rust ;p
astrobe_•10m ago
This doesn't affect the many browsers based on Chromium?