frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Hdrify (JavaScript HDR Lib) Gets a VS Code Extension

https://marketplace.visualstudio.com/items?itemName=benhouston3d.hdrify-vscode-extension
1•bhouston•1m ago•0 comments

Claude Code desktop now preview app / code review / handle CI&PR / roam to cloud

https://twitter.com/claudeai/status/2024937960572104707
1•jimmydoe•1m ago•1 comments

And then? And then Mullvad was censored in the UK

https://mullvad.net/en/and-then/uk
1•latexr•1m ago•0 comments

Podcasting has a Hall of Fame. Almost nobody knows it exists

https://recognized.substack.com/p/exclusive-behind-the-scenes-look
1•Chachingfm•3m ago•0 comments

Optophone

https://en.wikipedia.org/wiki/Optophone
1•Hooke•4m ago•0 comments

Lords of the Ring

https://harpers.org/archive/2026/03/lords-of-the-ring-joshua-hunt-cultural-politics-sumo-wrestling/
1•lermontov•6m ago•0 comments

Phil Spencer is exiting Microsoft as AI executive takes over Xbox

https://www.neowin.net/news/phil-spencer-is-exiting-microsoft-as-ai-executive-takes-over-xbox/
1•bundie•6m ago•0 comments

Show HN: AgentCheck – AI bot posture leaderboard from robots.txt and llms.txt

https://www.agentcheck.com
1•MK_Phoenix•8m ago•1 comments

Jsonh (JSON for Humans)

https://github.com/jsonh-org/Jsonh
3•Joy-less•10m ago•1 comments

Show HN: Dev visibility for non-technical founders and stakeholders

1•inferno22•10m ago•0 comments

Thoughts about Pi

https://colorforth.github.io/pi.htm
1•tosh•12m ago•0 comments

NASA chief classifies Starliner flight as "Type A" mishap, agency made mistakes

https://arstechnica.com/space/2026/02/nasa-chief-classifies-starliner-flight-as-type-a-mishap-say...
1•rbanffy•13m ago•0 comments

Palladium filters could enable cheaper, efficient generation of hydrogen fuel

https://news.mit.edu/2025/palladium-filters-could-enable-cheaper-more-efficient-generation-hydrog...
1•rbanffy•15m ago•0 comments

Nascent tech, real fear: how AI anxiety is upending career ambitions

https://www.theguardian.com/technology/ng-interactive/2026/feb/20/ai-future-work-technology-white...
1•paulpauper•15m ago•0 comments

MIT Challenge: Bachelor's Degree in 100 Days

https://gist.github.com/tirthd16/f9a5759352eea33cec6a278f9dbe2c35
1•tirthd•18m ago•1 comments

Taalas – The Model Is the Computer

https://taalas.com/
1•rvnx•18m ago•1 comments

ZSTDify: A robust pure-JavaScript implementation of ZSTD

https://github.com/bhouston/zstdify
1•bhouston•18m ago•0 comments

The Great Disconnect: Why the "12-Month" Clock Is Ticking Faster Than We Think

https://grayrhino.blog/
1•ghostinshell515•18m ago•1 comments

That 6am feeling – living at the end and beginning of everything

https://antonioaestero.substack.com/p/that-6am-feeling-living-at-the-end-and-beginning-of-everything
1•pmg101•19m ago•0 comments

Real-Time 3D Room Mapping with ESP32, VL53L5CX Sensor and IMU

https://hackaday.com/2026/02/14/real-time-3d-room-mapping-with-esp32-vl53l5cx-sensor-and-imu/
1•toomuchtodo•19m ago•0 comments

AI coding assistant Cline compromised to create more OpenClaw chaos

https://www.theregister.com/2026/02/20/openclaw_snuck_into_cline_package/
1•beardyw•19m ago•0 comments

A floating power station? China's flying wind turbine hits milestone

https://www.euronews.com/next/2026/01/29/a-floating-power-station-chinas-flying-wind-turbine-hits...
1•geox•20m ago•0 comments

James Bond x Seedance 2.0 [video]

https://old.reddit.com/r/singularity/comments/1r9xgdz/james_bond_x_seedance_20/
1•mgh2•22m ago•0 comments

I Analyzed Every Nootropic Study on PubMed

https://outspeaker.com/post/217
1•onesandofgrain•22m ago•0 comments

Bay Area Apartment Hunting Has Turned into an AI Hellscape

https://www.sfgate.com/local/article/bay-area-apartment-ai-21332194.php
2•randycupertino•23m ago•1 comments

The Sixth Bureau [video]

https://www.bloomberg.com/features/the-sixth-bureau/
1•petethomas•23m ago•0 comments

OpenScan

https://openscan.eu/pages/scan-gallery
2•joebig•24m ago•0 comments

Phil Spencer Retiring, Sarah Bond Out, Asha Sharma Named New Xbox Boss

https://www.ign.com/articles/phil-spencer-retiring-sarah-bond-out-matt-booty-promoted-as-microsof...
8•CIARobotFish•24m ago•2 comments

Private Equity Debt Left a Leading VPN Open to Chinese Hackers

https://financialpost.com/pmn/business-pmn/how-private-equity-debt-left-a-leading-vpn-open-to-chi...
1•strict9•27m ago•0 comments

Task-Completion Time Horizons of Frontier AI Models (Includes Opus 4.6)

https://metr.org/time-horizons/
1•admp•27m ago•0 comments
Open in hackernews

I found a Vulnerability. They found a Lawyer

https://dixken.de/blog/i-found-a-vulnerability-they-found-a-lawyer
92•toomuchtodo•1h ago

Comments

xvxvx•1h ago
I’ve worked in I.T. For nearly 3 decades, and I’m still astounded by the disconnect between security best practices, often with serious legal muscle behind them, and the reality of how companies operate.

I came across a pretty serious security concern at my company this week. The ramifications are alarming. My education, training and experience tells me one thing: identify, notify, fix. Then when I bring it to leadership, their agenda is to take these conversations offline, with no paper trail, and kill the conversation.

Anytime I see an article about a data breach, I wonder how long these vulnerabilities were known and ignored. Is that just how business is conducted? It appears so, for many companies. Then why such a focus on security in education, if it has very little real-world application?

By even flagging the issue and the potential fallout, I’ve put my career at risk. These are the sort of things that are supposed to lead to commendations and promotions. Maybe I live in fantasyland.

calvinmorrison•1h ago
> By even flagging the issue and the potential fallout, I’ve put my career at risk.

Simple as. Not your company? not your problem? Notify, move on.

refulgentis•1h ago
> These are the sort of things that are supposed to lead to commendations and promotions. Maybe I live in fantasyland.

I had a bit of a feral journey into tech, poor upbringing => self taught college dropout waiting tables => founded iPad point of sale startup in 2011 => sold it => Google in 2016 to 2023

It was absolutely astounding to go to Google, and find out that all this work to ascend to an Ivy League-esque employment environment...I had been chasing a ghost. Because Google, at the end of the day, was an agglomeration of people, suffered from the same incentives and disincentives as any group, and thus also had the same boring, basic, social problems as any group.

Put more concretely, couple vignettes:

- Someone with ~5 years experience saying approximately: "You'd think we'd do a postmortem for this situation, but, you know how that goes. The people involved think they're an organization-wide announcement that you're coming for them, and someone higher ranked will get involved and make sure A) it doesn't happen or B) you end up looking stupid for writing it."

- A horrible design flaw that made ~50% of users take 20 seconds to get a query answered was buried, because a manager involved was the one who wrote the code.

xvxvx•58m ago
I would get fired at Google within seconds then. I’m more than happy to shine a light on bullshit like that.
bubblewand•24m ago
I've seen into some moderately high levels of "prestigious" business and government circles and I've yet to find any level at which everyone suddenly becomes as competent and sharp as I'd have expected them to be, as a child and young adult (before I saw what I've seen and learned that the norm is morons and liars running everything and operating terrifically dysfunctional organizations... everywhere, apparently, regardless how high up the hierarchy you go). And actually, not only is there no step at which they suddenly become so, people don't even seem to gradually tend to brighter or generally better, on average, as you move "upward"... at all! Or perhaps only weakly so.

Whatever the selection process is for gestures broadly at everything, it's not selecting for being both (hell, often not for either) able and willing to do a good job, so far as what the job is apparently supposed to be. This appears to hold for just about everything, reputation and power be damned. Exceptions of high-functioning small groups or individuals in positions of power or prestige exist, as they do at "lower" levels, but aren't the norm anywhere as far as I've been able to discern.

refulgentis•1h ago
Wish they named them. Usually I don't recommend it. But the combination of:

A) in EU; GDPR will trump whatever BS they want to try B) no confirmation affected users were notified C) aggro threats D) nonsensical threats, sourced to Data Privacy Officer w/seemingly 0 scruples and little experience

Due to B), there's a strong responsibility rationale.

Due to rest, there's a strong name and shame rationale. Sort of equivalent to a bad Yelp review for a restaurant, but for SaaS.

mzi•1h ago
Dan Europe has a flow as discussed in the article and both the foundation and the regulated insurance branch is registered in Malta.
Nextgrid•40m ago
EU GDPR has very little enforcement. So while the regulation in theory prevents that, in practice you can just ignore it. If you're lucky a token fine comes up years down the line.
vaylian•1h ago
> Instead, I offered to sign a modified declaration confirming data deletion. I had no interest in retaining anyone’s personal data, but I was not going to agree to silence about the disclosure process itself.

Why sign anything at all? The company was obviously not interested in cooperation, but in domination.

desireco42•1h ago
I think the problem is the process. Each country should have a reporting authority and it should be the one to deal with security issues.

So you never report to actual organization but to the security organization, like you did. And they would be more equiped to deal with this, maybe also validate how serious this issue is. Assign a reward as well.

So you are researcher, you report your thing and can't be sued or bullied by organization that is offending in the first place.

ikmckenz•56m ago
That’s almost what we already have with the CVE system, just without the legal protections. You report the vulnerability to the NSA, let them have their fun with it, then a fix is coordinated to be released much further down the line. Personally I don’t think it’s the best idea in the world, and entrenching it further seems like a net negative.
PaulKeeble•31m ago
If the government wasn't so famous for also locking people up that reported security issues I might agree, but boy they are actually worse.

Right now the climate in the world is whistleblowers get their careers and livihoods ended. This has been going on for quite a while.

The only practical advice is ignore it exists, refuse to ever admit to having found a problem and move on. Leave zero paper trail or evidence. It sucks but its career ending to find these things and report them.

anonymous908213•1h ago
This is an LLM-generated article, for anyone who might wish to save the "15 min read" labelled at the top. Recounts an entirely plausible but possibly completely made up narrative of incompetent IT, and contains no real substance.
a3w•1h ago
ai;dr then? Should be removed from hackernews even?
circuit10•1h ago
How do you know? Some of the text has a slightly LLM-ish flavour to it (e.g. the numbered lists) but other than that I don’t see any solid evidence of that

Edit: I looked into it a bit and things seems to check out, this person has scuba diving certifications on their LinkedIn and the site seems real and high-effort. While I also don’t have solid proof that it’s not AI generated either, making accusations like this based on no evidence doesn’t seem good at all

thenewnewguy•48m ago
Not them but the formatting screams LLM to me. Random "bolding" (rendered on this website as blue text) of phrases, the heading layout, the lists at the end (bullet point followed by bolded text), common repeats of LLM-isms like "A. Not B". None of these alone prove it but combined they provide strong evidence.

You can also see the format and pacing differs greatly from posts on their blog made before LLMs were mainstream, e.g. https://dixken.de/blog/monitoring-dremel-digilab-3d45

While I wouldn't go so far as to say the post is entirely made up (it's possible the underlying story is true) - I would say that it's very likely that OP used an LLM to edit/write the post.

refulgentis•1h ago
I'm very sensitive to this but disagree vehemently.

I saw one or two sigils (ex. a little eager to jump to lists)

It certainly has real substance and detail.

It's not, like, generic LinkedIn post quality.

You could tl;dr it to "autoincrementing user ids and a default password set = vulnerability, and the company responded poorly." and react as "Jeez, what a waste of time, I've heard 1000 of these stories."

I don't think that reaction is wrong, per se, and I understand the impulse. I feel this sort of thing more and more as I get older.

But, it fitting into a condensed structure you're familiar with isn't the same as "this is boring slop." Moby Dick is a book about some guy who wants revenge, Hamlet is about a king who dies.

Additionally, I don't think what people will interpret from what you wrote is what you meant, necessarily. Note the other reply at this time, you're so confident and dismissive that they assume you're indicating the article should be removed from HN.

toomuchtodo•1h ago
Can you share how you confirmed this is LLM generated? I review vulnerability reports submitting by the general public and it seems very plausible based on my experience (as someone who both reviews reports and has submitted them), hence why I submitted it. I am also very allergic to AI slop and did not get the slop vibe, nor would I knowingly submit slop posts.

I assure you, the incompetence in both securing systems and operating these vulnerability management systems and programs is everywhere. You don't need an LLM to make it up.

(my experience is roughly a decade in cybersecurity and risk management, ymmv)

anonymous908213•1h ago
The headers alone are a huge giveaway. Spams repetitive sensatational writing tropes like "No X, No Y, No Z" and "X. Not Y" numerous times. Incoherent usage of bold type all throughout the article. Lack of any actually verifiable concrete details. The giant list of bullet points at the end that reads exactly like helpful LLM guidance. Many signals throughout the entire piece, but don't have time to do a deep dive. It's fine if you don't believe me, I'm not suggesting the article be removed. Just giving a heads-up for people who prefer not to read generated articles.

Regarding your allergy, my best guess is that it is generated by Claude, not ChatGPT, and they have different styles, so you may be sensitive to one but not the other. Regarding plausibility, that's the thing that LLMs excel at. I do agree it is very plausible.

p0w3n3d•47m ago
I wonder if there's any probabilistic analyser that could confirm that the article is generated, or show which parts might have been generated
roywiggins•31m ago
Pangram[0] thinks the closing part is AI generated but the opening paragraphs are human. Certainly the closing paragraphs have a bit of an LLM flavor (a header titled "The Pattern", eg)

[0] https://www.pangram.com

anonymous908213•19m ago
There are no automated AI detectors that work. False positives and false negatives are both common, and the false positives particularly render them incredibly dangerous to use. Just like LLMs have not actually replaced competent engineers working on real software despite all the hysteria about them doing so, they also can't automate detection, and it is possible to build up stronger heuristics as a human. I am fully confident and would place a large sum of money on this article being LLM-generated if we could verify the bet, but we can't, so you'll just have to take my word for it, or not.
BizarroLand•1h ago
Proof?
kazinator•52m ago
What is the evidence that the content is entirely LLM generated, rather just LLM-assisted writing of a genuine story?
gchamonlive•43m ago
HN's comment section new favourite sport, trying to guess if an article was generated by LLM. It's completely pointless. Why not focus on what's being said instead?
anonymous908213•34m ago
What's being said is a sensationalized clickbait narrative that appeals to people's outrage instincts (got threatened for white hat hacking! GRRR!!!), which is lacking in any evidence of the claimed event or anything interesting at all, really. I personally think this has zero merit and is not worth reading, all the moreso when the writing is the output of an LLM. If you do, good for you. You are free to read it to your heart's content. What, exactly, is the problem with disclosing the nature of the article for people who wish to avoid spending their time in that way?
gchamonlive•23m ago
> This is an LLM-generated article, for anyone who might wish to save the "15 min read" labelled at the top. Recounts an entirely plausible but possibly completely made up narrative of incompetent IT, and contains no real substance.

Nothing in the original message refers to it being clickbait, the core complaint is the LLM-like tone and the lack of substance, which you also just threw it there without references ironically.

> What, exactly, is the problem with disclosing the nature of the article for people who wish to avoid spending their time in that way?

It's alright as long as it's not based on faith or guesswork.

anonymous908213•12m ago
It is not based on guesswork. For whatever it's worth, I have gotten 7 LLM accounts banned from HN in the past week based on accurately detecting and reporting them to moderation[1]. Many of these accounts had between dozens and 100 upvotes, some with posts rated to the top of their threads that escaped detection by others. I have not once misidentified and reported an account that was genuinely human. I am aware that other people have poorly-tuned heuristics and make false accusations, but it is possible to build the skill to detect LLM output reliably, and I have done so. In the end, it is up to you whether you believe me, but I am simply trying to offer a warning for people who dislike reading this material, nothing more.

[1] Unlike LLM-generated articles, posting LLM-generated comments is actually against the rules.

SunshineTheCat•9m ago
I thought the same thing. With the rate LLMs are improving, it's not going to be too much longer before no one can tell.

I also enjoy all the "vibes" people list out for why they can tell, as though there was any rhyme or reason to what they're saying. Models change and adapt daily so the "heading structure" or "numbered list" ideas become outdated as you're typing them.

dolebirchwood•36m ago
> contains no real substance.

The same could be said of the accusation being levied here.

viccis•57m ago
This is somewhat related, but I know of a fairly popular iOS application for iPads that stores passwords either in plaintext or encrypted (not as digests) because they will email it to you if you click Forgot Password. You also cannot change it. I have no experience with Apple development standards, so I thought I'd ask here if anyone knows whether this is something that should be reported to Apple, if Apple will do anything, or if it's even in violation of any standards?
greggsy•53m ago
If anything it’s just a violation of industry expectations. You as a consumer just don’t need to use the product.
tokyobreakfast•23m ago
>whether this is something that should be reported to Apple, if Apple will do anything

Lmao Apple will not do anything for actual malware when reported with receipts, besides sending you a form letter assuring you "experts will look into it, now fuck off" then never contact you again. Ask me how I know. To their credit, I suspected they ran it through useless rudimentary automated checks which passed and they were back in business like a day later.

If your expectation is they will do something about shitty coding practices half the App Store would be banned.

jopsen•3m ago
> Apple will not do anything for actual malware when reported with receipts, besides sending you a form letter assuring you "experts will look into it, now fuck off"

Ask while you are in an EU country, request appeal and initiate Out-of-court dispute resolution.

Or better yet: let the platform suck, and let this be the year of the linux desktop on iPhone :)

projektfu•56m ago
Another comment says the situation was fake. I don't know, but to avoid running afoul of the authorities, it's possible to document this without actually accessing user data without permission. In the US, the Computer Fraud and Abuse Act and various state laws are written extremely broadly and were written at a time when most access was either direct dial-up or internal. The meaning of abuse can be twisted to mean rewriting a URL to access the next user, or inputting a user ID that is not authorized to you.

Generally speaking, I think case law has avoided shooting the messenger, but if you use your unauthorized access to find PII on minors, you may be setting yourself up for problems, regardless if the goal is merely dramatic effect. You can, instead, document everything and hypothesize the potential risks of the vulnerability without exposing yourself to accusation of wrongdoing.

For example, the article talks about registering divers. The author could ask permission from the next diver to attempt to set their password without reading their email, and that would clearly show the vulnerability. No kids "in harm's way".

alphazard•33m ago
Instead of understanding all of this, and when it does or does not apply, it's probably better to disclose vulnerabilities anonymously over Tor. It's not worth the hassle of being forced to hire a lawyer, just to be a white hat.
cptskippy•26m ago
Part of the motivation of reporting is clout and reputation. That sounds harsh or critical but for some folks their reputation directly impacts their livelihood. Sure the data controller doesn't care, but if you want to get hired or invited to conferences then the clout matters.
kazinator•53m ago
> vulnerability in the member portal of a major diving insurer

What are the odds an insurer would reach for a lawyer? They probably have several on speed dial.

cptskippy•25m ago
What makes you think they don't retain them in-house?
kazinator•36m ago
Why does someone with a .de website insure their diving using some company based in Malta?

Based on this interaction, you have wonder what it's like to file a claim with them.

som•7m ago
Divers Alert Network, which is probably the most well known dive membership (and insurance) org out there is registered in Malta in Europe.
ImPostingOnHN•4m ago
It is probably among the standard forms required to participate in a diving class/excursion for travelers from other countries; and, Malta was probably chosen as the official HQ for legal or liability shelter reasons.
0sdi•35m ago
Is this Divers Alert Network (DAN) Europe, and it's insurance subsidiary, IDA Insurance Limited?
locusofself•9m ago
Another commenter basically deduced this
stevage•29m ago
Since the author is apparently afraid to name the organisation in question, it seems the legal threats have worked perfectly.
tuhgdetzhh•11m ago
If you follow the jurisdictional trail in the post, the field narrows quickly. The author describes a major international diving insurer, an instructor driven student registration workflow, GDPR applicability, and explicit involvement of CSIRT Malta under the Maltese National Coordinated Vulnerability Disclosure Policy. That combination is highly specific.

There are only a few globally relevant diving insurers. DAN America is US based. DiveAssure is not Maltese. AquaMed is German. The one large diving insurer that is actually headquartered and registered in Malta is DAN Europe. Given that the organization is described as being registered in Malta and subject to Maltese supervisory processes, DAN Europe becomes the most plausible candidate based on structure and jurisdiction alone.

pavel_lishin•10m ago
Or maybe in the diving community, "Maltese insurance company for divers" is about as subtle as "Bird-themed social network with blue checkmarks".
undebuggable•23m ago
> the portal used incrementing numeric user IDs

> every account was provisioned with a static default password

Hehehe. I failed countless job interviews for mistakes much less serious than that. Yet someone gets the job while making worse mistakes, and there are plenty of such systems on production handling real people's data.

cptskippy•21m ago
Maintaining Cybersecurity Insurance is a big deal in the US, I don't know about Europe. So vulnerability disclosure is problematic for data controllers because it threatens their insurance and premiums. Today much of enterprise security is attestation based and vulnerability disclosure potentially exposes companies to insurance fraud. If they stated that they maintained certain levels of security, and a disclosure demonstratively proves they do not, that is grounds for dropping a policy or even a lawsuit to reclaim paid funds.

So it sort of makes sense that companies would go on the attack because there's a risk that their insurance company will catch wind and they'll be on the hook.

FurryEnjoyer•16m ago
Malta has been mentioned? As a person living here I could say that workflow of the government here is bad. Same as in every other place I guess.

By the way, I had a story when I accidentally hacked an online portal in our school. It didn't go much and I was "caught" but anyways. This is how we learn to be more careful.

I believe in every single system like that it's fairly possible to find a vulnerability. Nobody cares about them and people that make those systems don't have enough skill to do it right. Data is going to be leaked. That's the unfortunate truth. It gets worse with the come of AI. Since it has zero understanding of what it is actually it will make mistakes that would cause more data leaks.

Even if you don't consider yourself as an evil person, would you still stay the same knowing real security vulnerability? Who knows. Some might take advantage. Some won't and still be punished for doing everything as the "textbook way".

cynicalsecurity•15m ago
For a moment I thought he was an immigrant from a post Soviet country. A very unusual arrogance, carelessness and Robin Hood complex for a German. It's wild to imagine a German behave this.

Unless absolutely necessary, do not get involved in any legal battles or anything potentially involving lawyers. Not getting involved is always less expensive and less problematic. Unless your ass is covered by some big and influential organisation; never fight on your own. No one was dying here; people's lives were not in danger. Acting hostile and poking a company to sue you won't bring you anything good. His post won't make waves big enough and he might lose clients instead of gaining them.

kspacewalk2•5m ago
Not sure what the name of your complex is, maybe groveling deference to legalese? Whatever it is, I'm sure I would have applied it to your entire country of origin if I knew where you're from, and if I were developmentally around the age of twelve.

He did everything exactly by the book and in the end was even nice enough to not publish the company's name, despite the legal threat being bullshit and him being entirely in the right.

josefritzishere•6m ago
I find these tales of lawyerly threats completley validate the hackers actions. They reported the bug to spur the company to resolve it. Their reaction all but confirms that reporting it to them directly would not have been productive. Their management lacks good stewardship. They are not thinking about their responsibility to their customers and employees.