frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: I'm tracking 197 known exposures of health data from UK Biobank

https://biobank.rocher.lc
1•Cynddl•1m ago•0 comments

Germany unveils strategy for becoming Europe's strongest military by 2039

https://www.defensenews.com/global/europe/2026/04/22/germany-unveils-strategy-for-becoming-europe...
1•ramonga•1m ago•0 comments

Selective Test Execution at Stripe: Fast CI for a 50M-Line Ruby Monorepo

https://stripe.dev/blog/selective-test-execution-at-stripe-fast-ci-for-a-50m-line-ruby-monorepo
1•ains•2m ago•0 comments

Raj Reddy: The Future of AI: Doomers vs. Abundance [video]

https://www.youtube.com/watch?v=ydnOSMbyyQo
1•thelastgallon•2m ago•0 comments

The Disappearance of the Public Bench

https://placesjournal.org/article/the-disappearance-of-the-public-bench/
1•cainxinth•2m ago•0 comments

Bit warden CLI nom package compromised

https://gist.github.com/N3mes1s/9c210b64760390f1ca2c451100a5ec99
1•nitnelave•3m ago•0 comments

Grasp: A simple protocol for decentraliszed Git

https://gitgrasp.com
1•curtisblaine•5m ago•0 comments

Flipdiscs

https://flipdisc.io
1•skogstokig•5m ago•0 comments

Pitstop – an F1 dashboard with live timing, predictions and a fan feed

https://pitstopf1.xyz
1•ottovoldemar•5m ago•0 comments

Banter is the last thing I want from a coffee machine. Yet here we are

https://www.theguardian.com/lifeandstyle/commentisfree/2026/apr/23/my-old-coffee-machine-was-grea...
1•hansmayer•6m ago•0 comments

Show HN: Agent cache for Valkey, now in Python with bundled LiteLLM pricing

https://pypi.org/project/betterdb-agent-cache/
1•kaliades•7m ago•0 comments

OpenClaw: Opioids for Chinese AI Companies

https://overnightai.substack.com/p/openclaw-is-opioid-for-chinese-ai
1•jackyli02•8m ago•0 comments

SF sets $3.4B price tag for public takeover of PG&E

https://www.nbcbayarea.com/news/local/san-francisco-pge-public-takeover/4072644/
1•kaycebasques•9m ago•0 comments

How the Internet Works

https://www.makingsoftware.com/chapters/how-the-internet-works
2•vismit2000•9m ago•0 comments

What's the Point of Hardbacks?

https://tomrowley.substack.com/p/whats-the-point-of-hardbacks
1•gmays•10m ago•0 comments

I Stumbled Upon Paul Graham's Essays – and Can't Stop Reading

2•xnslx•10m ago•2 comments

Netflix authorizes $25B stock buyback after shares slumped

https://qz.com/netflix-25-billion-share-buyback-stock-repurchase-042326
1•andsoitis•10m ago•0 comments

Lovable denies vulnerability, then blames others for said vulnerability

https://cybernews.com/security/lovable-vibe-coding-flaw-apology/
2•smurda•11m ago•0 comments

Best crypto hardware wallets in 2026

https://blog.alcazarsec.com/posts/best-crypto-hardware-wallets-2026
1•alcazar•15m ago•0 comments

LLM pricing has never made sense

https://anderegg.ca/2026/04/22/llm-pricing-has-never-made-sense
2•Brajeshwar•15m ago•0 comments

Show HN: Envsleuth – catch missing env vars before they reach production

https://github.com/k38f/envsleuth
1•k38f•17m ago•0 comments

Google says 75% of the company's new code is AI-generated

https://www.businessinsider.com/google-ai-generated-code-75-gemini-agents-software-2026-4
2•geox•18m ago•0 comments

A Cones Throw Away

https://codepen.io/mrdoob_/full/yyadeww
2•memalign•19m ago•0 comments

Judging Technology – By Ran Prieur

https://www.ranprieur.com/tech.html
1•anilgulecha•20m ago•1 comments

X-Ray Imaging and ML in Ultrasound Assisted Laser-Based Additive Manufacturing

https://www.mdpi.com/1996-1944/19/6/1227
1•PaulHoule•21m ago•0 comments

Trump administration reclassifies cannabis as less dangerous

https://www.bbc.com/news/articles/cdxd0xxp0jko
13•kaycebasques•21m ago•1 comments

Private health records of half a million Britons for sale on Chinese website

https://www.theguardian.com/technology/2026/apr/23/private-health-records-uk-biobank-chinese-webs...
2•Lio•22m ago•0 comments

The Dallas Food Drive Debate

https://earthchronicles.substack.com/p/the-dallas-food-drive-debate
2•taguniversalsw•22m ago•0 comments

ASI Asolaria 16 GB RAM OS that operate UNDER the bios

https://github.com/JesseBrown1980/asolaria-behcs-256
1•jessedaniel•22m ago•0 comments

AI as a Fascist Artifact

https://tante.cc/2026/04/21/ai-as-a-fascist-artifact/
3•recvonline•23m ago•0 comments
Open in hackernews

Surveillance vendors caught abusing access to telcos to track people's locations

https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/
162•mentalgear•1h ago

Comments

aetherspawn•1h ago
Yeah, a friend of mine was tracked by a stalker ex boyfriend who worked at a Telco.

It was irritatingly difficult to avoid because it seemed he could look up her SIM card by name and then get her location no matter what (new SIM, new phone)

Anyone who reports this kind of thing to the police just sounds irrational and crazy and gets ignored.

therobots927•1h ago
Assuming he had access to a database with (lat, long, SIM) data, if she got a new phone he could just use the known (lat, long pairs) from the old sim and lookup to get the new sim. Then bam, you can get all of the new lat longs.

It’s impossible to avoid unless you simultaneously move to a new house / apartment when you get your new phone, and never bring the new phone to any previous low-traffic location you brought the old phone to.

calvinmorrison•1h ago
it's impossible for your precise location to be tracked by anybody... wow thats crazy
kenjackson•1h ago
What does this mean?
justinclift•46m ago
If the person was deep enough into the system to have access to location data, then they'd probably be able to just directly look up customer details (likely easier).
hocuspocus•25m ago
Absolutely not. I have access to geo-located network telemetry. CRM data is completely off limit to anyone on my team.
kakacik•10m ago
Well maybe it wasn't such a well secured company and also this seems story from the past.
Padriac•1h ago
Sounds like something worth reporting as it is an offence in Australia at least. The police would certainly investigate such an allegation and charges could be laid if there was sufficient evidence and a conviction was possible.
aetherspawn•1h ago
Yeah it was reported, but the telcos systems were such a load of slop there wasn’t any specific evidence recorded (logs etc), and besides nobody knew what to ask for, so it couldn’t be taken seriously.

I don’t remember the exact circumstances of how they got a confession years later, I think bragging, but he did get convicted and the Telco eventually fired him, which stopped the stalking.

boringg•59m ago
What no log files of who's accessing records? That seems super sketch.
aetherspawn•53m ago
I’m spitballing here but it seemed like his job was a kind of ITS/technician job in the core infrastructure, and it seemed like he didn’t need to go through normal channels to get the information he wanted, ie he could just like pcap a tower with a filter or whatever in a routine kind of way that I guess didn’t create any specific logs. If there were any relevant logs they would have had to give them to the police. And I know that at a high level Telcos are heavily regulated, so there should have been logs.
mr_toad•30m ago
Doesn’t surprise me at all. I signed up for an internet plan with a provider once, but they never let me login to pay the bills. After they started threatening me with collections and several phone calls layer it turned out they were billing someone in a completely different city. Complete shambles.
Zigurd•15m ago
Some systems, like lawful intercept, are designed to be hidden even from telco network management systems. The LI console that set up a wire tap might log activity at that particular console at that particular law-enforcement agency. But if you don't know where to look exactly, good luck.

This is why the Chinese picked lawful intercept as a hacking target for the salt typhoon exploit. It's almost impossible to know whether that exploit is continuing or when exactly it began.

ogurechny•6m ago
Someone else was targeting it long before the Chinese.
woadwarrior01•8m ago
I've seen people getting fired in BigTech for using the platform to stalk their ex-es. It's usually an alert that goes off when employees access internal dashboards for a certain profile, too many times.
throwawaysleep•4m ago
BigTech is far more competent than a Telco though.
joshstrange•47m ago
> The police would certainly investigate such an allegation and charges could be laid if there was sufficient evidence and a conviction was possible.

I'll let you know when I finish laughing.

This is 100% false. You can serve up all the evidence on a silver platter the the police will ignore it. I know, I've tried, specifically in a stalking case. They don't care.

Padriac•37m ago
Maybe where things are different where you live.
throwawaysleep•20m ago
Cops are too dumb to comprehend that. They would proclaim it impossible and order more donuts.

Most simple criminals get away with their crimes. Anyone with any level of sophistication does as well.

jimbo808•5m ago
Ha. That's what everyone thinks before they've needed the police.
hocuspocus•30m ago
I'm sorry but this sounds like bullshit. As someone who has access to such data at a telco:

- Very few people have legit business cases requiring access to enriched network telemetry, at least non aggregated.

- Of which, only a handful have any reason to see the MSISDN in clear.

- Of which, none can get access to clear CRM data.

- Lawful interception and emergency services use completely separate paths, exposed via user interfaces that aren't available to employees.

And obviously, a simple email to the data governance and privacy office would be taken extremely seriously.

Also why not simply switch to a different phone operator?

hnthrow0287345•27m ago
I'm sure every single telco in the world is perfectly in line with this
hocuspocus•14m ago
Even in pretty dysfunctional countries, or pro-business ones like the US, where nothing like the GDPR exists, telcos management have a strong interest in not letting just any rank and file employee spy on subscribers.
throwawaysleep•6m ago
Most breaches are not in the interests of management, but they happen anyway as management wants to save money or doesn't understand how it could happen.
mistrial9•18m ago
you are close to a system in a way that those guardrails are clear and present; the story is from the point of view of a victim, and it is possible that they were indeed a victim. Therefore the means of the stalking is not known at all via this story, but somehow, something did occur. It is not surprising on either side, and they do not necessarily contradict each other IMHO
throwawaysleep•17m ago
> And obviously, a simple email to the data governance and privacy office would be taken extremely seriously.

What is this based on? I used to work for a data governance and privacy vendor that supplied data for audits. Tons and tons of customers asked us to fudge their data.

This is after the Delve scandal, where the hottest tech compliance company was completely fraudulent and numerous other hot tech companies also had completely fraudulent audits.

This is not a reasonable assumption.

aetherspawn•11m ago
So what you’re saying is if you were secretly a psycho and wanted to stalk your ex-girlfriend, you work at a Telco and basically have access to the tools to do it?

So putting aside the fact you’re a reasonable person, anyone who works themselves up to a similar seniority and job description in a Telco as you, could in fact do exactly what the article is saying is an issue for the victims.

therobots927•1h ago
Oh would you look at that: “Israeli-based commercial geo-intelligence provider with specialized telecom capabilities.”

Make no mistake, the people of Gaza and Lebanon are being used as guinea pigs for highly invasive surveillance technology that could easily be pointed at any of us if we step out of line.

And yes I said people of Gaza, not tellhullists as they’re referred to in Zion.

throwaw12•1h ago
> ... Israeli-based commercial geo-intelligence provider with specialized telecom capabilities ...

why are they good at these kind of things - security, hacks, surveillance, 0-days?

pjc50•1h ago
They run a mass surveillance operation so they can target individual people with exploding pagers. It's just another aspect of the longstanding war between Israel and Iran (via Hezbollah etc).
bakugo•59m ago
When your goal is to covertly subvert and take control of foreign nations, these sorts of skills tend to come in handy.
morellt•11m ago
No clue why this is getting downvoted, this is literally the purpose.
jeroenhd•40m ago
They are a country surrounded by countries that either dislike them or want them wiped from the face of the earth. It only makes sense that they have a significant intelligence and spying industry.

The genocide they're undertaking does place that industry in a whole new light, of course.

arjunthazhath•1h ago
jesus christ!
rurban•1h ago
They do have the death penalty now in Israel. So it might get interesting for those bosses
dewey•58m ago
You forgot one important detail there.
pprotas•56m ago
The death penalty was intended for Palestinians, not Israeli bosses
rurban•37m ago
sure, but when the tide switches to a far-left government they might use it against them.
Anonyneko•57m ago
This is just par for the course in Russia. Government has telcos track people, and that data ends up available on the black market for anyone to purchase, for a fairly modest fee. The government has been recently trying (with uncertain degree of success) to crack down on the latter, as this was frequently used by the opposition journalists and investigators to uncover the details of the government's own nefarious plots.

The data is cross-referenced with other telcos, other SIM cards, Wi-Fi hotspots (anonymous public hotspots are outlawed), street cams, and many other databases, so it's basically impossible to avoid being tracked.

Probably inevitable to become the norm everywhere in the world.

betaby•1m ago
> Government has telcos track people

Yes

> and that data ends up available on the black market for anyone to purchase, for a fairly modest fee

Probably not. Those DBs are fake most ( all ? ) the time.

fchicken•55m ago
Color me shocked
dfc•42m ago
I get a 404 when I try and view the CitizenLab report:

https://citizenlab.ca/research/uncovering-global-telecom-exp...

mentalgear•39m ago
> Gary Miller, one of the researchers who investigated these attacks, told TechCrunch that some clues point to an “Israeli-based commercial geo-intelligence provider with specialized telecom capabilities,” but did not name the surveillance provider. Several Israeli companies are known to offer similar services, such as Circles (later acquired by spyware maker NSO Group), Cognyte, and Rayzone.
walrus01•35m ago
Why is the citizen lab report URL suddenly a 404?
Rob_Polding•32m ago
In my country 95% of people don't mind Meta tracking their location with WhatsApp, so I think the days of people caring about tracking are long gone!

I am the exception and believe in privacy, and I've not used a Meta app since I tested Facebook/WhatsApp back in 2010 and soon uninstalled them as I don't want a digital portfolio to be developed on me for advertisers. Same with Google, they can whistle for my personal information, but they won't get it!

I'm sure surveillance companies have an even easier time buying data from Meta/WhatsApp so that's even more worrying as people use different ISPs so 95% of people won't be traced by any one ISP, but Meta and Google have the location information of anyone gullible enough to use their services.

woadwarrior01•5m ago
One of the first bits of infosec advice I give to my non-technical friends and family, when they ask for it, is to turn off background location access for all apps on their phones.

Needless to say, I know plenty of technical people who don't care about it.

faxuss•7m ago
Everyone does it, they just got caught.