frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
361•klaussilveira•4h ago•74 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
732•xnx•9h ago•449 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
125•isitcontent•4h ago•13 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
98•dmpetrov•4h ago•47 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
45•jnord•3d ago•3 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
228•vecti•6h ago•108 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
12•SerCe•31m ago•4 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
17•quibono•4d ago•0 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
299•aktau•11h ago•148 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
298•ostacke•10h ago•76 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
149•eljojo•7h ago•116 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
369•todsacerdoti•12h ago•214 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
41•phreda4•4h ago•7 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
295•lstoll•10h ago•220 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
97•vmatsiiako•9h ago•32 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
162•i5heu•7h ago•117 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
31•lebovic•1d ago•9 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
134•limoce•3d ago•75 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
31•rescrv•12h ago•14 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
218•surprisetalk•3d ago•29 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
944•cdrnsf•13h ago•409 comments

The Oklahoma Architect Who Turned Kitsch into Art

https://www.bloomberg.com/news/features/2026-01-31/oklahoma-architect-bruce-goff-s-wild-home-desi...
15•MarlonPro•3d ago•2 comments

Claude Composer

https://www.josh.ing/blog/claude-composer
88•coloneltcb•2d ago•65 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
76•antves•1d ago•56 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
36•nwparker•1d ago•7 comments

How virtual textures work

https://www.shlom.dev/articles/how-virtual-textures-really-work/
22•betamark•11h ago•19 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
17•ray__•1h ago•2 comments

The Beauty of Slag

https://mag.uchicago.edu/science-medicine/beauty-slag
26•sohkamyung•3d ago•2 comments

Evolution of car door handles over the decades

https://newatlas.com/automotive/evolution-car-door-handle/
37•andsoitis•3d ago•59 comments

Planetary Roller Screws

https://www.humanityslastmachine.com/#planetary-roller-screws
32•everlier•3d ago•6 comments
Open in hackernews

Blue Shield Data Breach (Google Ads)

https://news.blueshieldca.com/notice-of-data-breach
71•bix6•10mo ago

Comments

bix6•10mo ago
Disappointing behavior to say the least.

"On February 11, 2025, Blue Shield discovered that, between April 2021 and January 2024, Google Analytics was configured in a way that allowed certain member data to be shared with Google’s advertising product, Google Ads, that likely included protected health information. Google may have used this data to conduct focused ad campaigns back to those individual members. We want to reassure our members that no bad actor was involved, and, to our knowledge, Google has not used the information for any purpose other than these ads or shared the protected information with anyone."

accrual•10mo ago
I wonder what, if any, HIPAA fines will apply to Blue Shield if they're found to have inadvertently exposed PHI.

https://www.hipaajournal.com/hipaa-violation-fines/

chimeracoder•10mo ago
> I wonder what, if any, HIPAA fines will apply to Blue Shield if they're found to have inadvertently exposed PHI.

Well, they have inadvertently exposed PHI - this press release literally admits that they did.

In terms of what fines will apply, well, the annual cap for violations is about $2 million per calendar year, but I doubt they'll have to pay even that.

01HNNWZ0MV43FF•10mo ago
"No bad actor was involved"

I see two but whatever

anon84873628•10mo ago
I'm sure Google doesn't want customers doing this dumb stuff. So I'd also expect by this point they would be automatically profiling the incoming data to throw up warnings and safe guards. Maybe there is a perverse incentive where doing that only increases their liability in these situations.
wrs•10mo ago
Putting a third party analytics tool on a page containing PHI is an incredibly dangerous thing to do. It’s really surprising the developers could get that through a security review.
donohoe•10mo ago
What security review?
stackskipton•10mo ago
As someone who has worked in this field, I'm not. Marketing is generally exempt from massive legal review as they hand wave away "We don't deal with HIPPA data" and developers just wanting marketing to go away, dropped the Javascript block into files that were used for a ton of products including HIPAA containing ones.

EDIT: Most of these places are just feature factories with offshore developers who are very unlikely to raise concerns.

chimeracoder•10mo ago
> As someone who has worked in this field, I'm not. Marketing is generally exempt from massive legal review as they hand wave away "We don't deal with HIPPA data" and developers just wanting marketing to go away, dropped the Javascript block into files that were used for a ton of products including HIPAA containing ones.

I don't know why you're being downvoted, because this is unfortunately quite accurate. You'd be shocked how often this happens, even for tools they think are totally secure and "HIPAA-compliant".

> EDIT: Most of these places are just feature factories with offshore developers who are very unlikely to raise concerns.

I don't think there's any meaningful difference based on where the developers are located. The developers aren't the ones making the decisions. Usually the issue is that the higher-ups want it, which is why practices can continue even after concerns are raised.

gausswho•10mo ago
I worked at an org that give Google Tag Manager access to marketing, effectively as means of bypassing engineering to try whatever spyslime of the month they could paste into a box.
unyttigfjelltol•10mo ago
I would turn that around to be an inference that there was no effective security review....
AlotOfReading•10mo ago
Kaiser was hit with a class action for exactly the same issue last year: https://news.bloomberglaw.com/litigation/patients-advance-ka...

GoodRx, BetterHelp, and dozens of others have received notices that this is an issue. The federal OCR even published a bulletin about this 3 years ago.

You'd think that any one of these would have triggered internal reviews and discovered this issue for all the others, but that's much too high a bar to expect in healthcare.

knowitnone•10mo ago
Good. Hope Blue Shield gets the same treatment but they'll just pass the costs to their customers
ajross•10mo ago
It's only surprising when you phrase it like that. Real bugs are interactions. I mean, sure, if you're asked to review a pull request like "patient_info: Use google to track MRI data", it's a no brainer.

But no doubt the analytics blurb was stuffed into a generic "top_level_page" generator or whatever. And it happens that the PHI wasn't firewalled by design, and pulled it in by default. Or it was firewalled, but then someone forgot and migrated the "patient_info_page" templates to a generic framework, etc...

Security is really, really hard. And one of the worst responses to a mistake like this is to tut-tut about how obvious a mistake and how easy to avoid it was. Believing that secure software is a matter of "not making mistakes" makes you more likely to write such bugs and not less, because you won't take the time to establish clear boundaries from the start.

int_19h•10mo ago
Thing is, that's exactly what security and privacy reviews are for.

If there was no review, that's negligence.

If there was a review, one of the first questions that would be asked is, "what kind of tracking or telemetry do you have"? And there are tools that will scan code and flag things like that for you that large companies normally use.

wrs•10mo ago
This is sort of like saying it's easy to crash an airplane so you shouldn't be surprised when somebody flies one into the ground. Everyone involved with aircraft knows crashes are bad and there are multiple layers of design and training to prevent it.

Similarly, everyone at Blue Shield should know they can be fined outrageous amounts for a systemic HIPAA breach, so the system design and code review processes should make it really difficult to mess this up. Anything else is surprising.

I have been in charge of such systems, and you can do a lot with pretty simple rules, such as: No external scripts can appear on a page containing PHI, with exceptions reluctantly approved by security review for things like performance monitoring (not advertising). Systems that can access PHI are a separate codebase from marketing. The marketing systems don't connect to anything with PHI in it. If anyone feels constrained by these rules, pull in the compliance team and discuss.

tpmoney•10mo ago
The statement seems to imply that it was one of these "external scripts...reluctantly approved...for...performance monitoring". Specifically google analytics. But google is an all consuming vacuum for information, and presumably defaults to sharing data between your analytics account and your ads account. And in today's modern software dev world where everything is dependent on everything, that's exactly the sort of setting that could get accidentally imported somewhere where it wasn't supposed to.

In fact it's also possible this came about because a page changed over time and no one re-reviewed that original approval. Imagine for example that they had some un-authenticated pages set up so that people could see what sort of Medicare plans BS offers. Every year, thousands of people flock to the site, drop their zip code in and see what plans are available in their area. So far so good, no PHI (zip + medicare without anything else isn't generally PHI). Then a year later someone gets the bright idea to let you search for which doctors are in or out of network. Again, not PHI for most practical purposes. Yes, it could be enough data to uniquely identify someone and their health conditions, but in practice, it's hardly going to raise any red flags. Next year someone suggests adding the ability to list your medications so that you can see what you out of pocket costs for a plan will be. We're edging up on PHI here, but as long as they're not taking actual personally identifying info like dates of birth or addresses, this probably still isn't getting flagged as a PHI page. Finally the next year someone suggests "wouldn't it be handy if our existing customers could have their medications and providers from the prior year just imported into the search automatically. Well sure it would, so they go ahead and implement it but whoops, pulling that data out of the system also pulled along some internal tracker id that happens to be composed partially of their external "HIPAA safe" analytics ID that gets mapped to the internal tracking ID so they can got analytics attached to your session even before you authenticate. And now that ID is matched up to health information in a way that both creates a unique connection between the health information and an individual and now also links that individual to a specific cross-site google tracking ID. And now you've had a data breach, without ever (intentionally) approving the application of marketing libraries on a PHI containing site. I agree that there should be a lot more safeguards still, but the bug also being in place between 3-4 years suggests to me that it was a lot more subtle than just "don't include `ads.google.js` on the patient's medical history page". It's possible they really are just completely inept and haven't had any audits in 5 years but we won't really know that unless/until someone leaks more details.

nyarlathotep_•10mo ago
> that no bad actor was involved

Actually no, Blue Shield is the bad actor here.

Why, again, is this necessary at all? What is the rationale for analytics somewhere that deals with private health data?

olyjohn•10mo ago
Are you fucking kidding me? You get interrupted reading this shit by a pop up asking you for your information?
userbinator•10mo ago
I guess that's what they mean by the "This site requires Javascript in order to function properly" banner I get at the top. The article is readable without JS anyway.
Ancapistani•10mo ago
The email subject for this notification was "Blue Shield of California Privacy Notification."

It sounds like a fairly minor concern, but I find it quite distasteful that the email subject doesn't indicate that a breach occurred.

knowitnone•10mo ago
the hope is people delete it because it's just a "privacy notification"
kmeisthax•10mo ago
Related pet peeve: if the price of something goes down, it's a price drop, but when it goes up, it's a price change.

Can we coin a term for this weasel-y headline writing?

josefritzishere•10mo ago
There should be legal penalties for companies whose negligence leads to data breaches. Consumers really have no recourse here and even CCPA and HIPAA fines are exceedingly rare.
wormius•10mo ago
I'm sure those affected will get a 3.00 check and the lawyers bringing suit will make a chunk of change. (curious if this will lead to a suit or what the laws are around that (e.g. can this be class action or will only known affected individuals be allowed to seek redress?)
neilv•10mo ago
> between April 2021 and January 2024, Google Analytics was configured in a way that allowed certain member data to be shared with Google’s advertising product, Google Ads, that likely included protected health information.

I see so many medical and government sites that really shouldn't be running third-party trackers. Yet almost every single time I check, they are.

It's negligence/incompetence/reckless, criminally so, in some cases.

Given the inability of almost anyone in our field to build or operate a competently secure system, and the practices that go out of their way to gratuitously make the situation even worse-- we really just need to smack our entire field upside the head, repeatedly, until we stop churning out shit while strutting about how smart we are.

"AI" development tools (i.e., making humans stupider, through the power of plagiarism, to churn more BS at a faster rate) isn't going to solve the root problems of grossly misaligned incentives and culture.

wormius•10mo ago
Gotta love the passive voice used, too.
stogot•10mo ago
How do we report this?
XCSme•10mo ago
I was initially surprised to see several customers from .gov or medical corporations using my self-hosted analytics platform (I never considered those customer types before), but it makes a lot of sense. I think many of them actually run the platforms locally, and I think all companies that deal with private data (e.g. medical, banks, insurance) should be legally forced to not send any data to third parties, unless the customers explicitly agree to that (or the law forces them to do so).
neilv•10mo ago
> We understand receiving a notice such as this can create concern, and we regret that member personal information may have been shared without authorization.

Vague passive voice, FTW.

One way to start to fix the pattern and practice of gross negligence in our field is for Blue Shield CA to get stuck with HIPAA violation fines for each record leaked.

If Blue Shield CA claims they're not competent to know which records were leaked, assume it's all of the records.

ceejayoz•10mo ago
I've seen this sort of wording called "exonerative tense" when describing police conduct.
phkahler•10mo ago
This isn't a "data breach" is it? Blue Shield shared data with GA that they were not supposed to right?
lmkg•10mo ago
It depends on the jurisdiction and law, but a "data breach" is when data is accessed by a party who is not authorized, or who should not be authorized. It's not just hackers. Sending data to the wrong recipient is a form of data breach. Under some definitions, sending data to the intended recipient without appropriate safeguard is a form of data breach.

In this case, health care data covered by HIPAA was sent to a party without a legal contract that extends HIPAA to the receiving party. By law, that's a data breach.

Under some legal definitions, "data breach" includes not just breakdowns of confidentiality, but also of availability and/or integrity. So a company deleting your data by accident would be considered a data breach, even though it's being accessed by fewer parties than intended. This can be important: imagine a bank or credit agency losing some or all of the data about you, this would materially impact your ability to do business in the modern world.

paxys•10mo ago
Well it is a data breach. Self inflicted, sure, but still a breach.
Animats•10mo ago
"Blue Shield severed the connection between Google Analytics and Google Ads on its websites in January 2024."

They're lying.

Look at the page source for the announcement of the data breach. Use of both Google Tag Manager and Google Analytics.

     <!-- Google tag (gtag.js) -->
      <script type="text/javascript" src="/static/js/jquery.cookie.js"></script>
      <script async src="https://www.googletagmanager.com/gtag/js?id=G-KTK4E56VDB"></script>
      <script>
...

      <script>
  
        (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
            (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
            m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
        })(window,document,'script','//www.google-analytics.com/analytics.js','ga');

        var check_site_id = 347;

        var social_patterns = 
        ['facebook.com/share','twitter.com/share','linkedin.com/share',
        'pinterest.com/share','mailto:?subject'];
...
gundmc•10mo ago
I'm pretty sure you can use Google analytics without sending the data to Google Ads? I'm not sure why they would lie about correcting the issue.
darknavi•10mo ago
Their News subdomain stack might be completely different than their patient portals.
kube-system•10mo ago
They almost certainly are entirely different tech stacks, and likely not even developed by the same organizations. If you poke around in the source a bit you can find clear evidence that the news site is probably developed by a third party PR firm, who wouldn't typically have anything to do with a patient portal.
Animats•10mo ago
No, that excuse does not correspond to reality.

Here's Blue Shield's patient portal:

https://www.blueshieldca.com/login

That will redirect. Do a view source on where it goes, and you'll see both Google Tag Manager and Google Analytics code.

(Can't archive that page, unfortunately.)

Animats•10mo ago
Saved copy of page, in case it is changed: https://archive.is/GB8Ty
wormius•10mo ago
Went to look at my provider's service portal to see if there was any google analytics. Nothing showed when searching google, but...

"...Settings.WebAnalyticsEnabled = 'False';"

is set - thank goodness my medical provider's doing it right. (at least on this portion, I'm not digging through all the code or whatever)

userbinator•10mo ago
This is a good reminder to add these to your HOSTS file if you don't already have them blocked (which I have done for over 2 decades now):

    0.0.0.0 analytics.google.com
    0.0.0.0 google-analytics.com
    0.0.0.0 ssl.google-analytics.com
    0.0.0.0 www.google-analytics.com
    0.0.0.0 www.googletagservices.com
Scoundreller•10mo ago
You’ve unlocked a memory:

Back in the day I ran a giant hosts file for the same reason. I guess dumb OSs didn’t index HOSTS files well (didn’t expect them to be very large?) and it slowed things down noticeably.

Apparently it’s still a thing and the workaround doesn’t work either:

> This is still relevant with Windows 11; adding a 20MB hosts file (to block every known malicious IP) makes a 24-core i7 /w nvme take 4+ hours to boot. Worse, DNS cache is now system-controlled and cannot be stopped. Do not attempt!

https://serverfault.com/questions/322747/can-a-long-etc-host...

userbinator•10mo ago
That sounds like the result of an "accidentally quadratic" or worse algorithm. Interesting that they didn't bother to fix it after all these years; perhaps they knew what those with large HOSTS files were using them for, and (especially now with Win11) were against it.
SapporoChris•10mo ago
I have 133 occurrences of google in my host file.(and I'm not even saying that's enough) Those five you listed are a good start, but you can do better. There are a lot of services available to update your host file.
NelsonMinar•10mo ago
I block ads and trackers in my browser. But I had that turned off for Blue Shield's website because it is very broken in lots of ways. One way it's broken is it fails if you run an ad blocker. Not sure if blocking Google's surveillance is the problem or some other ad blocker rule.
XCSme•10mo ago
This can happen to anyone, and not only that, once you decide to send data to thrid-parties, you no longer have control of this data, and those third-parties themselves might accidentally leak the data. Who would then be to blame if you sent the data to someone that didn't respect the privacy regulations? Because the customer only had a contract directly with you, and only shared data with your company.

Offtopic: I wrote a TLDR of this incident here: https://www.uxwizz.com/blog/blue-shield-data-breach-why-self...