frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

DoNotNotify is now Open Source

https://donotnotify.com/opensource.html
153•awaaz•3h ago•21 comments

Show HN: LocalGPT – A local-first AI assistant in Rust with persistent memory

https://github.com/localgpt-app/localgpt
237•yi_wang•9h ago•108 comments

Matchlock: Linux-based sandboxing for AI agents

https://github.com/jingkaihe/matchlock
21•jingkai_he•2h ago•0 comments

Reverse Engineering Raiders of the Lost Ark for the Atari 2600

https://github.com/joshuanwalker/Raiders2600
10•pacod•1h ago•1 comments

Haskell for all: Beyond agentic coding

https://haskellforall.com/2026/02/beyond-agentic-coding
132•RebelPotato•9h ago•38 comments

SectorC: A C Compiler in 512 bytes (2023)

https://xorvoid.com/sectorc.html
313•valyala•17h ago•61 comments

LLMs as the new high level language

https://federicopereiro.com/llm-high/
132•swah•5d ago•223 comments

The Architecture of Open Source Applications (Volume 1) Berkeley DB

https://aosabook.org/en/v1/bdb.html
41•grep_it•5d ago•6 comments

Modern and Antique Technologies Reveal a Dynamic Cosmos

https://www.quantamagazine.org/how-modern-and-antique-technologies-reveal-a-dynamic-cosmos-20260202/
8•sohkamyung•5d ago•0 comments

Software factories and the agentic moment

https://factory.strongdm.ai/
235•mellosouls•19h ago•396 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
193•surprisetalk•16h ago•198 comments

LineageOS 23.2

https://lineageos.org/Changelog-31/
71•pentagrama•5h ago•14 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
207•vinhnx•20h ago•22 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
196•AlexeyBrin•22h ago•36 comments

In the Australian outback, we're listening for nuclear tests

https://www.abc.net.au/news/2026-02-08/australian-outback-nuclear-tests-listening-warramunga-faci...
11•defrost•1h ago•1 comments

uLauncher

https://github.com/jrpie/launcher
33•dtj1123•4d ago•8 comments

Brookhaven Lab's RHIC concludes 25-year run with final collisions

https://www.hpcwire.com/off-the-wire/brookhaven-labs-rhic-concludes-25-year-run-with-final-collis...
82•gnufx•15h ago•66 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
373•jesperordrup•1d ago•111 comments

Wood Gas Vehicles: Firewood in the Fuel Tank (2010)

https://solar.lowtechmagazine.com/2010/01/wood-gas-vehicles-firewood-in-the-fuel-tank/
56•Rygian•3d ago•24 comments

Show HN: I saw this cool navigation reveal, so I made a simple HTML+CSS version

https://github.com/Momciloo/fun-with-clip-path
111•momciloo•17h ago•24 comments

First Proof

https://arxiv.org/abs/2602.05192
151•samasblack•19h ago•94 comments

Rabbit Ear "Origami": programmable origami in the browser (JS)

https://rabbitear.org/book/origami.html
4•molszanski•3d ago•1 comments

Substack confirms data breach affects users’ email addresses and phone numbers

https://techcrunch.com/2026/02/05/substack-confirms-data-breach-affecting-email-addresses-and-pho...
66•witnessme•6h ago•28 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
616•theblazehen•3d ago•222 comments

Al Lowe on model trains, funny deaths and working with Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
114•thelok•19h ago•25 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
353•1vuio0pswjnm7•23h ago•581 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
927•klaussilveira•1d ago•282 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
188•speckx•4d ago•278 comments

Show HN: A luma dependent chroma compression algorithm (image compression)

https://www.bitsnbites.eu/a-spatial-domain-variable-block-size-luma-dependent-chroma-compression-...
49•mbitsnbites•3d ago•7 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
312•isitcontent•1d ago•39 comments
Open in hackernews

Procolored printer drivers contained malware

https://www.neowin.net/news/this-printer-company-served-you-malware-for-months-and-dismissed-it-as-false-positives/
143•bundie•8mo ago

Comments

elmt35•8mo ago
The printer company in question is: Procolored
yccs27•8mo ago
Yup, that clickbait headline should be "Procolored served customers malware for months, dismissed it as false positives" instead.
kevincox•8mo ago
But that only grabs the attention of people who own a relatively niche Procolored printer. This clickbait headline scares everyone with a printer into clicking.

Absolute shit state we are in.

HPsquared•8mo ago
What is it with printers and (pardon the pun) shady practices?
gostsamo•8mo ago
diminishing market and margins call for extreme pressure to monitize whatever is left of the user base.
bigfatkitten•8mo ago
These aren’t commodity office printers. They’re UV inkjets, which are used to print artwork onto objects and cost many thousands of dollars.
raverbashing•8mo ago
So it sounds more like TDD (technobro driven development)
bolognafairy•8mo ago
I assure you that “sneaking spyware into installers” predates “tech bros”
Avamander•8mo ago
No it's your average hardware vendor wanting to spend the smallest possible amount of money on software.
M95D•8mo ago
There's only some printer companies. I'm using Epson inkjet and I never had any problems. Drivers are very good too.
jpc0•8mo ago
Their inktank line is quite scummy tbh…

Catch filter that can be trivially replaced in the field, firmware needs to be reset by an authorised repair center (yes there are workarounds but they aren’t official)

Also on windows their “drivers” install a ton of crap with them, even when you install the most basic version in their installer. When in fact they have go a driver which does exactly what it should and only installs a driver but then they don’t get that sweet spyware installed on your machine.

Never mind their network printer driver just failing to print half the time. Prints fine from my phone, on the same network right next to my PC but from my PC, FU.

Epson are not innocent in the chaos that is printers.

stop50•8mo ago
To be frank: every consumer printer "driver" installs bloat.
rvnx•8mo ago
If Bitcoin wallets would be designed properly they would ask for a second confirmation before sending 100k USD.

This may be the main thing to fix here, as it's very plausible that hacks happen again and again... by design.

Today it's an infected printer, tomorrow it will be a game on Steam.

alpaca128•8mo ago
Steam already had a game with an infostealer a while ago. A pirate game.

But something like that would only be surprising if it was more than an obvious lazy asset flip.

cm2187•8mo ago
The malware doesn’t send all the content of the wallet to itself, it just replaces the recipient address in the clipboard (so you wouldn’t notice unless you checked the address). The 100k I think are cumulatively, though if it is 9btc, it’s more like 1m.
cjbprime•8mo ago
Then the malware would provide that confirmation to the wallet too. Defending yourself from malware running on the same (Windows) machine is mostly impossible.
xnickb•8mo ago
That's a much harder attack to pull off. Windows actually does a decent job at preventing this kind of thing from being easily achievable.

Clipboard attacks are far easier, as most modern systems treat clipboard as a non-critical resource. Which is mind blowing if you ask me.

An app reading from clipboard must ring all sorts of alarms. Let alone writing to it.

gruez•8mo ago
>An app reading from clipboard must ring all sorts of alarms. Let alone writing to it.

You realize any sort of content editing app is going to be reading from clipboard? Most apps used on a daily basis are going to be reading from clipboard.

xnickb•8mo ago
Ok let me clarify:

- An app running in the background listening to clipboard changes;

- An app without a focused/visible window reading clipboard;

- An app reading from clipboard without a corresponding user input (menu/hotkey)

All these should be detectable and controlled by the OS

codetrotter•8mo ago
That kind of confirmation does exist, it’s called using a hardware wallet, such as those made by Trezor and others.

https://trezor.io/

The bigger question is, when they said:

> G Data's research showed that the Bitcoin address linked to SnipVex had received about 9.3 BTC, roughly $100,000

How big was the largest amount stolen?

It could be a few individuals with a lot of money in their unprotected software wallets, or it could be a lot of people with relatively smaller amounts stolen from each of them.

If you only have a couple hundred dollars worth of bitcoin and don’t intend to buy any more of it then it doesn’t make much sense to spend as much on a hardware wallet as those cost. But if you have like $500 of bitcoin then it starts to make more sense. Especially if you plan on buying more of it. And if you have over a $1,000 and are still using a software wallet you should really look into getting a hardware wallet ASAP IMHO.

johnisgood•8mo ago
This should be relatively easy to implement.
latexr•8mo ago
> This may be the main thing to fix here

It’s not, because that wasn’t the problem and would not have worked. For one, nothing indicates the $100K were extracted in one go, it looks like it was cumulative. For another, this malware isn’t directly sending coins, it’s just replacing addresses in your clipboard.

xnorswap•8mo ago
Right, but the confirmation prompt could say something like,

"You're sending $100k to L33tHaX0R, are you sure?"

But that would require the protocol to also have the ability to set friendly names against public addresses.

You could imagine a wallet that uses certificates for address validation. So a certificate owner could sign that they own a given public key. ( And sign with the public key to show they own that key too. )

Then that could go into a "verified recipients" section of the wallet, and you could set your wallet to only allow sending to verified recipients. ( Or only allow transactions over X to verified ).

jagged-chisel•8mo ago
I don’t see how this prevents malware from changing the destination just before the transaction heads out. If it can change addresses, then it can change them at any point in the process, even after human verification.
xnorswap•8mo ago
It doesn't stop specialized malware, but it stops clipjacking.

Security isn't an absolute. You're not trying to stop all vectors, you're just trying to put up a barrier to trip up by far the most common and easy method.

In a world where everyone leaves their doors open all day, you're asking "Why shut and lock your door when an attacker could just smash your windows?"

tough•8mo ago
on crypto you have also posioning address attacks (so using your clipboard to paste an addy is already a bad idea)
latexr•8mo ago
> But that would require the protocol to also have the ability to set friendly names against public addresses.

Which it doesn’t, and changing it to do so is not a realistic option. If we’re dreaming up anything, then my suggestion would instead be for no one to be dishonest, or for everyone’s basic needs to be met so they don’t need money and to speculate on cryptocurrencies. I’m pretty confident either of those would happen before every way people routinely get swindled off their cryptocurrencies is solved.

gruez•8mo ago
>But that would require the protocol to also have the ability to set friendly names against public addresses.

Most crypto exchanges and merchants generate unique addresses per user/transaction, so this won't work. Moreover having a fixed address is bad for privacy because it makes it obvious what the recipient of a given transaction is.

gruez•8mo ago
>If Bitcoin wallets would be designed properly they would ask for a second confirmation before sending 100k USD.

They already do? Here's a random screenshot I found:

https://user-images.githubusercontent.com/4597798/33999728-3...

the details are blacked out, but you can make out that it shows the address label along with the full addresse

canvascritic•8mo ago
SnipVex clipjacking wallets is almost beside the point, the real failure is a printer vendor treating software like a side gig. Printer and hardware companies get a pass on basic infosec hygiene that would be unacceptable for open source maintainers.

until that changes, airgap your weird hardware setups I guess

Also this is a perfect storm for lateral movement. USB-borne worms still work frighteningly well in small biz environments, especially ones with no centralized IT and people plugging printers directly into Windows desktops with admin perms. Here SnipVex is just a cherry on top-a nice, opportunistic payload for the growing class of infostealers targeting crypto wallets

ChrisMarshallNY•8mo ago
> a printer vendor treating software like a side gig

This is a chronic problem with hardware vendors.

Source: Software developer for hardware companies, for over 30 years.

throw903332•8mo ago
> basic infosec hygiene that would be unacceptable for open source maintainers

Opensource printer stack is a legacy mess. There is critical vulnerability almost every year. There are not enough money or developers to fix that!

aaviator42•8mo ago
> Opensource printer stack is a legacy mess.

I don't necessarily disagree, but isn't this because of extremely bad firm/soft/hardware design by the printer companies that then have to be supported by the open source stack?

juliangmp•8mo ago
The printer stack as a whole is a legacy mess.. I have an easier time getting a 3D printer to work than any inkjet machine
diggan•8mo ago
Maybe I got lucky, but in 2017 I bought a Brother DCP-L2520DW laser printer. No matter what OS, computer or network I connect it to, it seems to just work for everyone involved, always, and I don't think I've had a single issue with it since I got it nor did anything at all to set it up, basically installed CUPS on my desktop to get it to work and for Windows/macOS it just works.

Not affiliated, just happy user, at least some companies seem to be able to deal with it, regardless if it's open source (my stack) or not (my wife's Apple-stack).

Avamander•8mo ago
There has been a strong push by OS makers to unify and simplify printer interfaces to the point that they should not require special drivers.

But this process is still ongoing and lazy hardware vendors will continue to be lazy in their switch, if they have the option.

barbazoo•8mo ago
What’s that “switch” you’re referring to?
oasisaimlessly•8mo ago
"IPP Everywhere" [1][2]

[1]: https://wiki.debian.org/CUPSIPPEverywhere

[2]: https://www.pwg.org/ipp/everywhere.html

Avamander•8mo ago
IPP Everywhere linked in the other comment, but there's also Mopria certified printers (https://mopria.org/certified-products). Which use WPP drivers on Windows.
anticodon•8mo ago
I've bought almost the same model but a few years later. I also enjoy how effortless is connecting this printer to Linux. I have to install brlaser driver manually though.

But I did some research before buying (including here on HN) and Brother printers were praised for being reliable and having no problems with Linux drivers.

Suppafly•8mo ago
Brother lasers are the cheat mode for cheap quality prints with no BS.
indrora•8mo ago
Don't speak too quickly: https://www.tomshardware.com/peripherals/printers/brother-ac...
Suppafly•8mo ago
Luckily the old ones last forever, so it won't be a problem for another 20 years lol.
Avamander•8mo ago
What are we talking about here?
ajross•8mo ago
> Opensource printer stack is a legacy mess. There is critical vulnerability almost every year. There are not enough money or developers to fix that!

Maybe true, but no live trojans either, so it's ahead of the game already as I see it.

mcv•8mo ago
Unintentionally spreading malware is bad enough, but blindly dismissing reports as false positives is really bad. Verify first.
TheDong•8mo ago
Verify how?

Go look at the "build log" in your compromised jenkins server and download the (already compromised) build artifact and make sure it matches the mega.co.nz file?

Do you expect the average software engineer to be able to look at a .exe, pull up a disassembler, and know that all the assembly maps back to the source code?

lores•8mo ago
It's not hard to replicate downloading a zip archive from the official location and find someone knowledgeable to look at it if you aren't yourself. A non-software-engineer did just that.
hnlmorg•8mo ago
The person who originally reported it was not super technical so if your software engineer can’t reproduce the customers steps to see the same error then you probably need better software engineers.
duskwuff•8mo ago
You say "Jenkins server" as if there's a CI setup involved.

I wouldn't be surprised if, in many cases, these companies just have whoever touched the code last run a build on their computer and ship that. (Which probably explains how some of the malware got there.)

AStonesThrow•8mo ago
No, you do not understand Help Desk Level I Troubleshooting.

The steps are invariably:

- Turn it off then turn it back on again

- Force stop, clear your cache and cookies

- Disable AV and firewall then reinstall

If the user cannot be induced to follow this simple script, then we can never move past the most basic of troubleshooting sessions.

Because everyone knows that troubleshooting is about covering up the symptoms rather than diagnosing the root cause.

shermantanktop•8mo ago
Have you worked at a Help Desk? It’s shocking how often those dumb questions reveal what’s really going on. Fake but realistic examples:

- chrome doesn’t work! (It was actually Microsoft word)

- my printer won’t print! (Out of paper)

- your program keeps crashing! (No, that’s the os reminding you of a security update)

rcxdude•8mo ago
They do happen all the time, though. One piece of software I work on frequently fails in CI when a dependency updates because it often triggers defender's automated "new threat" detection system some days after it's released. After another week or so it's fine, but it's a pain the neck.
razakel•8mo ago
Hosting drivers on mega.co.nz.

Totally fills you with confidence.

codetrotter•8mo ago
I’ve seen other hardware companies that host firmware downloads for their products on Google Drive and some Chinese cloud drive. I don’t think doing that, nor Dropbox link, is different really from hosting it on Mega.
bolognafairy•8mo ago
Okay. It still doesn’t fill me with confidence.
MathMonkeyMan•8mo ago
Trust us, bro. We paid bottom dollar for this software.
djfergus•8mo ago
“ It is also worth noting that I contacted Procolored support four times over the course of my testing, for help with figuring out the software and settings. Every single time, the agent requested multiple times that I allow them to connect remotely to my computer”
tough•8mo ago
lol are procolored just a NK hacker unit or something ffs
jeroenhd•8mo ago
At least mega.co.nz is a file sharing name I recognise.

My keyboard's drivers are hosted on "egnyte.com"

Lammy•8mo ago
There's nothing wrong with Mega
msh•8mo ago
It implies that the company does not give a shit when they don’t even use their own web server.
jiggawatts•8mo ago
The worst part is that setting up static web content hosting with something like an Azure blob store, or just a NGINX server somewhere is hilariously trivial.

This is an afternoon's effort for the junior intern, but was "too hard" for these people.

eyegor•8mo ago
That costs money to maintain, even if it's just a few bucks a month. I've seen plenty of Chinese companies using mega/gdrive/etc just because it's free. I used to think it was just cheapness, but depending on the company it can be a huge hassle to set up recurring small bill items. At my current company for example, it's much easier to pay $5-10k once than pay $5/mo.
moi2388•8mo ago
Nope azure blob storage hosting can be completely free
perching_aix•8mo ago
With Google Drive specifically, scale becomes an issue though. Once too many people download a given shared file, it gets flagged for possibly being a piracy operation. Not sure about MEGA, but they also have some limits (although for normal drivers this shouldn't be an issue).
barbazoo•8mo ago
CDN? Cloud? What’s the obsession with running your own web server?
sidewndr46•8mo ago
If you distribute SHA256 or similar hashes through a secure mechanism, it seems OK to me.
fph•8mo ago
Ah yes, it's totally secure for those 5 users who check the hash of the files they download.
shakna•8mo ago
> While some redditors speculate that the trojan was planted on purpose, there is no evidence to support this claim. Outdated malware with an inactive command-and-control server is not advantageous for any attacker nor does superinfection make sense for this scenario. A far more plausible explanation points to the absence or failure of antivirus scanning on the systems used to compile and distribute the software packages. Procolored promises to improve this process, so that it cannot happen again.

That this system is so insecure as to be hit multiple times, I don't know how much stock anyone should put in "improved processes". This is a company who seems to have gone out of their way to create an insecure environment - probably out of some frustration, but all the same, insecure.

pavel_lishin•8mo ago
> Procolored promises to improve this process, so that it cannot happen again.

Given their lax security posture, can we really trust this promise? I'd demand, at minimum, a pinky swear.

sidewndr46•8mo ago
The improved process likely involved legal adding a clause to some sort of EULA that renders them harmless from any of their basic security failures
M95D•8mo ago
Somehow, I was expecting to be about HP.
whimsicalism•8mo ago
crazy to me that people are still writing malware in delphi