frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Postgres LISTEN/NOTIFY does not scale

https://www.recall.ai/blog/postgres-listen-notify-does-not-scale
293•davidgu•3d ago•109 comments

Show HN: Pangolin – Open source alternative to Cloudflare Tunnels

https://github.com/fosrl/pangolin
29•miloschwartz•4h ago•4 comments

What is Realtalk’s relationship to AI? (2024)

https://dynamicland.org/2024/FAQ/#What_is_Realtalks_relationship_to_AI
232•prathyvsh•11h ago•79 comments

Show HN: Open source alternative to Perplexity Comet

https://www.browseros.com/
160•felarof•8h ago•54 comments

Batch Mode in the Gemini API: Process More for Less

https://developers.googleblog.com/en/scale-your-ai-workloads-batch-mode-gemini-api/
21•xnx•3d ago•4 comments

FOKS: Federated Open Key Service

https://foks.pub/
177•ubj•13h ago•42 comments

Graphical Linear Algebra

https://graphicallinearalgebra.net/
180•hyperbrainer•10h ago•12 comments

Flix – A powerful effect-oriented programming language

https://flix.dev/
217•freilanzer•12h ago•88 comments

Measuring the impact of AI on experienced open-source developer productivity

https://metr.org/blog/2025-07-10-early-2025-ai-experienced-os-dev-study/
514•dheerajvs•10h ago•326 comments

Belkin ending support for older Wemo products

https://www.belkin.com/support-article/?articleNum=335419
53•apparent•7h ago•47 comments

Red Hat Technical Writing Style Guide

https://stylepedia.net/style/
159•jumpocelot•11h ago•71 comments

Yamlfmt: An extensible command line tool or library to format YAML files

https://github.com/google/yamlfmt
25•zdw•3d ago•12 comments

Launch HN: Leaping (YC W25) – Self-Improving Voice AI

49•akyshnik•8h ago•25 comments

Turkey bans Grok over Erdoğan insults

https://www.politico.eu/article/turkey-ban-elon-musk-grok-recep-tayyip-erdogan-insult/
84•geox•3h ago•57 comments

How to prove false statements: Practical attacks on Fiat-Shamir

https://www.quantamagazine.org/computer-scientists-figure-out-how-to-prove-lies-20250709/
198•nsoonhui•16h ago•153 comments

eBPF: Connecting with Container Runtimes

https://h0x0er.github.io/blog/2025/06/29/ebpf-connecting-with-container-runtimes/
35•forxtrot•7h ago•0 comments

Regarding Prollyferation: Followup to "People Keep Inventing Prolly Trees"

https://www.dolthub.com/blog/2025-07-03-regarding-prollyferation/
40•ingve•3d ago•1 comments

Show HN: Cactus – Ollama for Smartphones

108•HenryNdubuaku•7h ago•45 comments

Grok 4

https://simonwillison.net/2025/Jul/10/grok-4/
178•coloneltcb•6h ago•148 comments

Analyzing database trends through 1.8M Hacker News headlines

https://camelai.com/blog/hn-database-hype/
116•vercantez•2d ago•61 comments

Not So Fast: AI Coding Tools Can Reduce Productivity

https://secondthoughts.ai/p/ai-coding-slowdown
55•gk1•2h ago•34 comments

Diffsitter – A Tree-sitter based AST difftool to get meaningful semantic diffs

https://github.com/afnanenayet/diffsitter
89•mihau•13h ago•26 comments

Matt Trout has died

https://www.shadowcat.co.uk/2025/07/09/ripples-they-cause-in-the-world/
139•todsacerdoti•19h ago•42 comments

Is Gemini 2.5 good at bounding boxes?

https://simedw.com/2025/07/10/gemini-bounding-boxes/
259•simedw•13h ago•58 comments

The ChompSaw: A Benchtop Power Tool That's Safe for Kids to Use

https://www.core77.com/posts/137602/The-ChompSaw-A-Benchtop-Power-Tool-Thats-Safe-for-Kids-to-Use
80•surprisetalk•3d ago•64 comments

Foundations of Search: A Perspective from Computer Science (2012) [pdf]

https://staffwww.dcs.shef.ac.uk/people/J.Marshall/publications/SFR09_16%20Marshall%20&%20Neumann_PP.pdf
4•mooreds•3d ago•0 comments

Show HN: Typeform was too expensive so I built my own forms

https://www.ikiform.com/
166•preetsuthar17•17h ago•86 comments

Final report on Alaska Airlines Flight 1282 in-flight exit door plug separation

https://www.ntsb.gov:443/investigations/Pages/DCA24MA063.aspx
131•starkparker•5h ago•141 comments

Radiocarbon dating reveals Rapa Nui not as isolated as previously thought

https://phys.org/news/2025-06-radiocarbon-dating-reveals-rapa-nui.html
17•pseudolus•3d ago•8 comments

Optimizing a Math Expression Parser in Rust

https://rpallas.xyz/math-parser/
127•serial_dev•17h ago•55 comments
Open in hackernews

Retail cyber attacks: NCA arrest four for attacks on M&S, Co-op and Harrods

https://www.nationalcrimeagency.gov.uk/news/retail-cyber-attacks-nca-arrest-four-for-attacks-on-m-s-co-op-and-harrods
68•sandwichsphinx•8h ago

Comments

clort•7h ago
Little information there about them, but I find it kind of surprising that the suspects are even UK based..
beepboopboop•7h ago
Why is that surprising?
golan•6h ago
I guess I’d expect them to be in a country where it’d be difficult to be apprehended and extradited. Being in the UK seems like a stupid move to me, but what do I know!
immibis•5h ago
Was it a professional operation? Says they were 17. Some people playing around with their Commodore 64 except it's connected to the internet and a pretty big company.
dylan604•4h ago
Let's not pretend these kids were trying to hack the Gibson just for the lulz. Calling into help desk, requesting password resets with social engineering, getting into network, installing ransomware is all well beyond playing around. I know there are smart teens, but I would not be surprised to find out there is someone more experienced in the background that got the kids going if not even on behalf of.

There are plenty of teens selling dope, stealing cars, breaking into homes, yet nobody thinks they're just knuckleheads playing around. Why do we think because "but on a computer" makes it different?

multjoy•3h ago
Likely an OCG behind them. I wouldn't be surprised to see a defence of exploitation.
RainyDayTmrw•49m ago
Cybercrime is usually international, cross-border, because (1) it's all online anyways, and so it's approximately equally difficult from any country, and (2) to disincentivize your own local law enforcement from getting involved.
dboreham•6h ago
You have to buy underwear or prawn sandwiches in the UK to know M&S exists?
gluten_guardian•7h ago
Crazy how young all these cyber criminals are. When I was their age, the peak of my criminal career was scoring booze by lying about my age. I wish they shared a little bit on what cyberattacks they were conducting.
pekim•7h ago
I suspect that it is related to the M&S and Co-op attacks. https://www.bbc.co.uk/news/articles/cwykgrv374eo
MisterTea•6h ago
Young people have little fear of repercussion as they cant really fathom the consequences. Either they learn from this misadventure or go on being a career criminal. All of this depends on their home lives.
scott_w•6h ago
This simply isn’t true. Yes, teenagers are morons by the standard of a well adjusted 30 year old, but they’re more than capable of understanding consequences for their actions.

I hate to sound like my parents/grandparents but I absolutely knew that causing millions of pounds of damage and attempting to blackmail a major corporation could have huge negative consequences for people and myself at 17.

immibis•6h ago
The probability they'll try to teach you to obey the law instead of locking you in a cell for life is significantly higher when you're 17 than when you're 35. Even better if you're 13, though.
scott_w•5h ago
I’m a bit torn on that, honestly. Were this an embarrassing hack like the ones I read about as a teenager, I’d agree. However, they caused millions of pounds of damage to multiple companies (and their customers) and attempted to blackmail the CEO for profit.

I’d be amazed, and I think the public would be outraged, if they got a slap on the wrist for this.

stackskipton•5h ago
>I hate to sound like my parents/grandparents but I absolutely knew that causing millions of pounds of damage and attempting to blackmail a major corporation could have huge negative consequences for people and myself at 17.

Sure but not all do. If you look at murders, most of them are in 15-24 range in United States so them being 17, 19 and 20 tracks with what you expect.

scott_w•5h ago
And yet most 15-24 year olds are not committing murder, this sentence:

> Young people have little fear of repercussion as they cant really fathom the consequences.

is not true.

martinald•5h ago
But it is very well understood and accepted that teenage - especially male prefrontal cortexes don't fully develop until mid 20s.

I'm sure they knew it could have major consequences, but when your risk taking pedal (limbic system) pedal is pushed to the floor all the time and your risk avoidance brakes (prefrontal cortex) is not fully developed that all goes out of the window, not unlike being intoxicated.

For example, I shudder to think how aggressively I drove when I first got a car - and I was very sensible compared to many people I knew! I hadn't actually drove for a couple of decades since I was an adolescent until very recently and I had to rent a car for something, but it was absolutely startling to me my frame of mind vs the last time I drove. All I can remember back then that driving was extremely fun and the more windy the road the better, this time all I could see was loads of giant risks.

Now if you compare this to the whole population, if you have a segment of it that are much more risk seeking either through genetics or environmental reasons, you can see the problem.

You can see this in all kinds of statistics at a societal level - crime, accidents, addiction risk. It is all much higher in these age ranges (and especially skewed towards males).

I don't think we should just dismiss good science like this "because I knew better". It has always been a very grave societal issue that has tended to be ignored or downplayed.

Obviously this doesn't give people carte blanche to do what they want - I'm not saying that. But hopefully societal views will catch up a bit with society and we can actually do something about it.

scott_w•5h ago
> Young people have little fear of repercussion as they cant really fathom the consequences.

> But it is very well understood and accepted that teenage - especially male prefrontal cortexes don't fully develop until mid 20s.

Your statement here does not mean that the statement I quoted above is true. Just because biology predisposes one to doing stupid shit does not mean young people are incapable of understanding consequences and repercussions. The fact that most of us here never went out to cause millions of pounds of damage is testament to that.

BoorishBears•5h ago
I don't understand why clarifying young folks are capable of understanding consequences and repercussions, but will underperform at doing so for a myriad of reasons, including real physical differences in brain structure, should be this contentious.
scott_w•4h ago
Because we’re talking in the context of young people who executed a multi-stage criminal enterprise causing millions of pounds of damage, harming multiple companies and their customers, AND TRIED TO EXTORT THE CEO FOR PROFIT.

This is not “behavioural immaturity” associated with an underdeveloped prefrontal cortex!

martinald•3h ago
Actually, this is exactly what underdeveloped prefrontal cortex looks like at scale. You're describing sophisticated technical execution combined with catastrophically poor judgment.

They bragged about it to the BBC as well. This is not a clever strategy to not get caught. Neither is not immediately fleeing to another jurisdiction than the very one you committed the crimes in.

This is what happens when you have extremely smart kids with high risk-taking tolerance. If they weren't as intellectually gifted, they might be driving a souped up 15 year old Golf like a maniac round country roads - but because they have these technical capabilities, their poor judgment scales up to cause millions in damage instead of just getting themselves arrested with a few grams.

michaelt•4h ago
There are some statements that, though reasonable in isolation, are almost always heard from people teeing up a really bad opinion.

For example, if someone says "I'm not racist, but" I'm already rolling my eyes before they've even said what they're about to say.

Similarly, when some people hear "prefrontal cortexes don't fully develop until" they start rolling their eyes pre-emptively at the infantilising, anti-personal-responsibility take that usually follows. Even if it didn't, in your case.

MisterTea•3h ago
Maybe I didn't phrase that quite right. I knew a kid who was caught by the FBI carding at just 14. He was totally aware of what he was doing but did not comprehend the severity of his crimes. Like I remember him just casually dismissing it as some cute prank. Apparently he was arrested, had his computer confiscated, then banned from using the Internet or a computer. I only heard that through others who knew him personally so who knows but I never saw him online after that incident (irc/icq/aim days.)

So with that story, some teenagers don't or can't comprehend the severity of their crimes or the trial and punishment that ensues. To them it's just a dumb credit card company write off and a free laptop or whatever.

I'll admit, I used to push limits. Used to do silly things with misfit friends. Got into a little incident where we pissed off some dudes, one who had a gun (no one shot but man having one pointed at you is scary AF.) Learned real fast not to do stupid "funny shit" that was really just jerk behavior. We never expected to have a gun pointed at us.

That's what teenagers do, they push limits without thinking because they're rebellious. Looking to carve out their independence. Sometimes, they learn the hard way. That's just life.

nkrisc•5h ago
Not sure I'd agree. I'm sure most people reading here at HN had some computer-related incident as a teenager that made them realize there could be real consequences goofing around with a computer. And I would guess of those that did, most heeded that warning.
scott_w•5h ago
Yes, maybe these kids never learnt that lesson, for whatever reason. My point is that you can’t make this general claim:

> Young people have little fear of repercussion as they cant really fathom the consequences.

Clearly, young people can. Maybe these young people couldn’t, but that’s a different claim.

miohtama•5h ago
How bad your system be if it can be hacked by a kid?
socalgal2•4h ago
A kid can break all the windows in your house, smash in your door, set your house, car, bike, clothing on fire. I guess all those things are bad

I'm not saying the system wasn't poorly implemented but, society doesn't work when people abuse everything either. Maybe that just means we're doomed but most of society works because people don't go around smashing and/or taking everything they possibly can.

Aurornis•4h ago
3/4 of them were over 18. The other was 17.

It’s also unclear if this was everyone, or just who they caught. It’s not unknown for hacking groups to position the youngest (least experienced, most desperate for recognition) people in the most vulnerable positions.

lyu07282•7h ago
Apparently they pretended to be an employee and the help desk reset the password for them. Once in the door, active directory imploded as usual, with full access they encrypted everything and demanded ransome.

Source: https://specopssoft.com/blog/marks-spencer-ransomware-active...

Hilift•7h ago
Reminds me of Maersk. They had poor endpoint hygiene and no EDR. In 2017 about 90% of their infrastructure was wiped in less than one minute. They had to reinstall a lot of things due to backups weren't up to par. Usually level 1 merchants (> 6 million transactions per year) are put on an audit and improvement plan if this occurs. In the UK, there could be an investigation and penalty from the ICO for the data breach.
roywiggins•6h ago
> They had to reinstall a lot of things due to backups weren't up to par.

"After a frantic search that entailed calling hundreds of IT admins in data centers around the world, Maersk’s desperate administrators finally found one lone surviving domain controller in a remote office—in Ghana. At some point before NotPetya struck, a blackout had knocked the Ghanaian machine offline, and the computer remained disconnected from the network. It thus contained the singular known copy of the company’s domain controller data left untouched by the malware—all thanks to a power outage... So the Maidenhead operation arranged for a kind of relay race: One staffer from the Ghana office flew to Nigeria to meet another Maersk employee in the airport to hand off the very precious hard drive. That staffer then boarded the six-and-a-half-hour flight to Heathrow, carrying the keystone of Maersk’s entire recovery process."

https://www.wired.com/story/notpetya-cyberattack-ukraine-rus...

aaronrobinson•7h ago
This stinks of foreign sponsorship. I can see how they could pull off the social engineering but being able to work their way around a foreign system like they did - no way.
lyu07282•4h ago
Active directory has become an invaluable tool for ransome gangs, it not only gives them effortless root access on every system, but also documents the company structure so you can focus your resources. This isn't sophisticated at all.
casenmgreen•6h ago
Evil Tor used are blocked. Can't read site.
jancsika•6h ago
I only read sites that are written in Rust, and I can't load this one either.

Can someone post a String Literal for us, please?

testfrequency•6h ago
Omg rust is so fast. Did you know that?

edit: wow, fun is cancelled for today it seems

golan•6h ago
Related Reddit thread : https://www.reddit.com/r/cybersecurity/s/LXb88TKC4M
bargainbin•5h ago
This doesn’t surprise me. I work for a company that hires a substantial headcount from TCS, probably one of their biggest clients, and the quality of the work is astonishingly bad.

I’d recommend avoiding at all costs but we all know these companies are brought in by non-technical people.

toomuchtodo•5h ago
+1 from first hand experience with TCS
miohtama•5h ago
In a proper capitalistic system, those who build low quality e-commerce services, including hackable ones, should go out of business and replace more competent companies. This includes buying services from bad suppliers.

This Reddit post hints that many shortcuts were taken, security not taken seriously when they should have, and now they reap what they sow.

skippyboxedhero•5h ago
There has been no reaping. MKS shares were largely unimpacted (despite this costing at least £300m). Management have tried to deflect, said this was a highly sophisticated attack, said that other firms had been hacked but just didn't report it, endless amounts of lying.

The reality is that decreasing costs is a far easier lever to pull than increasing revenue so managers will be heavily incentivised to do this if you give them profit-based incentives. This happens every few years with listed companies in the UK now, no-one ever changes their behaviour (retail, in particular, is ground zero for bluffers in the UK, managers are exceptionally bad, and even worse are comp committees that set targets that cannot be achieved without damaging long-term value).

There is no efficient market here. It is as simple as managers understanding the world we now live in, and that is unlikely because all these companies view IT as a cost and their managers are people who rotate through executive roles and politics despite leaving a flaming wreck in their wake. Things will stay the same.

immibis•5h ago
In capitalism-as-explained-by-capitalists, that would happen. In actual capitalism, it would not.
lyu07282•5h ago
That's a very naive view of capitalism, there is nothing inherently preventing companies from being negligent in infosec no matter how "proper" that system is. Also wouldn't defunding the ICO make it more proper?
chrisweekly•4h ago
"go out of business and replace more competent companies"

... be replaced by more competent companies

helloooooooo•4h ago
They do. Security is about risk management. It’s all very actuarial. If the damages from an attack are severe enough (ie. a company makes it go bankrupt), that’s capitalism working.
Aurornis•4h ago
> In a proper capitalistic system, those who build low quality e-commerce services, including hackable ones, should go out of business

If the impact is large enough, they do.

This not a case where binary thinking works for most situations, though. The costs associated with the attack will hurt them by damaging their balance sheets a little bit, taking capital away from more productive opportunities, and distracting their employees from more fruitful tasks.

There’s always a public thirst for immediate blood in these situations, but the damage is more subtle and manifests more as opportunity cost than a sudden collapse of the company. The demand for sudden stock market collapse of companies is ironic, given all of the criticisms thrown at companies for putting too much emphasis on short term stock results.

mattigames•3h ago
"proper capitalist system" aka fantasy capitalism, an utopic capitalism that lacks operations/tasks where deceiving is cheaper than doing things correctly, yes I am one of those that don't believe that such thing is compatible with human nature.
SheinhardtWigCo•4h ago
> In 3 of 4 calls, the service desk reset passwords and re-enrolled MFA with zero resistance. The caller simply gave a name – no validation, no callback, no check. On the 4th call, the attacker requested access to a privileged group. The TCS agent asked for an employee ID. The ID given didn’t even match our company’s format; and yet, the access was granted anyway.

Yikes

djaychela•6h ago
A friend of mine is senior management at one of these companies. His life has been a real nightmare trying to get things back on track - there are so many interconnected systems that they needed to get back up 'clean' and running just to get their normal business running, let alone the online side. And he's not even directly responsible for any of this, but it's all so embedded in a modern retail business that if something like this happens it's your problem to deal with to a degree. The stress caused by this sort of thing is immense.
mtkd•4h ago
>it's your problem to deal with to a degree

How is it not the responsibility of senior management at a major retailer to ensure an exploit at a vendor can't take the whole house of cards down?

Many other major enterprise clients out there are all over vendor security/compliance ... auditing and reauditing vendors to minimise chance of this happening or worst-case, if does happen, containing it and recoverying quickly

devwastaken•5h ago
Cyber crime does not exist. Only deficient systems intentionally designed to be exploited exist. if you want your “cyber infrastructure” to not be attacked, dont make it vulnerable. All tech is artificial, not of nature.

Require software to be developed by licensed engineers. no more offshoring. no more importing of cheap labor. make tech corps pay instead of acruing mass wealth. Make the corps pay when the vulnerabilities they put in it are exploited.

tsm•5h ago
Theft does not exist. Only deficient windows intentionally designed to be breakable exist. if you want your "personal possessions" to not be taken, dont make them vulnerable. <etc>

Yes, the companies involved should take some responsibility for terrible security practice (though I'm sure they wish this had never happened!) but victim-blaming doesn't justify crime.

devwastaken•7m ago
More like if the store had the information of every customer sitting there for anyone to take. yes, theyre responsible for their negligence.

When you know its going to happen, and then it happens because you did nothing - yeah, its your fault.