frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
487•klaussilveira•7h ago•130 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
828•xnx•13h ago•495 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
48•matheusalmeida•1d ago•5 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
163•isitcontent•8h ago•18 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
104•jnord•4d ago•15 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
159•dmpetrov•8h ago•74 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
57•quibono•4d ago•10 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
267•vecti•10h ago•127 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
334•aktau•14h ago•161 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
216•eljojo•10h ago•136 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
329•ostacke•13h ago•87 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
31•kmm•4d ago•1 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
418•todsacerdoti•15h ago•220 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
9•denuoweb•1d ago•0 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
8•romes•4d ago•1 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
349•lstoll•14h ago•245 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
55•phreda4•7h ago•9 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
205•i5heu•10h ago•150 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
117•vmatsiiako•12h ago•43 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
155•limoce•3d ago•79 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
30•gfortaine•5h ago•4 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
12•gmays•3h ago•2 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
254•surprisetalk•3d ago•32 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1008•cdrnsf•17h ago•421 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
50•rescrv•15h ago•17 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
83•ray__•4h ago•40 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
41•lebovic•1d ago•12 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
78•antves•1d ago•59 comments

How virtual textures work

https://www.shlom.dev/articles/how-virtual-textures-really-work/
32•betamark•15h ago•28 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
41•nwparker•1d ago•11 comments
Open in hackernews

Teen suspect surrenders in 2023 Las Vegas casino cyberattack case

https://www.casino.org/news/teen-suspect-surrenders-in-2023-las-vegas-strip-cyberattack-case/
64•campuscodi•4mo ago

Comments

james_marks•4mo ago
> In 2023, hackers used vishing (voice phishing) to impersonate employees and gain access to the internal systems of MGM Resorts International and Caesars Entertainment on the Las Vegas Strip, causing hundreds of millions of dollars in financial losses.

First time I’ve heard the term “vishing” to describe the attack we’ve all seen coming.

electroglyph•4mo ago
social engineering is as old as hacking itself
ChrisMarshallNY•4mo ago
That was Mitnick’s specialty, and he was hacking before the Web.
AstroNutt•4mo ago
The Art of Deception was one of my favorite books when it came out.
wrayjustin•4mo ago
Phishing (Email), Smishing (SMS/Text Messages), and Vishing (Voice) are all standard industry terms, though obviously phishing is most well known.

Then there's even subcategories that further define some of these, like Spear Phishing, Whaling.

The industry loves its fun naming.

airstrike•4mo ago
"Phishing" isn't limited to email
lostlogin•4mo ago
That’s lucky. Putting ‘ishing’ on the end of something email related doesn’t work very well.
mmaunder•4mo ago
Never heard of vishing. I’m in the industry.
saithound•4mo ago
Wrong industry. It is primarily the "sell anti-phishing training to enterprise employees" industry that uses these terms.
antonymoose•4mo ago
I was worked in an anti Phishing / brand protection firm back in 2012 and we had Vishing and Smishing terminology baked in the to projects back then.
Razengan•4mo ago
> Smishing

uh that's something completely different (and not Monty Python)

Ekaros•4mo ago
Why is it not emishing with email?
StanislavPetrov•4mo ago
In my day we used to call it "social engineering".
Barbing•4mo ago
“human hacking”
ipnon•4mo ago
If a hastily organized band of teenagers can pull this off, you have to wonder what APTs are capable of.
tehwebguy•4mo ago
I’m almost positive ripping off a casino isn’t a crime. I’d be demanding a jury trial for sure.
era37•4mo ago
Legal: using your brain. Illegal: devices, collusion, past-posting, edge-sorting with marked cards. Juries know the difference.
closewith•4mo ago
Jurors also know that casinos aren't innocent victims, but great sources of societal harm.
immibis•4mo ago
Do they? Most people don't seem to know that.
Scoundreller•4mo ago
Statistically, the jury will be made of people that lost money at a casino, know they’re a financial scam or have some moral disagreement with them.
evan_•4mo ago
Orrrr it might be people who work in casinos/tourism and don’t feel great about someone extorting their employer.
LtWorf•4mo ago
TBH I would not hold a grudge to anyone extorting my employer.
trvr•4mo ago
I was in Las Vegas when this happened, though we had no idea that day that this is what was happening. My wife and I went to get tickets to the Titanic exhibit at the Luxor and they said "our computers systems are down, we can only take cash". I had cash, and they sold us the tickets for extremely cheap.

Long story short, I've always felt like I stole from the casino that day too! :-)

sudoshred•4mo ago
Cyberpunk robin hood
betsor•4mo ago
I was on call when that happened. Absolute nightmare for a few weeks and most of the team didn´t sleep for days. I hold no grudge but the business thinks differently for sure. Cheers to those guys because the way they got access and made it through was very clever after the social engineering part.
sillysaurusx•4mo ago
It’s cool to hear from someone who was on the front lines. I want to ask vague questions like “what was everyone’s initial reaction like?” or “how urgent was the call when you got it?” but mostly I’d just like to hear more of whatever you’d like to talk about.
joules77•4mo ago
It's like being behind a McDonald fry station when suddenly thousand people show up for lunch. So sort of like a Prank video.

Now the real question is why do prank videos mesmerize people?

The chimp troupes handles randomness and unpredictability, with the 3 inch chimp brain whose hardware hasn't been updated in 100K years, only one way - tell stories. It's our randomness handling hack.

The stories breakdown all the time.

3eb7988a1663•4mo ago

  MGM reportedly refused to pay a ransom, resulting in an estimated $100 million in losses and roughly 10 days of system outages affecting reservations, slot machines, room keys and websites. Caesars, in contrast, was reported by the Wall street Journal to have paid $15 million of a $30 million ransom demand and experienced less operational disruption.
So what happened to the $15 million?
Barbing•4mo ago
Reinvested (into more crime)
DarkmSparks•4mo ago
How you know https is compromised...

Access to this page is disabled The law prohibits participation in games of chance organized by unauthorized persons through means of electronic communication.

The authorized organizers of games of chance via means of electronic communication are the State Lottery of Serbia and persons authorized by the Ministry of Finance.

heavyset_go•4mo ago
You don't need to break TLS to do IP and domain blocking and redirection.

That said, I'd assume governments have access to root certificates, anyway, but they're only broken out for big investigations or secret dragnet stuff we'll find out about in five decades, if ever.

toast0•4mo ago
You don't need to break TLS to do IP/domain blocking, but you can't redirect an https page unless you have an acceptable certificate.

> but they're only broken out for big investigations or secret dragnet stuff we'll find out about in five decades, if ever.

Certificate Transparency, where required, makes certificates unusable if they're not published... But that might not be enough information.

10000truths•4mo ago
This is a DNS hijack, not an HTTPS hijack. The ISP's resolver sees "casino.org" in the A/AAAA query, finds it in a blocklist, and responds with an IP address to a web server that serves a block page (or a CNAME thereto).
michaelmcmillan•4mo ago
Which is useless if the domain had HSTS enabled, which they should.
10000truths•4mo ago
HSTS for a domain is trust-on-first-use unless the domain is in the browser's preload list.
toast0•4mo ago
The HN link is to https:// ... a web browser cannot request the page, and cannot process a redirect unless the server responds with an acceptable certificate. If the server responds with an unacceptable certificate, the browser may ask the user to accept it, in which case the browser could connect and issue the request and receive the block or a redirect.

If the user doesn't click through the certificate error, the user will only know it's blocked (or the server is misconfigured), they won't get information on why it's blocked; perhaps details of the certificate might help narrow down the cause of the block or the agency implementing it.

If the user loads the https page and sees "Access to this page is disabled The law prohibits participation in games of chance organized by unauthorized persons through means of electronic communication." as suggested earlier in this thread, and the user did not click through a certificate error, then the MITM must have obtained an acceptable certificate somehow or broken TLS. Since Sep 2024, multi-perspective issuance corroboration has been required by the CA/Browser Forum [1] and it was a best practice for many years, DNS takeover in a single country should be not sufficient to establish domain control for certificate issuance.

[1] https://cabforum.org/2024/08/05/ballot-sc067v3-require-domai...

10000truths•4mo ago
> The HN link is to https:// ...

Ah right, obviously the browser would still try to connect via TLS to the new IP. Not sure why I missed that.

vintermann•4mo ago
You certainly can, but you should get a big screaming "this site's certificate is not valid for dodgy-casino.games" warning.

If not, then maybe your browser vendor has been pressured to add some root certificate controlled by the Serbian police, which it approves to issue certificates to impersonate dodgy-casino.games.

cookiengineer•4mo ago
> One count of conspiracy to commit extortion

How can it be a planned conspiracy if only one person was involved? US law is so weird when it comes to bogus charges just to blow up the case artificially.

Is the offender a person with multiple identity disorder or what's the reasoning here?

MathMonkeyMan•4mo ago
I know of a guy who got nailed with "armed robbery" because he stole a gun from the glove compartment of an unoccupied car that he had broken into. All a prosecutor wants to do is screw somebody as hard as possible and win the case.
bagels•4mo ago
Seems appropriate to me. Person was holding a gun while doing a robbery which greatly amplifies the danger inherent in the crime they were doing.

On the flip side, I knew someone who interrupted a car burglary and was murdered by the burglar. Imagine what might happen if someone came upon the guy you know of who was doing a robbery while holding a stolen gun?

The person you knew made a lot of choices that led to this, any of which had they not chosen to do would have led to not being an armed robber: don't do a robbery, don't steal a gun, don't do a robbery while holding a gun.

lambertsimnel•4mo ago
IANAL, but my understanding is that breaking into an unoccupied car isn't robbery (but it might be theft and/or criminal damage). Wouldn't being convicted of armed robbery without committing a robbery be a serious injustice?
MathMonkeyMan•4mo ago
He stole the gun, so it was robbery. I feel like an armed robbery is one where you bring a weapon, which makes the robbery more dangerous. This guy was looking for cash and found a gun, so "armed robbery." The comment above claiming that the charge is justified does make sense, but I disagree with it. I'm also not a lawyer.
lambertsimnel•4mo ago
What I mean is that if no victim was present there couldn't have been the violence or threat of violence necessary to turn the theft/larceny into robbery:[0]

> Robbery, in turn, was simply a "compound" form of larceny. For Blackstone, "compound larciny is such as has all the properties of former, but is accompanied with one of, or both, the aggravations of a taking from one's house or person," id. at *240, and "[l]arciny from the person is either privately stealing; or by open and violent assault, which is usually called robbery,"

I'm not really making a judgement about the rights and wrongs of the actual case (because I'm not only not a lawyer, but also not a witness, juror, etc.), but as described it doesn't sound like robbery at all.

[0] https://web.archive.org/web/20060903163713/http://docket.med...

ascorbic•4mo ago
> Cybersecurity experts have attributed the attacks to a loosely organized hacker group known as Scattered Spider, which also operates under aliases such as Octo Tempest, UNC3944 and 0ktapus3.
aborsy•4mo ago
How come their IT systems are so bad that a kid in secondary school (thus with no experience) “hacked” into them?
hulitu•4mo ago
Because they protect against the user. Computer security has evolved: we must milk the user of its data and make sure he doen't interfere with the milking process.
IlikeMadison•4mo ago
What always interests me in these type of cases is how do hackers get identified? Aren't they savvy enough to use some sort of proxies to cover their tracks?
squigz•4mo ago
It only takes 1 mistaken connection for it all to fall apart.
Scoundreller•4mo ago
It only takes 1 mistaken connection for the parallel construction hammer to drop
immibis•4mo ago
No.
heavyset_go•4mo ago
Subpoenas and cooperating third parties can de-obfuscate proxy chains.
Xmd5a•4mo ago
Hack a wifi, connect longer-range radio IoT module, link it to your base, attach it to a firework rocket, hide it inabush near the target wifi, hack, ???, ignite.
jackgavigan•4mo ago
Likely linked to other recent arrests in the UK: https://www.theregister.com/2025/09/19/scattered_spider_teen...
Lucasoato•4mo ago
It should be illegal to pay a ransom to cyber criminals, every time it happens you’re increasing the incentives for these activities and you’re making it more likely to happen again in the future. If it’s illegal, these groups would feel less attracted to attack companies, because they know they wouldn’t be compensated for it.
vintermann•4mo ago
Seems obvious to me too, but then again, if we went with coordinating for the obvious common good there wouldn't be a casino industry to extort in the first place.
hiatus•4mo ago
What's the end result? Prosecuting the victim of a cybercrime for paying a ransom?
Tuna-Fish•4mo ago
The end result is less cybercrime and thus less victims.

The way you get there is prosecuting the victims of cybercrime for paying a ransom, if any are stupid enough to break the law.

dundarious•4mo ago
Alternatively, reporting of cyber crime craters or is massively delayed.
DangitBobby•4mo ago
Right, because it's so easy to hide an outage of that scale.
dundarious•4mo ago
You're right that the biggies wouldn't really have that option. I'm sure they're not the only ones that get hit by such attacks, though. Smaller and non-public companies would have to think about it.

I'm not even arguing for a specific policy, but I didn't like how the framing of the post was about being "stupid" enough to break the proposed law. It wouldn't be that simple.

heavyset_go•4mo ago
But what if cyber criminals planted a bomb and are demanding a ransom, and Jack Bauer can't defuse it in time?