frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
499•klaussilveira•8h ago•138 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
836•xnx•13h ago•503 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
53•matheusalmeida•1d ago•10 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
110•jnord•4d ago•18 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
164•dmpetrov•8h ago•76 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
166•isitcontent•8h ago•18 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
59•quibono•4d ago•10 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
279•vecti•10h ago•127 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
339•aktau•14h ago•163 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
222•eljojo•11h ago•139 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
332•ostacke•14h ago•89 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
421•todsacerdoti•16h ago•221 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
34•kmm•4d ago•2 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
11•denuoweb•1d ago•0 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
360•lstoll•14h ago•248 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
15•gmays•3h ago•2 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
9•romes•4d ago•1 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
58•phreda4•8h ago•9 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
209•i5heu•11h ago•156 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
33•gfortaine•6h ago•8 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
121•vmatsiiako•13h ago•51 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
159•limoce•3d ago•80 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
257•surprisetalk•3d ago•33 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1013•cdrnsf•17h ago•422 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
51•rescrv•16h ago•17 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
93•ray__•5h ago•43 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
44•lebovic•1d ago•12 comments

WebView performance significantly slower than PWA

https://issues.chromium.org/issues/40817676
10•denysonique•5h ago•0 comments

How virtual textures work

https://www.shlom.dev/articles/how-virtual-textures-really-work/
35•betamark•15h ago•29 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
81•antves•1d ago•59 comments
Open in hackernews

Vietnam Airlines Data Breach

https://haveibeenpwned.com/Breach/VietnamAirlines
74•pbd•3mo ago

Comments

naedish•3mo ago
Haven't heard a word from Vietnam Airlines - my whole family are members. Interesting to see how a Vietnamese organisation handles this type of incident.
nerdponx•3mo ago
Does the Vietnamese government have any interest in cases like this? Or are things pretty laissez-faire over there despite the nominal socialism?
naedish•3mo ago
Really not sure - my partner is Vietnamese (dual citizenship) but we don't live there. We flew Vietnamese Airlines for 4 flights in the last month (2 international). I'd like to think we'd receive an email about this in any case - so far only an email from HIBP.
zkmon•3mo ago
Trying to understand what's the real damage here. Dates of birth, Email addresses, Loyalty program details, Names, Phone numbers - how is one going to use this data to cause a loss the data owner? If any security check depends on this data by considering it as a secret, then I guess it's the fault of that security check.
brightbeige•3mo ago
https://security.stackexchange.com/a/95070

https://en.wikipedia.org/wiki/Phishing#Spear_phishing

zkmon•3mo ago
As I mentioned, the real issue is around considering of this data as a secret.
nerdponx•3mo ago
Phishing and persecution are real things that happen and can be greatly facilitated by personal details like this.
zkmon•3mo ago
Just to clarify to the downvoters: I meant "Secret" as in password, not as in "private data". It is a private data, but it shouldn't be used as a secret to pass some security check.
kijin•3mo ago
Where in the article does it say that the leaked information is used as a secret to pass security checks?

You are attacking a straw man here.

flotzam•3mo ago
It's inherently a loss of privacy that anyone (given that the dataset is now public) can correlate

> Dates of birth, Email addresses, Loyalty program details, Names, Phone numbers

zenmac•3mo ago
>In October 2025, data stolen from the Salesforce....

Seems like a salesforce leak. Not to single out sales force here. Could easily be fill in the ____ big corp. When are people going to get there is no absolute digital security. And at currently state, it is much more secure to NOT have all the data aggregated in one place. Of course this would go against the data mining operation. We should look at this from a perspective that benefits the user in the long term.

Server/relay should be very thin layer NOT storing any identifiable info about the user except for public keys. All other info should be stored locally where ONLY the user has access to them.

Thorrez•3mo ago
I don't think Salesforce itself was hacked. It says "data stolen from the Salesforce instances of multiple companies".

HIBP links to [1], which links to [2], which says

>The FBI last week warned airlines in the US that the group was targeting the aviation sector. In a post on X, the FBI said the group uses social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access, and bypassing multi-factor authentication.

So it sounds like phishing attacks against the individual airlines. It sounds pretty much the same as [3], which goes into detail of the exact mechanism that phishers can use to steal Salesforce data. It does sound like it is a little bit Salesforce's fault, because Salesforce's UI makes it really easy to grant an attacker access to your database without realizing it. Salesforce needs to improve the permission granting UI so that it's clearer what is going on.

[1] https://www.theguardian.com/business/2025/oct/11/hackers-lea...

[2] https://www.theguardian.com/business/2025/jul/02/qantas-conf...

[3] https://cloud.google.com/blog/topics/threat-intelligence/voi...

skybrian•3mo ago
There are lots of Saleforce customers getting hacked. [1]

> Insurance giant Allianz Life, Google, fashion conglomerate Kering, the airline Qantas, carmaking giant Stellantis, credit bureau TransUnion, and the employee management platform Workday, among several others, have confirmed their data was stolen in these mass hacks.

Perhaps it's bad security defaults which are in some sense user error, but when it becomes common pattern then I think the company needs to make systematic fixes.

Compare with many Snowflake customers getting hacked.

[1] https://techcrunch.com/2025/10/03/hacking-group-claims-theft...

chrischen•3mo ago
Another way to look at it is what's the real damage considering the breach right under Vietnam airlines already leaked that.
skeeter2020•3mo ago
>> If any security check depends on this data by considering it as a secret, then I guess it's the fault of that security check.

That is very small solace when you're the victim, regardless of the failures of others. "But you shouldn't be using that data as validation!" is not the first response when say, you find out someone's opened a credit card in your name with a $20K balance. Or your friends & family get phished (especially with the help of AI) because they know so much about you it had to be you.

ceejayoz•3mo ago
I’ve seen folks get their frequent flyer miles siphoned off. This would be perfect for a phishing attack intended to do that.
basilikum•3mo ago
Phishing, scams and social engineering mostly. Such breaches are a gold mine for that.

Scam calls are a lot more credible when rather than starting with "Hello, this is Microsoft calling. There is a problem with your computer." you get a call like:

"Hello Mr. zkmon, this is Mallory from MasterCard. I'm calling to verify a recent, suspicious transaction from your card to Vietnam Airlines on August 6th. We just want to make sure that was you and your card is not being misused. Before we do that can we please quickly verify your identity? I see here in our system that you're born in 1996. Can you please tell me your exact birth date so I can be sure I'm really talking to Mr. zkmon?"

Bonus points when the breach contains what bank you are at so they can pretend to be them.

Also such databreaches are useful for stalking people or tracking people down with very little information and then doxing them etc. Say all you have is an online username of someone you don't like, so you just search a database of leaks for that string. From there you get an email address and full name. And from there you can continue searching other breaches with those details and using other public sources.

JCharante•3mo ago
> how is one going to use this data to cause a loss the data owner?

1 email to my sister going "I have hacked into your computer and know xyz I'll spill your secrets unless you pay" was enough to make her freak out. It's all stuff that can be obtained from these leaks.

Vietnam is particularly bad with breaches. For like 25 cents you can send a telegram bot a phone number and it will immediately reply with DOB, ID number, Home Address, Facebook profiles, Instagram profiles. I know this because everyone gets a freebie and I tested it out.

tom1337•3mo ago
at this point one should just assume all their data is already public once they entered it to any platform...
Jcampuzano2•3mo ago
Given how willing basically every major company is to sell your data to make money this is basically already the case and has been for years.

And when governments try to plug up some of the loopholes when it comes to privacy and data sharing, every major company finds some new gap to exploit or just does it illegally without telling anybody until they get found out and pay the fine.

notahacker•3mo ago
Can't think of an airline I'd be less surprised to hear this about.

Vietnam Airlines once somehow managed to email me the boarding pass of another person due to fly with them the following day. I'd provided an email address to their sales agent when booking a flight on a different route some nine years earlier (back in the good old days of 2009 when they didn't have newfangled stuff like online booking), and didn't even have a remotely similar name to the individual whose boarding pass they'd sent me. I hope they didn't miss their flight! (yes, I emailed back, copying in some customer service addresses that definitely weren't no-reply...)

I'm not an expert in airline PSS systems, but I know one thing - that isn't supposed to happen :)

greatgib•3mo ago
Testing some emails in haveibeenpwned i realized something terrible about these leaks.

In isolation, ok, you have just your personal data like birthdate, name, phone number leaked just based on an email.

But now that there was so many leaks, just taking a single email, you can easily map an important part of the profile of a person. Give me an email, I now have: - All identification details, sometimes scanned id documents - linkedin details about the professional details of a person, which company when, ... - Even without the clear official address, you can have an average estimation of where the person live by looking at the countries or location of breached companies. - I can see with leak of big and small retailers like CostCo where the person is doing is shopping. Sometimes it can be worse for specialized retailers, like knowing that you might be vegetarian, or like buying electronic products. - With telecom providers breachs, you know the internet and mobile provider of a person, you can also discover that the person has multiple phone and mobile lines. - With leaks of forum and so, you can see if a user is into specific topics. - With things like leaks of airline providers like that, you can know if the person is a frequent flyers, might be a frequent visitor of some countries or area of the world as companies are often highly linked with their HQ country base. - You might also know that a person is frequently living in another place/country than its official residence ...

derwiki•3mo ago
Makes me feel OK about my strategy to use a different email for every sign up
skeeter2020•3mo ago
if you run your own domain and have a wildcard for email this is a very good strategy. I also never provide my real birthdate for (almost) anything. The vast majority DO NOT NEED IT, and the rare case where it might be required (still doubt it, but maybe age of majority or consent, or a waiver) I use Jan 1st of the real year. This has caused problems (ex: doesn't match your id) but on the balance seems to be positive.
ryandrake•3mo ago
Even without your own email hosting, Gmail kind of lets you do this by appending +whatever to your address before @gmail.com. Obviously this can be trivially detected and stripped but I suppose it is better than nothing. Multiple real Email addresses are definitely a best practice.
thenthenthen•3mo ago
Like: myname+whatever@gmail.com?
rkomorn•3mo ago
Yep. I do this a lot. It occasionally doesn't work (eg: some sites don't think + is valid).

To be fair, I don't think it's made a huge difference in my life. In fact it's possibly been more of a negative than a positive.

skatingaway•3mo ago
You do realize if this your strategy, you must own that domain FOREVER. Whomever purchases that domain after it expires now owns all your email aliases. Assuming you do a good job of changing all your emails at every service you ever used, there is still that potential leak. Large cloud services such as google do not allow name reuse. Of course paying for a domain name forever is probably still a better idea than a provider who can be purchased, but just a reminder!!
derwiki•3mo ago
It’s a good call out. I’m glad that I used one domain instead of scattershot across all the ones I’ve owned: at least I’m only bound to renew the one domain. It’s a cheap TLD and hopefully it stays cheap!
JCharante•3mo ago
Vietnam is particularly bad with breaches. For about 25 cents you can send a telegram bot a phone number and it will immediately reply with DOB, ID number, Home Address, Facebook profiles, Instagram profiles. I know this because everyone gets a freebie and I tested it out. For most twenty-somethings people's home address in the leaks are their parents home in the countryside. It's a security nightmare for any girl, especially when they leave parcels containing name & phone number in the mailrooms of condo towers.
8cvor6j844qw_d6•3mo ago
Using email alias for per account helps avoid tying your details across websites works pretty well as long as phone number is not associated with said account.

Also helps in tracking misbehaving websites that sells/leaks your emails or subject your email with excessive spam. I recall Stack Social is one of the worst offenders.

mustaphah•3mo ago
I've never been able to unsubscribe from their shitty emails - which I never subscribed to. I only signed up for a flight.

And now, my data is open-source ಠ_ಠ

TheDong•3mo ago
I think technically the CAN-SPAM act applies to an international company with any US customers, but in practice no company primarily in another country cares about that US law.

Maybe if the US was willing to perform an air strike on each business that violated CAN-SPAM we'd get some real compliance.

andrewinardeer•3mo ago
Qantas got caught up too.

For those that don't know, Qantas stands for Queensland and Northern Territory Airline Service.