frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

European.cloud: A Curated Directory of EU-Based Cloud Providers

https://european.cloud/
41•florian_s•32m ago•11 comments

A stateful browser agent using self-healing DOM maps

https://100x.bot/a/a-stateful-browser-agent-using-self-healing-dom-maps
16•shardullavekar•57m ago•8 comments

Liquibase continues to advertise itself as "open source" despite license switch

https://github.com/liquibase/liquibase/issues/7374
217•LaSombra•5h ago•157 comments

Upcoming Rust language features for kernel development

https://lwn.net/Articles/1039073/
156•pykello•7h ago•61 comments

Nightmare Fuel: What is Skibidi Toilet, How it demos a non-narrative future

https://journal.media-culture.org.au/index.php/mcjournal/article/view/3108
14•mallowdram•1h ago•16 comments

New coding models and integrations

https://ollama.com/blog/coding-models
139•meetpateltech•7h ago•46 comments

JustSketchMe – Digital Posing Tool

https://justsketch.me
98•surprisetalk•5d ago•21 comments

Claude Haiku 4.5

https://www.anthropic.com/news/claude-haiku-4-5
659•adocomplete•20h ago•251 comments

Jiga (YC W21) Is Hiring Full Stacks

https://www.workatastartup.com/jobs/44310
1•grmmph•1h ago

Steve Jobs and Cray-1 to be featured on 2026 American Innovations $1 coin

https://www.usmint.gov/news/press-releases/united-states-mint-releases-2026-american-innovation-o...
161•maguay•6h ago•138 comments

TurboTax’s 20-year fight to stop Americans from filing taxes for free (2019)

https://www.propublica.org/article/inside-turbotax-20-year-fight-to-stop-americans-from-filing-th...
363•lelandfe•7h ago•168 comments

Flies keep landing on North Sea oil rigs

https://theconversation.com/thousands-of-flies-keep-landing-on-north-sea-oil-rigs-then-taking-off...
128•speckx•5d ago•51 comments

Credential Stuffing

https://ciamweekly.substack.com/p/credential-stuffing
18•mooreds•2d ago•12 comments

Silver Snoopy Award

https://www.nasa.gov/space-flight-awareness/silver-snoopy-award/
65•LorenDB•4d ago•16 comments

Zed is now available on Windows

https://zed.dev/blog/zed-for-windows-is-here
470•meetpateltech•20h ago•290 comments

Free applicatives, the handle pattern, and remote systems

https://exploring-better-ways.bellroy.com/free-applicatives-the-handle-pattern-and-remote-systems...
70•_jackdk_•9h ago•19 comments

Build a Superscalar 8-Bit CPU (YouTube Playlist) [video]

https://www.youtube.com/watch?v=bwjMLyBU4RU&list=PLyR4neQXqQo5nPdEiMbaEJxWiy_UuyNN4&index=1
104•lrsjng•5d ago•10 comments

Apple M5 chip

https://www.apple.com/newsroom/2025/10/apple-unleashes-m5-the-next-big-leap-in-ai-performance-for...
1167•mihau•1d ago•1244 comments

The people rescuing forgotten knowledge trapped on old floppy disks

https://www.bbc.com/future/article/20251009-rescuing-knowledge-trapped-on-old-floppy-disks
30•jnord•5d ago•7 comments

Leaving serverless led to performance improvement and a simplified architecture

https://www.unkey.com/blog/serverless-exit
426•vednig•1d ago•223 comments

Are hard drives getting better?

https://www.backblaze.com/blog/are-hard-drives-getting-better-lets-revisit-the-bathtub-curve/
233•HieronymusBosch•20h ago•117 comments

VOC injection into a house reveals large surface reservoir sizes

https://www.pnas.org/doi/10.1073/pnas.2503399122
5•PaulHoule•4d ago•0 comments

The Hidden Math of Ocean Waves Crashes Into View

https://www.quantamagazine.org/the-hidden-math-of-ocean-waves-crashes-into-view-20251015/
35•pykello•6h ago•1 comments

A Gemma model helped discover a new potential cancer therapy pathway

https://blog.google/technology/ai/google-gemma-ai-cancer-therapy-discovery/
159•alexcos•18h ago•40 comments

Sharp Bilinear Filters: Big Clean Pixels for Pixel Art

https://bumbershootsoft.wordpress.com/2025/10/11/sharp-bilinear-filters-big-clean-pixels-for-pixe...
10•todsacerdoti•4d ago•3 comments

Chat-GPT becomes Sex-GPT for verified adults

https://twitter.com/sama/status/1978129344598827128
16•smartmic•1h ago•28 comments

Show HN: Halloy – Modern IRC client

https://github.com/squidowl/halloy
339•culinary-robot•1d ago•91 comments

What is going on with all this radioactive shrimp?

https://www.consumerreports.org/health/food-safety/radioactive-shrimp-explained-a5493175857/
85•riffraff•5d ago•24 comments

TaxCalcBench: Evaluating Frontier Models on the Tax Calculation Task

https://arxiv.org/abs/2507.16126
52•handfuloflight•9h ago•14 comments

F5 says hackers stole undisclosed BIG-IP flaws, source code

https://www.bleepingcomputer.com/news/security/f5-says-hackers-stole-undisclosed-big-ip-flaws-sou...
195•WalterSobchak•23h ago•92 comments
Open in hackernews

Credential Stuffing

https://ciamweekly.substack.com/p/credential-stuffing
18•mooreds•2d ago

Comments

DarkNova6•1h ago
Feels like LLM generated. I really would appreciate a TLDR.
gregoriol•54m ago
tl;dr: "Credential stuffing is an attack where malicious actors use stolen username-password pairs from one service to attempt unauthorized access to other services. Unlike brute force attacks that try many passwords against one account, credential stuffing exploits the widespread problem of password reuse across multiple platforms. Defending against credential stuffing requires multiple strategies. Unfortunately no single defense provides complete protection."
rokkamokka•36m ago
I'd argue that the really old custom of providing the user a fixed username (e.g. user ID) upon registration, and requiring that for login, provides complete protection vs credential stuffing. It has other drawbacks of course, which is why you rarely see it in use anymore...
mooreds•19m ago
Do you mean a username that is distinct from email or phone number?

If so, why does that provide protection against credential stuffing? A username can be reused across different applications.

What am I missing?

jaratec•3m ago
> Do you mean a username that is distinct from email or phone number?

No, he means a unique user id, generated by the server when you sign up for the service. Then for every login attempt, you provide the username/email + user id + password.

IAmBroom•7m ago
How does providing a predictable username protect against anything at all?
aetherson•1m ago
Because credential stuffing relies on the user reusing a username + password from another site. If you provide the user with a username they don't select, it won't be reused.
jbstack•21m ago
"Unfortunately no single defense provides complete protection"

For the server, maybe. For the user, a password manager (used properly) is a solid single defense solution.

IAmBroom•8m ago
I first noticed this weakness when I was caught in a "password breach", which was really a fishing site for passwords.

I checked the list of passwords, and a significant amount had values like "uRFcWEBSITENAME".

I reasoned first they would try USERNAME, PASSWORD, and then try USERNAME with passwords updated for the other websites they were hacking.

Even the section of passwords beginning with just the first letter of WEBSITENAME was unusually large. Then I scanned for passwords containing the first few letters of WEBSITENAME... yup, a conspicuous lot of them. Those people at least tried to be smart about their password uniqueness, but it didn't really work.

pankalog•19m ago
Some years ago I researched the whole credential stuffing ecosystem for a course paper at uni.

Credential Stuffing is (or at least was) a gigantic market, and it is one of the biggest headaches for the biggest pay-walled services, like Netflix, HBO, Prime, etc.

The people that made a living out of it were stuffing millions or billions of credentials (sourced from database leaks) in the most popular services, hoping to then sell the accounts for small amounts of money, like a dollar for a Netflix account with a 10-day warranty. It's a numbers game at heart with a substantial technical aspect, where you need to optimize your checker code to essentially send properly formatted requests that can't be intercepted and don't arouse suspicion, and then you had an ecosystem of "methods" that are certain request-response chains that make your login request look like it's from a real person. People needed to figure out advanced methods to not invoke a CAPTCHA check, which is cost-prohibitive, but not impossible to solve automatically (AI wasn't a thing back then). You then have to buy millions of proxies that are able to route the requests from different IPs so that you're not sending millions of requests from a single IP. Checkers had reached a point where, depending on your proxies, were performing 10,000 or even 20,000 checks per minute. Multithreading was the cornerstone of these technologies, as a simple 2vCPU VM was already bottlenecked by proxy speeds.

Back when I looked into it, it was the wild west, as SSO and other technologies just weren't a thing yet. Companies would become fads of this credential stuffing scene, and it would take a dev team an entire sprint just for them to make a login page that was able to at least force a CAPTCHA check for each single request, and that's IF they had the proper monitoring tools to notice the gigantic spike in login requests. Having a valid account to a service like Ebay where you can then order whatever you want with the linked credit-card, you can understand how big of a security issue this is.

I haven't looked at it recently, but I assume that this has become vastly more difficult for the common-place services like streaming providers and digital goods marketplaces. SSO, IAM platforms like Keycloak, and advanced request scanning techniques have evolved. I'm guessing things have become substantially better, but it's always going to be a big issue for those smaller websites without a dedicated dev team or without at least someone maintaining them.

mooreds•4m ago
Is the paper public? Would love to review/reference it for the newsletter.
ArcHound•6m ago
I am so happy I am no longer responsible for these. We had a solid monitor and an analysis script that was quite good at dealing with the attacks.

Then the fun thing was that some lawyers concluded this is still a breach on success and that we should be responsible and report/mitigate these.

How? How do you stop your users from making dumb decisions? The only solution seems to be to "give up" and go passwordless, putting the credentials to the big boys in town.