frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Build Your Own Database

https://www.nan.fyi/database
134•nansdotio•3h ago•28 comments

Neural audio codecs: how to get audio into LLMs

https://kyutai.org/next/codec-explainer
272•karimf•6h ago•85 comments

LLMs can get "brain rot"

https://llm-brain-rot.github.io/
180•tamnd•5h ago•97 comments

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws

https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via...
200•zdw•3h ago•100 comments

Do not accept terms and conditions

https://www.termsandconditions.game/
39•halflife•4d ago•26 comments

Show HN: Katakate – Dozens of VMs per node for safe code exec

https://github.com/Katakate/k7
55•gbxk•4h ago•24 comments

NASA chief suggests SpaceX may be booted from moon mission

https://www.cnn.com/2025/10/20/science/nasa-spacex-moon-landing-contract-sean-duffy
55•voxleone•6h ago•281 comments

Our modular, high-performance Merkle Tree library for Rust

https://github.com/bilinearlabs/rs-merkle-tree
97•bibiver•6h ago•25 comments

Mathematicians have found a hidden 'reset button' for undoing rotation

https://www.newscientist.com/article/2499647-mathematicians-have-found-a-hidden-reset-button-for-...
28•mikhael•5d ago•14 comments

Time to build a GPU OS? Here is the first step

https://www.notion.so/yifanqiao/Solve-the-GPU-Cost-Crisis-with-kvcached-289da9d1f4d68034b17bf2774...
21•Jrxing•2h ago•0 comments

ChatGPT Atlas

https://chatgpt.com/atlas
339•easton•2h ago•360 comments

Flexport Is Hiring SDRs in Chicago

https://job-boards.greenhouse.io/flexport/jobs/5690976?gh_jid=5690976
1•thedogeye•2h ago

Ilo – a Forth system running on UEFI

https://asciinema.org/a/Lbxa2w9R5IbaJqW3INqVrbX8E
86•rickcarlino•6h ago•29 comments

Wikipedia says traffic is falling due to AI search summaries and social video

https://techcrunch.com/2025/10/18/wikipedia-says-traffic-is-falling-due-to-ai-search-summaries-an...
99•gmays•18h ago•117 comments

The Programmer Identity Crisis

https://hojberg.xyz/the-programmer-identity-crisis/
99•imasl42•3h ago•93 comments

Diamond Thermal Conductivity: A New Era in Chip Cooling

https://spectrum.ieee.org/diamond-thermal-conductivity
124•rbanffy•8h ago•37 comments

StarGrid: A new Palm OS strategy game

https://quarters.captaintouch.com/blog/posts/2025-10-21-stargrid-has-arrived,-a-brand-new-palm-os...
170•capitain•8h ago•35 comments

Apple alerts exploit developer that his iPhone was targeted with gov spyware

https://techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-wit...
175•speckx•3h ago•81 comments

Binary Retrieval-Augmented Reward Mitigates Hallucinations

https://arxiv.org/abs/2510.17733
18•MarlonPro•3h ago•3 comments

Magit Is Amazing

https://heiwiper.com/posts/magit-is-awesome/
51•Bogdanp•1h ago•31 comments

Getting DeepSeek-OCR working on an Nvidia Spark via brute force with Claude Code

https://simonwillison.net/2025/Oct/20/deepseek-ocr-claude-code/
52•simonw•1d ago•2 comments

AWS multiple services outage in us-east-1

https://health.aws.amazon.com/health/status?ts=20251020
2187•kondro•1d ago•1986 comments

Minds, brains, and programs (1980) [pdf]

https://home.csulb.edu/~cwallis/382/readings/482/searle.minds.brains.programs.bbs.1980.pdf
4•measurablefunc•1w ago•0 comments

Show HN: ASCII Automata

https://hlnet.neocities.org/ascii-automata/
64•california-og•3d ago•7 comments

The death of thread per core

https://buttondown.com/jaffray/archive/the-death-of-thread-per-core/
30•ibobev•22h ago•5 comments

What do we do if SETI is successful?

https://www.universetoday.com/articles/what-do-we-do-if-seti-is-successful
66•leephillips•1d ago•54 comments

Show HN: bbcli – A TUI and CLI to browse BBC News like a hacker

https://github.com/hako/bbcli
27•wesleyhill•2d ago•2 comments

The Greatness of Text Adventures

https://entropicthoughts.com/the-greatness-of-text-adventures
76•ibobev•3h ago•60 comments

Amazon doesn't use Route 53 for amazon.com

https://www.dnscheck.co/blog/dns-monitoring/2025/10/21/aws-dog-food.html
19•mrideout•1h ago•7 comments

60k kids have avoided peanut allergies due to 2015 advice, study finds

https://www.cbsnews.com/news/peanut-allergies-60000-kids-avoided-2015-advice/
190•zdw•15h ago•204 comments
Open in hackernews

Apple alerts exploit developer that his iPhone was targeted with gov spyware

https://techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware/
174•speckx•3h ago

Comments

scheeseman486•3h ago
You swim with sharks...
duxup•3h ago
>Gibson, who until recently built surveillance technologies for Western government hacking tools maker Trenchant, may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.

Leopards ate my face moment?

They're not developing these tools to NOT use them...

alephnerd•3h ago
Based on the article, it sounds like a bit of a "he said - she said" article after Gibson was terminated at Trenchant/L3Harris.
duxup•3h ago
I'm not entirely sure how that applies to my post.
alephnerd•3h ago
What I mean is:

1. Most of us in this segment of the industry recognize the risks

2. He is absolutely not the first person targeted by this

3. This article sounds like it's part of a wrongful termination suit by Gibson based on the context provided

duxup•3h ago
Is there a lawsuit?
alephnerd•3h ago
Not sure, but the phrasing around this article and the entire second half of it definitely sounds like similar articles I've seen during these kinds of suits.
altairprime•3h ago
To clarify with the final paragraphs of context, “He said, Corp said, 3 of 3 coworkers asked corroborated what He said”.
tptacek•2h ago
For at least 2 decades now exploit developers have been rather infamously prime targets for spyware, so whoever wrote this piece isn't read in at all to the industry.
ghostly_s•1h ago
Oddly it seems to echo the feelings of the spyware developer in question.
tptacek•46m ago
I agree that developer, as quoted, has an odd vibe.
jsonBorn•43m ago
"..if you are a state or federal enforcement authority, and you have suspicion of any criminal activity of `Jay Gibson', be encouraged to immediately contact: Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.
runjake•1h ago
"Leopards ate my face" reference for others not in the know: https://knowyourmeme.com/memes/leopards-eating-peoples-faces...
throw0101c•1h ago
The original tweet just had its tenth anniversary (2015-10-16):

> 'I never thought leopards would eat MY face,' sobs woman who voted for the Leopards Eating People's Faces Party.

* https://twitter.com/Cavalorn/status/654934442549620736

CaptainOfCoit•1h ago
What happened with "reap what one sows", did it go out of fashion? Seems the same.
tgv•1h ago
Too biblical and old-fashioned, probably. I would say that at least half the people who've used "leopards ate my face" don't even know the meaning of reap. The simplicity and visual character of the modern expression make it memier.
svnt•1h ago
Leopards ate my face is only negative, and has been more political, typically someone voting to weaponize the government against their peer-level enemies but hypocritically, only to later realize they are not a party to the benefits, only the consequences.

It is really about a perceptual flaw in pre-fascist democratic behavior: people believing themselves to be a part of the protected class because they voted for it.

It seems to apply here because someone profiting from the creation of tools used on others by people with money/power has them used on him by the government.

tldr; it is a subset of you reap what you sow, with more specificity and punch

ranger_danger•3h ago
> I went immediately to buy a new phone.

Why does he think that will help against a state-backed adversary?

perching_aix•3h ago
>> I went immediately to buy a new phone.

> Why does he think that will help against a state-backed adversary?

What are his alternatives?

ranger_danger•3h ago
Not using a phone anymore
pinkmuffinere•2h ago
Is this a serious response? It is nearly impossible to live without a phone, short of pulling a Christ Mccandless. I understand that means this _is_ an option, but it is an option in the same way that cutting off your leg for fun is always an option.
majorchord•2h ago
Well if you're knowingly being targeted by a government, your choices are basically go off the grid... or continue having every inch of your life tracked so they can find any tiny little thing to construe as probable cause to take you in.

I don't really see any alternatives. Do you?

kergonath•1h ago
Going off the grid does not really prevent the alternative. It also presents convenient opportunities for accidents, depending on how far you go.
majorchord•1h ago
What do you suggest then?
BeetleB•2h ago
> It is nearly impossible to live without a phone,

There's a whole continuum.

Other than 2FA, text messaging is easy to get rid of.

You still use it to make calls, so yeah, they can track you that way. You can keep the phone off most of the time, though. People close to me know that they're more likely to reach me by calling my home phone.

What else does one really need a phone for?

Navigation? Do what I did: Get another phone that never has a SIM card and use an offline app.

Camera? The same. But really, life is very doable without a camera to begin with!

The only reason I need a phone is 2FA.

at-fates-hands•35m ago
I had Ubuntu Touch installed on an older OnePlus phone. It did everything, but they haven't figured out how to work with VoLTE. I considered just saying "screw it" and using it anyways, but then remembered that my Mum calls twice a week to chat me up so I went back.

But 100% you can still find alternatives, its just about how much stuff you wanna carry around with you right?

criddell•2h ago
Get a new iPhone and immediately turn on lockdown mode.
mrandish•1h ago
I'm not in this field but I was under the impression that people who know they are likely to be individually targeted use two (or more) phones and the one they use for their (target-worthy activity) is kept heavily locked down. Inconvenient to be sure but it seems like an unavoidable cost of being in that business.
duxup•3h ago
I don't think he thinks it is a state.
ranger_danger•3h ago
But the title says gov spyware?
duxup•2h ago
It's spyware that govs buy, but clearly the article goes in another direction as to who might have an interest in this guy.
freehorse•2h ago
meaning gov-grade spyware, most likely
bink•2h ago
There is some amount of protection until the adversary discovers the new number. But since they've already compromised his phone they likely have his dad's number and can compromise that phone to find him again. It's dystopian.

If he's running iOS he can also enabled Lockdown Mode on the new phone to block most types of attacks.

fn-mote•1h ago
This doesn’t make sense… of course it will help. It gives you a clean slate, not compromised when you pick it up.
ranger_danger•1h ago
Maybe but if we're talking on the level of targeted government surveillance, I think all options are on the table, i.e. they should assume they are being watched everywhere they go, and that all their communications, including their close friends/family (or anyone they have already been talking to lately) are likely being monitored as well, in which case, getting a new phone may not do much of anything.

Does that really not make sense?

ActorNightly•34m ago
If there are zero click, unknown yet zero days against Apple devices, it won't help.

If you are actually security conscious, the only setup that works is have a public facing phone and a private phone that is custom rooted, de googled, and you control everything that runs on it.

rs186•3h ago
> “I was panicking,” Jay Gibson, who asked that we don’t use his real name over fears of retaliation, told TechCrunch.

And later,

> Without a full forensic analysis of Gibson’s phone ... it’s impossible to know why he was targeted or who targeted him.

> But Gibson told TechCrunch that he believes the threat notification he received from Apple is connected to the circumstances of his departure from Trenchant ...

I find it funny that (1) this guy never thought this would happen to him (2) this guy has the balls to talk to media about this but fears retaliation

I mean, seriously, those who want to know your real name already know it.

ActorNightly•41m ago
This honestly smells really strong like made up shit. Or the guy is very much a low key player.

Generally, if you develop exploits, you should be completely aware of every single possible attack vector. If you are working for a company like Trenchant, and you know what you are doing, the last thing you do is use Apple devices (at least fully, most of the time you have a public phone and much more secure private phone)

The reason is, when you take an Apple phone, connect it to a router that proxies through a computer so you can inspect traffic, you can see the vast amounts of shit being sent back to Apple which you have no control of.

Meanwhile, if you do the same with my custom rooted, de-googled android phone that I take overseas, you will see only ntp traffic, and that is only so I don't have to deal with cert issues because my clock is wrong.

asadm•3h ago
any guesses for the state here?
duxup•3h ago
The article notes that the target's former employer makes hackng tools and they separated on bad terms. Seems like it easily could just be the target's former employer.
iamnothere•2h ago
I would be more surprised if these employers didn’t target their employees to prevent leaks of trade secrets, union activity, or other internal dissent. Having the power would be too tempting to resist, and besides, there is some degree of legitimate concern; it would be easy enough for rogue employees to sell exploits on the side for millions (there are plenty of buyers).

Another reason not to work at places like this.

duxup•2h ago
Yeah I think the sensibilities inside orgs like that filters out folks with some values and the result would be ... not a lot of trust.
bink•2h ago
I'm not disagreeing with you, but doing so would open them up to criminal charges and liability. Rightly or wrongly, selling exploits is not illegal. Hacking your employees devices is.
iamnothere•2h ago
True, but most governments probably aren’t interested in pressing charges against critical vendors, as long as the product is delivered.
arthurcolle•3h ago
I'm going to go out on a limb here and say it's a state in the DMV.. L3Harris HQ is in Arlington if I'm not mistaken
tptacek•2h ago
If it's actually a state, it's unlikely to be a NATO or FVEY country, since L3Harris is one of the largest defense contractors in the world and most of those countries are customers. The piece is kind of all over the place but the vibe it lands on is that his work phone may have been owned up by his employers.
amelius•3h ago
Maybe it went like this:

- Exploit developer makes and plays with exploits on their phone

- Apple notices this, warns them that there is spyware on their phone

- Exploit developer somehow thinks it is governments hacking into their phone

freehorse•3h ago
> I have mixed feelings of how pathetic this is, and then extreme fear because once things hit this level, you never know what’s going to happen

Interesting kind of payback. What does he think happens to the people whom the exploits he develops target?

thesuitonym•3h ago
Sounds like he naively believes only governments use these, and only against legitimate criminals.
markus_zhang•3h ago
What is the surprise? If I'm in his shoe I'd expect the gov knows everything about me including how often I make sex.
jeffhuys•2h ago
Nullable column I guess?

I’m kidding of course

markus_zhang•1h ago
0 is not NULL!
bink•2h ago
I've interviewed with these types of companies (not the ones in the article). I've even caught them using their exploits on me after they made me an offer and that seems to be the most likely explanation for what happened here. I don't know how anyone can develop exploits for resale in good conscience.

If these companies have no qualms using their exploits against their own employees they'll have absolutely no problem using them against members of Congress, the Courts, investment banks, tech leaders, and anyone with any sort of power. This gives them the ability to blackmail some of the most powerful people in the world.

edit: And that's not even mentioning their reported "intended use" against dissidents and journalists.

Ms-J•1h ago
That's outrageous that they tried to attack you like that. How exactly did it happen? Did they send a link via SMS to your phone, or some other way?
bink•1h ago
I don't wanna give away too much in case they're reading, but they didn't use their stealthiest exploit. It was pretty obvious, especially if you monitor your network traffic.
cj•52m ago
How obvious would it be to someone being hired as an office manager or janitor or similar?
cobertos•49m ago
Monitoring your network traffic on your local PC (ala Little Snitch or Open Snitch) or monitoring it at the gateway/router level?
matheusmoreira•45m ago
I gotta admit I'm not in the habit of monitoring my network traffic... Gotta wonder if it's even possible to protect ourselves against this surveillance without going full OPSEC mode.
Ms-J•42m ago
Ok guessing against a computer of yours and not a phone (which of course is still possible) thanks. Hope it can help all of us stay safe.
tptacek•47m ago
You don't know how any of these could be developed in good conscience? How about: anti-proliferation intelligence work is going to happen whether it requires human intelligence or CNE, and CNE is less costly and harmful?

I get where you're probably coming from: this same technology is used all over the world to target journalists and dissidents in countries with and without the rule of law. A very real concern. I wouldn't do this kind of work either (also, it's been over a decade since I had the chops even to apprentice at it).

But there are very coherent reasons people are comfortable doing this work for NATO countries. Our reflexive distrust of law enforcement and intelligence work is a fringe belief: a lot of families are very proud to include people working in these fields.

The most important thing I guess I'd have to say here is: our opinion of this stuff doesn't matter. At current market rates every country in the world can afford CNE technology, and it's a market well served by vendors outside of NATO.

Ms-J•38m ago
"our opinion of this stuff doesn't matter."

It very much does matter. If more people refuse to do this type of work, it eventually won't be done to the required standard. People would cut family ties and this would stop fast.

tptacek•32m ago
That's an incredibly blinkered view of the ecosystem that assumes that the only talent capable of delivering this work is people you talk to or share cultural ties with. There are ultra-skilled people in developing countries who could not give less of a fuck about how uncomfortable this stuff makes people in the west.
duxup•46m ago
I think by default these companies kinda filter out people with values that would impede unrestricted use of their tools. And at worse possibly attract people who think "I'd sure like to spy on other people". That's scary.
yachad•2h ago
Live by the sword, die by the sword.
antonymoose•2h ago
If an engineer at Ford dies in a car crash does he really deserve it?

We live in a world full of threat-actors. We need exploits just like we need firearms and tanks and fighters and jets.

To mock the guy is just naive.

kuhsaft•2h ago
An engineer at Ford isn’t developing cars that actively harms passengers.

If you develop weapons, physical or digital, don’t be surprised if you end up on the receiving end.

just_steve_h•1h ago
Well, they’re certainly developing cars that kill and maim pedestrians, disperse clouds of microplastics, and contribute excess CO2 to our atmosphere…
kuhsaft•1h ago
Right. I was talking about passenger safety. But sure, if you purposefully designed a vehicle that has poor pedestrian visibility and end up getting hit by that same vehicle due to that poor visibility, you shouldn't be surprised.
moritzwarhier•1h ago
I agree that car analogies should be taken seriously.

Sure, cars are useful. But aiming to sell as many cars as possible is no more ethical than selling as many yachts as you can, especially if it involves making the living conditions worse for anyone who doesn't own a yacht, for example by bribing politicians, or destroying non-yacht-capable waterways.

at-fates-hands•49m ago
> An engineer at Ford isn’t developing cars that actively harms passengers.

Maybe not at Ford?

https://www.popsci.com/technology/tesla-lock-issue/

Firefighters recently resorted to breaking a Tesla’s window to free a 20-month-old child locked inside after one of the vehicle’s batteries died. The emergency rescue is the second of such incidents reported on this week by Arizona CBS news affiliate KPHO and reiterates the potential dangers of the EV company’s ongoing, under-addressed battery issues in extreme heat.

In July 2023, a 73-year-old man was reportedly forced to kick out a window in his Model Y after becoming trapped. A similar emergency occurred for a mother and her daughter in Illinois a few weeks later after renting a Tesla, while a California driver last month claimed she found herself stuck in her EV while waiting on an over-the-air software update that shut down her car. In the 40 minutes it took to complete the update, outside temperatures rose to 115-degrees Fahrenheit.

And yeah, if you know how, and can go through multiple steps: The only other workaround to battery issues appears to be a step-by-step solution in the owner’s manual that only opens a dead Tesla’s front hood by ostensibly hotwiring the car using external jumper cables. If this is the case, then people who find themselves locked out of their EV may need to continue relying on EMS—and their axes—until Tesla decides to address the glaring safety hazard.

lawlessone•1h ago
Not the best analogy, more like a man who develops car mounted harpoons being hit by a car mounted harpoon.
tptacek•1h ago
I know people involved at Trenchant and have trouble believing that anybody who worked there was shocked by this threat. Maybe things have changed post-L3Harris but "it" (it's more than one company) was an incredibly paranoid IT shop prior to the acquisition.
r_lee•2h ago
This guy is pretty naive if he thinks they (or their biggest customers) won't verify whether he really was leaking something or not if they've got the tools to do that lol and to maybe send a message to not think about it
CaptainOfCoit•2h ago
> Gibson .. may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.

> But the ex-Trenchant employee may not be the only exploit developer targeted with spyware .. there have been other spyware and exploit developers in the last few months

eimrine•2h ago
I would like to see the screenshot or the photo of display with that kind of alert.
runjake•1h ago
Here's what it looks like: https://c.ndtvimg.com/2024-04/30p8264g_apple-notification_62...
veeti•50m ago
> Apple detected a targeted mercenary spyware attack against your iPhone

Not going to lie, this subject line would fit right in with the phishing messages and 419 scams in my Spam folder.

internetter•25m ago
Indeed, however the notification also comes via iMessage and appears at the top of your Apple account, plus contains no external links
ajross•1h ago
This framing seems weird:

> Two days after receiving the Apple threat notification, Gibson contacted a forensic expert with extensive experience investigating spyware attacks.

Surely as a professional "exploit developer", Gibson himself should have been about as expert at this particular niche as any human being on the planet already.

I mean, sure, absolutely he should have called in his friends in the community and gotten more eyes on the device. But the way that's written it sounds like he took it into the local Genius Bar.

It also, in context, feels a little obfuscatory. Like he's trying to flag the involvement of senior folks who he can't name.

tptacek•1h ago
I agree it reads weird, but I am leaving room for the idea that there are a lot of very gifted people who work on this stuff as an intellectual challenge, have a sort of straight up systemsy computer science background, and don't have or care about a bigger picture of where they fit into the industry. But still: the companies that became Trenchant were notoriously paranoid about state-sponsored CNE threats! It would still be weird to be surprised by them.
2OEH8eoCRo0•8m ago
Why is it not computer crime? It wasn't done by the govt, they suspect it was done clandestinely by Trenchant.

Sue them!