frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
233•theblazehen•2d ago•68 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
694•klaussilveira•15h ago•206 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
6•AlexeyBrin•1h ago•0 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
962•xnx•20h ago•555 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
130•matheusalmeida•2d ago•35 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
67•videotopia•4d ago•6 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
54•jesperordrup•5h ago•24 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
36•kaonwarb•3d ago•27 comments

ga68, the GNU Algol 68 Compiler – FOSDEM 2026 [video]

https://fosdem.org/2026/schedule/event/PEXRTN-ga68-intro/
10•matt_d•3d ago•2 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
236•isitcontent•15h ago•26 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
233•dmpetrov•16h ago•124 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
32•speckx•3d ago•21 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
335•vecti•17h ago•147 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
502•todsacerdoti•23h ago•244 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
386•ostacke•21h ago•97 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
300•eljojo•18h ago•186 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
361•aktau•22h ago•185 comments

UK infants ill after drinking contaminated baby formula of Nestle and Danone

https://www.bbc.com/news/articles/c931rxnwn3lo
10•__natty__•3h ago•0 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
425•lstoll•21h ago•282 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
68•kmm•5d ago•10 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
96•quibono•4d ago•22 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
21•bikenaga•3d ago•11 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
19•1vuio0pswjnm7•1h ago•5 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
264•i5heu•18h ago•216 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
33•romes•4d ago•3 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
64•gfortaine•13h ago•28 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1076•cdrnsf•1d ago•460 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
39•gmays•10h ago•13 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
298•surprisetalk•3d ago•44 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
154•vmatsiiako•20h ago•72 comments
Open in hackernews

Aisuru botnet shifts from DDoS to residential proxies

https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residential-proxies/
59•feross•3mo ago

Comments

sieep•3mo ago
Very fascinating. I saw multiple people predict that these ddos attacks were just advertisement for the Aisuru services.

How can regular users of Android, smart TV's, etc. identify these IoT devices that have been compromised?

hombre_fatal•3mo ago
I guess the increased bandwidth should at least show up on the ISP bill since that's the only place anyone would notice.

But we're pretty far from having a system that isn't perfect for botnets and malicious proxies hiding on your network.

Kinda crazy how my ISP doesn't even show me my usage on the bill. But then again every time I call them for something, they try to convince me I need something more than the minimum plan, and they're BS depends on me not knowing which tier I need.

SkiFire13•3mo ago
> I guess the increased bandwidth should at least show up on the ISP bill since that's the only place anyone would notice.

Not sure about other places, but where I live ISPs don't have bandwidth limits over which they make you pay an extra. In extreme cases they might suspend service if your usage is deemed abusive though, but I never heard of this happening to people I know IRL.

hombre_fatal•3mo ago
Sure. And that's yet another enabler of the status quo where malicious actors have infinite resources: every compromised computer or internet of shit product has unmetered high quality residential bandwidth.
zokier•3mo ago
realistically? not much regular joe can do.

advanced users can segregate all their iot crap into separate network which allows keeping an eye on what goes on in there. but you need to know what your normal safe baseline looks like to be able to identify something weird happening.

of course there is lot of fancy tools built around this topic too, stuff like zeek and suricata almost certainly could be used to identify possible compromises. especially in a separate iot network, which should have otherwise fairly regular traffic patterns. but realistically, idk if anyone has been very successful in implementing such detection.

acheong08•3mo ago
I recently heard that a group at Cardiff University is moving to commercialize what was their PHD thesis on this topic.

https://orca.cardiff.ac.uk/id/eprint/147062/1/AnoML.pdf

Saw them working on their elevator pitch last week.

acheong08•3mo ago
Edit: I posted the wrong paper. Not sure why that was in my clipboard. It's this: https://orca.cardiff.ac.uk/id/eprint/176813/1/Mohammed_PAPER...
aPoCoMiLogin•3mo ago
recently had to research "residential proxy", and the number of websites that claim that they have millions of IPs on hand was very strange. then the fact that a lot of them work in the exact same way, and a lot of them accepted payment mostly in crypto was very strange. so now connecting the dots, makes sense now why these "residential proxy" websites looked and worked the same way
baobabKoodaa•3mo ago
also note that all of them claim that their residential proxies are "ethically sourced" (unlikely their competitors, I guess?)

there's no such thing as an ethically sourced residential proxy.

Retr0id•3mo ago
I've been thinking about building an actually-ethical residential proxy system, for censorship-evasion purposes.

The internet in a growing number of countries is censored, but different content categories are censored in each jurisdiction. Many sites and services also block known VPNs (i.e. non-residential IPs), so that doesn't work as a bypass in all cases.

I have trusted friends in other countries, so by mutual agreement we could set up wireguard links for each other to use (subject to agreed terms). It just needs some way to intelligently route traffic depending on which jurisdictions will allow which requests (i.e. "which is the lowest-latency link that will allow this request").

kruffalon•3mo ago
And the concept of web of trust and signing parties just gets more and more valuable for each day!
tuhgdetzhh•3mo ago
> I've been thinking about building an actually-ethical residential proxy system, for censorship-evasion purposes.

That thing already exist and is called Tor Snowflake.

Retr0id•3mo ago
That's not the same as what I'm suggesting.
heinternets•3mo ago
The issue with this is in many authoritarian nations they will see your Wireguard link and block it. Or even knock at your door.
navigate8310•3mo ago
Their are services that allow users to share their bandwidth in return for some cents per GB, a way to passively earn income.
dewey•3mo ago
> there's no such thing as an ethically sourced residential proxy.

There is, just like you giving your attention and cpu to watch free ad supported content on the internet. It's the same in apps that give users access for free in return for bandwidth, or free VPNs that allow you to share bandwidth. There's also ISP "residential" proxies where ISPs re-sell some of their address space to proxy providers.

baobabKoodaa•3mo ago
So it's ethical to bypass bot restrictions and rate limits by pretending to be a bunch of residential connections?
dewey•3mo ago
Not much different than blocking access to people without JS enabled, blocking people stuck behind NAT, blocking whole countries or require them to solve Cloudflare captchas.
baobabKoodaa•3mo ago
What does any of this have to do with residential proxies? If you can't access a website because you have disabled JS, you won't be able to access that website with a residential proxy either.
dewey•3mo ago
I was referring to the fact that many websites block / force users to use the resource in a certain way, why shouldn't they in return have the right to bypass these restrictions.
baobabKoodaa•3mo ago
A residential proxy can not be used to bypass the restriction on JavaScript. Regarding the other items on your list, sure, a residential proxy could be used, but why do you need it? Why not a regular datacenter proxy?
dewey•3mo ago
This was a general statement, no need to nitpick every detail. DC proxies are not as accurate for geolocation, they are also often flagged as such or face higher scrutiny from bot protections.
baobabKoodaa•3mo ago
Okay, sure, in theory someone could use a residential proxy to evade unjust blocking. Whether that has happened at any point in history or not, I'm not sure.

In practice, the vast majority of residential proxy usage would be for other (non-ethical) purposes.

cruffle_duffle•3mo ago
If it’s to enable users to fetch their own data, it’s absolutely ethical. These websites can offer API’s so people can access their own data “above the board” but instead make it incredibly difficult.
hofrogs•3mo ago
"Users fetching their own data" is probably less than a hundredth of a percent of traffic passing through residential proxies, I'd even bet some money on that.
baobabKoodaa•3mo ago
Yeah, if that's your use case, why not just use a regular datacenter proxy?
TZubiri•3mo ago
Additionally, there's almost no ethical use for a residential proxy. The purpose is always to deceive, at best you get lightly unethical uses like "avoiding georestrictions on IP distributors like netflix", or "avoiding controls in dictatorships" which is acknowledging that it is used to break the law, but maybe it's the wrong kind of law.

Even these soft reasons to use VPNs and residential proxies are like an alibi for bad actors, is IP 25.14.xx.xx creating a fake account on twitter to spread malware or is he downloading a show that wasn't available before? I guess we'll never know such are the limits of privacy I guess.

ifwinterco•3mo ago
It's analogous to people using other people's accounts (with or without their well-informed permission) for small to moderate amounts of illegal transactions. It's a simple strategy but it's actually very hard for authorities to completely stop as your illicit activity gets lost in the huge amount of everyday noise
inemesitaffia•3mo ago
Some sites block entire countries or even apply GDPR restrictions to Africa
ribosometronome•2mo ago
What laws are you breaking using a residential VPN to access Netflix?
iamacyborg•3mo ago
So not only are AI companies stealing content, they’re actively funding criminal organisations too. Wonderful
miki123211•3mo ago
They're funding criminal organizations in the same way you're funding one if you get your hair cut at a hair salon which works as a front for money laundering.

That is, mostly unknowingly, perhaps suspecting what's going on, but politely trying to ignore it for their own convenience.

hofrogs•3mo ago
A hair salon is a legitimate business. "Residential proxies" have very little legitimate use, and are sourced by unethical means, so it's not a fair comparison.
Dylan16807•3mo ago
Watching netflix is plenty legitimate in my book.
hofrogs•3mo ago
Netflix execs trying to restrict account sharing and implementing region locks wouldn't agree with that ;)

I think it is a valid reason to use residential proxies as an individual (because I think that these region locks and other restrictions are bs), but if a company does that to bypass crawling restrictions - it is wrong.

walletdrainer•3mo ago
>"Residential proxies" have very little legitimate use

You have to be joking. Having seen a list of biggest Luminati contracts, legitimate use makes up probably well over 90% of traffic via these services.

It’s companies like Expedia and OpenAI, not Nigerian princes.

Yeah sure, fraud happens. Those customers aren’t even lucrative because posting scam ads on Craigslist or wherever does not use much bandwidth. Criminals also use Google search.

ImPostingOnHN•3mo ago
How would OpenAI routing requests through an Aisuru-compromised IoT botnet member be "legitimate"?

Besides the small matter of the victim in the arrangement, the entire reason OpenAI does it is ban evasion, which is not legitimate.

hofrogs•3mo ago
And why is OpenAI using residential proxies instead of their own or some datacenter address space? Are they not using the proxies to steal data from unwilling website operators? I would count that as an illegitimate use. If they can't operate openly and have to bypass restrictions, they are doing something shady.
somehnguy•3mo ago
In the last few months I've seen many advertisements for a device they call the "Super Box" - it's essentially an (Android based?) IPTV device with every channel imaginable. The people I know with them paid around $300 and there isn't a monthly fee.

I have a hunch they're trading free TV for becoming a residential proxy unknowingly. Would love to capture network traffic from one and see what's really going on.

The fact that people are willing to buy these super sketchy devices and plug them into their networks without a second thought is kinda scary.

lesuorac•3mo ago
Well didn't lookup Super Box but I assume it's less sketchy than you image.

It probably just pulls from something like https://github.com/iptv-org/iptv and so the provider of Super Box doesn't have to maintain pretty much anything or use any of their own bandwidth. So the $300 minus the cost of the hardware is the profit and they don't have real reoccurring costs.

somehnguy•3mo ago
I don't believe so. These boxes provide access to premium TV channels and live sports, not just public broadcasting.
anonym29•3mo ago
Premium TV channels and live sports have publicly accessible IPTV streams, though. Undocumented != nonpublic.
anjel•3mo ago
On tiktok, "superboxes" get pushed but hard, for $2-300 a device.
anjel•3mo ago
The pirate IPTV industry has a pirating problem of its own
duskwuff•3mo ago
These have been a thing for a while - check your local Craigslist for "fully loaded" Fire sticks or other streaming TV devices. I wouldn't be surprised at all if you're correct - these devices are marketed to technically unsophisticated users, by vendors who have every incentive to maximize profit.
tart-lemonade•3mo ago
I've also seen these marketed as "Kodi boxes".
walletdrainer•3mo ago
They’re generally not selling a million of these or even tens of thousands of these, so setting up residential proxy software on the boxes would almost certainly not be worth the time spent.
duskwuff•3mo ago
I wouldn't expect the installers to be setting a proxy network themselves, but rather acting as an affiliate for an existing network and collecting commissions from that.

Alternatively, I wouldn't be surprised if some of the apps installed on these devices have their own embedded malware - the operators of the pirate TV networks are looking to get paid, too.

walletdrainer•3mo ago
The affiliate fees paid per install by the proxy networks are very small.
nodja•3mo ago
I've never seen a $300 one but I've seen $70 ones. I don't think they're nefarious in that sense, but these boxes are usually scams.

They come preloaded with a pirate iptv service that only works for 1-2 months then they ask you to pay something like $70/year to keep watching. There's tons of providers for these IPTV services so bundling them with the boxes is a way to make it easy to access while gaining subscriptions, you can just buy a cheap android TV box yourself, install the apk and get a cheaper IPTV provider.

Most of these boxes/providers don't last more than a couple years as authorities tend to go after them when they get too big. My dad uses them to watch portuguese TV--it would be impossible to watch certain channels outside the country otherwise--and in the past 10 years he changed provider 3-4 times.

rattlesnakedave•3mo ago
Similarly most fire stick pirate streaming and side loading tutorials use an app called “downloader” which includes a URL shortener. Users are given an 8 digit “downloader code” and most blindly download and sideload APKs on their device. Probably a field day for anyone wanting to bundle and distribute malware.

https://troypoint.com/best-downloader-codes/

walletdrainer•3mo ago
The value of a single residential proxy is so low that the scheme you’re proposing is utterly ridiculous.
zerof1l•3mo ago
> ... renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services...

And that's why I will never buy any IoT devices that require an internet connection to work. Only IoT devices in my house are those that connect to my own server and never see the light of the internet.

ainiriand•3mo ago
Your IoT is an Intranet of Things then, checks out!
codedokode•3mo ago
Why there is no protocol that would allow a network to request blocking traffic from a subnet or network? For example, AS X doesn't want any traffic from Y, and all operators between X and Y block traffic from Y to X.

To motivate lazy network operators, this protocol should be linked with financial conditions: an operator who doesn't honor the request, gets significantly reduced payment for this month's traffic.

I see weak people whining about attacks for like 10 years, and nobody changes anything. It's easier to blame evil hackers than fix their own broken poorly designed systems.

To give specific example, imagine a business which has 95% customers in developed country A, but receives 99% web requests from developing countries (DDoS attacks mainly come from there). It makes financial sense to cut off those countries first and after than figure out what happened.

anonym29•3mo ago
The capabilities offered by the protocol you're envisioning already exist in the form of firewall rules and BGP peering agreements.

Most websites and networks would suffer more from blocking residential ISP traffic than they do from misuse of residential ISP traffic, though...

codedokode•3mo ago
No. If you have majority of customers in country A, but the attack comes from country B, it is better to cut off B to keep the web services working.

BGP doesn't allow to stop attacks this way as I understand.

nemomarx•3mo ago
what if the attack comes from country A too? my understanding is they try to get botnets and residential proxies in large Western countries to avoid being filtered by IP range already.
madsushi•3mo ago
The finances work the other way around: you can often pay your transit/upstream providers an additional fee for their DDOS protection/filtering service, where you can signal (via BGP or otherwise) that there's traffic you don't want to receive. BGP Flowspec (or similar) is one of the technologies used here.
waterproof•3mo ago
About the ethics of residential proxies: Brightdata, which sells a residential proxy, blocks their own proxy when you point it to brightdata.com.

The fact that they don't allow you to use their service to scrape their own domain, tells you something about their ethics...