frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Al Lowe on model trains, funny deaths and working with Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
50•thelok•3h ago•6 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
117•AlexeyBrin•6h ago•20 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
811•klaussilveira•21h ago•246 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
49•vinhnx•4h ago•7 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
91•1vuio0pswjnm7•7h ago•102 comments

Reinforcement Learning from Human Feedback

https://rlhfbook.com/
73•onurkanbkrc•6h ago•5 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
1054•xnx•1d ago•601 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
471•theblazehen•2d ago•174 comments

U.S. Jobs Disappear at Fastest January Pace Since Great Recession

https://www.forbes.com/sites/mikestunson/2026/02/05/us-jobs-disappear-at-fastest-january-pace-sin...
49•alephnerd•1h ago•15 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
197•jesperordrup•11h ago•68 comments

Selection Rather Than Prediction

https://voratiq.com/blog/selection-rather-than-prediction/
8•languid-photic•3d ago•1 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
9•surprisetalk•1h ago•2 comments

France's homegrown open source online office suite

https://github.com/suitenumerique
537•nar001•5h ago•248 comments

Coding agents have replaced every framework I used

https://blog.alaindichiappari.dev/p/software-engineering-is-back
206•alainrk•6h ago•313 comments

A Fresh Look at IBM 3270 Information Display System

https://www.rs-online.com/designspark/a-fresh-look-at-ibm-3270-information-display-system
33•rbanffy•4d ago•6 comments

72M Points of Interest

https://tech.marksblogg.com/overture-places-pois.html
26•marklit•5d ago•1 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
110•videotopia•4d ago•30 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
69•speckx•4d ago•71 comments

Software factories and the agentic moment

https://factory.strongdm.ai/
63•mellosouls•4h ago•70 comments

Show HN: Kappal – CLI to Run Docker Compose YML on Kubernetes for Local Dev

https://github.com/sandys/kappal
21•sandGorgon•2d ago•11 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
271•isitcontent•21h ago•36 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
199•limoce•4d ago•110 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
284•dmpetrov•21h ago•153 comments

Making geo joins faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
155•matheusalmeida•2d ago•48 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
553•todsacerdoti•1d ago•267 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
424•ostacke•1d ago•110 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
467•lstoll•1d ago•308 comments

Ga68, a GNU Algol 68 Compiler

https://fosdem.org/2026/schedule/event/PEXRTN-ga68-intro/
41•matt_d•4d ago•16 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
348•eljojo•1d ago•214 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
367•vecti•23h ago•167 comments
Open in hackernews

FBI Wanted List: Fraudulent Remote IT Workers from DPRK

https://www.fbi.gov/wanted/cyber/fraudulent-remote-it-workers-from-dprk
45•smurda•1mo ago

Comments

hallole•1mo ago
Remote jobs? In tech? In this job market? Credit where credit is due...

And, maybe I'm reading too far into it, but this line:

>With these roles, these individuals allegedly abused their access at the companies to steal virtual currency.

makes it sound like they were stealing Robux or something. Could money be laundered through re-selling video game currencies?

kotaKat•1mo ago
Sounds like a couple of crypto exchanges didn’t KYC their employees as hard as they do their customers and let them be too close to the casino vaults, as it were…
LordGrey•1mo ago
Just a couple of days ago, I received an email from our HR department requesting information about a recent hire. Basically, they asked if I or anyone on my team had physically met that person. My company still embraces remote work, and everyone on my team is remote. As luck would have it, the person in question lives near another team member and they had met up for a company function (once).

I assume that the request was related to something like this: Preventing fraudulent remote workers.

derelicta•1mo ago
Honestly, impressive feat on their end.
phendrenad2•1mo ago
Am I reading this right? They're in the U.S. somewhere? How did they get into the country? Do we still think low border security is a good idea?
alephnerd•1mo ago
> They're in the U.S. somewhere

Nope. UAE or Laos:

"The men speak English and Korean and have ties to the United Arab Emirates and Laos"

foxyv•1mo ago
Essentially, they steal US social security numbers or ITINs from leaked identities to apply for jobs in the US as US citizens. They then make money for prohibited countries like North Korea while pretending to be that citizen. The mony is exfiltrated through cryptocurrency or money mules. In the meantime they install malware and steal anything that isn't nailed down. Passwords, keys, proprietary documents, cryptocurrency, etc...

Edit: They also recruit US Citizens through "Work from home" schemes to help them engage in the fraud.

suburban_strike•1mo ago
Can confirm, we're dealing with one right now.

They coast for a while on passable work but it isn't sustained through multiple warnings. The day after we hit him with a PIP he performed a mass exfiltration.

Two weeks after we let him go, systems he had previously had access to were compromised from outside.

With remote workers, if they start underperforming, start revoking whatever access you can at the first warning. Most of the events were set in motion once he saw the writing on the wall. This one was a textbook case with such predictable timing it's absurd that he got as far as he did.

He also raised every red flag in the book during the hiring process (interviewers noted suspicions of AI use) and presented as too good to be true with perfect skills alignment and low salary requirements. At every point in the process we knew better.

Kolonie•1mo ago
Seems like you didn't read it right.. The trouble with border security is that it is a very expensive way to get a misplaced sense of security.
platevoltage•1mo ago
The majority of people in the country without documented status entered legally.
davidbhead•1mo ago
The sophistication of these guys is high. They're hiring US citizens to interview for them and then if they get hired, their work quality is high so they fly under the radar for awhile.
jmkni•1mo ago
I wonder how complicit the companies are? They know "Jeff" is a fraud, but his code is great? ¯\_(ツ)_/¯
davidbhead•1mo ago
I've thought about the same thing. My company specializes in blocking candidate fraud and we have yet to see anyone who's sentiment isn't "get these people out of here".

Employing a North Korean can create sanctions and criminal risk, so it's not worth it.

From what I've heard from people who have accidentally hired them though, many are great engineers.

floatin•1mo ago
I do IT support for onboarding remote hires for a call center we catch about 1-2 hires a day who are fraudulent. Most we catch by comparing the photos on their DL to the person who shows up on webcam for training. It’s unclear the motivation for the fraud. I don’t think they really have dug into that yet.