frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma

https://rhodesmill.org/brandon/2009/commands-with-comma/
142•theblazehen•2d ago•42 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
668•klaussilveira•14h ago•202 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
949•xnx•19h ago•551 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
122•matheusalmeida•2d ago•32 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
53•videotopia•4d ago•2 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
229•isitcontent•14h ago•25 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
16•kaonwarb•3d ago•19 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
222•dmpetrov•14h ago•117 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
27•jesperordrup•4h ago•16 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
330•vecti•16h ago•143 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
494•todsacerdoti•22h ago•243 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
381•ostacke•20h ago•95 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
359•aktau•20h ago•181 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
288•eljojo•17h ago•169 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
412•lstoll•20h ago•278 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
19•bikenaga•3d ago•4 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
63•kmm•5d ago•6 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
90•quibono•4d ago•21 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
256•i5heu•17h ago•196 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
32•romes•4d ago•3 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
43•helloplanets•4d ago•42 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
12•speckx•3d ago•4 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
59•gfortaine•12h ago•25 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
33•gmays•9h ago•12 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1066•cdrnsf•23h ago•446 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
150•vmatsiiako•19h ago•67 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
149•SerCe•10h ago•138 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
287•surprisetalk•3d ago•43 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
182•limoce•3d ago•98 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
73•phreda4•13h ago•14 comments
Open in hackernews

FBI Wanted List: Fraudulent Remote IT Workers from DPRK

https://www.fbi.gov/wanted/cyber/fraudulent-remote-it-workers-from-dprk
45•smurda•1mo ago

Comments

hallole•1mo ago
Remote jobs? In tech? In this job market? Credit where credit is due...

And, maybe I'm reading too far into it, but this line:

>With these roles, these individuals allegedly abused their access at the companies to steal virtual currency.

makes it sound like they were stealing Robux or something. Could money be laundered through re-selling video game currencies?

kotaKat•1mo ago
Sounds like a couple of crypto exchanges didn’t KYC their employees as hard as they do their customers and let them be too close to the casino vaults, as it were…
LordGrey•1mo ago
Just a couple of days ago, I received an email from our HR department requesting information about a recent hire. Basically, they asked if I or anyone on my team had physically met that person. My company still embraces remote work, and everyone on my team is remote. As luck would have it, the person in question lives near another team member and they had met up for a company function (once).

I assume that the request was related to something like this: Preventing fraudulent remote workers.

derelicta•1mo ago
Honestly, impressive feat on their end.
phendrenad2•1mo ago
Am I reading this right? They're in the U.S. somewhere? How did they get into the country? Do we still think low border security is a good idea?
alephnerd•1mo ago
> They're in the U.S. somewhere

Nope. UAE or Laos:

"The men speak English and Korean and have ties to the United Arab Emirates and Laos"

foxyv•1mo ago
Essentially, they steal US social security numbers or ITINs from leaked identities to apply for jobs in the US as US citizens. They then make money for prohibited countries like North Korea while pretending to be that citizen. The mony is exfiltrated through cryptocurrency or money mules. In the meantime they install malware and steal anything that isn't nailed down. Passwords, keys, proprietary documents, cryptocurrency, etc...

Edit: They also recruit US Citizens through "Work from home" schemes to help them engage in the fraud.

suburban_strike•1mo ago
Can confirm, we're dealing with one right now.

They coast for a while on passable work but it isn't sustained through multiple warnings. The day after we hit him with a PIP he performed a mass exfiltration.

Two weeks after we let him go, systems he had previously had access to were compromised from outside.

With remote workers, if they start underperforming, start revoking whatever access you can at the first warning. Most of the events were set in motion once he saw the writing on the wall. This one was a textbook case with such predictable timing it's absurd that he got as far as he did.

He also raised every red flag in the book during the hiring process (interviewers noted suspicions of AI use) and presented as too good to be true with perfect skills alignment and low salary requirements. At every point in the process we knew better.

Kolonie•1mo ago
Seems like you didn't read it right.. The trouble with border security is that it is a very expensive way to get a misplaced sense of security.
platevoltage•1mo ago
The majority of people in the country without documented status entered legally.
davidbhead•1mo ago
The sophistication of these guys is high. They're hiring US citizens to interview for them and then if they get hired, their work quality is high so they fly under the radar for awhile.
jmkni•1mo ago
I wonder how complicit the companies are? They know "Jeff" is a fraud, but his code is great? ¯\_(ツ)_/¯
davidbhead•1mo ago
I've thought about the same thing. My company specializes in blocking candidate fraud and we have yet to see anyone who's sentiment isn't "get these people out of here".

Employing a North Korean can create sanctions and criminal risk, so it's not worth it.

From what I've heard from people who have accidentally hired them though, many are great engineers.

floatin•1mo ago
I do IT support for onboarding remote hires for a call center we catch about 1-2 hires a day who are fraudulent. Most we catch by comparing the photos on their DL to the person who shows up on webcam for training. It’s unclear the motivation for the fraud. I don’t think they really have dug into that yet.