frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
591•klaussilveira•11h ago•173 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
897•xnx•16h ago•544 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
93•matheusalmeida•1d ago•22 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
20•helloplanets•4d ago•13 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
27•videotopia•4d ago•0 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
201•isitcontent•11h ago•24 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
199•dmpetrov•11h ago•91 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
312•vecti•13h ago•136 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
353•aktau•18h ago•176 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
354•ostacke•17h ago•92 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
23•romes•4d ago•3 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
458•todsacerdoti•19h ago•229 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
7•bikenaga•3d ago•1 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
80•quibono•4d ago•18 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
258•eljojo•14h ago•155 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
53•kmm•4d ago•3 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
391•lstoll•17h ago•264 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
231•i5heu•14h ago•177 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
122•SerCe•7h ago•101 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
45•gfortaine•9h ago•13 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
136•vmatsiiako•16h ago•59 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
68•phreda4•11h ago•12 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
271•surprisetalk•3d ago•37 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
25•gmays•6h ago•7 comments

Zlob.h 100% POSIX and glibc compatible globbing lib that is faste and better

https://github.com/dmtrKovalenko/zlob
13•neogoose•4h ago•8 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1043•cdrnsf•20h ago•431 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
171•limoce•3d ago•90 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
60•rescrv•19h ago•22 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
89•antves•1d ago•66 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
14•denuoweb•1d ago•2 comments
Open in hackernews

Instagram data breach reportedly exposed the personal info of 17.5M users

https://www.engadget.com/cybersecurity/an-instagram-data-breach-reportedly-exposed-the-personal-info-of-175-million-users-192105616.html
218•IvanAchlaqullah•3w ago

Comments

btbuildem•3w ago
Wonder if closed / banned / deleted accounts are in that batch
barbazoo•3w ago
> the leak included Instagram usernames, physical addresses, phone numbers, email addresses and more.
DetectDefect•3w ago
Have not used Instagram in a decade - sincerely curious why would a physical address be part of the leaked data? Are users actually required or voluntarily provide this information to Facecrook?
clintmcmahon•3w ago
My guess is that it might a couple things:

1. There's a map feature where users can assign their location to a photo that was taken. I suppose this could qualify as 'physical address'.

2. Businesses often have their physical addresses as part of their profile.

Sayrus•3w ago
You can order things from Shops within the application. I am not an Instagram user so whether this is the only feature that records your address or not, I can't say.
netsharc•3w ago
I use Facebook with the email address that I use for many things, like online shops. Some years ago FB allowed "check what data we have on you" and I learnt that these online shops upload their customer data to FB, so they can target us in the ads they put on FB. Among others, it matches using email... so I'm guessing Zuck has my home address too.

But anyway, I have Instagram and WhatsApp on my phone. They probably can also see my location (or the SSID of networks around me) and figure out where I live.

drnick1•3w ago
Most people are incredible naive and willingly provide that information to Facebook/Meta. They even provide real names and videos and pictures of themselves and their relatives to these websites!
gus_massa•3w ago
Sometimes Meta decides you are not real or your name is not real and block your account.

They will ask for a ID, then a video, then an ID, then a photo, then an ID, ...

After an undefined number of iterations, they made decide you are real enough, until ...

drnick1•3w ago
> block your account.

I would consider this as a favor.

charliebwrites•3w ago
Someone tried to get into my account 2 days ago by attempting to reset it with “forgot password”

That’s never happened to me before, wonder if it’s related

c-fe•3w ago
Same for me. Also never happened to me before
myth_drannon•3w ago
Yes, it happened a couple of days ago on my hidden non active account. I had it for 13 years and it never happened before.
MillionOClock•3w ago
Wow, exactly the same issue for me, and for two different accounts of mine!
yakkomajuri•3w ago
The first line in the article alludes to this:

"If you received a bunch of password reset requests from Instagram recently, you're not alone."

prodigycorp•3w ago
This news answers a bunch of questions I’ve had.

I’ve got an Instagram burner I literally never use. Never clicked weird links, never logged in anywhere sketchy, so a phishing compromise makes zero sense. If my info got out, it likely came from Instagram’s side, not mine.

What’s interesting is the timing pattern. I started getting “reset your password” emails in early 2023, then they’d come in waves. It feels like the creds were getting resold and different people were taking turns running the same list. The emails were in different languages too, which tracks with whoever was firing off the requests.

Got another reset attempt a couple days ago. Congrats to the latest buyer: you bought pure schwag. Whatever value was in that list got milked long before it ended up public.

gruez•3w ago
>Congrats to the latest buyer: you bought pure schwag. Whatever value was in that list got milked long before it ended up public.

Nobody is buying your account specifically, they're buying it bulk. At that scale the fact that a percentage of accounts are fake/burner/bots is baked whatever the buyer is expecting. If anything, the bigger issue is bot accounts, not random privacy-oriented people's burner accounts.

Aurornis•3w ago
Instagram password reset can start from an email address.

> If my info got out, it likely came from Instagram’s side, not mine.

Did you use a burner email account to register? An account that was never used for anything else?

prodigycorp•3w ago
Ahhhhh, no. This account was registered pre hide-my-email days.
Aurornis•3w ago
Yeah, common surprise point for services that have any form of username recovery from email.
pentagrama•3w ago
I just checked, and Instagram’s password reset flow allows requesting a reset using an email address, a phone number, or even the username [1]. The username is public information, so triggering password reset emails is relatively easy.

[1] https://www.instagram.com/accounts/password/reset/ (screenshot: https://imgur.com/a/4x5HPLx)

HelloUsername•3w ago
Source posted on 9-jan: https://news.ycombinator.com/item?id=46571968

Instagram response posted on 11-jan: "We fixed an issue that let an external party request password reset emails for some people. There was no breach of our systems and your Instagram accounts are secure. You can ignore those emails — sorry for any confusion" https://xcancel.com/instagram/status/2010202301886238822?s=2...

chneu•3w ago
I get email reset passwords from IG at least once a month.

I doubt they fixed anything. Lol

flir•3w ago
I honestly thought it was a "hey, we're still here, you should log in" dark pattern. (My account's been unused for years).
staindk•3w ago
Same, it's very weird. Only ever IG.

Got one a day or two ago again actually.

adventured•3w ago
Same here, I got one on January 9th.
Ekaros•3w ago
I get those for account I never registered or confirmed email for. I just keep reporting them as phishing they are...
varenc•3w ago
My guess is they fixed whatever weakness in their rate limiting allowed an attacker to automate requesting millions of password reset emails. The fix could be as simple as adding a new CAPTCHA to the password reset flow.
d1sxeyes•3w ago
I mean, if they knew who was requesting the password reset, then you wouldn’t need to reset the password, just accept whatever auth mechanism allows them to know who is resetting the password.
fma•3w ago
Yep I got 2 on Jan 9th. he e-mails come from security@mail.instagram.com

I also get a bunch of these e-mails from them every few weeks:

Sorry to hear you’re having trouble logging into Instagram. We got a message that you forgot your password. If this was you, you can get right back into your account or reset your password now.

So, I guess you can actually message them, pretend to another user to rese password? I don't follow many people or have many followers. I can't imagine the attempts on other higher valued accounts...

ares623•3w ago
I’m 100% convinced they send those out purposefully to encourage users to log back in.
gruez•3w ago
>Source posted on 9-jan: https://news.ycombinator.com/item?id=46571968

Yeah the source is terrible. I'd expect at least some sort of explanation on how they arrived at that conclusion, eg. "someone on breachforums claims to have it for sale" or "some whistleblower at instagram reported". If it's the former, it's possible that instagram themselves aren't at fault, eg. they got it via phishing or credential stuffing.

malshe•3w ago
I received a password reset request email just yesterday. Not sure what they fixed.
fn-mote•3w ago
I’m confident that is the breach/attack/whatever they are discussing.
paxys•3w ago
Am I missing something? The source they shared is a screenshot of a password reset email, which anyone can trigger if they have the email address of the account.
salgorithm•3w ago
I have a masked email* for Instagram and have received two password reset requests in the last five days. Obviously, this is just an anecdote.

* https://support.1password.com/fastmail/

netsharc•3w ago
So what if you have masked emails...

Whoever it is, they just entered your Instagram username in the "To recover your password, enter your username, and we'll email you a reset link" field...

zwog•3w ago
You don't even need the email address. The account name is enough to start the password request.
alex1138•3w ago
I'm pretty damn sure MZ bought IG so he could have a monopoly on social communication. "Improve product quality"? Please
Tiberium•3w ago
Can anyone point to an actual reputable source that has any details about what specifically got leaked, and how? Instagram has way more users, so it's very odd that only 17.5M get "leaked". Just honestly feels like this is overblown and it's again just scraped data or something.

The original Malwarebytes tweet is incredibly generic.

luxuryballs•3w ago
probably some kind of plugin or app they logged into via instagram but I am not sure what kind of integrations there are, or could it be regional for some reason?
jmyeet•3w ago
One thing I'm curious about is I hear stories about people getting hacked and losing their FB/IG/Tiktok accouts then fighting to get them back. You never hear details but I can only assume they're reusing passwords or they're using guessable passwords. For reference, anything 10 characters or less has to be viewed as guessable in this day and age.

I've long-viewed password managers are mandatory. Every site get its own 20+ character randomly generated password. I don't care if the hash gets leaked. It's not getting cracked. For years this has been 1Password. Initially it was LastPass but 1Password is just more slick.

The annoyance is all the arbitrary rules sites create about you have to use special characters or you can't or they have different, non-overlapping requirements on password length or the absolute worst is forced password rotation.

I don't generally try and get non-tech friends and family use password managers however because it's still kinda clunky to use and generate. Passkeys are kinda better I guess? But they're far from universal and I don't expect them ever to be.

Anyway, this kind of leak from Meta kinda surprises me. Leaking information that ties a physical address to an email address? That's a massive breach and not normally one you expect form a company employing thousands of engineers.

I will say this: IG operates as its own domain within Meta and AFAIK they still use a completely separate code base in Python/Django. Facebook proper is in Hack (almost entirely) and has excellent tooling and systems to detect weak endpoints and PII leaks of this sort such that leaky endpoints (or however this information leaked; I didn't see any details in the article) really just don't happen.

This has long been a point of friction within Meta engineerings. It's defensible to say it's not worth rewriting but IG are constantly playing catch up with what the rest of the company gets for "free". How many billion+ dollar settlements does it take before this equation changes?

And yes I believe that leaking physical addresses is going to cost th ecompany more than a billion dollars. It may get people killed. That's how serious this is.

pentagrama•3w ago
I looked into this a bit and I am also skeptical about the leak narrative.

I just checked, and Instagram’s password reset flow allows requesting a reset using an email address, a phone number, or even the username [1]. The username is public information, so triggering password reset emails is relatively easy. At scale you would need IP rotation and some basic automation, but it is not particularly hard to generate a large volume of reset emails and create confusion.

From an attacker’s perspective, this does not grant access to accounts or sensitive data. It mainly causes users to receive unexpected reset emails and possibly panic or change their passwords. That aligns more with nuisance or malice than with a meaningful breach.

I do not have definitive proof, but based on this behavior it seems plausible that the reported wave of reset emails could be explained without any large scale data leak.

[1] https://www.instagram.com/accounts/password/reset/ (screenshot: https://imgur.com/a/4x5HPLx)

ivan_gammel•3w ago
If mailboxes of some people were breached, those reset emails can be used to steal their Instagram accounts. So it can be some other breach being exploited, rather than a vulnerability in Instagram account itself.
thunderbong•3w ago
If my mailbox is breached, Instagram will be the least of my worries.
gloxkiqcza•3w ago
Password reset emails usually contain a token that expires rather quickly so unless I’m missing something, this should be a non-issue.
Fire-Dragon-DoL•3w ago
But you can generate such emails with a public username
ipaddr•3w ago
Or the email address you have already hacked into. Why both with the username at that point.
SkyPuncher•3w ago
Yep. And if you also have access to my email, you can already look at it to figure out exactly what services I have an account with.

If you’ve pawned my email address, you can get my user names, send email reset, etc, etc.

stackghost•3w ago
It wouldn't be reported as an Instagram breach, in that case.
faust201•3w ago
And that would also apply to everything. What else? Banks.
hamburglar•3w ago
My Instagram username is <firstinitial><lastname> and I get password reset offers (they say “looks like you’re having trouble logging into Instagram” or something similar) about once a week.
bradleyankrom•3w ago
Same, on average. I'll go a few weeks without any, then one or two per day for a while.
Nextgrid•3w ago
> From an attacker’s perspective, this does not grant access to accounts or sensitive data

I think there might be an effort in the "security" snake oil industry to classify publicly available data as some sort of breach. Probably because for a security company it's a quick win finding such a "breach" you can generate publicity with and/or scare clueless executives into buying your solution/consultancy services. I think there was a similar "breach" at Twitter where it turns out it was all publicly-available data users themselves put on their public profile that was scraped.

I've personally had people argue with me that disclosing whether an account was registered was a major breach and do "something" about it, yet refuse to change the registration form to also not disclose that fact (since otherwise we'd have to move the registration process behind an emailed link and ask the user to wait for the confirmation email to continue, killing conversion rates).

The "something" was done, and of course the bad guys promptly moved onto the signup form. But hey as far as I know, we're now secure™.

wilg•3w ago
Skeptical? There's not even a clear claim of what the leaked information is? There just appears to be no leak at all.
rvz•3w ago
I just heard lots of AI agents celebrating yet another data breach where they get free private data about lots of users and now can link them up just like this previous breach. [0]

They are about to get to know about us even more!

[0] https://news.ycombinator.com/item?id=46530353

dwa3592•3w ago
can't believe people are still using that shit. i permanently deleted my account last year.
sailfast•3w ago
Engadget changed the title - this one should also be edited.
cm2012•3w ago
This would be monumental if true, meta data breaches are basically unheard of contrary to popular opinion
cheald•3w ago
I receive several "Let's help get you back onto Instagram" emails a week, and have for months and months. I can only assume it's someone trying to do something nasty, but I have no idea what it actually could be.

It's quite perplexed me.

Anamon•3w ago
Someone seems to be running a campaign like this with Amazon accounts currently. I don't know the password reset process for Instagram, but maybe a similar thing could be happening that people assumed is behind the Amazon wave:

Amazon sends you a 6-digit code to reset your password. The code is valid for five minutes before a new one is generated. I don't know what the rate limit is, but even if you can just try five times within those five minutes, your chance of guessing it right would be 1 in 200,000. Now assume the attackers are running this on several million accounts in parallel, and you can assume they'd be able to steal a few accounts just with lucky guesses.

It worried me enough that I removed my phone number from my account, through which the password reset requests were initiated. The absolute risk for each user may be low, but overall it seems like a terrible system with regards to security.