frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM

https://defusedcyber.com/ivanti-epmm-sleeper-shells-403jsp
48•waihtis•1h ago•13 comments

GitHub Is Down

https://github.com/
149•albelfio•20m ago•56 comments

Thoughts on Generating C

https://wingolog.org/archives/2026/02/09/six-thoughts-on-generating-c
97•ingve•2h ago•12 comments

UEFI Bindings for JavaScript

https://codeberg.org/smnx/promethee
109•ananas-dev•2h ago•61 comments

It's not you; GitHub is down again

https://www.githubstatus.com/incidents/54hndjxft5bx
61•MattIPv4•23m ago•34 comments

Show HN: Algorithmically Finding the Longest Line of Sight on Earth

https://alltheviews.world
240•tombh•6h ago•93 comments

Why Is the Sky Blue?

https://explainers.blog/posts/why-is-the-sky-blue/
5•udit99•55m ago•1 comments

Long-Sought Proof Tames Some of Math's Unruliest Equations

https://www.quantamagazine.org/long-sought-proof-tames-some-of-maths-unruliest-equations-20260206/
30•ibobev•1h ago•2 comments

Hong Kong pro-democracy tycoon Jimmy Lai gets 20 years' jail

https://www.bbc.com/news/articles/c8d5pl34vv0o
103•tartoran•1h ago•59 comments

Medieval Monks Wrote over Ancient Star Catalog – Particle Accel Reveals Original

https://www.smithsonianmag.com/smart-news/medieval-monks-wrote-over-a-copy-of-an-ancient-star-cat...
13•bookofjoe•5d ago•0 comments

AT&T, Verizon blocking release of Salt Typhoon security assessment reports

https://www.reuters.com/business/media-telecom/senator-says-att-verizon-blocking-release-salt-typ...
96•redman25•2h ago•16 comments

Art of Roads in Games

https://sandboxspirit.com/blog/art-of-roads-in-games/
505•linolevan•19h ago•161 comments

Vouch

https://github.com/mitchellh/vouch
985•chwtutha•1d ago•430 comments

Like Game-of-Life, but on Growing Graphs, with WASM and WebGL

https://znah.net/graphs/
51•znah•1d ago•9 comments

Humans peak in midlife: A combined cognitive and personality trait perspective

https://www.sciencedirect.com/science/article/pii/S0160289625000649
58•Brajeshwar•2h ago•15 comments

Roman industrial hub discovered on banks of River Wear

https://www.durham.ac.uk/news-events/latest-news/2026/01/roman-industrial-hub-discovered-on-banks...
48•andsoitis•4d ago•7 comments

AirPods Pro 4 Could Feature Cameras to 'See Around You'

https://www.macrumors.com/2026/02/09/airpods-pro-4-could-feature-cameras-to-see-around-you/
13•geox•39m ago•17 comments

Nobody knows how the whole system works

https://surfingcomplexity.blog/2026/02/08/nobody-knows-how-the-whole-system-works/
154•azhenley•11h ago•113 comments

Show HN: Browse Internet Infrastructure

https://www.wirewiki.com
90•pul•4h ago•15 comments

Show HN: Printable Classics – Free printable classic books for hobby bookbinders

https://printableclassics.com
28•bookman10•4h ago•7 comments

Matrix messaging gaining ground in government IT

https://www.theregister.com/2026/02/09/matrix_element_secure_chat/
154•rbanffy•4h ago•117 comments

Offpunk 3.0

https://ploum.net/2026-02-09-offpunk3.html
128•todsacerdoti•5h ago•26 comments

AI Doesn't Reduce Work–It Intensifies It

https://hbr.org/2026/02/ai-doesnt-reduce-work-it-intensifies-it
138•swolpers•1h ago•92 comments

LispE: Lisp Interpreter with Pattern Programming and Lazy Evaluation

https://github.com/naver/lispe
87•PaulHoule•4d ago•16 comments

Show HN: Minimal NIST/OWASP-compliant auth implementation for Cloudflare Workers

https://github.com/vhscom/private-landing
28•vhsdev•5h ago•8 comments

Tessellation Kit (2016)

https://sciencevsmagic.net/tes/#0.5.0.1.aaaaaaaaa
39•surprisetalk•5d ago•3 comments

Show HN: A custom font that displays Cistercian numerals using ligatures

https://bobbiec.github.io/cistercian-font.html
144•bobbiechen•17h ago•33 comments

Every book recommended on the Odd Lots Discord

https://odd-lots-books.netlify.app/
150•muggermuch•17h ago•61 comments

Show HN: I created a Mars colony RPG based on Kim Stanley Robinson’s Mars books

https://underhillgame.com/
277•ariaalam•23h ago•98 comments

Experts Have World Models. LLMs Have Word Models

https://www.latent.space/p/adversarial-reasoning
180•aaronng91•22h ago•177 comments
Open in hackernews

AT&T, Verizon blocking release of Salt Typhoon security assessment reports

https://www.reuters.com/business/media-telecom/senator-says-att-verizon-blocking-release-salt-typhoon-security-assessment-2026-02-03/
96•redman25•2h ago

Comments

ungreased0675•1h ago
These companies were required by the government to have lawful intercept capability. A bad actor took advantage of that government-required backdoor, and now the government has the shamelessness to grandstand about privacy and security? We need to elect better people.
dmix•1h ago
Is this speculation or has that information come out already?
medina•1h ago
https://www.commerce.senate.gov/2025/12/experts-agree-u-s-co...

> “The Chinese government's espionage operation deeply penetrated networks of at least nine U.S. telecom companies, including AT&T and Verizon,” said Sen. Cantwell. “They exploited the wiretapping system that our law enforcement agencies rely on under the Communications Assistance for Law Enforcement Act -- known as CALEA. These systems became an open door for Chinese intelligence. Salt Typhoon allowed the Chinese operation to track millions of Americans’ locations in real time, record phone calls at will and read our text messages.”

dmix•1h ago
That definitely deserves a congressional investigation then. No wonder they don't want to talk about that.
xnx•1h ago
This quote speaks in past tense, but last I heard the Chinese still had access/control of compromised systems. Do we know if this attack is even over?
gruez•57m ago
>and now the government has the shamelessness to grandstand about privacy and security? We need to elect better people.

Where's "the government [... grandstanding] about privacy and security"? It's getting blocked by the companies, not the government.

>She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon.

observationist•45m ago
"US Senator says AT&T, Verizon blocking release of Salt Typhoon security assessment reports"

A US senator is using it for political grandstanding. She is an ineffective twit with no power and no principles, no right under law to receive what she demanded, and she made sure to run to the press with it "see! look, I'm a principled, powerful senator holding those evil corporations feet to the fire!"

The problem is that the vulnerability exploited by salt typhoon is a systemic flaw implemented at the demand of Cantwell and other of our legislative morons.

You cannot have an "only the good guys" backdoor. That doesn't work. People are bad, and stupid, and fallible. You can't make policy or exceptions that depend on people being good, and smart, and infallible.

She's using the inevitable consequence of a system she helped create for her own political benefit. She voted for the backdoor back in 94 against the strenuous and principled objections by people who actually know what they're talking about.

Bobblehead talking points should not serve as the basis for technical policy and governance, but here we are.

Spivak•11m ago
You can tell this whole thing will be a nothingburger on the government side because the only thing she can actually do is pull in some CEOs to (not) answer questions and receive a congressional tsk tsk.
SunshineTheCat•50m ago
I agree with you on electing better people, but this is largely a systematic problem with how government works:

1. Propose bill to solve a problem which is either minor or completely misunderstood by the person proposing the bill 2. Pass bill, don't solve original "problem," creates 15 new, actual problems 3. Run on fixing all the new problems they created (and some others that don't exist) 4. Repeat

maltalex•49m ago
The problem isn't the back door. Every telecom company in every country provides access for "lawful intercept". Phone taps have been a thing for decades and as far as I know, require a warrant.

The problem is that telecoms are very large, very complex environments, often with poor security controls. Investing in better controls is hard, time-consuming and expensive, and many telecoms are reluctant to do it. That's not great great since telcos are prime targets for nation state hackers as Salt Typhoon shows.

Hacking the lawful intercept systems is very brazen, but even if the hackers didn't don't go as far, and "only" gained control of normal telco stuff like call routing, numbering, billing, etc. it still would have been incredibly dangerous.

ddtaylor•23m ago
The problem is the back door.

Decentralized systems don't have the same faults.

Just because you want to force a structure or paradigm doesn't absolve it of responsibility for the problem.

Hand waving the proglem away because a company is bad at management or scale doesn't change anything.

maltalex•6m ago
Even if the back door wasn't there, you wouldn't want nation state hackers anywhere near telecoms since they're critical infrastructure. Telecoms should be highly secure. Period.
forgotaccount3•19m ago
> many telecoms are reluctant to do it.

This really buries the lede. Telecoms are reluctant to do it because 'doing' it isn't aligned with their priorities.

Why would a telecom risk bankruptcy by investing heavily into a system that their competitors aren't?

If you want a back-door to exist (questionable) then the government either needs to have strong regulatory compliance where poor implementations receive a heavy fine such that telecoms who don't invest into a secure implementation get fined in excess of the investment cost or the government needs to fund the implementation itself.

maltalex•10m ago
Yes, telecoms should be forced to invest in their own security if they're not doing it. But the focus on the back door misses the point in my opinion. Even if the back door wasn't there, you wouldn't want nation state hackers anywhere near telecoms since they're critical infrastructure.
ok123456•1h ago
If they simply implicated an "APT" in wrongdoing, they would have released it, as it would have been unremarkable and fit neatly within the Overton window of hissing-chinese spys justifying an even more expansive national security apparatus and general anti-sino sentiments among the ruling class in Washington.

This leads me to two possible, non-exclusive outcomes: the links to China are tenuous, and the attribution is flimsy (e.g., they accessed a machine at 9 am Beijing time!); or the report implicates the system itself as unauditable by design, which was bound to happen given the design of the intercept tools.

walletdrainer•37m ago
These reports would be useful for any other attacker interested in their infra, it’s obvious why the companies wouldn’t want to release them in this manner.