frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Palantir's secret weapon isn't AI – it's Ontology. An open-source deep dive

https://github.com/Leading-AI-IO/palantir-ontology-strategy
44•leading-AI•1h ago•27 comments

How I use Claude Code: Separation of planning and execution

https://boristane.com/blog/how-i-use-claude-code/
209•vinhnx•3h ago•126 comments

Japanese Woodblock Print Search

https://ukiyo-e.org/
15•curmudgeon22•47m ago•3 comments

Show HN: Llama 3.1 70B on a single RTX 3090 via NVMe-to-GPU bypassing the CPU

https://github.com/xaskasdf/ntransformer
134•xaskasdf•7h ago•31 comments

A Botnet Accidentally Destroyed I2P

https://www.sambent.com/a-botnet-accidentally-destroyed-i2p-the-full-story/
35•Cider9986•2h ago•13 comments

Evidence of the bouba-kiki effect in naïve baby chicks

https://www.science.org/doi/10.1126/science.adq7188
92•suddenlybananas•6h ago•24 comments

How far back in time can you understand English?

https://www.deadlanguagesociety.com/p/how-far-back-in-time-understand-english
404•spzb•3d ago•235 comments

Parse, Don't Validate and Type-Driven Design in Rust

https://www.harudagondi.space/blog/parse-dont-validate-and-type-driven-design-in-rust/
143•todsacerdoti•8h ago•39 comments

Scientists discover recent tectonic activity on the moon

https://phys.org/news/2026-02-scientists-tectonic-moon.html
19•bookmtn•4d ago•1 comments

zclaw: personal AI assistant in under 888 KB, running on an ESP32

https://github.com/tnm/zclaw
122•tosh•15h ago•65 comments

Two Bits Are Better Than One: making bloom filters 2x more accurate

https://floedb.ai/blog/two-bits-are-better-than-one-making-bloom-filters-2x-more-accurate
20•matheusalmeida•4d ago•0 comments

Forward propagation of errors through time

https://nicolaszucchet.github.io/Forward-propagation-errors-through-time/
15•iNic•2d ago•0 comments

CXMT has been offering DDR4 chips at about half the prevailing market rate

https://www.koreaherald.com/article/10679206
167•phront•13h ago•150 comments

Claws are now a new layer on top of LLM agents

https://twitter.com/karpathy/status/2024987174077432126
223•Cyphase•1d ago•667 comments

People Loved the Dot-Com Boom. The A.I. Boom, Not So Much

https://www.nytimes.com/2026/02/21/technology/ai-boom-backlash.html
11•1vuio0pswjnm7•41m ago•1 comments

EDuke32 – Duke Nukem 3D (Open-Source)

https://www.eduke32.com/
161•reconnecting•7h ago•60 comments

Toyota Mirai hydrogen car depreciation: 65% value loss in a year

https://carbuzz.com/toyota-mirai-massive-depreciation-one-year/
112•iancmceachern•9h ago•258 comments

Canvas_ity: A tiny, single-header <canvas>-like 2D rasterizer for C++

https://github.com/a-e-k/canvas_ity
68•PaulHoule•9h ago•23 comments

Inputlag.science – Repository of knowledge about input lag in gaming

https://inputlag.science
73•akyuu•8h ago•12 comments

Finding forall-exists Hyperbugs using Symbolic Execution

https://dl.acm.org/doi/full/10.1145/3689761
23•todsacerdoti•5d ago•0 comments

Acme Weather

https://acmeweather.com/blog/introducing-acme-weather
215•cryptoz•20h ago•128 comments

I verified my LinkedIn identity. Here's what I handed over

https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/
1195•ColinWright•20h ago•418 comments

What not to write on your security clearance form (1988)

https://milk.com/wall-o-shame/security_clearance.html
402•wizardforhire•10h ago•181 comments

Be wary of Bluesky

https://kevinak.se/blog/be-wary-of-bluesky
262•kevinak•1d ago•179 comments

Personal Statement of a CIA Analyst

https://antipolygraph.org/statements/statement-038.shtml
190•grubbs•10h ago•113 comments

Permacomputing

https://wiki.xxiivv.com/site/permacomputing.html
110•tosh•4d ago•27 comments

Uncovering insiders and alpha on Polymarket with AI

https://twitter.com/peterjliu/status/2024901585806225723
137•somerandomness•1d ago•127 comments

A16z partner says that the theory that we’ll vibe code everything is wrong

https://www.aol.com/articles/a16z-partner-says-theory-well-050150534.html
96•paulpauper•1d ago•142 comments

I Don't Like Magic

https://adactio.com/journal/22399
124•edent•3d ago•101 comments

Keep Android Open

https://f-droid.org/2026/02/20/twif.html
2009•LorenDB•1d ago•694 comments
Open in hackernews

A Botnet Accidentally Destroyed I2P

https://www.sambent.com/a-botnet-accidentally-destroyed-i2p-the-full-story/
35•Cider9986•2h ago

Comments

gnabgib•1h ago
This seems to lack the full story, despite the headline.. Krebs' coverage is more in-depth (39 points) https://news.ycombinator.com/item?id=46976825
kace91•1h ago
Man, I feel so out of depth with cybersecurity news.

Why does i2p (per the article) expect state sponsored attacks every February? Where are those forming from, what does the regularity achieve?

How come the operators of giant (I’m assuming illegal) botnets are available to voice their train of thought in discord?

OgsyedIE•1h ago
Many state bodies involved in adversarial action have dedicated budgets for offensive cyber-warfare, credential thefts, supply chain compromises and disinformation. If they haven't used all of their budget by the end of the budget period, they'll be allocated a smaller budget for the next budget period.
kace91•52m ago
Oh ffs. Whenever I think my opinion on the state of the world can’t get any lower, things somehow manage to get dumber.
bryanrasmussen•31m ago
I mean this is a common pattern in many large organizations, governmental and non, if you didn't use your budget it means we can save money, yayyyy! I hadn't really considered it would apply to state-backed hacking but makes sense.
jjmarr•1h ago
From the main article, I2P has 55,000 computers, the botnet tried to add 700,000 infected routers to I2P to use it as a backup command-and-control system.

https://news.ycombinator.com/item?id=46976825

This, predictably, broke I2P.

infogulch•31m ago
That's an interesting stress test for I2P. They should try to fix that, the protocol should be resilient to such an event. Even if there are 10x more bad nodes than good nodes (assuming they were noncompliant I2P actors based on that thread) the good nodes should still be able to find each other and continue working. To be fair spam will always be a thorny problem in completely decentralized protocols.
sandworm101•2m ago
No. They should not try to survive such attacks. The best defense to a temporary attack is often to pull the plug. Better than than potentially expose users. When there are 10x as many bad nodes as good, the base protection of any anonymity network is likely compromised. Shut down, survive, and return once the attacker has moved on.
illusive4080•56m ago
Why does Discord allow a server for a botnet owner?
fragmede•45m ago
botnet owners dying typically come forwards and say they are trying to run a botnet, so there may be some difficulty there.
fragmede•45m ago
botnet owners don't typically come forwards and say they are trying to run a botnet, so there may be some difficulty in detecting them there.
ddtaylor•36m ago
Discord has a lot of terrible servers. This is one of the reasons they were not trusted when they came out and wanted to do identity verification. They already have a lot of information yet fail to do meaningful enforcement at scale.
chmod775•12m ago
There's servers where they just hang out, but which themselves are legitimate. Cybersecurity related ones etc. You can ban them and they'll just switch to another account within a minute. Occasionally discord or a server owner does, but everyone knows its pointless. There's probably other servers that are mostly used by cybercriminals, maybe command-and-control backups, and security researchers may stumble upon these when taking some malware apart, join them, and end up getting in contact with the owner.

In general I don't think law enforcement wants discord to take these down or ban them. These guys would have no problem to just make some IRC servers or whatever to hang out on instead, which would be much harder to surveil for law enforcement - compared to discord just forwarding them everything said by those accounts and on those servers.