frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Don't Make Me Talk to Your Chatbot

https://raymyers.org/post/dont-make-me-talk-to-your-chatbot/
66•pkilgore•50m ago•25 comments

MacBook Pro with new M5 Pro and M5 Max

https://www.apple.com/newsroom/2026/03/apple-introduces-macbook-pro-with-all-new-m5-pro-and-m5-max/
599•scrlk•9h ago•565 comments

Intel's make-or-break 18A process node debuts for data center with 288-core Xeon

https://www.tomshardware.com/pc-components/cpus/intels-make-or-break-18a-process-node-debuts-for-...
208•vanburen•4h ago•158 comments

GPT‑5.3 Instant

https://openai.com/index/gpt-5-3-instant/
247•meetpateltech•5h ago•171 comments

Claude's Cycles [pdf]

https://www-cs-faculty.stanford.edu/~knuth/papers/claude-cycles.pdf
397•fs123•12h ago•192 comments

Textadept

https://orbitalquark.github.io/textadept/
23•giancarlostoro•2d ago•4 comments

Voxile: A ray-traced game made in its own engine and programming language

https://elbowgreasegames.substack.com/p/voxray-games-pushes-major-update
43•spacemarine1•2h ago•5 comments

An Interactive Intro to CRDTs (2023)

https://jakelazaroff.com/words/an-interactive-intro-to-crdts/
70•evakhoury•3h ago•10 comments

The Xkcd thing, now interactive

https://editor.p5js.org/isohedral/full/vJa5RiZWs
1071•memalign•12h ago•145 comments

When AI writes the software, who verifies it?

https://leodemoura.github.io/blog/2026/02/28/when-ai-writes-the-worlds-software.html
95•todsacerdoti•6h ago•83 comments

Don't become an engineering manager

https://newsletter.manager.dev/p/dont-become-an-engineering-manager
273•flail•8h ago•198 comments

Physics Girl: Super-Kamiokande – Imaging the sun by detecting neutrinos [video]

https://www.youtube.com/watch?v=B3m3AMRlYfc
387•pcdavid•8h ago•61 comments

Launch HN: Cekura (YC F24) – Testing and monitoring for voice and chat AI agents

65•atarus•8h ago•19 comments

Possible US Government iPhone-Hacking Toolkit in foreign spy and criminal hands

https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/
141•alwillis•3h ago•40 comments

TorchLean: Formalizing Neural Networks in Lean

https://leandojo.org/torchlean.html
58•matt_d•2d ago•8 comments

I'm reluctant to verify my identity or age for any online services

https://neilzone.co.uk/2026/03/im-struggling-to-think-of-any-online-services-for-which-id-be-will...
846•speckx•8h ago•523 comments

Arm's Cortex X925: Reaching Desktop Performance

https://chipsandcheese.com/p/arms-cortex-x925-reaching-desktop
252•ingve•15h ago•151 comments

We've freed Cookie's Bustle from copyright hell

https://gamehistory.org/cookies-bustle/
52•sb057•3h ago•7 comments

MacBook Air with M5

https://www.apple.com/newsroom/2026/03/apple-introduces-the-new-macbook-air-with-m5/
336•Garbage•9h ago•395 comments

TV's TV (1987) & TV Games Encyclopedia (1988)

https://blog.gingerbeardman.com/2026/03/01/tvs-tv-1987-and-tv-games-encyclopedia-1988/
6•msephton•1d ago•0 comments

OpenAI CEO Sam Altman Defends Pentagon Work to Staff

https://www.wsj.com/tech/ai/openai-ceo-altman-defends-pentagon-work-to-staff-calls-backlash-reall...
28•cdrnsf•1h ago•3 comments

Disable Your SSH access accidentally with scp

https://sny.sh/hypha/blog/scp
86•zdw•3d ago•37 comments

I'm losing the SEO battle for my own open source project

https://twitter.com/Gavriel_Cohen/status/2028821432759717930
413•devinitely•9h ago•213 comments

The Two Kinds of Error

https://evanhahn.com/the-two-kinds-of-error/
25•zdw•1d ago•12 comments

GitHub Is Having Issues

https://www.githubstatus.com/incidents/n07yy1bk6kc4
185•Simpliplant•4h ago•125 comments

Payment fees matter more than you think

https://cuencahighlife.com/why-payment-fees-matter-more-than-you-think/
88•dxs•4h ago•58 comments

Apple Studio Display and Studio Display XDR

https://www.apple.com/newsroom/2026/03/apple-unveils-new-studio-display-and-all-new-studio-displa...
201•victorbjorklund•9h ago•224 comments

Show HN: Open-Source Article 12 Logging Infrastructure for the EU AI Act

33•systima•13h ago•2 comments

Show HN: Online OCR Free – Batch OCR UI for Tesseract, Gemini and OpenRouter

https://onlineocrfree.qzz.io
12•naimurhasanrwd•3h ago•2 comments

Meta’s AI smart glasses and data privacy concerns

https://www.svd.se/a/K8nrV4/metas-ai-smart-glasses-and-data-privacy-concerns-workers-say-we-see-e...
1362•sandbach•1d ago•760 comments
Open in hackernews

Possible US Government iPhone-Hacking Toolkit in foreign spy and criminal hands

https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/
141•alwillis•3h ago

Comments

oxfeed65261•2h ago
https://archive.ph/r7jGc
mentalgear•2h ago
How could something as sensitive get out of an administration as competent as the current one? At least they have no access to lets say AI or autonomous weapons and the tools of mass surveillance ...
grosswait•34m ago
The constant injection of political view points on hn is becoming exhausting
happyopossum•2h ago
"Possible" stripped from the headline on HN. That word seems particularly important given that it's speculative:

"Clues suggest it was originally built for the US government."

tptacek•1h ago
The Google threat analysis report doesn't say anything about USG involvement; that it was found on compromised Ukrainian sites, has code written in "native English", but also signs of LLM authorship. The Google report says the kit they found can't compromise current iOS, which is a capability you'd assume USG would have --- though it's important remember that "USG" comprises dozens of different buyers each with different toolchains.

Maybe this was the Fisheries Department exploit toolkit.

iVerify, which spun out of Trail of Bits and presumably knows what they're talking about, says it bears "hallmarks" of being connected to USG CNE work. I believe it. But the USG is on net a buyer, not a producer, of CNE tooling. Whatever a given service agency or IC arm buys, dozens of other aligned countries are also buying.

(And, of course, the non-aligned countries have their own commercial supply chains).

bri3d•1h ago
I don't think the ancient nature of the exploit chain has much bearing on the origin. I think it points away from the actual 2025 campaigns being USG-attached, but I don't think anyone was suggesting that to start with - the Google report makes it pretty clear that they believe the same code was resold to several parties, either in parallel or sequentially, around this time frame.

I think the notion here is that either:

* There's a shared upstream origin or author between this toolkit and the Operation Triangulation toolkit ahead of the use in Operation Triangulation (ie - someone sold this chain to both the Operation Triangulation authors and a third party). I actually think that the uses of specifically structured code-names internally and the overall structure of the codebase described in the Google writeup make this theory less likely; building an exploit toolkit while using these practices to cosplay as a US-government affiliated engineer would be clever and fun, but it's not something we've really seen before.

* This toolkit originated from (whether it was leaked, compromised, or resold) the same actor who was responsible for Operation Triangulation.

tptacek•28m ago
Right, I agree with you; my thing is mostly just differentiating between CNE enablement packages the USG itself creates vs CNE enablement packages that are on offer to every USG-aligned country, of which there are a bunch.
Simulacra•1h ago
Good point, that was also struck by the comment that it's infected "tens of thousands" phones. That's a minuscule rounding error.
dang•1h ago
The title limit is 80 chars, if anyone wants to figure out a decent way to squeeze possibility back in there.
alwa•1h ago
“Possible US-Gov-made iPhone-hacking toolkit is now in foreign and criminal hands“ ?
dang•56m ago
We try to avoid abbreviations if possible. You spurred me to take another crack at it and I think it worked this time? Happy to edit again if not...
irishcoffee•58m ago
A US Govt iPhone-hacking suite is now possibly in criminal hands

15 chars to spare!

dang•57m ago
I think the "possibly" is supposed to mean "possibly produced by the US government"
irishcoffee•54m ago
Good point.
doctorpangloss•2h ago
the government doesn't have superpowerful code crackers though

it has a guy working at apple who introduces the subtle vulnerability he is instructed to do

tptacek•1h ago
I expect the evidence for this claim is axiomatic, which is to say that you think it sounds good.
lightedman•1h ago
No, anyone who remembers the Best Buy/FBI debacle knows that this statement is very well-grounded in reality. If you took your laptop to Best Buy for repairs, the FBI got a copy of your hard drive contents.
majorchord•58m ago
Source:
doctorpangloss•53m ago
haha yeah, thanks for the compliment
joshrw•50m ago
Hello, have you heard of the Snowden revelations? What OP was referring to are called bugdoors.
thesuitonym•1h ago
Those two are not mutually exclusive.
8cvor6j844qw_d6•59m ago
Yeah. TAO was intercepting Cisco routers in transit and installing implants.

The leap from supply chain interdiction to cooperative insiders isn't a big one.

everdrive•1h ago
No matter the risk, I must carry my smartphone everywhere and install every app. It would be unimaginable to have the urge to look something up, but then wait to do it later until I'm using a real computer. No negative outcome will EVER shake my deep, permanent need to carry a smartphone all the time and use it for as much as possible.
theearling•1h ago
Webapps exist for a reason, they don't get all the special permissions apps get when fully installed.

at the very least use a VPN / more secure phone like a pixel with graphene

You keep doing you though

thewebguyd•1h ago
Ironically, the exploits in this leaked kit all involved flaws in webkit, so you'd have been safer sticking to native apps assuming they didn't have any webviews in them to load the malicious site.
SpaceManNabs•54m ago
WebView is the worst experience I have on any smart phone or mobile app.

The fact that there is no option so that any webview by default opens in safari across all app in ios is horrible.

i am not surprised it is riddled with security holes.

thesuitonym•1h ago
A VPN won't help you if your device is compromised. A VPN won't help you if the server is compromised. A VPN won't help you if the VPN is compromised.

I really wish people would understand that VPNs are not magical, unbreakable security. VPNs are barely security at all, and commercial VPNs even less so.

theearling•53m ago
oh 100% agree here, I was just confused at the OP comments evangelism of installing and keeping his phone on his for those quick fix google searches
stock_toaster•35m ago
With this administration? Color me unsurprised.
auslegung•3m ago
> In total, Coruna takes advantage of 23 distinct vulnerabilities in iOS, a rare collection of hacking components that suggests it was created by a well-resourced, likely state-sponsored group of hackers.

People have been hacking iOS since before it was called iOS and they weren't necessarily "well-resourced, likely state-sponsored". See geohot