frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Shall I implement it? No

https://gist.github.com/bretonium/291f4388e2de89a43b25c135b44e41f0
379•breton•1h ago•149 comments

Malus – Clean Room as a Service

https://malus.sh
931•microflash•9h ago•365 comments

Bubble Sorted Amen Break

https://parametricavocado.itch.io/amen-sorting
225•eieio•5h ago•76 comments

Reversing memory loss via gut-brain communication

https://med.stanford.edu/news/all-news/2026/03/gut-brain-cognitive-decline.html
178•mustaphah•6h ago•50 comments

ATMs didn't kill bank teller jobs, but the iPhone did

https://davidoks.blog/p/why-the-atm-didnt-kill-bank-teller
279•colinprince•7h ago•329 comments

Innocent woman jailed after being misidentified using AI facial recognition

https://www.grandforksherald.com/news/north-dakota/ai-error-jails-innocent-grandmother-for-months...
215•rectang•1h ago•118 comments

The Met releases high-def 3D scans of 140 famous art objects

https://www.openculture.com/2026/03/the-met-releases-high-definition-3d-scans-of-140-famous-art-o...
183•coloneltcb•7h ago•38 comments

Bringing Chrome to ARM64 Linux Devices

https://blog.chromium.org/2026/03/bringing-chrome-to-arm64-linux-devices.html
33•ingve•2h ago•31 comments

Document poisoning in RAG systems: How attackers corrupt AI's sources

https://aminrj.com/posts/rag-document-poisoning/
28•aminerj•9h ago•8 comments

Forcing Flash Attention onto a TPU and Learning the Hard Way

https://archerzhang.me/forcing-flash-attention-onto-a-tpu
26•azhng•4d ago•2 comments

Show HN: OneCLI – Vault for AI Agents in Rust

https://github.com/onecli/onecli
107•guyb3•6h ago•37 comments

Launch HN: IonRouter (YC W26) – High-throughput, low-cost inference

https://ionrouter.io
32•vshah1016•3h ago•14 comments

Runners who churn butter on their runs

https://www.runnersworld.com/news/a70683169/how-to-make-butter-while-running/
62•randycupertino•3h ago•25 comments

An old photo of a large BBS (2022)

https://rachelbythebay.com/w/2022/01/26/swcbbs/
138•xbryanx•3h ago•96 comments

Show HN: Detect any object in satellite imagery using a text prompt

https://www.useful-ai-tools.com/tools/satellite-analysis-demo/
8•eyasu6464•4d ago•1 comments

WolfIP: Lightweight TCP/IP stack with no dynamic memory allocations

https://github.com/wolfssl/wolfip
75•789c789c789c•7h ago•7 comments

Dolphin Progress Release 2603

https://dolphin-emu.org/blog/2026/03/12/dolphin-progress-report-release-2603/
284•BitPirate•13h ago•47 comments

Converge (YC S23) Is Hiring a Founding Platform Engineer (NYC, Onsite)

https://www.runconverge.com/careers/founding-platform-engineer
1•thomashlvt•5h ago

US private credit defaults hit record 9.2% in 2025, Fitch says

https://www.marketscreener.com/news/us-private-credit-defaults-hit-record-9-2-in-2025-fitch-says-...
189•JumpCrisscross•10h ago•308 comments

Big data on the cheapest MacBook

https://duckdb.org/2026/03/11/big-data-on-the-cheapest-macbook
280•bcye•11h ago•241 comments

Show HN: Axe – A 12MB binary that replaces your AI framework

https://github.com/jrswab/axe
129•jrswab•8h ago•85 comments

The Cost of Indirection in Rust

https://blog.sebastiansastre.co/posts/cost-of-indirection-in-rust/
78•sebastianconcpt•3d ago•31 comments

Are LLM merge rates not getting better?

https://entropicthoughts.com/no-swe-bench-improvement
91•4diii•10h ago•96 comments

NASA's DART spacecraft changed an asteroid's orbit around the sun

https://www.sciencenews.org/article/spacecraft-changed-asteroid-orbit-nasa
94•pseudolus•3d ago•59 comments

The Road Not Taken: A World Where IPv4 Evolved

https://owl.billpg.com/ipv4x/
41•billpg•7h ago•74 comments

Full Spectrum and Infrared Photography

https://timstr.website/blog/fullspectrumphotography.html
42•alter_igel•4d ago•23 comments

Show HN: Understudy – Teach a desktop agent by demonstrating a task once

https://github.com/understudy-ai/understudy
69•bayes-song•5h ago•19 comments

DDR4 Sdram – Initialization, Training and Calibration

https://www.systemverilog.io/design/ddr4-initialization-and-calibration/
52•todsacerdoti•2d ago•13 comments

Long Overlooked as Crucial to Life, Fungi Start to Get Their Due

https://e360.yale.edu/features/fungi-kingdom
74•speckx•9h ago•20 comments

Show HN: OpenClaw-class agents on ESP32 (and the IDE that makes it possible)

https://pycoclaw.com/
6•pycoclaw•1h ago•1 comments
Open in hackernews

Should hack-back be legal?

https://speculumx.at/blogpost/should-hack-back-be-legal
14•Vektorceraptor•1d ago

Comments

sjducb•52m ago
There’s a case for allowing digital privateering against countries that routinely allow fraud. For example fraud is 68% of Laos’s GDP.

If Laos wants to be taken off the list of permitted targets then it can crack down on fraud. They have effectively allowed digital privateering against us by failing to crack down on fraud.

https://www.theguardian.com/technology/2025/dec/02/scam-stat...

alephnerd•46m ago
The issue is those jurisdictions that have allowed such rot to take hold truly don't care.

Both Cambodia and Laos have governments where leadership is directly tied to organized crime, but the PRC has continued to expand their relationships with both because of their strategic position and because their governments directly cooperate with Chinese law enforcement.

Similarly, in the threat hunting space, it's been common to find Russian originated malware that would shut itself off if it identified an indicator or signature that implied that the workload was within the CIS.

In the same manner, if I were to conduct illicit cyberoperations in a jurisdiction like the UAE but not target the US, India, China, and a couple other jurisdictions with strong ties with the UAE I could operate with impunity.

It's the same reason Neville Singham is in Shanghai and Guo Wengui is in New York. It's also the same reason Ecuador handed Assange after the government changed from being hard-left and aligned with Russia and Venezuela to center-right and aligned with the US.

Edit: can't reply

> the case that fraudsters can already target Loas and Cambodia with impunity from certain jurisdictions

Not legally or morally, but this is de facto the case.

That said, the countries most annoyed at Laos and Cambodia (eg. Thailand, Vietnam, and the auS) would much rather use regime change, or use pressure points like financial crimes prosecution which dramatically reduces your freedom and dramatically increases your risk of being used as a pawn to trade, and offer the carrot of negotiated immunity deals in return for flipping.

These kinds of organizations don't exist with impunity - they are pawns that are discarded the moment their value can no longer justify their liabilities.

sjducb•40m ago
Are you making the case that fraudsters can already target Loas and Cambodia with impunity from certain jurisdictions?

If you are then I would point out that being legitimate allows you to attract better talent. See America’s private military contracting sector. Yes you can go and be a mercenary abroad and operate in a legal grey area, but if you’re a Private Military Contractor working for a major US company then you won’t go to jail in the US when you come back, and you can put it on your CV.

joegibbs•51m ago
I think you’re fine, which hacker is going to go to the police about it?
GuinansEyebrows•44m ago
you just better be sure they initially exploited the only vulnerability they found the first time.
bitwize•40m ago
"If I sprain my ankle

While I'm robbing your place;

If I hurt my knuckles

When I punch you in the face...

I'm gonna sue! Sue! Yeah, that's what I'm gonna do!

Sue! Sue! I might even sue you!"

—Weird Al Yankovic, "I'll Sue Ya"

TACIXAT•39m ago
The better question is will you get killed. Foreign intelligence does not take kindly to interference, nor do well funded criminal enterprises.
KaiserPro•19m ago
Depends.

If the hacker is any good, they'll be using other people's machines. this means that you could be triggering legal fun™

andy_ppp•48m ago
All vigilantism has issues. For example, if I was ever to do something horrific online I’d probably hack someone unrelated to me first and tunnel through their computer and online presence to make sure if I got caught it would not blowback onto me so easily. Not that I’ve thought about it or anything :-/
KaiserPro•40m ago
I mean it sounds ok, assuming that you are evenly matched. But assuming this was legal and someone like google has automated hack back triggered by some automated rule.

Its a bit trigger happy and I do something like change VPN, with my session, and it looks like I'm trying to probe with multiple IPs.

Boom, my devices all fall apart and my internet is offline until they stop DOS'ing me

looperhacks•37m ago
> Legitimate use cases, including security research, web archiving, and search engine crawling, can be distinguished from credential scanning by scope and target: no valid automated process needs to probe arbitrary third-party servers for .env or .git files.

What about security researchers scanning for their research? What about scanners that notify you?

Vektorceraptor•28m ago
You are right. I am not satisfied with this sentence myself and will revise it. In its current form it sounds contradictory and nonsensical. However, I have not yet been able to identify a reliable demarcation criterion...
derefr•19m ago
Insofar as the thing we're talking about here isn't exactly "hack-back" per se, but more like "booby trapping your honeypot", I think you might be able to make an argument analogous to the one that would apply as a booby-trap defense:

Namely, that if "common sense" is enough to prevent someone from suffering any injury from a booby trap even when they do trigger it, then it's not really a "booby trap" in the classical definition. It's just an object with dangerous edge-cases.

In the literal booby-trap case, you might picture, say... a garden hose.

It would be hard to imagine someone being harmed by "normal" use of a garden hose. Most ways to engage with it wouldn't result in any harm. You could turn it on, maybe get a bit wet or lashed if the hose whips around as it stiffens. Point it at yourself and use it to wash yourself clean. Maybe point it in your mouth and choke.

The only clear way to harm yourself with a garden hose, would be to put the hose in your mouth and then turn it on. And then to not remove the hose when you begin to feel very, very uncomfortable.

And that's very silly! Why would you do that? You could have stopped drinking from the hose at any time!

A garden hose has a dangerous edge-case: the water stream is infinite, and the hose fits in your mouth, and the internal stomach capacity of a human is finite. But it's an absurd dangerous edge-case. Nobody with common sense would encounter this edge-case. So a garden hose is not a booby trap. And an abandoned house with a garden house connected to a water supply, is not a booby-trapped house.

See what I'm getting at here?

You can give up and stop streaming (/ parsing / building-up-your-in-memory-ADT-from) an HTTP response that "just keeps going and going" at any time. And any vuln-scanning client programmed by someone with some common sense (e.g. a professional security researcher) would have that common sense built into it. So a 1TB .env-file HTTP response is not a booby trap.

And yet, of course, it will catch (and break) those "special" clients, built by people with no software-engineering common sense, i.e. script kiddies. But it's not your fault that some people have built deranged software that goes around wrapping its mouth around strangers' garden hoses!

looperhacks•31m ago
Hack-backs are a topic that comes up every few months from government representatives here. There are two big problems I have with this:

- you don't know "who" you hit. The case in TFA is still rather simple (just send the "hack" as the response), but you will still most likely hit some residential proxy and nuke some random person instead of the responsible actor - (this is not too related to TFA but a point in discussions about hack-backs on a state-actor level) unless you're doing a very simple "attack", you need to have some sort of vuln ready to perform any kind of hack-back. Which leaves the ethical dilemma that actors are now motivated to keep vulnerabilities available, thus making the world more unsafe. And once you have used your vulnerability, your "enemy" probably knows it as well.