frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

What is jj and why should I care?

https://steveklabnik.github.io/jujutsu-tutorial/introduction/what-is-jj-and-why-should-i-care.html
142•tigerlily•2h ago•71 comments

DaVinci Resolve – Photo

https://www.blackmagicdesign.com/products/davinciresolve/photo
741•thebiblelover7•11h ago•199 comments

NimConf 2026: Dates Announced, Registrations Open

https://nim-lang.org/blog/2026/04/07/nimconf-2026.html
38•moigagoo•2h ago•9 comments

A new spam policy for “back button hijacking”

https://developers.google.com/search/blog/2026/04/back-button-hijacking
516•zdw•10h ago•305 comments

Backblaze has stopped backing up your data

https://rareese.com/posts/backblaze/
374•rrreese•5h ago•239 comments

Someone bought 30 WordPress plugins and planted a backdoor in all of them

https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/
1039•speckx•19h ago•299 comments

Introspective Diffusion Language Models

https://introspective-diffusion.github.io/
110•zagwdt•5h ago•28 comments

GitHub Stacked PRs

https://github.github.com/gh-stack/
777•ezekg•16h ago•425 comments

Franklin's bad ads for Apple ][ clones and the beloved impersonator they depict

https://buttondown.com/suchbadtechads/archive/franklin-ace-1000/
55•rfarley04•3d ago•29 comments

The M×N problem of tool calling and open-source models

https://www.thetypicalset.com/blog/grammar-parser-maintenance-contract
34•remilouf•4d ago•9 comments

The acyclic e-graph: Cranelift's mid-end optimizer

https://cfallin.org/blog/2026/04/09/aegraph/
9•tekknolagi•4d ago•1 comments

Distributed DuckDB Instance

https://github.com/citguru/openduck
97•citguru•6h ago•20 comments

Ransomware Is Growing Three Times Faster Than the Spending Meant to Stop It

https://ciphercue.com/blog/ransomware-claims-grew-faster-than-security-spend-2025
42•adulion•4h ago•34 comments

Lean proved this program correct; then I found a bug

https://kirancodes.me/posts/log-who-watches-the-watchers.html
302•bumbledraven•13h ago•141 comments

The Case Against Gameplay Loops

https://blog.joeyschutz.com/the-case-against-gameplay-loops/
10•coinfused•2h ago•2 comments

WiiFin – Jellyfin Client for Nintendo Wii

https://github.com/fabienmillet/WiiFin
195•throwawayk7h•13h ago•89 comments

The exponential curve behind open source backlogs

https://armanckeser.com/writing/jellyfin-flow
6•armanckeser•1h ago•1 comments

Multi-Agentic Software Development Is a Distributed Systems Problem

https://kirancodes.me/posts/log-distributed-llms.html
61•tie-in•7h ago•26 comments

MOS tech 6502 8-bit microprocessor in pure SQL powered by Postgres

https://github.com/lasect/pg_6502
45•adunk•7h ago•5 comments

The Great Majority: Body Snatching and Burial Reform in 19th-Century Britain

https://publicdomainreview.org/essay/the-great-majority/
8•apollinaire•3d ago•1 comments

Nothing Ever Happens: Polymarket bot that always buys No on non-sports markets

https://github.com/sterlingcrispin/nothing-ever-happens
446•m-hodges•21h ago•243 comments

A soft robot has no problem moving with no motor and no gears

https://engineering.princeton.edu/news/2026/04/08/soft-robot-has-no-problem-moving-no-motor-and-n...
46•hhs•4d ago•13 comments

US appeals court declares 158-year-old home distilling ban unconstitutional

https://nypost.com/2026/04/11/us-news/us-appeals-court-declares-158-year-old-home-distilling-ban-...
412•t-3•23h ago•276 comments

Design and implementation of DuckDB internals

https://duckdb.org/library/design-and-implementation-of-duckdb-internals/
150•mpweiher•3d ago•9 comments

Lumina – a statically typed web-native language for JavaScript and WASM

https://github.com/nyigoro/lumina-lang
27•light_ideas•4d ago•10 comments

Write less code, be more responsible

https://blog.orhun.dev/code-responsibly/
123•orhunp_•3d ago•70 comments

Make tmux pretty and usable (2024)

https://hamvocke.com/blog/a-guide-to-customizing-your-tmux-conf/
406•speckx•22h ago•248 comments

N-Day-Bench – Can LLMs find real vulnerabilities in real codebases?

https://ndaybench.winfunc.com
83•mufeedvh•15h ago•26 comments

Android now stops you sharing your location in photos

https://shkspr.mobi/blog/2026/04/android-now-stops-you-sharing-your-location-in-photos/
395•edent•1d ago•308 comments

The secrets of the Shinkansen

https://www.worksinprogress.news/p/the-secret-behind-japans-railways
127•WillDaSilva•6h ago•116 comments
Open in hackernews

Ransomware Is Growing Three Times Faster Than the Spending Meant to Stop It

https://ciphercue.com/blog/ransomware-claims-grew-faster-than-security-spend-2025
42•adulion•4h ago

Comments

CoastalCoder•2h ago
It seems obvious to me that the only real solution is to penalize the payment of ransoms. For the same reasons one doesn't negotiate with terrorists.

Is there some reason to believe that this isn't the best approach? And if not, then any theories as to why it hasn't been enacted?

ArcHound•2h ago
I don't think you can enforce such a rule. I think it's a good approach too.

Another issue is that not paying up and risking restore from underfunded ops dept. might be more expensive than paying up AND making a selected executive look bad. And we can't have that, can we.

finghin•1h ago
Agreed - it’s not that it’s a bad point but it would be an ineffective rule which is usually an excuse to forgo other more effective (usually more expensive) options
TeMPOraL•1h ago
Unfortunately the actual solution will probably have to mirror real world, which means balkanizing the Internet to clarify legal jurisdiction, maybe some international police task force to aid with cross-border investigation, but ultimately it all hinges on whether and how much the countries with most nuclear aircraft carriers are willing to pressure other countries to take this seriously.
wongarsu•1h ago
It would make the ransomware statistic go down without actually stopping crime. Any company that considers paying the ransom would have a strong incentive to never report the security incident to avoid being punished for ransom payments
entuno•1h ago
Plus it gives the ransomware gangs a whole new angle they can use.

So, remember how you illegally paid us a ransom a few months ago? Unless you want to go to prison, then you better...

We're already seeing this against companies who pay ransoms and fail to report the breaches when they're legally required to - but it would be much worse if it's against individuals who are criminally liable.

cucumber3732842•2h ago
All that does is make the problem more expensive by whatever cut the middle men who will pop up take and however much the overhead of the obfuscation is. It might reduce payments at the margin, but probably not enough to be worth the cost.
entuno•1h ago
It's one of those ideas that sounds nice in theory, but doesn't survive contact with the real world. In the same way that many people would say that you shouldn't negotiate with terrorists or kidnappers; but if it's their loved one who's being held and tortured they'll very quickly change their mind.

Getting to a world where no one pays ransoms and the ransomware groups give up and go away would be the ideal, and we'd all love to get there. But outlawing paying ransoms basically sacrificing everyone who gets ransomwared in the meantime until we get to that state for the greater good.

And where companies get hit, they'll try hard to find ways around that, because the alternative may well be shutting down the business. But if something like a hospital gets hit, are governments really going to be able to stand behind the "you can't pay a ransom" policy when that could directly lead to deaths?

Tangurena2•1h ago
I work in the state government space. Many targets/victims of ransomware are small/local government agencies and the ransom demands are greater than their annual budgets. Not every agency is big enough to have someone (bored) come in on Sunday, notice stuff getting encrypted and then run in to the server room and hit the big red button like Virginia's legislature in 2021[0].

Many ransoms are far more than the victim can actually pay. Not all ransom payments result in a decryption key that actually works.

Notes:

0 - https://www.nbcnews.com/politics/politics-news/officials-vir...

alopha•2h ago
The idea that the spending needs to grow linearly with the growth is a damning indictment of the mindset of the vast ineffectual mess that is the cybersecurity industry.
bigfatkitten•2h ago
It’s not a popularly held mindset, either within the security industry or outside of it. This piece seems to be pitched at salespeople whose only job is to extract money from other companies.

Basic hygiene security hygiene pretty much removes ransomware as a threat.

mschuster91•2h ago
> Basic hygiene security hygiene pretty much removes ransomware as a threat.

It does not. The problem is, as long as there are people employed in a company, there will be people being too trustful and executing malware, not to mention AI agents. And even if you'd assume people and AI agents were perfect, there's all the auto updaters these days that regularly get compromised because they are such juicy targets.

And no, backups aren't the solution either, they only limit the scope of lost data.

In the end the flaw is fundamental to all major desktop OS'es - neither Windows, Linux nor macOS meaningfully limit the access scope of code running natively on the filesystem. Everything in the user's home directory and all mounted network shares where the user has write permissions bar a few specially protected files/folders is fair game for any malware achieving local code execution.

ArcHound•2h ago
AFAIK the idea is to have backups so good, that restoring them is just a minor inconvenience. Then you can just discard encrypted/infected data and move on with your business. Of course that's harder to achieve in practice.
mschuster91•2h ago
In the end the limiting factor will be the bandwidth of your disk arrays... enough compromised machines and they will get overwhelmed.
finghin•1h ago
Sleeper agent malware is a thing especially in high risk situations. If somebody has a dormant RAT installed since year X-1 it’s going to be impossible to solve that in year X by using backups
BenjiWiebe•21m ago
What about non executable backups? Backup data but not programs?

Not applicable everywhere, but I think it's applicable most places.

trollbridge•16m ago
Er… Linux has pretty good isolation of users who don’t have super user privileges.
dlgeek•3m ago
https://xkcd.com/1200/
mapontosevenths•1h ago
Serious professionals use one or more spending models to determine budget.

My favorite is the Gordon-Loeb model[0], but there are others that are simpler and some that are more complex. Almost none that imply the budget should naively grow in lockstep with prevelence linearly.

I think TFA doesnt really mean to imply that it should, merely that there is a likley mismatch.

[0] https://en.wikipedia.org/wiki/Gordon%E2%80%93Loeb_model

reliabilityguy•18m ago
> damning indictment of the mindset of the vast ineffectual mess that is the cybersecurity industry

Cybersecurity is not about stopping issues but about compliance and liability. Attend RSA once, and you will see it yourself.

HPsquared•3m ago
It makes sense when you consider the main threat you are protecting yourself from is lawsuits.
_tk_•2h ago
I think this article mostly shows that publicly announcing a successful ransoming of a company is now more popular than a couple years back.
CodeCompost•2h ago
Thanks, Satoshi
super256•1h ago
Don't worry, ransomware already existed before BTC. The ransomware demanded Ukash and Paysafecard instead.
wstrange•55m ago
That seems disingenuous. Crypto made ransomware much easier.
ravenstine•49m ago
Thanks, Tim Berners-Lee.
shrubble•1h ago
I don't think there is a reasonable correlation, since stopping ransomware doesn't require that much of an increase in spending; it's a culture thing more than a money thing.
Waterluvian•1h ago
Moving security tickets to the top of the stack is absolutely a money thing. Training is a money thing. Exchanging velocity for security is a money thing. Changing culture takes money.
mewpmewp2•51m ago
What do you need to do to improve culture in the correct way?
everdrive•1h ago
If ransomware spending must scale directly with ransomware attacks then I don't see how companies could possibly keep up with the spending. A lot of the "gaps" in cybersecurity are essentially spending problems. Companies want to spend as little on it as they can.
Frieren•52m ago
Stopping Ransomware is trivial if governments knew where the money goes. But cryptocurrencies and lax capital control pushed by the uber-rich makes it impossible.

The technology is there and it is used to track the average citizens every move. But when it comes to rich people then the money goes and comes without control (and without taxation).

Cryptocurrencies are a great solution to enable criminal activity. Their only use and highly appreciated by terrorists, criminals and dictatorial governments around the world.

rbbydotdev•39m ago
I wonder what kinds of market hypotheses you could derive from the game theory here
mystraline•38m ago
Well, given that C levels see cybersecurity has a bad return on investment (read: insurance), Ive seen countless numbers of people laid off these jobs.

So yeah, I'm surprised its only 3x, and not even more.

A good abliterated local LLM is great at finding dumb exploits and writing ransomware code. And the cybersec professionals? Yeah, theyre pivoting elsewhere and gone.

ingohelpinger•18m ago
The davos oracle https://youtube.com/shorts/Pqig_vIR4zI?si=G_JpJP90xqO0AQAd