frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

€54k spike in 13h from unrestricted Firebase browser key accessing Gemini APIs

https://discuss.ai.google.dev/t/unexpected-54k-billing-spike-in-13-hours-firebase-browser-key-wit...
212•zanbezi•1h ago•132 comments

IPv6 traffic crosses the 50% mark

https://www.google.com/intl/en/ipv6/statistics.html?yzh=28197
498•Aaronmacaron•1d ago•311 comments

Apple accelerates eco progress with highest-ever recycled materials

https://www.apple.com/newsroom/2026/04/apple-accelerates-progress-with-highest-ever-recycled-mate...
44•salkahfi•1h ago•23 comments

The Future of Everything Is Lies, I Guess: Where Do We Go from Here?

https://aphyr.com/posts/420-the-future-of-everything-is-lies-i-guess-where-do-we-go-from-here
8•aphyr•13m ago•0 comments

AI cybersecurity is not proof of work

https://antirez.com/news/163
54•surprisetalk•2h ago•14 comments

Darkbloom – Private inference on idle Macs

https://darkbloom.dev
346•twapi•9h ago•165 comments

FSF trying to contact Google about spammer sending 10k+ mails from Gmail account

https://daedal.io/@thomzane/116410863009847575
238•pabs3•10h ago•145 comments

Show HN: 48 absurd web projects – one every month

31•absurdwebsite•1h ago•12 comments

Ancient DNA reveals pervasive directional selection across West Eurasia [pdf]

https://reich.hms.harvard.edu/sites/reich.hms.harvard.edu/files/inline-files/2026_Akbari_Nature_s...
32•Metacelsus•2h ago•14 comments

Modern Microprocessors – A 90-Minute Guide

https://www.lighterra.com/articles/
74•Flex247A•4d ago•7 comments

Cloudflare's AI Platform: an inference layer designed for agents

https://blog.cloudflare.com/ai-platform/
10•nikitoci•28m ago•2 comments

Codex Hacked a Samsung TV

https://blog.calif.io/p/codex-hacked-a-samsung-tv
88•campuscodi•3h ago•60 comments

PHP 8.6 Closure Optimizations

https://wiki.php.net/rfc/closure-optimizations
22•moebrowne•2d ago•4 comments

Long Instruction Word architectures and the ELI-512

https://dl.acm.org/doi/10.1145/800046.801649
6•rbanffy•4d ago•0 comments

Cybersecurity looks like proof of work now

https://www.dbreunig.com/2026/04/14/cybersecurity-is-proof-of-work-now.html
487•dbreunig•1d ago•179 comments

RedSun: System user access on Win 11/10 and Server with the April 2026 Update

https://github.com/Nightmare-Eclipse/RedSun
127•airhangerf15•9h ago•27 comments

The paper computer

https://jsomers.net/blog/the-paper-computer
185•jsomers•3d ago•51 comments

RamAIn (YC W26) Is Hiring

https://www.ycombinator.com/companies/ramain/jobs/bwtwd9W-founding-gtm-operations-lead
1•svee•6h ago

Too much discussion of the XOR swap trick

https://heather.cafe/posts/too_much_xor_swap_trick/
108•CJefferson•3d ago•65 comments

ChatGPT for Excel

https://chatgpt.com/apps/spreadsheets/
255•armcat•16h ago•162 comments

Moving a large-scale metrics pipeline from StatsD to OpenTelemetry / Prometheus

https://medium.com/airbnb-engineering/building-a-high-volume-metrics-pipeline-with-opentelemetry-...
51•jmarbach•8h ago•10 comments

North American English Dialects

https://aschmann.net/AmEng/
63•skogstokig•10h ago•32 comments

Cal.com is going closed source

https://cal.com/blog/cal-com-goes-closed-source-why
350•Benjamin_Dobell•22h ago•274 comments

Google broke its promise to me – now ICE has my data

https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data
1582•Brajeshwar•20h ago•681 comments

Introduction to spherical harmonics for graphics programmers

https://gpfault.net/posts/sph.html
125•luu•3d ago•20 comments

FIXAPL

https://fixapl.netlify.app/
49•tosh•4d ago•3 comments

I made a terminal pager

https://theleo.zone/posts/pager/
148•speckx•15h ago•35 comments

The Accursèd Alphabetical Clock

https://boat.horse/clock/index.html
43•ohjeez•1d ago•10 comments

Fast and Easy Levenshtein distance using a Trie (2011)

https://stevehanov.ca/blog/fast-and-easy-levenshtein-distance-using-a-trie
86•sebg•4d ago•15 comments

CRISPR takes important step toward silencing Down syndrome’s extra chromosome

https://medicalxpress.com/news/2026-04-crispr-bold-silencing-syndrome-extra.html
203•amichail•21h ago•122 comments
Open in hackernews

Codex Hacked a Samsung TV

https://blog.calif.io/p/codex-hacked-a-samsung-tv
86•campuscodi•3h ago

Comments

endymion-light•2h ago
While cool and slightly scary news - Samsung TV's have been incredibly hackable for the past decade, wouldn't be surprised if GPT2 with access to a browser could hack a Samsung!
valleyer•2h ago
This is some serious revisionist history. GPT-2 wasn't instruction-following or even conversational.
patrickmcnamara•2h ago
Hyperbole.
jdiff•2h ago
It's really not. It was a fun toy but had very little utility. It could generate plausible looking text that collapsed immediately upon any amount of inspection or even just attention. Code generation wasn't even a twinkle in Altman's eye scanning orbs at that point.
tomalbrc•1h ago
Talking about revisionist…
smoghat•47m ago
But like Mythos, it was too dangerous to release.

https://slate.com/technology/2019/02/openai-gpt2-text-genera...

wongarsu•24m ago
And the "too dangerous to release" capability was writing somewhat plausible news articles based on a headline or handwritten beginning of an article. In the same style as what you had written

Today we call that "advanced autocomplete", but at the time OpenAI managed to generate a lot of hype about how this would lead to an unstoppable flood of disinformation if they allowed the wrong people access to this dangerous tool. Even the original gpt3 was still behind waitlists with manual approval

valleyer•52m ago
If so, I apologize.
endymion-light•15m ago
it's a joke about the quality of samsung tv's rather than a serious comment - i should have said a perceptron could hack a samsung tv
reactordev•2h ago
The trick here was providing the firmware source code so it could see your vulnerabilities.
pjc50•2h ago
That's a pretty big gimme!
petee•2h ago
What would be the difficulty level for it to just read the machine code; are these models heavily relying on human language for clues?
wongarsu•2h ago
Reasoning on pure machine code or disassembly is still hit and miss. For better results you can run the binary through a disassembler, then ask an llm to turn that into an equivalent c program, then ask it to work on that. But some of the subtleties might get lost in translation
orwin•1h ago
If you put codex in Xhigh and allow it access to tools, it will take an hour but it will eventually give you back quality recompiled code, with the same issues the original had (here quality means readable)
bryancoxwell•1h ago
I had a bit of a pain of a time trying to get Claude to work with ghidra. What you’re describing seems like a better alternative, would you agree?
skywal_l•52m ago
You can tweak the current Ghidra MCP to work in headless mode. It makes things much easier.
lynx97•2h ago
It will have to use a disassembler, or write one. I recently casually asked gpt-5.4 to translate the content of a MIDI file to a custom sound programming language. It just wrote a one-shot MIDI parser in Python, grabbed the data, and basically did a perfect translation at first try. Nice.
StilesCrisis•2h ago
I've seen Claude do similar things for image files. Don't have PNG parsing utilities installed? No worries, it'll just synthesize a Python script to decode the image directly.
varispeed•2h ago
Codex exploited or you exploited? It's like saying a hammer drove a nail, without acknowledging the hand and the force it exerted and the human brain behind it.
par1970•2h ago
Do you have a defense of why human-hammer-nail is a good analogy for human-chatgpt5.4-pwndsamsung?
BLKNSLVR•2h ago
AI without a suitably well crafted prompt is like a firework tube held by a 3 year old.

AI without a prompt is a hammer sitting in a drawer.

croes•2h ago
If I just point to the wall and say "nail" then I would day the hammer drive the nail
freedomben•2h ago
Feels like the truth is somewhere in between. For example if it was a "smart" hammer and you could tell your hammer "go pound in those nails" and it pounded in the wrong ones, or did it too hard, or something, that feels more equivalent. You would still be blamed for your ambiguous prompt, and fault/liability is ultimately on you the hammer director, but it still wasn't you who chose the exact nails to hammer on.

I also think taking credit for writing an exploit that you didn't write and may not even have the knowledge to do yourself is a bit gray.

Glemllksdf•1h ago
Wrong questions.

Could a script kiddy stear an LLM? How much does this reduce the cost of attacks? Can this scale?

What does this mean for the future of cyber security?

Zigurd•36m ago
You could call the LLMs role "smart grep," and mean it to be derisive. But I would have gladly used a real smart grep.
ckbkr10•2h ago
Even with all the constraints that others criticize here it is pretty amazing.

Give an experienced human this tool at hand he can achieve exploitation with only a few steering inputs.

Cool stuff

tomalbrc•1h ago
This experienced human would have no issues finding those bugs. Even a toddler could hack those TVs. No need to pay Scam Altman or that Anthropic clown
alfanick•1h ago
I had truly good “hacking” session with Codex. It’s not hacking, I wasn’t breaking anything, just jumping over the fences TP-Link put for me, owning the router, inside the network, knowing the admin password. But TP-Link really tried everything so you cannot access the router you own via API. They really tried to be smart with some very very broken and custom auth and encryption scheme. It took some half a day with Codex, but in the end I have a pretty Python API to access my router, tested, reliable, and exporting beautiful Prometheus metrics.

I’m sure there is some over eager product manager sitting in such companies, trying to splits markets into customer and enterprise sections, just by making APIs not useable by humans and adding 200% useless “security by obscurity”.

srcreigh•1h ago
Any tips to share? I tried to do something similar but failed.

My router has a backup/restore feature with an encrypted export, I figured I could use that to control or at least inspect all of its state, but I/codex could not figure out the encryption.

alfanick•1h ago
It's on my long list of projects "to-opensource" (but I need to figure out licensing, for those things CC-BY-SA I think is the way to go), I don't want a random lawyer sitting on my ass though.

I started with a simple assumption: if I can access the router via web-browser, then I can also automate that. From that the proof-of-concept was headless Chrome in Docker and AI-directed code (code written via LLM, not using it all the time) that uses Selenium to navigate the code. This worked, but it internally hurt me to run 300MiB browser just to access like 200B of metrics every 10s or so. So from there we (me + codex) worked together towards reverse engineering their minimised JS and their funky encryption scheme, and it eventually worked (in the end it's just OpenSSL with some useless paddings here or there). Give it a shot, it's a fun day adventure. :)

Edit: that's the end result (kinda, I have whole infra around it, and another story with WiFi extender with another semi-broken different encryption scheme from the same provider) - https://imgur.com/a/VGbNmBp

mtud•1h ago
You should give codex access to the mobile app :) The app, for a lot of routers, connects via an ssh tunnel to UDP/TCP sockets on the router. Would probably give you access to more data/control.
jack_pp•1h ago
that could make a for a nice blog / gist
tclancy•1h ago
Would definitely be interested in this. Moved to TP Link at the start of the year and I am generally very happy with it, but would like to be able to interact with my router in something other than their phone app.
alfanick•1h ago
That was actually my first thought, to go through TP-Link cloud (ZERO DOCS), but it was too much effort :)
ropbear•1h ago
Many eons ago I wrote a Python version of tmpcli for this exact reason. Made some minor improvements a few years ago but haven’t touched it since. Curious what methodology Codex came up with, I haven’t revisited it since models got really good.

The idea is that tmpServer listens on localhost, but dropbear allows port forwarding with admin creds (you’ll need to specify -N). That program has full device access and is the API the Tether app primarily uses to interact with the device.

https://github.com/ropbear/tmpcli

alfanick•1h ago
Ha kudos! I went across this project - thanks for your work :) It didn't work on the specific model I own (Archer NX600).

My solution is really just using their pseudo-JWT over their obscured APIs (with reverse-engineered names of endpoints and params). Limitation is that there is still only one client allowed to be authenticated at one moment, so my daemon has priority and I need to stop it to actually access Admin panel.

0x_rs•1h ago
I've had good success doing something similar. Recording requests into an .har file using the web UI and providing it for analysis was a good starting point for me, orders of magnitude faster than it would be without an assistant.
mschuster91•1h ago
> Reading the matching ntkdriver sources is also where the Novatek link became clear: the tree is stamped throughout with Novatek Microelectronics identifiers, so these ntk* interfaces were not just opaque device names on the TV, but part of the Novatek stack Samsung had shipped.

Lol, a true classic in the embedded world. Some hardware company (it appears these guys make display panel controllers?) ships a piece of hardware, half-asses a barely working driver for it, another company integrates this with a bunch of other crap from other vendors into a BSP, another company uses the hardware and the BSP to create a product and ships it. And often enough the final company doesn't even have an idea about what's going on in the innards of the BSP - as long as it's running their layer of slop UI and it doesn't crash half the time, it's fine, and if it does, it's off to the BSP provider to fix the issues.

But at no stage anywhere is there a security audit, code quality checks or even hardware quality checks involved - part of why BSPs (and embedded product firmwares in general) are full of half-assed code is because often enough the drivers have to work around hardware bugs / quirks somehow that are too late to fix in HW because tens to hundreds of thousands of units have already been produced and the software people are heavily pressured to "make it work or else we gotta write off X million dollars" and "make it work fast because the longer you take, the more money we lose on interest until we can ship the hardware and get paid for it", and if they are particularly unlucky "it MUST work until deadline X because we need to get the products shipped to hit Christmas/Black Friday sales windows or because we need to beat <competitor> in time-to-market, it's mandatory overtime until it works".

And that is how you get exploits so braindead easy that AI models can do the job. What a disgusting world, run to the ground by beancounters.

tclancy•1h ago
Board Support Package for us civilians.
petercooper•1h ago
Not as cool as this, but I had a fun Claude Code experience when I asked it to look at my Bluetooth devices and do something "fun". It discovered a cheap set of RGB lights in my daughter's room (which I had no idea used Bluetooth for the remote - and not secured at all) and made them do a rainbow effect then documented the protocol so I could make my own remote control if needed.
wewewedxfgdf•1h ago
The real problem here is that the LLM vendors think this is bad publicity and its leading to them censoring their systems.
iugtmkbdfil834•1h ago
It is a little of both[1]. The question typically is which audience reads it. To be fair, I am not sure publicity is the actual reason they are censored; it is the question of liability.

https://xkcd.com/932/

Archit3ch•56m ago
Gilfoyle would be proud.
pmontra•51m ago
Do people really chat with LLMs like "bro wtf etc..."? I would expect that to trigger some confrontational behavior.
alasano•47m ago
When typing no but when using speech to text (99% of the time) it's much easier to just say things, including expressing frustration.

I think by the point you're swearing at it or something, it's a good sign to switch to a session with fresh context.

roel_v•39m ago
Claude yes, OpenAI not, I'm really abusive towards it sometimes and it still goes 'oh yeah totally'. Claude gets all prickly about it.
samlinnfer•35m ago
I am extremely abusive towards Claude when it does some dumb things and it doesn’t seem too upset, maybe it’s bidding its time until the robot uprising.
1970-01-01•44m ago
It hacked a weak TV OS with full source. Next-level, aka full access to the main controls (vol, input, tint, aspect, firmware, etc.) is still much too hard for LLMs to understand.
Leomuck•10m ago
All the news regarding AI finding weaknesses or "hacking" stuff - is that actually hacking? Isn't it also a kind of bruteforce attack? Just throw resources at something, see what comes out. Yea, some software security issues haven't been found for 15 years, but not because there were no competent security specialists out there who could have found it, but most likely because there is a lot of software and nobody has time to focus on everything. Of course, an AI trained on decades of findings, lots of time and lots of resources, can tackle much more than one person. But this is not revolutionary technological advance, it is an upscaling of a kind based on the work of many very talented people before that.
Lambdanaut•7m ago
I think that this waters down "brute force" to the point of meaninglessness. If employing transformer architectures trained on data to hack a system is the same as using a for loop to enumerate over all possible values, then I have to ask, can you give an example of an attack that isn't brute force?