frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Surveillance vendors caught abusing access to telcos to track people's locations

https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-p...
208•mentalgear•2h ago•55 comments

Sneaky spam in conversational replies to blog posts

https://shkspr.mobi/blog/2026/04/sneaky-spam-in-conversational-replies-to-blog-posts/
62•ColinWright•2h ago•38 comments

Show HN: Honker – Postgres NOTIFY/LISTEN Semantics for SQLite

https://github.com/russellromney/honker
83•russellthehippo•2h ago•13 comments

I am building a cloud

https://crawshaw.io/blog/building-a-cloud
630•bumbledraven•9h ago•315 comments

Alberta startup sells no-tech tractors for half price

https://wheelfront.com/this-alberta-startup-sells-no-tech-tractors-for-half-price/
1928•Kaibeezy•21h ago•644 comments

Your hex editor should color-code bytes

https://simonomi.dev/blog/color-code-your-bytes/
251•tobr•2d ago•81 comments

A Renaissance gambling dispute spawned probability theory

https://www.scientificamerican.com/article/how-a-renaissance-gambling-dispute-spawned-probability...
31•sohkamyung•2d ago•1 comments

Apple fixes bug that cops used to extract deleted chat messages from iPhones

https://techcrunch.com/2026/04/22/apple-fixes-bug-that-cops-used-to-extract-deleted-chat-messages...
696•cdrnsf•17h ago•172 comments

Writing a C Compiler, in Zig

https://ar-ms.me/thoughts/c-compiler-1-zig/
55•tosh•5h ago•16 comments

Modern Board Games: and why you should play them (2022)

https://boardgamegeek.com/blog/10755/blogpost/124992/modern-board-games-and-why-you-should-play-them
12•maayank•2d ago•1 comments

Jiga (YC W21) Is Hiring

https://jiga.io/about-us/
1•grmmph•2h ago

The Onion to Take over InfoWars

https://www.nytimes.com/2026/04/20/business/infowars-alex-jones-the-onion.html
326•lxm•2d ago•116 comments

We found a stable Firefox identifier linking all your private Tor identities

https://fingerprint.com/blog/firefox-tor-indexeddb-privacy-vulnerability/
799•danpinto•20h ago•236 comments

Isopods of the world

https://isopod.site/
63•debesyla•2d ago•26 comments

Work with the Garage Door Up

https://notes.andymatuschak.org/Work_with_the_garage_door_up
30•jxmorris12•1d ago•23 comments

5x5 Pixel font for tiny screens

https://maurycyz.com/projects/mcufont/
707•zdw•3d ago•144 comments

Arch Linux Now Has a Bit-for-Bit Reproducible Docker Image

https://antiz.fr/blog/archlinux-now-has-a-reproducible-docker-image/
151•maxloh•12h ago•54 comments

Raylib v6.0

https://github.com/raysan5/raylib/releases/tag/6.0
47•rydgel•2h ago•1 comments

A True Life Hack: What Physical 'Life Force' Turns Biology's Wheels?

https://www.quantamagazine.org/what-physical-life-force-turns-biologys-wheels-20260420/
131•Prof_Sigmund•2d ago•23 comments

Our newsroom AI policy

https://arstechnica.com/staff/2026/04/our-newsroom-ai-policy/
110•zdw•9h ago•79 comments

Trump administration reclassifies cannabis as less dangerous

https://www.bbc.com/news/articles/cdxd0xxp0jko
34•kaycebasques•49m ago•20 comments

Over-editing refers to a model modifying code beyond what is necessary

https://nrehiew.github.io/blog/minimal_editing/
390•pella•20h ago•226 comments

Highlights from Git 2.54

https://github.blog/open-source/git/highlights-from-git-2-54/
70•ingve•2d ago•35 comments

Website streamed live directly from a model

https://flipbook.page/
346•sethbannon•20h ago•91 comments

An amateur historian's favorite books about the Silk Road

https://bookdna.com/best-books/silk-road
50•bwb•2d ago•16 comments

Technical, cognitive, and intent debt

https://martinfowler.com/fragments/2026-04-02.html
292•theorchid•22h ago•78 comments

Ping-pong robot beats top-level human players

https://www.reuters.com/sports/ping-pong-robot-ace-makes-history-by-beating-top-level-human-playe...
146•wslh•23h ago•209 comments

Parallel agents in Zed

https://zed.dev/blog/parallel-agents
252•ajeetdsouza•20h ago•138 comments

Books are not too expensive

https://www.millersbookreview.com/p/no-books-are-not-remotely-too-expensive
79•herbertl•2d ago•93 comments

Qwen3.6-27B: Flagship-Level Coding in a 27B Dense Model

https://qwen.ai/blog?id=qwen3.6-27b
900•mfiguiere•1d ago•417 comments
Open in hackernews

Surveillance vendors caught abusing access to telcos to track people's locations

https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/
208•mentalgear•2h ago

Comments

aetherspawn•1h ago
Yeah, a friend of mine was tracked by a stalker ex boyfriend who worked at a Telco.

It was irritatingly difficult to avoid because it seemed he could look up her SIM card by name and then get her location no matter what (new SIM, new phone)

Anyone who reports this kind of thing to the police just sounds irrational and crazy and gets ignored.

therobots927•1h ago
Assuming he had access to a database with (lat, long, SIM) data, if she got a new phone he could just use the known (lat, long pairs) from the old sim and lookup to get the new sim. Then bam, you can get all of the new lat longs.

It’s impossible to avoid unless you simultaneously move to a new house / apartment when you get your new phone, and never bring the new phone to any previous low-traffic location you brought the old phone to.

calvinmorrison•1h ago
it's impossible for your precise location to be tracked by anybody... wow thats crazy
kenjackson•1h ago
What does this mean?
justinclift•1h ago
If the person was deep enough into the system to have access to location data, then they'd probably be able to just directly look up customer details (likely easier).
hocuspocus•52m ago
Absolutely not. I have access to geo-located network telemetry. CRM data is completely off limit to anyone on my team.
kakacik•37m ago
Well maybe it wasn't such a well secured company and also this seems story from the past.
justinclift•7m ago
Are you in a small company where most people wear lots of hats, or in a big company that has siloed off groups? Am guessing it's more of the big company approach that silos things off?
Padriac•1h ago
Sounds like something worth reporting as it is an offence in Australia at least. The police would certainly investigate such an allegation and charges could be laid if there was sufficient evidence and a conviction was possible.
aetherspawn•1h ago
Yeah it was reported, but the telcos systems were such a load of slop there wasn’t any specific evidence recorded (logs etc), and besides nobody knew what to ask for, so it couldn’t be taken seriously.

I don’t remember the exact circumstances of how they got a confession years later, I think bragging, but he did get convicted and the Telco eventually fired him, which stopped the stalking.

boringg•1h ago
What no log files of who's accessing records? That seems super sketch.
aetherspawn•1h ago
I’m spitballing here but it seemed like his job was a kind of ITS/technician job in the core infrastructure, and it seemed like he didn’t need to go through normal channels to get the information he wanted, ie he could just like pcap a tower with a filter or whatever in a routine kind of way that I guess didn’t create any specific logs. If there were any relevant logs they would have had to give them to the police. And I know that at a high level Telcos are heavily regulated, so there should have been logs.
mr_toad•58m ago
Doesn’t surprise me at all. I signed up for an internet plan with a provider once, but they never let me login to pay the bills. After they started threatening me with collections and several phone calls layer it turned out they were billing someone in a completely different city. Complete shambles.
Zigurd•43m ago
Some systems, like lawful intercept, are designed to be hidden even from telco network management systems. The LI console that set up a wire tap might log activity at that particular console at that particular law-enforcement agency. But if you don't know where to look exactly, good luck.

This is why the Chinese picked lawful intercept as a hacking target for the salt typhoon exploit. It's almost impossible to know whether that exploit is continuing or when exactly it began.

ogurechny•33m ago
Someone else was targeting it long before the Chinese.
woadwarrior01•35m ago
I've seen people getting fired in BigTech for using the platform to stalk their ex-es. It's usually an alert that goes off when employees access internal dashboards for a certain profile, too many times.
throwawaysleep•32m ago
BigTech is far more competent than a Telco though.
joshstrange•1h ago
> The police would certainly investigate such an allegation and charges could be laid if there was sufficient evidence and a conviction was possible.

I'll let you know when I finish laughing.

This is 100% false. You can serve up all the evidence on a silver platter the the police will ignore it. I know, I've tried, specifically in a stalking case. They don't care.

Padriac•1h ago
Maybe where things are different where you live.
trinsic2•28m ago
Maybe you're being Naive? Just because there are laws doesn't mean there going to be enforced. Especially with what's going on right now with governments becomming authoritarian.
throwawaysleep•47m ago
Cops are too dumb to comprehend that. They would proclaim it impossible and order more donuts.

Most simple criminals get away with their crimes. Anyone with any level of sophistication does as well.

jimbo808•33m ago
Ha. That's what everyone thinks before they've needed the police.
hocuspocus•58m ago
I'm sorry but this sounds like bullshit. As someone who has access to such data at a telco:

- Very few people have legit business cases requiring access to enriched network telemetry, at least non aggregated.

- Of which, only a handful have any reason to see the MSISDN in clear.

- Of which, none can get access to clear CRM data.

- Lawful interception and emergency services use completely separate paths, exposed via user interfaces that aren't available to employees.

And obviously, a simple email to the data governance and privacy office would be taken extremely seriously.

Also why not simply switch to a different phone operator?

hnthrow0287345•54m ago
I'm sure every single telco in the world is perfectly in line with this
hocuspocus•41m ago
Even in pretty dysfunctional countries, or pro-business ones like the US, where nothing like the GDPR exists, telcos management have a strong interest in not letting just any rank and file employee spy on subscribers.
throwawaysleep•34m ago
Most breaches are not in the interests of management, but they happen anyway as management wants to save money or doesn't understand how it could happen.
mistrial9•46m ago
you are close to a system in a way that those guardrails are clear and present; the story is from the point of view of a victim, and it is possible that they were indeed a victim. Therefore the means of the stalking is not known at all via this story, but somehow, something did occur. It is not surprising on either side, and they do not necessarily contradict each other IMHO
throwawaysleep•44m ago
> And obviously, a simple email to the data governance and privacy office would be taken extremely seriously.

What is this based on? I used to work for a data governance and privacy vendor that supplied data for audits. Tons and tons of customers asked us to fudge their data.

This is after the Delve scandal, where the hottest tech compliance company was completely fraudulent and numerous other hot tech companies also had completely fraudulent audits.

This is not a reasonable assumption.

aetherspawn•38m ago
So what you’re saying is if you were secretly a psycho and wanted to stalk your ex-girlfriend, you work at a Telco and basically have access to the tools to do it?

So putting aside the fact you’re a reasonable person, anyone who works themselves up to a similar seniority and job description in a Telco as you, could in fact do exactly what the article is saying is an issue for the victims.

therobots927•1h ago
Oh would you look at that: “Israeli-based commercial geo-intelligence provider with specialized telecom capabilities.”

Make no mistake, the people of Gaza and Lebanon are being used as guinea pigs for highly invasive surveillance technology that could easily be pointed at any of us if we step out of line.

And yes I said people of Gaza, not tellhullists as they’re referred to in Zion.

throwaw12•1h ago
> ... Israeli-based commercial geo-intelligence provider with specialized telecom capabilities ...

why are they good at these kind of things - security, hacks, surveillance, 0-days?

pjc50•1h ago
They run a mass surveillance operation so they can target individual people with exploding pagers. It's just another aspect of the longstanding war between Israel and Iran (via Hezbollah etc).
bakugo•1h ago
When your goal is to covertly subvert and take control of foreign nations, these sorts of skills tend to come in handy.
morellt•38m ago
No clue why this is getting downvoted, this is literally the purpose.
jeroenhd•1h ago
They are a country surrounded by countries that either dislike them or want them wiped from the face of the earth. It only makes sense that they have a significant intelligence and spying industry.

The genocide they're undertaking does place that industry in a whole new light, of course.

tailscaler2026•2m ago
The US government funds Israel to create and operate these sort of companies, including spying on US citizens, since it would be illegal in the US.
arjunthazhath•1h ago
jesus christ!
rurban•1h ago
They do have the death penalty now in Israel. So it might get interesting for those bosses
dewey•1h ago
You forgot one important detail there.
pprotas•1h ago
The death penalty was intended for Palestinians, not Israeli bosses
rurban•1h ago
sure, but when the tide switches to a far-left government they might use it against them.
tovej•10m ago
I do believe the law was specifically carved out so it could only be used against Palestinian prisoners. And there is no far-left in Israel, at least no far-left party that could ever be in government.
Anonyneko•1h ago
This is just par for the course in Russia. Government has telcos track people, and that data ends up available on the black market for anyone to purchase, for a fairly modest fee. The government has been recently trying (with uncertain degree of success) to crack down on the latter, as this was frequently used by the opposition journalists and investigators to uncover the details of the government's own nefarious plots.

The data is cross-referenced with other telcos, other SIM cards, Wi-Fi hotspots (anonymous public hotspots are outlawed), street cams, and many other databases, so it's basically impossible to avoid being tracked.

Probably inevitable to become the norm everywhere in the world.

betaby•29m ago
> Government has telcos track people

Yes

> and that data ends up available on the black market for anyone to purchase, for a fairly modest fee

Probably not. Those DBs are fake most ( all ? ) the time.

fchicken•1h ago
Color me shocked
dfc•1h ago
I get a 404 when I try and view the CitizenLab report:

https://citizenlab.ca/research/uncovering-global-telecom-exp...

mentalgear•1h ago
> Gary Miller, one of the researchers who investigated these attacks, told TechCrunch that some clues point to an “Israeli-based commercial geo-intelligence provider with specialized telecom capabilities,” but did not name the surveillance provider. Several Israeli companies are known to offer similar services, such as Circles (later acquired by spyware maker NSO Group), Cognyte, and Rayzone.
walrus01•1h ago
Why is the citizen lab report URL suddenly a 404?
Rob_Polding•59m ago
In my country 95% of people don't mind Meta tracking their location with WhatsApp, so I think the days of people caring about tracking are long gone!

I am the exception and believe in privacy, and I've not used a Meta app since I tested Facebook/WhatsApp back in 2010 and soon uninstalled them as I don't want a digital portfolio to be developed on me for advertisers. Same with Google, they can whistle for my personal information, but they won't get it!

I'm sure surveillance companies have an even easier time buying data from Meta/WhatsApp so that's even more worrying as people use different ISPs so 95% of people won't be traced by any one ISP, but Meta and Google have the location information of anyone gullible enough to use their services.

woadwarrior01•32m ago
One of the first bits of infosec advice I give to my non-technical friends and family, when they ask for it, is to turn off background location access for all apps on their phones.

Needless to say, I know plenty of technical people who don't care about it.

faxuss•34m ago
Everyone does it, they just got caught.
DrewADesign•23m ago
I was training to be a 911 dispatcher a while ago. When they told us about getting someone’s location from the cell company outside of what was available automatically from e911 or whatever— which required them to be on the phone with you, so not useful if you get a text saying they just drove off a cliff in the middle of nowhere, or something— you had to sign an affidavit testifying that there were exigent circumstances, fax it to them, and then wait, sometimes for hours, until their legal department approved it. And you always risked being dragged to court if you made the wrong call. That’s the price of privacy, and the potential for abuse is rife, so it makes sense.

Yet these jackholes can just snag it whenever because, ya know, profit. That is obviously insane. Our corporate culture has driven our society insane with normalized greed. The unholy alliance of tech and marketing is largely to blame.

areoform•18m ago
One of the biggest lies about the surveillance state is that it'll be professional.

NSA employees have used multi-billion dollar American surveillance assets to spy on women they're infatuated with. There's even a cute term for it, LOVEINT.

https://www.nbcnews.com/news/world/loveint-nsa-letter-disclo...

https://www.yahoo.com/news/nsa-staff-used-spy-tools-spouses-...

    In another instance, a foreign woman who was employed by the U.S. government suspected that her lover, an NSA civilian employee, was listening to her phone calls. She shared her suspicion with another government employee, who reported it. An investigation found the man abused NSA databases from 1998 to 2003 to snoop on nine phone numbers of foreign women and twice collected communications of an American, according to the inspector general's report.
People aren't able to imagine the ramifications of pervasive surveillance because there never has been such pervasive surveillance in human history. And humans are terrible at predicting how this is going to change things. Especially, with LLMs in the mix.

Unless a very strict line is maintained for privacy across the board; the world that's coming will be many, many custom, tailor-made hells co-existing as tumors off of the back of state and corporate surveillance infrastructure.

lbcadden3•10m ago
I’m shocked, shocked I say!
voxadam•4m ago
Well, not that shocked.