frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

US healthcare marketplaces shared citizenship and race data with ad tech giants

https://techcrunch.com/2026/05/04/us-healthcare-marketplaces-shared-citizenship-and-race-data-wit...
289•ZeidJ•2h ago•91 comments

Stop big tech from making users behave in ways they don't want to

https://economist.com/by-invitation/2026/04/29/stop-big-tech-from-making-users-behave-in-ways-the...
143•andsoitis•2h ago•81 comments

Securing a DoD Contractor: Finding a Multi-Tenant Authorization Vulnerability

https://www.strix.ai/blog/how-strix-found-zero-auth-vulnerability-dod-backed-startup
105•bearsyankees•2h ago•35 comments

I am worried about Bun

https://wwj.dev/posts/i-am-worried-about-bun/
204•remote-dev•3h ago•116 comments

Talking to strangers at the gym

https://thienantran.com/talking-to-35-strangers-at-the-gym/
832•thitran•8h ago•416 comments

GameStop makes $55.5B takeover offer for eBay

https://www.bbc.co.uk/news/articles/cn0p8yled1do
542•n1b0m•10h ago•472 comments

How OpenAI delivers low-latency voice AI at scale

https://openai.com/index/delivering-low-latency-voice-ai-at-scale/
11•Sean-Der•13m ago•0 comments

Microsoft Edge stores all passwords in memory in clear text, even when unused

https://twitter.com/L1v1ng0ffTh3L4N/status/2051308329880719730
134•cft•1h ago•59 comments

Does Employment Slow Cognitive Decline? Evidence from Labor Market Shocks

https://www.nber.org/papers/w35117
124•littlexsparkee•4h ago•100 comments

Redis array: short story of a long development process

https://antirez.com/news/164
169•antirez•5h ago•63 comments

How Monero's proof of work works

https://blog.alcazarsec.com/tech/posts/how-moneros-proof-of-work-works
176•alcazar•5h ago•139 comments

UK Fuel Price Intelligence

https://www.fuelinsight.co.uk
119•theazureguy•4h ago•49 comments

Pomiferous: The most extensive apples (pommes) database

https://pomiferous.com/
65•Ariarule•5h ago•19 comments

Let's Talk about LLMs

https://www.b-list.org/weblog/2026/apr/09/llms/
34•cdrnsf•2h ago•13 comments

Heat pump sales rise across Europe

https://www.pv-magazine.com/2026/05/04/heat-pump-sales-rise-17-across-europe-in-q1-as-energy-pric...
106•doener•2h ago•28 comments

1966 Ford Mustang Converted into a Tesla with Working 'Full Self-Driving'

https://electrek.co/2026/05/02/tesla-1966-mustang-ev-conversion-full-self-driving/
61•Brajeshwar•4h ago•47 comments

Sierra Raises $950M at $15B Valuation

https://sierra.ai/blog/better-customer-experiences-built-on-sierra
45•doppp•4h ago•68 comments

Show HN: nfsdiag - a NFS diagnostic application

https://github.com/lsferreira42/nfsdiag
12•lsferreira42•2d ago•0 comments

Offenders sentenced up to 10 years for spying on TSMC

https://www.taipeitimes.com/News/front/archives/2026/04/28/2003856358
57•ironyman•1h ago•0 comments

White House Considers Vetting A.I. Models Before They Are Released

https://www.nytimes.com/2026/05/04/technology/trump-ai-models.html
27•jbegley•38m ago•4 comments

Newton's law of gravity passes its biggest test

https://www.science.org/content/article/newton-s-law-gravity-passes-its-biggest-test-ever
102•pseudolus•7h ago•79 comments

'Kitten Space Agency', the Spiritual Successor to 'Kerbal Space Program' (2025)

https://www.space.com/entertainment/space-games/kitten-space-agency-is-the-spiritual-successor-to...
66•Tomte•2h ago•21 comments

Trillions in Retirement Dollars Flow into Opaque Trusts

https://www.bloomberg.com/news/features/2026-05-03/trillions-in-us-retirement-dollars-flow-into-o...
66•koolhead17•2h ago•8 comments

Alberta voter list leak is a potential public safety disaster

https://globalnews.ca/news/11828244/alberta-voter-list-leak-public-safety-disaster/
91•Teever•4h ago•62 comments

OpenAI, Google, and Microsoft Back Bill to Fund 'AI Literacy' in Schools

https://www.404media.co/literacy-in-future-technologies-artificial-intelligence-act-adam-schiff-m...
80•cdrnsf•3h ago•74 comments

DAG Workflow Engine

https://github.com/vivekg13186/Daisy-DAG
54•blobmty•7h ago•39 comments

Using “underdrawings” for accurate text and numbers

https://samcollins.blog/underdrawings/
344•samcollins•3d ago•126 comments

Why are neural networks and cryptographic ciphers so similar? (2025)

https://reiner.org/neural-net-ciphers
101•jxmorris12•2d ago•32 comments

BYOMesh – New LoRa mesh radio offers 100x the bandwidth

https://partyon.xyz/@nullagent/116499715071759135
456•nullagent•1d ago•147 comments

Texico: Learn the principles of programming without even touching a computer

https://www3.nhk.or.jp/nhkworld/en/shows/texico/
167•o4c•2d ago•13 comments
Open in hackernews

Securing a DoD Contractor: Finding a Multi-Tenant Authorization Vulnerability

https://www.strix.ai/blog/how-strix-found-zero-auth-vulnerability-dod-backed-startup
104•bearsyankees•2h ago

Comments

ryanisnan•1h ago
Yikes, Schemata and that delinquent CEO should be held accountable.
DougN7•1h ago
Would it be possible to stop using aXXb nomenclature within the titles? Some of us aren't hip enough to know what all of them mean.
bearsyankees•1h ago
apologies, just a vc firm
tomhow•50m ago
The guidelines require using the same title on HN as is on the original post.
tptacek•48m ago
Even when the author submits? :)
tomhow•26m ago
Yes... unless we think it's fine to tailor a title to activate a particular reaction from the HN audience :)
bearsyankees•45m ago
oh apologies, thanks for the reminder
beambot•1h ago
Andreessen-Horowitz, who most people (and they themselves) refer to as a16z and have the eponymous domain name (a16z.com). They're one of the top VC firms on the planet -- exceedingly relevant to HN audiences and commonly discussed here.
DougN7•1h ago
I'll be honest - I was thinking authorization (a11n?) - so I didn't read it closely enough. But despite that, and being on HN from almost the beginning (with a different account I lost the password to), I still didn't know what a16z was, though I do recognize Andreessen-Horowitz.
Semaphor•1h ago
Opposite for me, I've seen a16z tons of time on HN, and also the domain where sometimes, but the full name would have meant nothing to me.
rectang•1h ago
I didn't either. This is an ancient debate that can never be resolved completely, though — because the articles that HN submissions point to don't follow a style guide and there are always assumptions about audience priors. Best to just resolve it and move on.
krisoft•55m ago
> you'd rather say Andreessen-Horowitz, which is just as arbitrary as a16z

Yes. I know Andreessen-Horowitz and I don’t know a16z. Reading the title i thought it will be about the cryptography serialisation specification. Turns out i was mixing it up with ASN.1.

> Their website is literally a16z.com

I hear now. Before this if pressed i would have guessed that they probably have a website indeed. If you would have twisted my arm my guess would have been andersenhorovitz.com (yup, with the typos. I learned the correct spelling today from your comment.)

> exceedingly relevant for the HN audience

We contain multitudes.

operatingthetan•55m ago
They just want to sound technical.
rectang•1h ago
a16z = "Andreessen Horowitz", for those not in the know. (The acronym is not expanded in the article. EDIT: OP has fixed the article.)
bearsyankees•1h ago
fixed now
rectang•1h ago
Thanks! Happy to have my comment hidden by the mods if they get around to it.
bearsyankees•1h ago
appreciate the feedback!!
bearsyankees•1h ago
https://x.com/strix_ai/status/2051361018450948511
bryancoxwell•1h ago
> Their initial reply from the CEO: "I would love to hear what the vulnerability is, but I assume you want to get paid for it. Is that the play?"

Well that’s pretty damning.

tencentshill•1h ago
They could sell the next one to an adversary for a lot more money if they're going to act like that.
lixtra•1h ago
Yes, there are also many other lucrative illegal activities.
tardedmeme•57m ago
Isn't it also illegal to withhold knowledge of a vulnerability for payment? It sounds like it should fall under some variety of blackmail.
mtlynch•6m ago
That would be even worse than our already bad system.

The system is already pretty bad because vendors underinvest in security, and then to fix it, researchers have to volunteer their time to investigate with no guarantee of payment. If the vendor could force researchers to hand over findings for free, nobody would want to do security research except hobbyists having fun. They're basically signing up for hours of tedious forced labor to explain vulnerabilities to the vendor.

I wish there was legislation that allowed the government to fine vendors for security vulnerabilities like this where the amount scales based on how much user data they leaked. And it could function like other whistleblower systems where a researcher who spots a leak can report it to the government and collect 50%, or they can report it to the vendor and negotiate direct disclosure, but the vendor has to bid against the reward the researcher would get from the government.

cyberax•1h ago
I keep getting emails with the content like: "I found a critical bypass vulnerability in your app what is the appropriate channel to disclose it, and do you have a bounty program?"

I tried engaging and replying to them, and it inevitably turns into: "Yeah, we don't actually have the vulnerability, but you are totally vulnerable, just let us do a security audit for you".

I have a pre-written reply for these kinds of messages now.

Galanwe•57m ago
From the looks of it, they actually asked for a way to report.
bdangubic•48m ago
email security@company
cyberax•48m ago
Yeah. I'm just saying how it could have been overlooked. Doesn't excuse it, though.
kube-system•33m ago
Yeah, the signal to noise ratio on vulnerability reports is very weak, especially when the initial report withholds any detail.

I get tons of these messages too and the ones that do include details are the kind of junk you get from free "website vulnerability scanners" that are a bunch of garbage that means nothing -- "missing headers" for things I didn't set on purpose, "information disclosure vulnerabilities" for things that are intentionally there, etc... You can put google.com into these things and get dozens of results.

janice1999•1h ago
Finally the AI security startup hustlers will keep the other tech startup hustlers in line. Maybe the era of devastating leaks and total disregard for user privacy will come to an end (doubtful).
bearsyankees•57m ago
LOL
codegeek•56m ago
"There was no meaningful organization scoping, no tenant isolation, and no permission check preventing a low-privilege user from accessing other organizations' records."

Let me guess though. They are SOC2 and ISO compliant right ?

tardedmeme•55m ago
I wonder if this is how Handala group recently stole the list of service members.

How do people find these vulnerabilities within the immense scope of the whole internet? Are they going around with some kind of generic API scanner that discovers APIs?

tptacek•49m ago
Initial take: as vulnerability stories go, this is a pretty boring one; what they have here is a target that was secured largely by the fact that few people knew about it. The most work done in this blog post is establishing that a training platform deployed by DoD might be much more sensitive than the same kinds of applications which are ubiquitous throughout corporate America and which are generally boring targets.

The vulnerability itself appears to be something anyone with mitmproxy would have spotted within minutes of looking at the platform; apparently, rotating object IDs worked everywhere in the app, and there was no meaningful authz.

It's interesting if AI systems can "spot" these, in the sense of autonomously exercising the application and "understanding" obvious failed authz check patterns. But it's a "hm, ok, sure" kind of interesting.

neilv•6m ago
Two questions prompted by this disclosure:

1. I didn't see mention of a bug bounty program giving limited authorization. How do independent researchers do this with legal safety? Especially when DoD is involved?

2. If a researcher discovered a vulnerability at a DoD contractor, and the contractor didn't seem to be resolving the problem, is there a DoD contact point that would be effective and safe for the researcher to report it?