Hacker News
@hackernewslive
24.6K
subscribers
216K
links
Download Telegram
Join
Hacker News
24.6K subscribers
Hacker News
The Google 0-day all Infostealer groups are exploiting
Article
,
Comments
InfoStealers
The Google 0-day all Infostealer groups are exploiting.
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups.
🌭
6
Hacker News
Amazon's Silent Sacking
Article
,
Comments
Justin Garrison
Amazon's Silent Sacking
Companies are fighting back for quiet quitting and it's having a big impact.
🌭
8
🔥
2
👍
1
Hacker News
Tether reveals partnerships with Secret Service, FBI in letter to U.S. Senate
Article
,
Comments
Yahoo Finance
Tether Reveals Partnerships With Secret Service, FBI in Letter to U.S. Senate
Tether, the company behind the leading USDT stablecoin, has made public the letters it sent to the U.S. Senate Committee on Banking, Housing, and Urban Affairs.
💩
18
😁
8
🤯
4
🖕
4
👻
3
🤮
2
🌭
2
Hacker News
Centralization, Decentralization, and Internet Standards
Article
,
Comments
www.rfc-editor.org
RFC 9518: Centralization, Decentralization, and Internet Standards
This document discusses aspects of centralization that relate to Internet standards efforts. It argues that, while standards bodies have a limited ability to prevent many forms of centralization, they can still make contributions that assist in the decentralization…
🌭
6
Hacker News
A modern data stack for startups (2022)
Article
,
Comments
incident.io
A modern data stack for startups | Blog
Making data accessible to everyone in a company is key to unlocking its full potential. We've built a modern data stack using powerful, user-friendly tools that democratize data access. In this post, we'll break down the tools we use, how we've configured…
🌭
5
🤪
3
Hacker News
The Linux graphics stack in a nutshell, part 2
Article
,
Comments
lwn.net
The Linux graphics stack in a nutshell, part 2
Displaying an application's graphical output onto the screen requires
compositing and
mode setting that are correctly synchronized among the various pieces,
with low overhead.
In this second and final article in the series, we will look at
those pieces of…
🌭
5
👍
4
Hacker News
Amazon allegedly resells damaged books
Article
,
Comments
X (formerly Twitter)
Joaquín Baldwin (@joabaldwin) on X
I got my first confirmation just now from someone who bought an Amazon copy and received my returned, damaged copy. Those bastards. What recourse do I have on this? How can this be prevented? It’s totally illegal, I’m guessing.
😁
9
🌭
3
🔥
1
Hacker News
NY times is asking that all LLMs trained on Times data be destroyed
Article
,
Comments
X (formerly Twitter)
Daniel Jeffries (@Dan_Jeffries1) on X
The NY Times is asking that *ALL* LLMs trained on Times data be destroyed.
That includes GPT 3 and 4, Claude, Mistral, Llama/Llama 2 and pretty much any other model in existence.
I call on @facebook, @cohere, @AnthropicAI, @MistralAI, @huggingface, @google…
😁
25
🤣
14
🍌
7
😱
5
👏
4
🥴
4
🌭
3
👍
2
🔥
2
🤡
2
🖕
1
Hacker News
EU Cyber Resilience Act: What does it mean for open source?
Article
,
Comments
Bert Hubert's writings
EU CRA: What does it mean for open source? - Bert Hubert's writings
The final compromise text of the EU Cyber Resilience Act is now officially available, and various open source voices are currently opining on it. This is a complex act and other parts of the open source world (like the Eclipse Foundation and NLNet Labs) have…
💩
9
👀
3
🌭
2
Hacker News
A Hobby Coding Biography
Article
,
Comments
www.marginalia.nu
A Hobby Coding Biography
This is a bit of a retrospective of every project I’ve worked on, as far as I remember them. I’ve tried to unearth any artifacts that remain.
Far from everything is flattering and resounding success, but then again, maybe that’s good. There are definitely…
🌭
5
👍
2
👎
1
Hacker News
Ugrep – a more powerful, fast, user-friendly, compatible grep
Article
,
Comments
Ugrep
The ugrep file pattern searcher
The ugrep file pattern searcher -- a user-friendly, faster, more capable grep replacement
🌭
7
👍
3
🤮
2
Hacker News
Malware abuses Google OAuth endpoint to 'revive' cookies, hijack accounts
Article
,
Comments
BleepingComputer
Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts
Multiple information-stealing malware families are abusing an undocumented Google OAuth endpoint named "MultiLogin" to restore expired authentication cookies and log into users' accounts, even if an account's password was reset.
🌭
7
👍
2
😱
2
👎
1
😍
1
Hacker News
BYD Overtakes Tesla as Most Popular EV Maker
Article
,
Comments
Bloomberg.com
Chinese Carmaker Overtakes Tesla as World’s Most Popular EV Maker
Elon Musk once scoffed at the notion that BYD could compete with his company. Now, the automaker run by billionaire Wang Chuanfu is poised to be the new No. 1 in electric vehicles.
🤮
19
🔥
16
🌭
5
❤
4
Hacker News
Claude Bragdon: Drawings of the Fourth Dimension (2022)
Article
,
Comments
SOCKS
Claude Bragdon: Drawings of the Fourth Dimension (1913-1915)
American architect Claude Fayette Bragdon (1866-1946) was also an artist, writer and stage designer. He was based in Rochester, NY where he built his masterpiece, the New York Central Railroad...
❤🔥
4
🌭
3
👍
2
👎
2
Hacker News
I'm skeptical of low-code
Article
,
Comments
nick.scialli.me
Why I'm skeptical of low-code - Nick Scialli | Senior Software Engineer
Low-code can be a great tool but it often fails to live up to its marketing
👍
10
🌭
7
🔥
1
Hacker News
More fun with Apple's internal tools: creating a PDS card
Article
,
Comments
🌭
3
👍
1
Hacker News
High Performance Voxel Engine (2021)
Article
,
Comments
🌭
4
👍
1
Hacker News
The history of MSX computers [video]
Article
,
Comments
YouTube
The history of MSX computers
From their inception to technological evolution, MSX computers have left an indelible mark in the world of retrocomputing. Enjoy the video and don't forget to leave a comment with your memories and thoughts on the history of MSX.
🕹️
If you'd like to support…
👎
9
🌭
5
👍
2
🤷
1
Hacker News
Coastline paradox
Article
,
Comments
🌭
7
🤷♀
1
Hacker News
Natural Language Corpus Data: Beautiful Data (2009)
Article
,
Comments
🌭
4
Hacker News
Electric light transmits data faster than Wi-Fi
Article
,
Comments
Tech Xplore
Electric light transmits data 100 times faster than Wi-Fi
Li-fi, a communication technology harnessing visible light for data transmission, has a potential to surpass Wi-Fi's speed by more than 100 times and boasts a high bandwidth, facilitating the simultaneous ...
⚡
22
👍
6
💩
6
🌭
4
😁
1
TWeb.init({scrollToPost:'hackernewslive/171478'});