Hacker News

Subscribe to Hacker News feed
Hacker News RSS
Updated: 14 min 22 sec ago

Show HN: GitHub Commits Leaderboard

Mon, 03/02/2026 - 9:55pm

I made a public leaderboard for all time GitHub commit contributions.

https://ghcommits.com

You can connect your GitHub account and see where you rank by total commit contributions.

It uses GitHub’s contribution data through GraphQL, so it is based on GitHub’s counting rules rather than raw git history. Private contributions can be included. Organization contributions only count if you grant org access during auth.

There is also a public read only API.

https://ghcommits.com/api

The main thing I learned building it is that commit counting sounds straightforward until you try to match how GitHub actually attributes contributions.

I’d be interested in feedback on whether commit contributions are the right ranking metric, and whether I should also support other contribution types.

Comments URL: https://news.ycombinator.com/item?id=47227383

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Konform Browser v140.8.0-105 - Security-focused Firefox fork

Mon, 03/02/2026 - 9:53pm

Konform Browser

Some highlights last time:

- Rebased on latest ESR release (obviously) - Been porting over relevant security-motivated changes from Tor Browser[0] and Mozilla. - Significantly improved fingerprinting situation making anonymity less of a pipe-dream - Addons no longer leaking their local IDs in HTTP headers - ML/"AI" features adapted for local/offline use when enabled (while proprietary cloud snoopies fully removed)

Been quiet on HN previously so keeping this submission brief. Release notes are probably the best resource right now to get an overview and feel for the project. Happy to talk more if anyone has any questions!

Would also love to hear feedback from anyone who's either tried it out or dug into the repo.

[0]: Big thanks and cred to inspiring maintainers and contributors there

---

Socials: https://techhub.social/@konform

Releases: https://codeberg.org/konform-browser/source/releases

Past Show HN submissions:

- v140.7.0-103 https://news.ycombinator.com/item?id=46713226

- v140.7.0-108 https://news.ycombinator.com/item?id=46956420

Comments URL: https://news.ycombinator.com/item?id=47227369

Points: 1

# Comments: 0

Categories: Hacker News

Evolving Typst

Mon, 03/02/2026 - 9:51pm
Categories: Hacker News

Ask HN: What Online LLM / Chat do you use?

Mon, 03/02/2026 - 9:13pm

I have been wanting to try more LLMs than the standard Anthropic/Grok/ChatGPT/Qwen

Are there other LLM chat sites you use or recommend?

Comments URL: https://news.ycombinator.com/item?id=47227046

Points: 2

# Comments: 0

Categories: Hacker News

CKAN – an open-source DMS (data management system)

Mon, 03/02/2026 - 9:08pm

Article URL: https://ckan.org/

Comments URL: https://news.ycombinator.com/item?id=47227010

Points: 2

# Comments: 0

Categories: Hacker News

How to Recover Your Stolen Crypto After a Scam–Guidance from Intelligence Wizard

Mon, 03/02/2026 - 9:00pm

Being scammed can be a painful and frustrating experience. Many victims feel overwhelmed and unsure about what to do next. However, taking quick action can significantly increase the chances of recovering lost funds. Whether the scam involves gift cards, bank transfers, credit cards, or cryptocurrency, it is important to act immediately and keep all records related to the transaction. For victims who were asked to pay using gift cards, contacting a recovery or investigation team as soon as possible is critical. In some cases, funds may still be frozen or traced if the report is made quickly before scammers fully redeem the cards. If the scam involved a wire transfer, victims should immediately report the transaction and provide the full transfer details. Rapid reporting may allow investigators or financial institutions to attempt to intercept the funds before they are withdrawn or moved to another account. For those who paid with credit or debit cards, contacting the card issuer and filing a dispute is essential. Many banks and card companies offer fraud protection programs that may reverse unauthorised transactions after an investigation. In the case of electronic bank transfers, victims should quickly notify their bank and request a dispute or stop-payment order. Keeping records such as receipts, transaction IDs, and screenshots will strengthen the claim and help investigators track the movement of funds. If payment was made through mailed checks, cash, or money orders, contacting the payment issuer or courier immediately may help stop or cancel the transaction if it has not yet been cashed. Some scams involve paying for products or services that are never delivered. Victims should document all communications with the seller, including emails, receipts, and payment confirmations, and file a complaint with the relevant authorities or fraud investigation services. When scammers obtain personal information, such as passwords or identity details, victims should change all passwords immediately, monitor financial accounts, and consider placing a credit freeze or identity theft alert to prevent further damage. For scams involving cryptocurrency, recovery can be more complex because blockchain transactions are typically irreversible. However, reporting the scam quickly and providing wallet addresses and transaction details may allow cyber investigators to trace the funds and identify the movement of digital assets. Cyber investigation groups such as Intelligence Cyber Wizard focus on cyber intelligence, cryptocurrency investigations, and digital asset tracing. Their services aim to assist victims by analysing blockchain transactions, tracking scam networks, and helping individuals understand possible recovery options. The most important step for any victim is to act quickly. Save all evidence, including receipts, transaction IDs, screenshots, emails, and wallet addresses. The sooner a scam is reported, the greater the chance that investigators or financial institutions may be able to help. Online scams continue to evolve, but awareness and rapid reporting can make a significant difference. If you or someone you know has been targeted by a scam, gather all relevant information and seek professional guidance as soon as possible. Every minute counts when it comes to protecting your finances and attempting recovery.

Schedule a mail session with the forensic team of professionals today. How to Approach Contacting the team: Type “Intelligence Cyber Wizard” into Google to find their official contact on Google reviews or contact directly via – mail at intelligencecyberwizard (@) mail . com to get started immediately.

Comments URL: https://news.ycombinator.com/item?id=47226959

Points: 2

# Comments: 0

Categories: Hacker News

One-Stop Wan AI Video and Image Generator Platform

Mon, 03/02/2026 - 8:58pm

Article URL: https://towan.net/

Comments URL: https://news.ycombinator.com/item?id=47226945

Points: 2

# Comments: 1

Categories: Hacker News

Show HN: Ask Mob

Mon, 03/02/2026 - 8:51pm

We made our own website, this is the response to one of our beloved monkeys asking for a waifu.

Anybody ever wanted to ask or request something from MOB, feel free to do so here. We might add requests/questions soon to the website, but now the comment section here will work, for our monkey is sleepy :)

Comments URL: https://news.ycombinator.com/item?id=47226908

Points: 2

# Comments: 0

Categories: Hacker News

Show HN: A Kotlin Multiplatform app that works on watch, CLI, browser extension

Mon, 03/02/2026 - 8:50pm

On top of desktop and mobile apps, this app works on literally every conceivable platform.

Comments URL: https://news.ycombinator.com/item?id=47226903

Points: 2

# Comments: 0

Categories: Hacker News

Show HN: Generate random, valid US residential addresses for testing

Mon, 03/02/2026 - 8:46pm

I needed a way to get formatted, real US addresses for my e-commerce testing without hitting rate limits on big map APIs. So I built this. It supports all 50 states and provides clean JSON outputs. Free to use.

Comments URL: https://news.ycombinator.com/item?id=47226877

Points: 3

# Comments: 0

Categories: Hacker News

A timeline of cyber attacks:home users, contractors, and SMBs are now targets

Mon, 03/02/2026 - 8:43pm

Over the last decade, the pattern in cyber attacks has shifted noticeably. Large enterprises still get headlines, but the most consistent victims are now home users, contractors, MSPs, and SMBs. Lower visibility, weaker controls, and reliance on cloud and 3rd party platforms have made these environments attractive to both criminal groups and state linked actors.

I put together a timeline of major attacks from 2016 to 2025 to show how this trend evolved. The text version is below for anyone who prefers reading it directly.

Timeline of attacks (2016–2025)

• 2016 — Mirai botnet DDoS Home users with consumer IoT devices were compromised and turned into a large DDoS botnet. Multiple criminal groups reused the leaked Mirai code. • 2017 — WannaCry ransomware Home users and SMBs were hit by a worm exploiting SMBv1. Widely attributed to the Lazarus Group. • 2017 — NotPetya wiper SMBs were affected by a destructive wiper disguised as ransomware. Linked to Russian state associated actors. • 2018–2020 — Emotet/TrickBot → Ryuk/Conti Credential theft and ransomware campaigns targeting SMBs. Operated by multiple criminal groups. • 2019 — Cloud and 3rd party breaches SMBs and home users impacted by weak access controls and data exposure across various cloud platforms. • 2020 — Toll Group ransomware Contractors and service providers disrupted by ransomware attacks affecting logistics operations. • 2020–2021 — SolarWinds supply chain breach 3rd party providers compromised via trojanized software updates. Attributed to a Russian state linked APT. • 2021 — Kaseya VSA ransomware MSPs and SMBs hit through a supply chain ransomware attack. Attributed to the REvil group. • 2021–2023 — Ransomware as a Service surge SMBs targeted by affiliate driven ransomware operations across multiple RaaS groups. • 2022–2024 — SaaS and 3rd party platform breaches Home users and SMB customers affected by credential theft and data exfiltration across cloud platforms. • 2023–2025 — Targeting MSPs and niche contractors

MSPs and specialised contractors targeted with ransomware, data theft, and extortion by both criminal and state linked actors.

I’ve been working on a Windows focused threat hunting tool (www.sapience-tech.com) aimed at home users and SMBs who don’t have EDR or SIEM tooling. It grew out of trying to help smaller environments spot early indicators of compromise without needing enterprise grade infrastructure. Happy to answer questions about the data, the timeline, or the approach.

Comments URL: https://news.ycombinator.com/item?id=47226856

Points: 3

# Comments: 0

Categories: Hacker News

Pages