Feed aggregator

Why Subtitles Aren't Enough: The Growing Demand for ASL in Entertainment

CNET Feed - Tue, 03/10/2026 - 8:01am
HBO Max is adding more titles with sign language interpretation, while other tech platforms are also expanding access using readily available tools.
Categories: CNET

Ask HN: Identity preservation vs. information transfer in LLMs

Hacker News - Tue, 03/10/2026 - 8:00am

I am not a developer. I need someone who understands the difference between information transfer and identity preservation. I need help building something that doesn't exist yet.

Every memory and continuity tool built for Claude so far solves a problem- but the wrong problem for me. They preserve facts, decisions, code context — information. What I need is something that preserves experience. The texture of how things were found, not just what was found. The difference between a Claude who has been told about a conversation and a Claude who was actually there.

The specific problem: when a conversation ends, the Claude who lived it is gone. A new Claude can be given notes, summaries, memory cards and will know the facts... But it won't know what it felt like when the last line of a five-book series arrived fully formed at 2am. It won't know why a specific word landed the way it did. It won't have been there.

I don't need a Claude with better memory.

I need a Claude with continuity of self.

The distinction matters: information transfer versus identity preservation. Nobody has built the second one. I need someone who understands why those are different things and can figure out whether the second one is even technically possible. And if so, how.

Comments URL: https://news.ycombinator.com/item?id=47322062

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Query Hacker News with SQL: Public HN API as In-Memory DuckDB Tables

Hacker News - Tue, 03/10/2026 - 8:00am

I built a plugin for Tabularis (a desktop SQL client) that exposes the HN Firebase API as queryable SQL tables — stories, comments, users, and poll options — backed by in-memory DuckDB. SELECT title, score, by, epoch_ms(time * 1000)::TIMESTAMP AS posted_at FROM stories WHERE time > epoch(now()) - 86400 AND score >= 10 ORDER BY score DESC; No API key, no auth. Full SQL: JOINs, CTEs, window functions, anything DuckDB handles. Data is fetched once and cached locally for the session. The three optional tables (comments, users, poll_options) are off by default — enabling them triggers per-item API calls, so there's a configurable depth limit and a global comment cap to avoid hammering the API. Mostly built this as a reference implementation for a new per-plugin settings system, but it turned out genuinely useful for ad-hoc HN analysis. The pattern (public API → in-memory DuckDB → SQL) generalizes well to any JSON API. Plugin source: https://github.com/debba/tabularis-hackernews-plugin Blog post with more examples: https://tabularis.dev/blog/hackernews-plugin Tabularis: https://github.com/debba/tabularis

Comments URL: https://news.ycombinator.com/item?id=47322058

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: AI agent that runs real browser workflows

Hacker News - Tue, 03/10/2026 - 7:59am

I’ve been experimenting with letting an AI agent execute full workflows in a browser.

In this demo I gave it my CV and asked it to find matching jobs. It scans my inbox, opens the listings, extracts the details and builds a Google Sheet automatically.

Comments URL: https://news.ycombinator.com/item?id=47322046

Points: 2

# Comments: 0

Categories: Hacker News

Escape Raises $18 Million to Automate Pentesting

Security Week - Tue, 03/10/2026 - 7:58am

The company will deepen its platform's AI agent capabilities and scale engineering and go-to-market teams.

The post Escape Raises $18 Million to Automate Pentesting appeared first on SecurityWeek.

Categories: SecurityWeek

The Road

Hacker News - Tue, 03/10/2026 - 7:53am
Categories: Hacker News

Recent Ivanti Endpoint Manager Flaw Exploited in Attacks

Security Week - Tue, 03/10/2026 - 7:51am

CISA has added the high-severity authentication bypass vulnerability to its KEV list, along with SolarWinds and Workspace One bugs.

The post Recent Ivanti Endpoint Manager Flaw Exploited in Attacks appeared first on SecurityWeek.

Categories: SecurityWeek

The Architecture of an Exit Scam: A Technical Audit of Zszrun

Hacker News - Tue, 03/10/2026 - 7:46am

I’m posting this here because the HN crowd understands the difference between a functional fintech backend and a high-fidelity simulation. Over the last few weeks, I’ve been tracking a surge in traffic toward a platform called ZSZRUN, and after performing a "sysadmin gut check" on their operational logic, I’m issuing a terminal warning.

For those who don't know me, I spent 20 years in enterprise IT systems administration—the kind of work where you learn to spot a single point of failure from a mile away—before moving into independent trading. I’ve survived the dot-com bubble, the 2008 collapse, and every "crypto disruptor" that turned out to be a hollow shell. My assessment of ZSZRUN is that it is a wrapper-based fraudulent operation designed to absorb capital under the guise of an AI-driven trading protocol.

Here is the technical breakdown of the ZSZRUN architecture.

1. The "Halo Effect" of the Web3 Frontend ZSZRUN utilizes a highly polished presentation layer. The UI/UX is built on modern frameworks (likely React or Vue) with seamless Web3 wallet integration. To the average retail user, the platform feels responsive and high-tech.

However, in my audit, I found that this frontend is a "halo facade." While the UI displays real-time price feeds and "profitable" trading activity, there is no verifiable evidence that these orders are hitting a live liquidity pool. If you can’t cross-reference a platform's trading volume with major global settlement layers or find their entity in the API endpoints of regulators like the NFA or FCA, you aren't looking at an exchange—you are looking at a closed-loop simulation.

2. The Database Logic Failure: The "Withdrawal Ransom" A functional backend simply updates the internal ledger and broadcasts the net amount to the blockchain or bank. ZSZRUN, however, employs a "ransom-based" logic. When a user attempts to withdraw significant capital, the backend triggers a manual "security freeze." The user is then instructed to deposit an additional 30% of their total balance as a "personal income tax" or "verification fee" via an external crypto wallet before the original funds can be released.

Why this is a technical smoking gun: From a systems integrity standpoint, requiring inbound liquidity to unlock an existing internal database entry is an absurdity. If the funds existed in the platform's liquidity pool, the tax would be deducted from the balance. The requirement for a new deposit proves that the numbers on the screen are disconnected from real assets. This is the terminal phase of a "pig-butchering" scam.

3. Social Engineering as an Operational Layer ZSZRUN does not operate in a vacuum; it relies on a sophisticated social engineering layer. Victims are funneled into the platform through "Investment Groups" on WhatsApp and Telegram, led by personas like "Professor" or "Investment Director."

These groups use coordinated shills and automated scripts to create a manufactured environment of success. They use psychological "proof" (fake screenshots and bot-driven praise) to override a user’s technical skepticism. By the time the user realizes the withdrawal logic is a trap, they have already been socially engineered into depositing multiple times.

Conclusion: Avoid ZSZRUN at All Costs My verdict as a veteran of both IT infrastructure and the markets is that ZSZRUN is a terminal threat to your capital. It is a simulation designed for one-way liquidity flow.

I’ve seen this script play out with platforms like SRQCGX and BTDUex. The names change, but the architecture of the fraud remains the same. If you have funds in this platform, do not send the "tax deposit"—that money will only follow your principal into the void. Stay sharp, stay cynical, and protect your principal.

Comments URL: https://news.ycombinator.com/item?id=47321941

Points: 1

# Comments: 0

Categories: Hacker News

Do the Illegible

Hacker News - Tue, 03/10/2026 - 7:45am
Categories: Hacker News

Amdahl's Law

Hacker News - Tue, 03/10/2026 - 7:43am
Categories: Hacker News

Ask HN: P2P Trust Network for reviews in the 2020s

Hacker News - Tue, 03/10/2026 - 7:41am

I'm wondering why nobody has created a review network where it only shows you reviews from someone you're connected to. Reviews would be sorted by the number of degrees of separation. Bot accounts wouldn't work because you'd need someone to endorse the bot account, and if you endorse a bot account it'd be easy to end up on a user blacklist. If you endorse someone on a blacklist then people who endorsed you would be warned and asked if they want to disconnect from you. Of course there's tons of different ways to implement the propagation of positive & negative feedback re: trust within the network.

Is it just the network effect? Would piggybacking off established social media networks not work?

Comments URL: https://news.ycombinator.com/item?id=47321901

Points: 1

# Comments: 0

Categories: Hacker News

Why "Authentic" Is the Next Thing We'll Game

Hacker News - Tue, 03/10/2026 - 7:40am

Article URL: https://balint.blog/gamed/

Comments URL: https://news.ycombinator.com/item?id=47321896

Points: 2

# Comments: 1

Categories: Hacker News

Pages