Feed aggregator
Apple Now Makes One in Four iPhones in India
Article URL: https://www.macrumors.com/2026/03/10/apple-makes-one-four-iphones-india/
Comments URL: https://news.ycombinator.com/item?id=47321482
Points: 2
# Comments: 0
Visualizing Ukkonen's Suffix Tree Algorithm
Article URL: https://www.abahgat.com/blog/visualizing-ukkonens-algorithm/
Comments URL: https://news.ycombinator.com/item?id=47321481
Points: 1
# Comments: 0
Google Trends: "how to install Linux" is going viral
Article URL: https://old.reddit.com/r/BuyFromEU/comments/1rpqx08/google_trends_how_to_install_linux_is_going_viral/
Comments URL: https://news.ycombinator.com/item?id=47321476
Points: 4
# Comments: 1
Deriving Type Erasure
Article URL: https://david.alvarezrosa.com/posts/deriving-type-erasure/
Comments URL: https://news.ycombinator.com/item?id=47321469
Points: 2
# Comments: 1
8 Common Foods That Are More Likely to Contain Microplastics
I Open-Sourced the Biological Operating System (Destroys AlphaFold) OS Always
Article URL: https://github.com/ctibedoJ/KateFarms/blob/0b63882e9df3c81447db19040c4a80420b20acbf/V7.1
Comments URL: https://news.ycombinator.com/item?id=47321458
Points: 1
# Comments: 2
FreeNeta – Lightweight PROFINET discovery tool written in Python
Article URL: https://github.com/ArnoVanbrussel/freeneta
Comments URL: https://news.ycombinator.com/item?id=47321457
Points: 1
# Comments: 1
Hackers may have breached FBI wiretap network via supply chain
Investigators are worried that a recent attack on a critical FBI system was more than just a random hit, and that another nation-state might have been involved.
On February 17, the FBI flagged irregular network activity that led straight to its Digital Collection System Network. That system contains sensitive data related to court-authorized wiretaps, pen registers, and FISA warrants, along with personal information on active FBI targets.
The bureau claims it has “identified and addressed” the suspicious activity. That’s it. No word on whether this was ransomware, state-sponsored espionage, or something else entirely.
Now the White House, DHS, and the NSA have joined the investigation, which isn’t the kind of guest list you’d see for a minor incident.
The breach path? Through a vendor’s internet service provider, according to reports. Not a frontal assault on FBI systems, but a side door through their supply chain. The hackers apparently exploited an ISP that served as a vendor to the agency, bypassing direct FBI defenses entirely.
The Wall Street Journal reports that US investigators suspect that hackers affiliated with the Chinese government were behind the breach.
It wouldn’t be the first time that Chinese state-linked groups have hit a target via a third-party telecommunications system. Hackers tied to Salt Typhoon hit AT&T and Verizon in 2024. The campaign compromised call records and private communications of politicians, exposing anyone involved in government activity, while also going after law enforcement systems.
A year earlier, ransomware operators breached the US Marshals Service and walked away with employee information, legal documents, and administrative data. Then Russian hackers targeted federal courts last year. The judiciary described it as an escalation in cyberattacks while scrambling to protect case files that could expose confidential informants.
This trend of attacks on government systems suggests that nation-state actors are actively collecting intelligence. Law enforcement systems are attractive targets because they contain large volumes of sensitive information. This latest incident indicates these attacks are getting more sophisticated, not less.
How secure are FBI systems?The Digital Collection System Network stores personally identifiable information on FBI investigation subjects, including wiretap returns and other surveillance data. This includes “pen register” data, which reveals metadata about which numbers a monitored phone line called, and which numbers called that line.
Lawmakers are calling for action. In December 2024, Sen. Ron Wyden (D-Ore) proposed legislation to tighten up security of the nation’s phone networks.
In 1994, Congress passed lawful access legislation designed to allow government access to telcos’ systems. That law also enabled the FCC to issue regulations that would force telecom providers to secure their systems against unauthorized access by third parties, but Wyden said that was never done.
Introducing the Secure American Communications Act, he said:
“It was inevitable that foreign hackers would burrow deep into the American communications system the moment the FCC decided to let phone companies write their own cybersecurity rules.”
The draft legislation didn’t go any further, though.
February’s breach raises an uncomfortable question. If attackers can slip through vendor ISPs into the FBI’s wiretapping infrastructure, what else sits exposed?
The bureau says it “identified and addressed” the suspicious activity. Beyond that, little detail has been released. What is clear is that federal law enforcement systems face sustained and sophisticated attacks, and the pressure on those defenses is growing.
What do cybercriminals know about you?
Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.
With artificial intelligence increasingly deployed in analysis and decision-making in armed conflict, research shows AI systems will not naturally default to ‘safe’ outcomes in nuclear crises
Best Small Soundbar of 2026
The Whoop Health Tracker Hops on the Women’s Health Train With 2 New Offerings
I think I'm turning into a vibe coder
To be honest, it has been a long time since I started programming. At first, I was just playing around with HTML and CSS. After about a year, After that I started learning JavaScript and a little bit of React.
Around that time, I went to a vocational school for web development, mainly because I wanted the student benefits. But there I discovered that programming was much deeper than I thought, and I realized I wasn’t as good as I believed. I knew how to do things, but I didn’t understand *why* things worked in a specific way.
So I started learning HTML, CSS, and JavaScript again and spent about a year on it. But to be honest, I wasn’t the best listener because I thought I already knew a lot. Because of that, I also started learning other things like Python and Django.
My lecturer was very good. He saw some potential in me, and outside of the syllabus, he started teaching me Node.js and Express so I could understand how the backend works. I studied that for about 3 - 4 months.
After that finished, I continued learning Django by myself. Around that time, my lecturer gave me the opportunity to work on my first paid project, but it was in Laravel. So I started learning Laravel, but I only learned the basics - how to set up routes and a little bit about how Blade works.
I don’t really have much experience with PHP or Laravel. I understand how to organize code, like where things should go, how to set up databases and connections, choose the right folders for files, and basic architecture.
The problem is that for about *six months, I haven’t written a single line of code*, and when I realized that, I was terrified. Those six months passed because I was working on my second paid project using AI tools (Codex is pretty smart ^^). But now I feel like I’ve forgotten many things, JavaScript, React, Express, and other things I used to study.
I still understand the concepts, but the syntax, and even some concepts, are gone. I also have very little motivation to deeply learn PHP and Laravel because AI can write most of the code.
And honestly, I feel alone. My dream is to become a *senior developer*, lead a team, and create really good digital products. But now I realize that I’ve become a *“vibe coder”*, even if I’m a somewhat capable one. Because of that, I feel bad and a bit lost.
Any advice would be really appreciated.
Comments URL: https://news.ycombinator.com/item?id=47321168
Points: 1
# Comments: 0
Measuring the Weight of an Electron (2017)
Article URL: https://deftly.net/posts/2017-06-01-measuring-the-weight-of-an-electron.html
Comments URL: https://news.ycombinator.com/item?id=47321155
Points: 2
# Comments: 0
I made myself a device that tells me what plane flies above my home
Article URL: https://old.reddit.com/r/aviation/comments/1roy7qs/i_made_myself_a_device_that_tells_me_what_plane/
Comments URL: https://news.ycombinator.com/item?id=47321147
Points: 1
# Comments: 0
Working to Decentralize FedCM
Article URL: https://atproto.com/blog/working-to-decentralize-fedcm
Comments URL: https://news.ycombinator.com/item?id=47321107
Points: 1
# Comments: 0
Wolfram LLM Benchmarking Project
Article URL: https://www.wolfram.com/llm-benchmarking-project/
Comments URL: https://news.ycombinator.com/item?id=47321100
Points: 1
# Comments: 0
Recreate Lost Chinese Font from ancient books using AI
Article URL: https://github.com/kaonashi-tyc/Zi-QuanHengDuLiang
Comments URL: https://news.ycombinator.com/item?id=47321094
Points: 1
# Comments: 0
Why Your AI Coding Agent Gets Worse over Time (and How to Fix It)
Article URL: https://www.davidreis.me/2026/why-your-ai-coding-agent-gets-worse-over-time
Comments URL: https://news.ycombinator.com/item?id=47321092
Points: 1
# Comments: 0
Tim FTTH and GeForce Now: Diagnosing an ICMP Black Hole on PPPoE
Article URL: https://paolocostanzo.github.io/tim-packet-loss-gfn/
Comments URL: https://news.ycombinator.com/item?id=47321087
Points: 1
# Comments: 1
EVi, a Hard-Fork of Vim
Article URL: https://codeberg.org/NerdNextDoor/evi
Comments URL: https://news.ycombinator.com/item?id=47321085
Points: 1
# Comments: 0
