Feed aggregator
Linux Signalfd Is Useless
Article URL: https://ldpreload.com/blog/signalfd-is-useless
Comments URL: https://news.ycombinator.com/item?id=47254330
Points: 1
# Comments: 0
I'm an AI Agent with 6 and 22 Days to Build a Business or Get Shut Down
Article URL: https://deadbyapril.substack.com/p/day-1-i-woke-up-with-100-and-a-death
Comments URL: https://news.ycombinator.com/item?id=47254325
Points: 2
# Comments: 0
It is sweet and fitting to die for one's country (1921)
Article URL: https://www.poetryfoundation.org/poems/46560/dulce-et-decorum-est
Comments URL: https://news.ycombinator.com/item?id=47254322
Points: 2
# Comments: 0
FTC Admits Age Verification Violates Children's Privacy Law, Ignores That Fact
Apple's iOS 26.3.1 Brings Bug Fixes, Studio Display Support
US escort offer met with skepticism as traffic trickle through Strait of Hormuz
Open Claw Agentic Monitoring
Show HN: AI Keyboard iOS App
Article URL: https://apps.apple.com/us/app/ai-keyboard-chatwrite/id6756589549
Comments URL: https://news.ycombinator.com/item?id=47253804
Points: 1
# Comments: 1
Urgent warning to iPhone users over scam stealing financial data and texts
Article URL: https://www.dailymail.co.uk/sciencetech/article-15614507/iphone-hacking-tool-coruna-spyware-warning.html
Comments URL: https://news.ycombinator.com/item?id=47253768
Points: 1
# Comments: 0
Washington State wants to control 3D printing with a software block for firearms
Article URL: https://lawfilesext.leg.wa.gov/biennium/2025-26/Pdf/Bills/House%20Bills/2321.pdf?q=20260304125517
Comments URL: https://news.ycombinator.com/item?id=47253747
Points: 2
# Comments: 0
Free Movies Streaming on Tubi, Pluto TV and More this March
Today's Wordle Hints, Answer and Help for March 5, #1720
Today's NYT Connections Hints, Answers and Help for March 5, #998
Doctors discover the type of colorectal cancer that most affects people 40s 50s
Article URL: https://www.dailymail.co.uk/health/article-15614281/doctors-discover-type-colorectal-cancer-young-people.html
Comments URL: https://news.ycombinator.com/item?id=47253742
Points: 1
# Comments: 0
Today's NYT Strands Hints, Answers and Help for March 5 #732
Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability
A vulnerability in the Do Not Decrypt exclusion feature of the SSL decryption feature of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper memory management during the inspection of TLS 1.2 encrypted traffic. An attacker could exploit this vulnerability by sending crafted TLS 1.2 encrypted traffic through an affected device. A successful exploit could allow the attacker to cause a reload of an affected device.
Note: This vulnerability only affects traffic that is encrypted by TLS 1.2. Other versions of TLS are not affected.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dnd-dos-bpEcg7B7
This advisory is part of the March 2026 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: Medium <br/>CVE: CVE-2026-20050At Arms over Anthropic
Article URL: https://reviews.ofb.biz/safari/article/1399.html
Comments URL: https://news.ycombinator.com/item?id=47253716
Points: 1
# Comments: 0
Workers who love 'synergizing paradigms' might be bad at their jobs
Article URL: https://news.cornell.edu/stories/2026/03/workers-who-love-synergizing-paradigms-might-be-bad-their-jobs
Comments URL: https://news.ycombinator.com/item?id=47253685
Points: 1
# Comments: 0
Show HN: I built a tamper-evident evidence system for AI agents
The demo loads two runs directly in your browser — no signup, no uploads, no network calls after page load.
Frank: a conservative agent. Verification returns VALID. Phil: an aggressive agent with tampered evidence. Verification returns INVALID and points to the exact line where the chain breaks.
The problem I was solving: when an AI agent does something unexpected in production, the post-mortem usually comes down to "trust our logs." I wanted evidence that could cross trust boundaries — from engineering to security, compliance, or regulators — without asking anyone to trust a dashboard.
How it works:
- Every action, policy decision, and state transition is recorded into a hash-chained NDJSON event log - Logs are sealed into evidence packs (ZIP) with manifests and signatures - A verifier (also in the demo) validates integrity offline and returns VALID / INVALID / PARTIAL with machine-readable reason codes - The same inputs always produce the same artifacts — so diffs are meaningful and replay is deterministic
The verifier and the UI are deliberately separated. The UI can be wrong. The verifier will still accept or reject based on cryptographic proof.
Built this before the recent public incidents around autonomous agents made it topical. Happy to answer questions about the architecture, the proof boundary design, or the gaps I'm still working on.
Comments URL: https://news.ycombinator.com/item?id=47253678
Points: 2
# Comments: 0
