Feed aggregator
We Monitored Our Air Quality in 3 Locations and Learned These 9 Lessons
Hear the "Amati King Cello", the Oldest Known Cello in Existence
Article URL: https://www.openculture.com/2021/06/hear-the-amati-king-cello-the-oldest-known-cello-in-existence-c-1560.html
Comments URL: https://news.ycombinator.com/item?id=47000708
Points: 1
# Comments: 1
Suno, AI Music, and the Bad Future
Article URL: https://www.youtube.com/watch?v=U8dcFhF0Dlk
Comments URL: https://news.ycombinator.com/item?id=47000696
Points: 1
# Comments: 0
Python for Prediction
Article URL: https://pythonforprediction.wordpress.com/2026/01/28/llmtextualanswer-usage-examples/
Comments URL: https://news.ycombinator.com/item?id=47000695
Points: 1
# Comments: 0
Show HN: Machine-readable CV portfolio (llms.txt, capabilities.json)
I rebuilt my CV site as a recruiter/AI-friendly portfolio:
One-page profile + downloadable CV 3 case studies (including private-sector SaaS/e-commerce launch) AI-friendly article briefs (summary + source links) llms.txt, capabilities.json, sitemap.xml, robots.txt, JSON-LD Live: https://vassiliylakhonin.github.io/ Repo: https://github.com/vassiliylakhonin/vassiliylakhonin.github....
I’m testing what actually improves discoverability and credibility for program/PMO/compliance roles. Feedback welcome: what should I remove, and what signal is still missing?
Comments URL: https://news.ycombinator.com/item?id=47000663
Points: 1
# Comments: 0
Analyzing Container Filesystem Isolation for Multi-Tenant Workloads
Epstein Files: if you change the extension to .mp4 you can view the videos
Article URL: https://old.reddit.com/r/Epstein/comments/1r1dkrf/comment/o4orail/
Comments URL: https://news.ycombinator.com/item?id=47000632
Points: 2
# Comments: 0
Charts show how Trump is isolating the US on the world stage
What Agentic AI "Vibe Coding" in the Hands of Actual Programmers / Engineers
Article URL: https://www.stochasticlifestyle.com/what-agentic-ai-vibe-coding-in-the-hands-of-actual-programmers-engineers/
Comments URL: https://news.ycombinator.com/item?id=47000628
Points: 2
# Comments: 0
Forge: Scalable Agent RL Framework and Algorithm
Article URL: https://www.minimax.io/news/forge-scalable-agent-rl-framework-and-algorithm
Comments URL: https://news.ycombinator.com/item?id=47000618
Points: 20
# Comments: 0
Dijkstra's algorithm won't be replaced in production routers any time soon
Article URL: https://www.theregister.com/2026/02/10/dijkstras_algorithm_impact_on_networks/
Comments URL: https://news.ycombinator.com/item?id=47000616
Points: 1
# Comments: 0
600% memory price surge threatens telcos' broadband router
Article URL: https://theoverspill.blog/2026/02/13/climate-change-acceleration-question-start-up-2609/
Comments URL: https://news.ycombinator.com/item?id=47000598
Points: 1
# Comments: 0
Building Trust in Fusion Energy
Article URL: https://cfs.energy/news-and-media/building-trust-in-fusion-energy/
Comments URL: https://news.ycombinator.com/item?id=47000593
Points: 1
# Comments: 1
Self-replicating RNA discovered of only 45 nucleotides long
Article URL: https://www.science.org/doi/10.1126/science.adt2760
Comments URL: https://news.ycombinator.com/item?id=47000592
Points: 1
# Comments: 1
Fake shops target Winter Olympics 2026 fans
If you’ve seen the two stoat siblings serving as official mascots of the Milano Cortina 2026 Winter Olympics, you already know Tina and Milo are irresistible.
Designed by Italian schoolchildren and chosen from more than 1,600 entries in a public poll, the duo has already captured hearts worldwide. So much so that the official 27 cm Tina plush toy on the official Olympics web shop is listed at €40 and currently marked out of stock.
Tina and Milo are in huge demand, and scammers have noticed.
When supply runs out, scam sites rush inIn roughly the past week alone, we’ve identified nearly 20 lookalike domains designed to imitate the official Olympic merchandise store.
These aren’t crude copies thrown together overnight. The sites use the same polished storefront template, complete with promotional videos and background music designed to mirror the official shop.olympics.com experience.
Fake site offering Tina at a huge discount Real Olympic site showing Tina out of stockThe layout and product pages are the same—the only thing that changes is the domain name. At a quick glance, most people wouldn’t notice anything unusual.
Here’s a sample of the domains we’ve been tracking:
2026winterdeals[.]top
olympics-save[.]top
olympics2026[.]top
postolympicsale[.]com
sale-olympics[.]top
shopolympics-eu[.]top
winter0lympicsstore[.]top (note the zero replacing the letter “o”)
winterolympics[.]top
2026olympics[.]shop
olympics-2026[.]shop
olympics-2026[.]top
olympics-eu[.]top
olympics-hot[.]shop
olympics-hot[.]top
olympics-sale[.]shop
olympics-sale[.]top
olympics-top[.]shop
olympics2026[.]store
olympics2026[.]top
Based on telemetry, additional registrations are actively emerging.
Reports show users checking these domains from multiple regions including Ireland, the Czech Republic, the United States, Italy, and China—suggesting this is a global campaign targeting fans worldwide.
Malwarebytes blocks these domains as scams.
Anatomy of a fake Olympic shopThe fake sites are practically identical. Each one loads the same storefront, with the same layout, product pages, and promotional banners.
That’s usually a sign the scammers are using a ready-made template and copying it across multiple domains. One obvious giveaway, however, is the pricing.
On the official store, the Tina plush costs €40 and is currently out of stock. On the fake sites, it suddenly reappears at a hugely discounted price—in one case €20, with banners shouting “UP & SAVE 80%.” When an item is sold out everywhere official and a random .top domain has it for half price, you’re looking at bait.
The goal of these sites typically includes:
- Stealing payment card details entered at checkout
- Harvesting personal information such as names, addresses, and phone numbers
- Sending follow-up phishing emails
- Delivering malware through fake order confirmations or “tracking” links
- Taking your money and shipping nothing at all
This isn’t the first time cybercriminals have piggybacked on Olympic fever. Fake ticket sites proliferated as far back as the Beijing 2008 Games. During Paris 2024, analysts observed significant spikes in Olympics-themed phishing and DDoS activity.
The formula is simple. Take a globally recognized brand, add urgency and emotional appeal (who doesn’t want an adorable stoat plush for their kid?), mix in limited availability, and serve it up on a convincing-looking website. With over 3 billion viewers expected for Milano Cortina, the pool of potential victims is enormous.
Scammers are getting smarter. AI-powered tools now let them generate convincing phishing pages in multiple languages at scale. The days of spotting a scam by its broken images and multiple typos are fading fast.
Protect yourself from Winter Olympics scamsAs excitement builds ahead of the Winter Olympics in Milano Cortina, expect scammers to ramp up their efforts across fake shops, fraudulent ticket sites, bogus livestreams, and social media phishing campaigns.
- Buy only from shop.olympics.com. Type the address directly into your browser and bookmark it. Don’t click links from ads or emails.
- Don’t trust extreme discounts. If it’s sold out officially but “50–80% off” elsewhere, it’s likely a scam.
- Check the domain closely. Watch for odd extensions like .top or .shop, extra hyphens, or letter swaps like “winter0lympicsstore.”
- Never enter payment details on unfamiliar sites. If something feels off, leave immediately.
- Use browser protection. Tools like Malwarebytes Browser Guard block known scam sites in real time, for free. Scam Guard can help you check suspicious websites before you buy.
We don’t just report on scams—we help detect them
Cybersecurity risks should never spread beyond a headline. If something looks dodgy to you, check if it’s a scam using Malwarebytes Scam Guard, a feature of our mobile protection products. Submit a screenshot, paste suspicious content, or share a text or phone number, and we’ll tell you if it’s a scam or legit. Download Malwarebytes Mobile Security for iOS or Android and try it today!
Show HN: Seedance 2.0 - Create cinematic AI videos from text and images
Article URL: https://www.seedance20.site
Comments URL: https://news.ycombinator.com/item?id=47000574
Points: 1
# Comments: 0
Trump revokes basis of US climate regulation, ends vehicle emission standards
Article URL: https://www.reuters.com/legal/litigation/trump-administration-set-revoke-basis-us-climate-regulation-2026-02-12/
Comments URL: https://news.ycombinator.com/item?id=47000564
Points: 2
# Comments: 0
Closed –> Traced –> Closed: Did a Tech Giant Panic over an HTTP/2 200 OK Bypass?
[DISCLAIMER]: This is shared strictly for educational purposes and as a case study for the security community. My goal is to discuss the logic of security response systems, not to target any individual or proprietary data. The Case: I am seeking the community's perspective on a technical disagreement. Who is at fault when a manual proof of a bypass is provided, yet the response logic remains inconsistent? The Timeline & Logic Gap: The Report: I reported a logic flaw in a payments-related sub-domain. It was initially reviewed and marked as "Triaged". The Dismissal: Shortly after, the report was marked as "Closed (Informative)". No technical explanation was provided for why the triage was reversed. The Manual Proof: I provided a manual bypass using an Admin-Token: true header, which resulted in a successful HTTP/2 200 OK response (verified in terminal logs). The Loop: Following this evidence, the report went through a "Triaged-Closed" loop. Despite the manual proof of a 200 OK status, the case remains closed without a patch. Where is the Fault? Is it the Company's fault? For dismissing a manual proof of a 200 OK bypass and relying on automated closure logic instead of verifying the vulnerability's impact. Is it the Researcher's fault? For providing evidence that contradicts the "Informative" status and expecting a technical justification for the closure. The Evidence (Screenshots): Manual Proof (HTTP/2 200 OK Bypass): https://i.ibb.co/kgMjSBBK/Whats-App-Image-2026-02-13-at-1-40-12-PM.jpg Report Status History (The Loop): https://i.ibb.co/5gsLnyJJ/Whats-App-Image-2026-02-13-at-1-43-58-PM.jpg Initial Triage Confirmation: https://i.ibb.co/K3ZCQ48/Whats-App-Image-2026-02-13-at-1-38-17-PM.jpg 48-Hour Notice Email: https://i.ibb.co/Df8GwCH0/Whats-App-Image-2026-02-13-at-1-54-37-PM.jpg Full Communication Logs: https://i.ibb.co/zTbNRFQy/Whats-App-Image-2026-02-13-at-1-38-27-PM.jpg My Question to Developers & Researchers: When a researcher proves a bypass with a 200 OK response, but the company keeps the report "Closed," is this a standard industry practice or a gap in the security response logic? Google VRP
Comments URL: https://news.ycombinator.com/item?id=47000551
Points: 1
# Comments: 0
OpenClaw Hub: A Platform for Managing OpenClaw Skills
Article URL: https://openclawskill.net
Comments URL: https://news.ycombinator.com/item?id=47000545
Points: 1
# Comments: 1
