Hacker Newsnew | past | comments | ask | show | jobs | submit | arewethereyeta's commentslogin

what's your problem?

one may be closer to Donald Trump than the other.


Open source outreach / email campaign software: https://outreachstud.io


titanium has a low tensile strength compared to steel. I wouldnt recommend it even on a bike handlebar


Oh but they do. People have been making titanium replacement bolt kits for bicycles since at least 1993.

Doesn’t change the fact that those are tiny bolt holes for holding a 750 kw motor. How are they affixing it to a vehicle?


Open source app for email outreach: https://www.outreachstud.io/


every 6 months. They also rotate on you to have a reason for calling again, out of the blue


Greece is 20 years behind Romania with that scam


Zenfone 10 is pretty cool if you chase the form factor


Zenfone 10 also isn't available anymore and its software support will end long before the iPhone's, if it hasn't already.


isn't this basically what flutter does?


No.

SVG is a proper part of the browser. You get native text rendering, real links, real text selection, stuff like that.

Flutter is pure-canvas. You get no accessibility (unless you duplicate everything, in which case why even bother?), fake links which don’t behave properly, incorrect text rendering, megabytes of overhead, slow startup, &c.


> An attacker published new versions of four of duckdb’s packages that included malicious code to interfere with cryptocoin transactions

How can anyone publish their packages?


The attacker emailed a maintainer from a legitimate looking email address. The maintainer clicked the link and reset their credentials on a legitimate looking website. The attacker then signs into the legitimate duckdb account and publishes their new package.

This is the second high-profile instance of the technique this week.


2FA for such high profile packages should be enforced


It is, if your packages are popular enough then npm will force you to enable 2FA. They started doing that a few years ago. It clearly doesn't stop everything though, the big attack yesterday went through 2FA by tricking the author into doing a "2FA reset".


> It is, if your packages are popular enough then npm will force you to enable 2FA.

Are they actively forcing it? I've received the "Remember to enable 2FA" email notifications from NPM since 2022 I think, but haven't bothered since I'm not longer publishing packages/updates.

Besides, the email conveniently mentions their "automation" tokens as well, which when used for publishing updates, bypasses 2FA fully.



Passkeys should be enforced


Parent is exactly right! For critical infrastructure an un-phishable 2fa mechanism like passkeys or hardware token (FIDO2/yubikey) should be required! It would remove this category of attack completely.


I take the downvote but I’d like to know why?

Passkeys are effectively and objectively a better security solution than password+2FA. Among other things, they are completely unfishable.


> Among other things, they are completely unfishable.

From what I've heard, they're also unbackupable, and tied to the ecosystem used to create them (so if you started with an Apple desktop, you can't later migrate the passkeys to a Windows desktop, you have to go to every single site you've ever used and create new ones).


You can't really backup hardware tokens, either? It's quite possible to use something like bitwarden/vaultwarden/1password as a password manager, and you can "backup" tokens quite easily without being tied to a particular mobile/desktop ecosystem.


You can just create a new passkey on the new device after logging in. It's a non-issue.


It is not a given that multiple services let you enroll multiple keys. How many year did it take before Amazon allowed multiple Yubikeys? Which means you are in a real pickle if you ever lose your one hardware device with keys (lost, stolen, bricked, whatever).


It's an incorrect implementation, the same as when eg an account provider truncates a long password to 8 characters.


That’s not true anymore; you can migrate passkeys to another password manager now.


for popular packages - and in this case - they are. This attack (and yesterday's) are relay attacks, with the attacker in the middle between npm and the target.


He would have entered 2FA too


There is a detailed postmortem in the linked ticket explaining exactly how this happened.


This is the same phishing attack that hit junon yesterday.

https://news.ycombinator.com/item?id=45169657


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: