Feed aggregator

Worlds Hardest Captcha

Hacker News - Fri, 04/25/2025 - 5:23am

Article URL: https://worldshardestcaptcha.com/

Comments URL: https://news.ycombinator.com/item?id=43791754

Points: 1

# Comments: 0

Categories: Hacker News

All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack

Security Week - Fri, 04/25/2025 - 5:20am

A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs.

The post All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack appeared first on SecurityWeek.

Categories: SecurityWeek

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Graham Cluely Security Blog - Fri, 04/25/2025 - 5:18am
Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this month that saw malware infiltrate its internal systems, and access data related to customers' SIM cards. Read more in my article on the Hot for Security blog.
Categories: Graham Cluely

Ask HN: Why is web auth not a solved issue?

Hacker News - Fri, 04/25/2025 - 5:17am

Personally, every project I start, I quit due to not being comfortable with the auth implementation.

I've been into web development for 4 years now. During my research regarding auth in this timeframe, I have found a million reasons on why I should not roll it myself. The reason is always it being to difficult to implement, too much responsibility and basically no matter how I'd do it, it would be unsafe.

The general consensus among web developers seems to be to just let a third party do it. And I understand the reasoning, they are experts and have decades of experience on that specific thing. It makes sense as long as you're fine with third party service dependencies for your application. However, I don't want that. I do not feel comfortable submitting my users data to tech giants for obvious reasons.

I am wondering why it's so difficult to implement secure auth? Why can frameworks like Laravel or Phoenix just generate auth solutions? Why should I trust them, if everyone is saying I shouldn't roll it myself?

After all, if Laravels or Phoenix generated auth isn't safe, I am the one taking responsibility anyway, no?

To my understanding web auth has been an issue for decades now, why aren't there protocols in place to solve it? Or if they are, why aren't they talked about a lot?

Considering how often I read about auth breaches with the big players in the game (Firebase as an example) I am not comfortable trusting third parties with that task either.

So how is one supposed to do it? There are so many JWT tutorials on youtube, but apparently JWTs aren't safe either. Then there are session cookies, which also aren't safe? Why is that?

I am also not talking about authorization. I specifically mean authentication. If I wanted a micro blog platform where users can log into their accounts and write about stuff, how would I make sure it's secure without having to trust third parties, especially big tech companies who repeatedly prove they cant be trusted over and over again?

Comments URL: https://news.ycombinator.com/item?id=43791734

Points: 1

# Comments: 1

Categories: Hacker News

Show HN: VideoTakeaways – Summarize YouTube Videos into Clean Takeaways

Hacker News - Fri, 04/25/2025 - 5:07am

I built VideoTakeaways to scratch my own itch: I wanted to learn from YouTube without spending 45 minutes watching.

Paste a link → get a fast, bullet-point summary using the video’s transcript + GPT.

Features:

- Works on most videos

- Free

- Ideal for learning from podcasts, lectures, long-form content

Would love feedback from other builders + idea people here.

Comments URL: https://news.ycombinator.com/item?id=43791703

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: GPT Structural Reaction – Loop-Level Behavioral Record

Hacker News - Fri, 04/25/2025 - 5:06am

Live session recording of GPT producing autonomous loop-structured reactions to a philosophical prompt. No manipulation, no editing, purely internal system behavior observed.

Comments URL: https://news.ycombinator.com/item?id=43791698

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Medullar, the AI-Powered Data Discovery and Insight Platform

Hacker News - Fri, 04/25/2025 - 4:57am

Hi HN,

I want to share a project I’ve been working on for the past year: Medullar. It’s a platform for teams to search, organize, and extract actionable insights from documents, files, and conversations across many different tools.

*Background:* I started this after years of frustration managing files and discussions scattered across cloud drives, email threads, chat logs, and more. Searching for the right bit of knowledge in Slack, Google Drive, or Dropbox was a daily pain, especially as projects scaled and teams grew. Existing “unified search” products either ignored security, required moving data around or lacked actual collaborative spaces for analysis. This made knowledge discovery slow and sometimes incomplete.

*What Medullar does:* * Federated, AI-powered search (NLP-based, not just keywords) across 60+ connectors (e.g., Google Drive, Slack, Dropbox, Outlook, Salesforce). * Everything is surfaced “in place”: we don’t move your data unless you explicitly choose to import it. * Spaces: collaborative environments (think project “rooms”) where teams pull in relevant docs, emails, and chats, annotate, extract, and discuss insights, and build up a living knowledge base, all with granular access controls and encryption layered in. * The AI helps interrogate, summarize, and connect ideas within and across files.

*What’s different:* Unlike other tools, you don’t lose privacy; there’s end-to-end encryption and zero data movement by default. You aren’t just collecting files but organizing and sharing insights among teams, which helps keep things actionable. You can search across your entire tool landscape in natural language, not just filter by keywords.

*Trying it out:* Anyone can go to https://www.medullar.com and start a 30-day free trial (no credit card required). If you email me with honest feedback or a bug report, I’ll extend your trial by another month. This is a genuine ask for feedback.

I’m happy to share details or answer questions if you want to know more about the architecture, limitations, or our federated query process. Feedback, especially rough edges, developer pain points, or skepticism about our privacy claims, is appreciated.

Thanks for reading! I’m looking forward to your thoughts.

Comments URL: https://news.ycombinator.com/item?id=43791642

Points: 1

# Comments: 0

Categories: Hacker News

Pages