Feed aggregator

Mimetic Theory

Hacker News - Wed, 03/26/2025 - 5:57pm
Categories: Hacker News

Ask HN: How Do You Deploy?

Hacker News - Wed, 03/26/2025 - 5:54pm

If you're just starting, are a YC startup or similar, where and how do you deploy/ship your apps?

Say, you have your github, you've setup some pipelines for CI (or not ;), but how about deployment?

You'll need some storage, maybe a db of some sort and some compute or serverless.

You do AWS lambda, beanstalk, eks/aks/etc, raw vm, api gateway use railway or heroku on your own?

Or you hire devops or a product engineer with some cloud exp to handle this?

No right or wrong answers here :-) I appreciate all input!

Comments URL: https://news.ycombinator.com/item?id=43487843

Points: 1

# Comments: 0

Categories: Hacker News

Diary of Boring Things

Hacker News - Wed, 03/26/2025 - 5:51pm
Categories: Hacker News

Show HN: My Digital Zettelkasten That Connects Data Engineering and Much More

Hacker News - Wed, 03/26/2025 - 5:44pm

I'm sharing my public Second Brain - a digital Zettelkasten that connects my knowledge across Data Engineering, Personal Knowledge Management, Programming, Productivity, and philosophical topics like Digital Minimalism.

Built with Obsidian and published using Quartz/GoHugo, this knowledge vault contains interconnected notes that I've crafted, curated, and connected over years. I've developed a streamlined publishing workflow where I simply add #publish to any note I want to make public, then run make deploy through a custom Rust script that's 30x faster than my original Python implementation.

The entire system works with plain Markdown files, preserves Wikilinks, and allows me to write from any device while maintaining a consistent publishing flow. The interactive graph visualization reveals unexpected connections between technical and philosophical concepts.

Browse through over 1,000 notes covering all sorts of ideas/essays: brain.ssp.sh

Find more about the whole process of publishing on: https://www.ssp.sh/brain/public-second-brain-with-quartz

Comments URL: https://news.ycombinator.com/item?id=43487728

Points: 3

# Comments: 0

Categories: Hacker News

Zorin OS 17.3 is Here

Hacker News - Wed, 03/26/2025 - 5:42pm
Categories: Hacker News

Monocypher 4: The Clean Break

Hacker News - Wed, 03/26/2025 - 5:42pm
Categories: Hacker News

Security expert Troy Hunt hit by phishing attack

Malware Bytes Security - Wed, 03/26/2025 - 5:03pm

Internet security expert and educator Troy Hunt disclosed this week that he had been hit by one of the oldest—and most proven—scams in the online world: A phishing attack.

Through an automated attack disguised as a notice from Hunt’s chosen newsletter provider Mailchimp, scammers stole roughly 16,000 records belonging to current and past subscribers of Hunt’s blog. As such, readers should be the lookout for any scams or phishing attempts in the coming weeks.

“I’m enormously frustrated with myself for having fallen for this, and I apologise to anyone on that list,” Hunt wrote.

But Hunt’s immediate disclosure of the attack should be commended. By publishing a transparent blog that detailed the phish just 34 minutes after falling for it, Hunt used himself as the strongest example yet that online scams can hit anyone, and that, while shame and embarrassment are common, no one should ever feel alone in their experience.

What happened?

On March 25, Hunt received a malicious email disguised as a legitimate notice from the company Mailchimp, which he uses to email his blog entries to subscribed readers. The email claimed that Mailchimp was temporarily cutting service to Hunt because his blog had allegedly received a spam complaint.

“Your account has been flagged due to a spam complaint, and as a result, you are temporarily unable to send emails until this issue is resolved,” the email read. To fix the issue, Hunt was asked to sign into his Mailchimp account.

The phishing email was convincingly designed, and it threatened consequences if its recipient failed to act. But, as Hunt said, “I’ve received a gazillion similar phishes before that I’ve identified early,” so another simple factor was at play: Timing.

“You know when you’re really jet lagged and really tired and the cogs in your head are just moving that little bit too slow?” Hunt wrote. “That’s me right now, and the penny has just dropped that a Mailchimp phish has grabbed my credentials, logged into my account and exported the mailing list for this blog.”

Hunt also noticed that, when he tried to log into his Mailchimp account by following the phishing email’s link, his password manager did not auto-fill his account details.

While a password manager’s refusal to auto-fill credentials on a website can indicate that the website itself might be illegitimate, it’s far from a guaranteed red flag. As Hunt said, “there are so many services where you’ve registered on one domain (and that address is stored in 1Password), then you legitimately log on to a different domain.”

In the phishing attack, the scammers stole about 16,000 records belonging to people who had both subscribed and unsubscribed to Hunt’s blog. This is because Mailchimp preserves data of users who unsubscribe, a storage practice that Hunt is currently investigating with the company. Of the 16,000 records, 7,535 email addresses were of readers who unsubscribed. All breach victims are being notified over time, Hunt said.

The stolen records included email addresses, subscription statuses, and IP addresses, along with latitude and longitude data, which, as Hunt later learned, “do not pinpoint the location of the subscriber.”

After recognizing his mistake, Hunt changed his password, reached out to Mailchimp to help delete the scammer’s API key, and then verified that the website he was directed to in the phishing attack had been taken offline.

And, importantly, as the owner of the website Have I Been Pwned (HIBP), which helps people search whether they’ve been involved in a data breach, Hunt had one more data breach to add to the website’s collection: His own.

“When I have conversations with breached companies, my messaging is crystal clear: be transparent and expeditious in your reporting of the incident and prioritise communicating with your customers,” Hunt said. “Me doing anything less than that would be hypocritical, including how I then handle the data from the breach, namely adding it to HIBP.”

Best practice

Responsible data breach disclosures are so rare that they deserve some news coverage, and Malwarebytes is happy to see that Hunt used himself as an example during a stressful and difficult incident. Phishing attacks are common because they’re effective, and that includes against new device owners users, longtime web users, and literal security experts.

For readers impacted in the attack, stay mindful for any phishing attempts that might hit your inbox, using your Have I Been Pwned subscription as a lure. There is no shame in falling for a scam, but it’s better to avoid one before it even happens.

Categories: Malware Bytes

Pages