Hacker Newsnew | past | comments | ask | show | jobs | submit | bearsyankees's submissionslogin
1.Strix Is an Open-Source Claude Code Security (strix.ai)
5 points by bearsyankees 5 days ago | past | discuss
2.Finding a Cross-Tenant Vulnerability in GCP's Apigee (omeramiad.com)
1 point by bearsyankees 24 days ago | past
3.Reverse Engineering US Airline's PNR System and Accessing All Reservations (alexschapiro.com)
134 points by bearsyankees 71 days ago | past | 63 comments
4.Reverse engineering a $1B Legal AI tool exposed 100k+ confidential files (alexschapiro.com)
821 points by bearsyankees 87 days ago | past | 288 comments
5.Pwning OpenAI Atlas Through Exposed Browser Internals (hacktron.ai)
2 points by bearsyankees 88 days ago | past | 1 comment
6.Low PNR Entropy: I accessed all airline bookings via simple math (alexschapiro.com)
4 points by bearsyankees 89 days ago | past | 1 comment
7.Airline Left All Passenger Data Vulnerable Due to Missing Last-Name Check (alexschapiro.com)
6 points by bearsyankees 3 months ago | past
8.Hacktron Hacks Supabase (hacktron.ai)
7 points by bearsyankees 3 months ago | past
9.Nobel Peace Prize Sparks Insider Trading Questions on Prediction Sites (forbes.com/sites/brandonkochkodin)
3 points by bearsyankees 4 months ago | past | 3 comments
10.New investment bank is almost entirely powered by AI -- and it works (ft.com)
2 points by bearsyankees 7 months ago | past | 2 comments
11.The ancient invention that ignited game play (2021) (bbc.com)
9 points by bearsyankees 8 months ago | past | 2 comments
12.Xfinity using WiFi signals in your house to detect motion (xfinity.com)
668 points by bearsyankees 8 months ago | past | 501 comments
13.GerriScary: Hacking the Supply Chain of Popular Google Products (tenable.com)
1 point by bearsyankees 8 months ago | past
14.Netflix Vulnerability: Dependency Confusion in Action (landh.tech)
1 point by bearsyankees 8 months ago | past
15.I hacked a dating app (and how not to treat a security researcher) (alexschapiro.com)
570 points by bearsyankees 9 months ago | past | 311 comments
16.I hacked a dating app (Total account takeover) (alexschapiro.com)
4 points by bearsyankees 9 months ago | past
17.Student exposes scary vulnerabilities in popular dating app (yaledailynews.com)
1 point by bearsyankees 10 months ago | past
18.Hacking a Dating App: Private Chats, Passports and More Exposed (alexschapiro.com)
2 points by bearsyankees 10 months ago | past
19.Student exposes scary vulnerabilities in popular dating app (yaledailynews.com)
2 points by bearsyankees 10 months ago | past
20.Hacking a Dating App: Private Chats, Passports and More Exposed (alexschapiro.com)
3 points by bearsyankees 10 months ago | past
21.The Global Right: From French Revolution-The American Insurrection (Yale Class) (coursetable.com)
5 points by bearsyankees 10 months ago | past
22.From Cybersecurity to AI Interpretability (starseer.ai)
1 point by bearsyankees 10 months ago | past
23.Smart Phish via GitHub – Stay Vigilant (twitter.com/hackingdave)
1 point by bearsyankees on Jan 21, 2025 | past
24.Mozilla: Temporal (Limited Availability) (developer.mozilla.org)
2 points by bearsyankees on Jan 21, 2025 | past | 1 comment
25.What Classes Would You Take as a Yale Undergrad? (coursetable.com)
3 points by bearsyankees on Jan 20, 2025 | past
26.Protecting Democracy from Itself: Plato's Lessons for Modern Democracies [pdf] (yale.edu)
2 points by bearsyankees on Dec 15, 2024 | past
27.First Tsunami Warning in Oregon in Years (oregonlive.com)
5 points by bearsyankees on Dec 5, 2024 | past | 1 comment
28.Ruler of Chechnya Claims Elon Musk Shut Down His Cybertruck (yahoo.com)
9 points by bearsyankees on Sept 19, 2024 | past | 1 comment
29.First Draft from Usaisi: Managing Misuse Risk for Dual-Use for Foundation Models [pdf] (nist.gov)
1 point by bearsyankees on July 26, 2024 | past
30.Optimizing Bot Traffic Handling for Link Previews (coursetable.com)
1 point by bearsyankees on July 25, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: