Man who videotaped himself BASE jumping in Yosemite arrested. He says it was AI
Comments URL: https://news.ycombinator.com/item?id=46916961
Points: 32
# Comments: 11
from Hacker News: Front Page https://ift.tt/aCzkPLI
Article URL: https://www.latimes.com/california/story/2026-02-05/man-videotaped-himself-base-jumping-in-yosemite-federal-officials-say-he-sa...
Comments URL: https://news.ycombinator.com/item?id=46916961
Points: 32
# Comments: 11
Hey HN, I built an automated system that tracks malicious Chrome/Edge extensions daily.
The database updates automatically by monitoring chrome-stats for removed extensions and scanning security blogs. Currently tracking 1000+ known malicious extensions with extension IDs, names, and dates.
I'm working on detection tools (GUI + CLI) to scan locally installed extensions against this database, but wanted to share the raw data first since maintained threat intelligence lists like this are hard to find.
The automation runs 24/7 and pushes updates to GitHub. Free to use for research, integration into security tools, or whatever you need.
Happy to answer questions about the scraping approach or data collection methods.
Comments URL: https://news.ycombinator.com/item?id=46914974
Points: 7
# Comments: 3
Article URL: https://www.theverge.com/streaming/873416/piracy-streaming-boxes
Comments URL: https://news.ycombinator.com/item?id=46901974
Points: 31
# Comments: 39
Article URL: https://www.divergent-desktop.org/blog/2026/01/26/a12web/
Comments URL: https://news.ycombinator.com/item?id=46887326
Points: 9
# Comments: 1
What PII-Shield does: It's a K8s sidecar (or CLI tool) that pipes application logs, detects secrets using Shannon entropy (catching unknown keys like "sk-live-..." without predefined patterns), and redacts them deterministically using HMAC.
Why deterministic? So that "pass123" always hashes to the same "[HIDDEN:a1b2c]", allowing QA/Devs to correlate errors without seeing the raw data.
Key features: 1. JSON Integrity: It parses JSON, sanitizes values, and rebuilds it. It guarantees valid JSON output for your SIEM (ELK/Datadog). 2. Entropy Detection: Uses context-aware entropy analysis to catch high-randomness strings. 3. Fail-Open: Designed as a transparent pipe wrapper to preserve app uptime.
The project is open-source (Apache 2.0).
Repo: https://github.com/aragossa/pii-shield Docs: https://pii-shield.gitbook.io/docs/
I'd love your feedback on the entropy/threshold logic!
Comments URL: https://news.ycombinator.com/item?id=46873308
Points: 4
# Comments: 0