Everyone Is Stealing TV
Article URL: https://www.theverge.com/streaming/873416/piracy-streaming-boxes
Comments URL: https://news.ycombinator.com/item?id=46901974
Points: 31
# Comments: 39
from Hacker News: Front Page https://ift.tt/7qje9I5
Article URL: https://www.theverge.com/streaming/873416/piracy-streaming-boxes Comments URL: https://news.ycombinator.com/item?id=46901974 ...
Article URL: https://www.theverge.com/streaming/873416/piracy-streaming-boxes
Comments URL: https://news.ycombinator.com/item?id=46901974
Points: 31
# Comments: 39
Article URL: https://www.divergent-desktop.org/blog/2026/01/26/a12web/
Comments URL: https://news.ycombinator.com/item?id=46887326
Points: 9
# Comments: 1
What PII-Shield does: It's a K8s sidecar (or CLI tool) that pipes application logs, detects secrets using Shannon entropy (catching unknown keys like "sk-live-..." without predefined patterns), and redacts them deterministically using HMAC.
Why deterministic? So that "pass123" always hashes to the same "[HIDDEN:a1b2c]", allowing QA/Devs to correlate errors without seeing the raw data.
Key features: 1. JSON Integrity: It parses JSON, sanitizes values, and rebuilds it. It guarantees valid JSON output for your SIEM (ELK/Datadog). 2. Entropy Detection: Uses context-aware entropy analysis to catch high-randomness strings. 3. Fail-Open: Designed as a transparent pipe wrapper to preserve app uptime.
The project is open-source (Apache 2.0).
Repo: https://github.com/aragossa/pii-shield Docs: https://pii-shield.gitbook.io/docs/
I'd love your feedback on the entropy/threshold logic!
Comments URL: https://news.ycombinator.com/item?id=46873308
Points: 4
# Comments: 0
Article URL: https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys
Comments URL: https://news.ycombinator.com/item?id=46857615
Points: 48
# Comments: 28
Article URL: https://forkingmad.blog/wordle-crisis/
Comments URL: https://news.ycombinator.com/item?id=46847924
Points: 3
# Comments: 0