Hacker Newsnew | past | comments | ask | show | jobs | submit | czbond's commentslogin

Agree - yet, security researchers and our wider community also needs to recognize that vulnerabilities are foreign to most non-technical users.

Cold approach vulnerability reports to non-technical organizations quite frankly scare them. It might be like someone you've never met telling you the door on your back bedroom balcony can be opened with a dummy key, and they know because they tried it.

Such organizations don't kmow what to do. They're scared, thinking maybe someone also took financial information, etc. Internal strife and lots of discussions usually occur with lots of wild specualation (as the norm) before any communication back occurs.

It just isn't the same as what security forward organizations do, so it often becomes as a surprise to engineers when "good deed" seems to be taken as malice.


> Such organizations don't know what to do.

Maybe they should simply use some common sense? If someone could and would steal valuables, it seems highly unlikely that he/she/it would notify you before doing it.

If they would want to extort you, they would possibly do so early on. And maybe encrypt some data as a "proof of concept" ...

But some organizations seem to think that their lawyers will remedy every failure and that's enough.


> If someone could and would steal valuables, it seems highly unlikely that he/she/it would notify you before doing it.

after* doing it. Though I agree with your general point

Note the parts in the email to the organization where OP (1) mentions they found underage students among the unsecured accounts and (2) attaches a script that dumps the database, ready to go¹. It takes very little to see in access logs that they accessed records that they weren't authorized to, which makes it hard to distinguish their actions from malicious ones

I do agree that if the org had done a cursory web search, they'd have found that everything OP did (besides dumping more than one record from the database) is standard practice and that responsible disclosure is an established practice that criminals obviously wouldn't use. That OP subsequently agrees to sign a removal agreement, besides the lack of any extortion, is a further sign of good faith which the org should have taken them up on

¹ though very inefficiently, but the data protection officer that they were in touch with (note: not a lawyer) wouldn't know that and the IT person that advises them might not feel the need to mention it


Definitely will be a fight against bad actors pulling bulk open source software projects, npm packages, etc and running this for their own 0 days.

I hope Anthropic can place alerts for their team to look for accounts with abnormal usage pre-emptively.


You want frontier models to actively prevent people from using them to do vulnerability research because you're worried bad people will do vulnerability research?

Not at all. I was suggesting if an account is performing source code level request scanning of "numerous" codebases - that it could be an account of interest. A sign of mis-use.

This is different than someones "npm audit" suggesting issues with packages in a build and updating to new revisions. Also different than iterating deeply on source code for a project (eg: nginx web server).


@chaseadam17 - What advice or lessons would you share for others looking to pursue a company which focuses on public good or nonprofit?

Well done, OP.


I believe the trend of population decline coupled with the wave of retirees when coupled with "AI" will produce a net benefit for everyone.

I believe humans and jobs will be able to accomplish more, with less people and have better margins - and thus be able to be paid much more.

I am an optimist that these trends together, when managed and harnessed well, can make us better paid, less stressed, and with more free time.


Every single other previous advance that could have done that has NOT produced the less stressed part - imagine taking an 1800s subsistence farmer and arming him with modern equipment and tooling; he'd be ecstatic.

The key is always internal, personal, once you right yourself, the world starts feeling much better.


I really enjoyed Zork. I am enjoying your creation and the ability for it to translate instructions into multiple steps makes it much more enjoyable than the original.


> it is possible to design a sw stack capable of making updates to traditionally burned-in components.

This is interesting - is the software stack essentially acting as "light" translation layer or abstraction layer on components?


I have been receiving a large number of spam emails in my "Important and Unread" areas which is anomalous. I was wondering exactly why and this helps. thanks!


@carderne I think el_pa_b has an idea on how to commercialize it.

In all seriousness, how is it not useful for gold mining or phracking?


I like it - I had been taking screenshots with Cmd-Shift-4. ha!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: