Hacker News
Four years of running a SaaS in a competitive market
Article URL: https://maxrozen.com/on-four-years-running-saas-competitive-market
Comments URL: https://news.ycombinator.com/item?id=43909986
Points: 1
# Comments: 0
Show HN: Free web "Form Builder" (TypeForm for free)
I just built and launched a free web form builder similar to TypeForm. Feel free to check it out, its Free to use, just need to sign up so that your forms can be organized. More advanced features coming soon.
Comments URL: https://news.ycombinator.com/item?id=43909961
Points: 1
# Comments: 0
Ask HN: Have you used Claude Code? Is it any good?
If you do use it, how does it fit into your workflow?
Comments URL: https://news.ycombinator.com/item?id=43909955
Points: 2
# Comments: 1
Always Think of the Hook First
Article URL: https://elijahpotter.dev/articles/always_think_of_the_hook_first
Comments URL: https://news.ycombinator.com/item?id=43909953
Points: 2
# Comments: 0
Trump's Third-Term Jokes Deserve a Serious Response
Article URL: https://www.nytimes.com/2025/05/06/opinion/trump-third-term.html
Comments URL: https://news.ycombinator.com/item?id=43909945
Points: 3
# Comments: 0
The Phishing Campaign Targeting Gmail Users from April 2025
In April 2025 a phishing campaign, targeting Gmail users has launched in a massive attack, making a malicious email look legitimate.
Foreseeing a probability of such circumstances to happen I filed a patent on an idea I had.
The issue that almost any website has is the ability to be proxied by a Man in The Middle. Means by that is that if I (Haim/Vital) now copy exactly a website, put it on my server and forward the same user actions from my site to the original site, then once the user is logged in, since it’s done via the hacker’s machine in the middle, then the attacker can keep using the victim’s session as technically it’s simply possible.
In my patent I do not let a MiTM attack a room to happen. How? Simply. Each request and response are treated like JWT! The only difference is that both parties both sign and validate the JWT. And the additional shared secret which is required by design is shared via a 3rd communication channel, via email. So that even if user’s credentials are stolen, the shared key still won’t let the attacker to fake a request.
Comments URL: https://news.ycombinator.com/item?id=43909942
Points: 1
# Comments: 0
A Critical Look at MCP
Article URL: https://raz.sh/blog/2025-05-02_a_critical_look_at_mcp
Comments URL: https://news.ycombinator.com/item?id=43909941
Points: 1
# Comments: 0
Invented or Discovered? P1
Article URL: https://natesesti.com/publicthinking/iodI
Comments URL: https://news.ycombinator.com/item?id=43909914
Points: 1
# Comments: 0
Are Heat Pumps a Commodity?
Article URL: https://www.heatpumped.org/p/are-heat-pumps-a-commodity
Comments URL: https://news.ycombinator.com/item?id=43909903
Points: 1
# Comments: 0
Analysis of the Russian information manipulation set Storm-1516 [pdf]
Article URL: https://www.sgdsn.gouv.fr/files/2025-05/20250507_TLP-CLEAR_NP_SGDSN_VIGINUM_Technical%20report_Storm-1516.pdf
Comments URL: https://news.ycombinator.com/item?id=43909898
Points: 1
# Comments: 0
Freddy the Robot Was the Fall Guy for British AI
Article URL: https://spectrum.ieee.org/freddy-robot-british-ai-winter
Comments URL: https://news.ycombinator.com/item?id=43909884
Points: 1
# Comments: 1
The Company Behind Signal Clone Mike Waltz Used Has Direct Access to User Chats
Article URL: https://www.wired.com/story/tm-signal-telemessage-plaintext-message-archive/
Comments URL: https://news.ycombinator.com/item?id=43909873
Points: 8
# Comments: 1
The Case for Building a Bigger Window of Tolerance
Article URL: https://sivsankr.substack.com/p/you-are-not-distracted
Comments URL: https://news.ycombinator.com/item?id=43909869
Points: 3
# Comments: 0
iVentoy tool injects malicious certificate and driver during Win install
Article URL: https://github.com/ventoy/PXE/issues/106
Comments URL: https://news.ycombinator.com/item?id=43909824
Points: 2
# Comments: 1
Lies, Damn Lies, & Statistics: Is Mem0 SOTA in Agent Memory?
Article URL: https://blog.getzep.com/lies-damn-lies-statistics-is-mem0-really-sota-in-agent-memory/
Comments URL: https://news.ycombinator.com/item?id=43909538
Points: 1
# Comments: 0
Sentry Acquires Emerge Tools (YC W21)
Article URL: https://www.emergetools.com/blog/posts/emerge-tools-is-joining-sentry
Comments URL: https://news.ycombinator.com/item?id=43909535
Points: 1
# Comments: 0
AI focused on brain regions recreates what you're looking at (2024)
Article URL: https://www.newscientist.com/article/2438107-mind-reading-ai-recreates-what-youre-looking-at-with-amazing-accuracy/
Comments URL: https://news.ycombinator.com/item?id=43909519
Points: 2
# Comments: 1
Show HN: GuessTen – Guess the Top Ten of Various Categories
The idea for this came from a game I would play in the car with friends to keep ourselves entertained on long road trips. Take a play and tell me what you think!
Comments URL: https://news.ycombinator.com/item?id=43909499
Points: 2
# Comments: 0
Building Local-First Flutter Apps with Riverpod, Drift, and PowerSync
Article URL: https://dinkomarinac.dev/building-local-first-flutter-apps-with-riverpod-drift-and-powersync
Comments URL: https://news.ycombinator.com/item?id=43909487
Points: 2
# Comments: 0
I fucking hate myself
Article URL: https://dannorris.me/i-fucking-hate-myself/
Comments URL: https://news.ycombinator.com/item?id=43909467
Points: 1
# Comments: 1