Feed aggregator

How Is Data Stored?

Hacker News - Tue, 02/10/2026 - 9:02pm
Categories: Hacker News

NetBSD 11.0 RC1

Hacker News - Tue, 02/10/2026 - 9:01pm
Categories: Hacker News

Show HN: Prompt Fatigue CC status line – Know when to stop prompting

Hacker News - Tue, 02/10/2026 - 8:58pm

Claude Code is fun, but at some point it becomes a slot machine.

At 10pm it's more hope and less intention, and the prompts become lazy.

This tool reads your cc history, uses simple heuristic to see if you are prompting or grunting. When your brain is fried just rest.

Comments URL: https://news.ycombinator.com/item?id=46969796

Points: 1

# Comments: 0

Categories: Hacker News

Thank You, AI

Hacker News - Tue, 02/10/2026 - 8:50pm
Categories: Hacker News

Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities

Cisco Security Advisories - Tue, 02/10/2026 - 8:42pm

Multiple Cisco products are affected by vulnerabilities in the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, which would result in an interruption of packet inspection.

For more information about these vulnerabilities, see the Details section of this advisory.

Cisco has released software updates that address these vulnerabilities. There are workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH

<br/>Security Impact Rating: Medium <br/>CVE: CVE-2026-20026,CVE-2026-20027
Categories: Cisco

Today's NYT Connections: Sports Edition Hints and Answers for Feb. 11, #506

CNET Feed - Tue, 02/10/2026 - 8:36pm
Here are hints and the answers for the NYT Connections: Sports Edition puzzle for Feb. 11, No. 506.
Categories: CNET

RAG and Data Boundaries in Multi-Tenant Systems

Hacker News - Tue, 02/10/2026 - 8:15pm

RAG works well in simple setups, but is it matter once you run in multi-tenant systems.

Many implementations retrieve broadly and rely on filtering later. From a security perspective, that can be uncomfortable. Once data is touched during retrieval, it’s hard to say the system never accessed something it shouldn’t have.

In practice, organizations often have layered access: parent-level policies, branch-level rules, roles, and documents that are only valid for certain periods. If that structure isn’t modeled explicitly, enforcing boundaries becomes inconsistent.

My approach that helped was treating access rules as a gate before retrieval. Only documents that already meet tenant scope, role visibility, and policy constraints are eligible for similarity search.

This reduces the risk of accidental exposure and avoids relying on prompts or model behavior as a security control.

The model becomes a consumer of already-approved context, rather than part of the enforcement path.

It’s less about stronger AI and more about clearer boundaries in the data model.

Interested in how others think about this trade-off in production.

— Arty

Comments URL: https://news.ycombinator.com/item?id=46969515

Points: 1

# Comments: 0

Categories: Hacker News

Pages