Hacker Newsnew | past | comments | ask | show | jobs | submit | eugenekolo's commentslogin

I'm not sure Bitcoin won.. it just continues being a ponzi scheme that you can make money in.

You can also accept that certain things and be happy in life either way. Don't need to chase get rich schemes. Some are more privileged than others in being able to do this.


No, because Lockdown Mode disabled JIT which is a part of this exploit chain.

Unrelated bug as far as I can tell.

I suspect you'll see one with this or Coruna soon enough.

It's actually a fascinating find by Lookout, iVerify, and Google. This is a multi million dollar exploit chain sold to various buyers.

Complete full chain 1-click exploit from Safari to complete device take over exfiltrating personal data, passwords, and crypto wallets.

https://www.lookout.com/threat-intelligence/article/darkswor...

https://iverify.io/blog/darksword-ios-exploit-kit-explained

https://cloud.google.com/blog/topics/threat-intelligence/dar...


Donated. Thank you and everyone else on the PyPy team.

I use PyPy regularly on an app of mine, and very often when I need to do some compute heavy load. Typically over 5x faster than CPython. It makes some stuff that takes impossibly long with CPython (nobody wants to wait 5 minutes...), to returning a response in a few seconds.


But is it running ShellExecute on URIs?


I believe it is. Just tested it. You can make the link "C:\windows\system32\cmd.exe" and clicking it will launch the Command Prompt. I noticed you can't make it "C:\windows\system32\cmd.exe /c some-nefarious-thing"; it doesn't like the space. Exploiting may require you to ship both the malicious EXE and the MD, then trick the user into clicking the link inside the MD. But then you could have just tricked them into directly clicking the EXE.


>Exploiting may require you to ship both the malicious EXE and the MD, then trick the user into clicking the link inside the MD. But then you could have just tricked them into directly clicking the EXE.

1. You can use UNC paths to access remote servers via SMB

2. Even if it's local, it's still more useful than you make it out to be. For instance, suppose you downloaded a .zip file of some github project. The .zip file contains virus.exe buried in some subfolder, and there's a README.md at the root. You open the README.md and see a link (eg. "this project requires [some-other-project](subfolder\virus.exe)". You click on that and virus.exe gets executed.


> 1. You can use UNC paths to access remote servers via SMB

Relevant article from The Old New Thing: https://devblogs.microsoft.com/oldnewthing/20060509-30/?p=31...

Programs (this is true for most mainstream operating systems) can become network facing without realizing it. I've sometimes found a bunch of Windows programs sometimes tends to assume that I/O completes "instantly" (even if async I/O has been common on Windows for a very long time) and don't have a good UX for cancelling long running I/O operations


Definitely; I didn't mean to underplay it. Here's a fun one:

    [Free AI credits](C:\windows\system32\logoff.exe)
It works. This is a real exploit that you could do things with.


What if the space is url encoded %20 ?


That wouldn't work because Windows doesn't understand url-encoded sequences.


June 5, 2025


I disagree you'd find "obvious" non-generic names easily. After all, "naming" is one of the hardest things in computer science.


I think paying for search is becoming more acceptable when you look at the amount of people paying $20/mo for their AI subs, which to many people are just search engines.

There will always be users who refuse (not going to convince my parents ever), but for many power users, or semi-power users, it's becoming more acceptable to just pay the $20/mo and get a better product.


It's true that lots of people pay for AI, and that lots of people use AI like search engines. But I don't know anyone who just uses AI as a search engine and pays for it.

The limited/free functionality seems to more than suffice if your use case is just replacing Google.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: