The “Bug Hunt” blog post pattern is the programming world’s equivalent of a detective story. It has a theme, a main plot, side plots, a protagonist (you), an antagonist (usually also you, having introduced the bug two weeks ago in the first place). It’s captivating, keeps readers in suspense, and ends with a satisfying plot twist, or a tactical cliffhanger. And the best part is…it’s even more fun to write than to read!
HackerNoon
Technology, Information and Internet
Edwards, Colorado 18,138 followers
How hackers start their afternoons. Where 25k+ technologists publish stories and expertise for 4M+ monthly readers.
About us
"The best hacker and developer publication on the internet" — real person on Twitter. Submit your tech stories to Hacker Noon: hackernoon.com/signup
- Website
-
https://hackernoon.com/
External link for HackerNoon
- Industry
- Technology, Information and Internet
- Company size
- 11-50 employees
- Headquarters
- Edwards, Colorado
- Type
- Privately Held
- Founded
- 2016
- Specialties
- tech media, tech publishing, community driven, independent media, professional tech publishing, tech podcast, technology podcast, tech, technology, technology media, technology publishing, hacking, hacker noon, tech life, blockchain publishing, blockchain, blockchain media, blockchain jobs, startup publishing, startup tech media, startup, media startup, publishing, and digital publishing
Products
Locations
-
Primary
Get directions
Edwards, Colorado 81632, US
Employees at HackerNoon
-
Chris Gale
Co-Founder of Gale Strategies
-
Justin Roberti
Writer, Producer, community builder, on-air host
-
Swati Gupta
Cybersecurity Evangelist | 5X Cybersecurity Awareness Champion | Writer at Medium & HackerNoon | Keynote Speaker | Simplifying technology for SMB…
-
David Jones
Founder @ Sonoma IT | Network-as-a-Service Solutions | Meter Partner
Updates
-
The Ethernaut Cashback challenge exploits flawed EIP-7702 delegation security. The contract's modifiers assume strict access controls, but have critical vulnerabilities: First exploit: Craft a contract with the Cashback address embedded in bytecode at the expected offset, bypassing the onlyDelegatedToCashback modifier. Jump over the address to execute normally. Call accrueCashback directly to gain max cashback for both currencies and one NFT. Second exploit: Use storage collision—delegate your EOA to a contract that writes to the same nonce slot, inject nonce = 9999, then re-delegate to Cashback and execute one final transaction to reach nonce 10,000 and mint a second NFT with your player address. Key lesson: Never store security-critical state in EOAs—delegation allows unrestricted storage manipulation across delegated contracts.Retry
-
Scientific algorithms ship as MATLAB code. To accurately port them to JavaScript, use Octave as a free validation oracle. Run the original MATLAB, compare to your JS output, and catch bugs before they ship. I used this to build SSIM and GMSD implementations that match MATLAB within 0.03% - 24x more accurate than existing libraries.
-
Can you kill an AI? Or, more precisely: when does the Delete button stop being a technical operation and become a moral dilemma? Behaviour ≠ Subjectivity. Sounding human does not make an AI a subject. L0–L4 framework. A tool for locating the line where an algorithm turns into a subject. We are at L2. ChatGPT and Claude are adaptive, but they do not have an “I”. The L3 dilemma. Crossing into self-reflexive systems will turn Delete from disk clean-up into a moral choice.
-
Meet the folks behind the HackerNoon Blogging Course: editors, writers, and technologists who’ve spent years helping stories get published and actually read. They’ve been in your shoes, staring at the blinking cursor, wondering if the draft is good enough. And they’re here to help. 👋 Say hi to the faculty https://lnkd.in/gQG8geH2
-
-
Poor data quality is a massive hidden cost that silently sabotages expensive AI projects and drains company resources. The "1-10-100 Rule" proves that proactive prevention is exponentially cheaper than fixing failures downstream. The solution requires a systematic approach, starting with a data audit and establishing continuous data governance, which ultimately transforms data from a liability into a high-ROI strategic asset.
-
Deepfake technology has its greatest impact on people through identity theft. It is no longer just fake videos on social media; even a few seconds of voice recording can create a convincing scam. The real challenge for consumers is not so much the deepfake itself, but the fatigue of trying to verify it.