Investigative journalist Pavla Holcová details how she and her colleague, Ján Kuciak, became targets of Slovak businessman Marian Kočner. Kočner, now imprisoned for ordering Kuciak's murder, also planned to have Holcová killed after her reporting exposed his fraudulent activities. Holcová learned of the plot after Kočner's arrest and the subsequent investigation revealed communication discussing her surveillance and intended assassination. This revelation came after years of harassment and intimidation she faced due to her investigations into Kočner. The article underscores the dangers investigative journalists face, particularly when exposing powerful figures involved in corruption.
Micah Lee's blog post investigates leaked data purportedly from a Ukrainian paramilitary group. He analyzes the authenticity of the leak, noting corroboration with open-source information and the inclusion of sensitive operational details that make a forgery less likely. Lee focuses on the technical aspects of the leak, examining the file metadata and directory structure, which suggests an internal compromise rather than a hack. He concludes that while definitive attribution is difficult, the leak appears genuine and offers a rare glimpse into the group's inner workings, including training materials, equipment lists, and personal information of members.
Hacker News users discussed the implications of easily accessible paramilitary manuals and the potential for misuse. Some commenters debated the actual usefulness of such manuals, arguing that real-world training and experience are far more valuable than theoretical knowledge gleaned from a PDF. Others expressed concern about the ease with which extremist groups could access these resources and potentially use them for nefarious purposes. The ethical implications of hosting such information were also raised, with some suggesting that platforms have a responsibility to prevent the spread of potentially harmful content, while others argued for the importance of open access to information. A few users highlighted the historical precedent of similar manuals being distributed, pointing out that they've been available for decades, predating the internet.
Sweden is investigating a newly discovered break in a fiber optic cable in its territorial waters of the Baltic Sea, marking the fourth such incident in the region since October. While the damaged cable primarily served domestic internet traffic for the island of Gotland, authorities are treating the incident seriously given the recent spate of unexplained cable cuts, including those affecting international data and power transmission. The Swedish Security Service is leading the investigation and has not yet determined a cause or identified any suspects, though sabotage is a suspected possibility given the geopolitical context and previous incidents. The damage has not significantly disrupted internet access for Gotland residents.
Hacker News commenters discuss the likelihood of this cable break being another act of sabotage, similar to the Nord Stream pipelines. Several express skepticism of the official explanation of a fishing trawler causing the damage, citing the cable's depth and robust construction. Some speculate about Russian involvement given the geopolitical context, while others suggest the possibility of other state actors or even non-state actors being responsible. The lack of clear evidence and the ongoing investigation are highlighted, with several commenters calling for more transparency and a thorough inquiry before drawing conclusions. A few users also discuss the vulnerability of undersea infrastructure and the potential implications for communication and energy security.
A UK watchdog is investigating Apple's compliance with its own App Tracking Transparency (ATT) framework, questioning why Apple's first-party apps seem exempt from the same stringent data collection rules imposed on third-party developers. The Competition and Markets Authority (CMA) is particularly scrutinizing how Apple gathers and uses user data within its own apps, given that it doesn't require user permission via the ATT pop-up prompts like third-party apps must. The probe aims to determine if this apparent double standard gives Apple an unfair competitive advantage in the advertising and app markets, potentially breaching competition law.
HN commenters largely agree that Apple's behavior is hypocritical, applying stricter tracking rules to third-party apps while seemingly exempting its own. Some suggest this is classic regulatory capture, where Apple leverages its gatekeeper status to stifle competition. Others point out the difficulty of proving Apple's data collection is for personalized ads, as Apple claims it's for "personalized experiences." A few commenters argue Apple's first-party data usage is less problematic because the data isn't shared externally, while others counter that the distinction is irrelevant from a privacy perspective. The lack of transparency around Apple's data collection practices fuels suspicion. A common sentiment is that Apple's privacy stance is more about marketing than genuine user protection. Some users also highlight the inherent conflict of interest in Apple acting as both platform owner and app developer.
Summary of Comments ( 102 )
https://news.ycombinator.com/item?id=43293487
Hacker News commenters discuss the chilling implications of a journalist being targeted by a powerful criminal. Several express skepticism about the lack of mainstream media coverage, questioning why such a significant story hasn't garnered wider attention. Some speculate about the reasons, suggesting potential political pressure or editorial choices. Others focus on the practicalities of witness protection and the difficulties of maintaining anonymity in the digital age. A few commenters express sympathy and concern for the targeted journalist and colleague, highlighting the dangers inherent in investigative journalism. The overall sentiment reflects a mixture of disbelief, concern, and a desire for more information about the case.
The Hacker News post titled "Europe's most wanted man plotted my murder and that of my colleague" links to an article detailing the experiences of a journalist and researcher targeted by a criminal organization. The comments section on Hacker News contains several threads discussing various aspects of the situation.
A significant number of comments focus on the apparent lack of police action or protection offered to the journalist and researcher. Many express disbelief and outrage that despite credible threats and the known dangerous nature of the individual involved, the authorities seemingly provided minimal support. Some commenters speculate on the reasons for this inaction, suggesting possibilities such as bureaucratic inefficiency, lack of resources, or even potential corruption. Others share similar stories of perceived police inaction in other situations, highlighting a perceived systemic issue.
Another prominent thread discusses the implications of such threats for journalistic freedom and the safety of journalists investigating organized crime. Commenters express concern about the chilling effect such incidents can have on investigative journalism, particularly in sensitive areas like organized crime and corruption. Some suggest the need for stronger protections for journalists and whistleblowers facing such threats.
Several commenters delve into the specifics of the case, analyzing the details provided in the linked article and speculating on the motivations behind the alleged murder plot. Some question the veracity of certain claims made in the article, while others offer alternative interpretations of the events.
There's also discussion about the nature of organized crime and its reach, with some commenters sharing their own experiences or knowledge of similar organizations. This leads to a broader conversation about the challenges of combating such groups and the need for international cooperation.
Finally, some comments offer practical advice to the journalist and researcher, suggesting ways to improve their personal security and protect themselves from future threats. These suggestions range from basic security measures to more advanced strategies, reflecting a genuine concern for their safety.
Several comments express skepticism about the journalist's claims, suggesting they might be exaggerated or even fabricated for attention. However, these comments are generally downvoted and met with counter-arguments from other users who point to the seriousness of the situation and the credibility of the sources involved.
Overall, the comments section reflects a mix of shock, outrage, concern, and skepticism regarding the situation described in the article. The most compelling comments highlight the vulnerability of journalists investigating organized crime, the apparent failings of law enforcement in providing adequate protection, and the broader implications for freedom of the press.