Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
vi
HomeCategoriesArcadeBookmarks
Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
Privacy|Terms

© 2026 Coding4Food. Written by devs, for devs.

All news
Dev LifeTechnology

Uploading Your ID to Read a Blog? The Data Mining Scam We All Hate

March 4, 20263 min read

Forced to upload your ID just to browse a site? HN devs are roasting the absolute state of online verification and data honeypots. Let's spill the tea.

Share this post:
hack, fraud, card, code, computer, credit, crime, cyber, data, hacker, identity, information, internet, password, phishing, pile, privacy, protection, safety, secure, spy, steal, technology, thief, fraud, fraud, fraud, fraud, fraud, hacker, hacker, phishing, phishing, phishing, phishing, thief
Nguồn gốc: https://coding4food.com/post/uploading-id-online-verification-data-mining. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/uploading-id-online-verification-data-mining. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/uploading-id-online-verification-data-miningNguồn gốc: https://coding4food.com/post/uploading-id-online-verification-data-mining. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/uploading-id-online-verification-data-mining. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/uploading-id-online-verification-data-mining
Nguồn gốc: https://coding4food.com/post/uploading-id-online-verification-data-mining. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/uploading-id-online-verification-data-mining. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/uploading-id-online-verification-data-miningNguồn gốc: https://coding4food.com/post/uploading-id-online-verification-data-mining. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/uploading-id-online-verification-data-mining. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/uploading-id-online-verification-data-mining
xác minh danh tính onlinebảo mật dữ liệurò rỉ thông tin cá nhândark patternhacker news
Share this post:

Bình luận

Related posts

financial, crisis, loss, business, trade, down, chart, decreasing, problem, man, stock, exchange, graph, stressful, fear, arrow, depression, economy, economic, global, market, stress, fall, failed, issue, loss, loss, loss, loss, loss, failed
AI & AutomationTechnology

Token Inflation Exposed: The Hidden Cost of Opus 4.6 vs 4.7

A new leaderboard exposes how much different AI models are silently eating your API tokens. A must-read survival guide for AI developers.

Apr 193 min read
Read more →
train, railway, station, train station, railway system, railroad, train tracks, cityscape, industrial, landscape, traffic, urban, power station, train, train, train, train, train, railway, train station, industrial, industrial
TechnologyDev Life

Japanese Railways: The Ultimate System Design Masterclass for Devs

A Hacker News deep dive into why Japanese railways are so OP. Learn crucial lessons in microservices, 99.999% SLAs, and business logic for software devs.

Apr 193 min read
Read more →
ball, binary, computer data, binary matrix, digital binary, binary code, binary system, byte, bits, digital computer code, computer code, computer data matrix, ball, binary, binary, binary, binary, binary, binary code, binary code, computer code
TechnologyDev Life

Wanna Build a Compiler? Toss the Dragon Book, Just Read These 2 Papers!

A 2008 Hacker News classic resurfaces: The hidden cheat code to writing a compiler without sacrificing your sanity to the 1000-page Dragon Book.

Apr 153 min read
Read more →
privacy policy, security, hacker, cyber, password, protection, computer, crime, technology, to back up, data, internet, protect, information, lock, malware, privacy policy, password, password, malware, malware, malware, malware, malware
IT DramaTechnology

Google's Privacy Promise Fails: ICE Has Your Data Now

When Big Tech promises privacy but hands your data to ICE. A deep dive into the latest Hacker News drama and why the 'cloud' is just a lie.

Apr 163 min read
Read more →
business, people, businessmen, office, window, suit, success, building, executives
Technology

Tim Cook Steps Down: 'Hardware Wizard' John Ternus to Claim Apple's Iron Throne!

April 2026 marks the end of an era. Tim Cook is stepping down as Apple CEO, handing the reins to John Ternus. What does this mean for devs and the future of Apple?

Apr 212 min read
Read more →
paper, a book, magazine, old, side, text, nostalgia, to forget, past, retro, transience, memory, magazine, magazine, magazine, magazine, magazine, to forget, to forget, to forget
Technology

Digging Up Fossils: The 1975 BYTE Magazine Archive and the Era Before StackOverflow

The 1975 BYTE Magazine archive is blowing up on Hacker News. Let's take a nostalgic trip back to when devs had to optimize every single kilobyte and solder their own hardware.

Apr 203 min read
Read more →

Handing over your government ID card or doing a facial scan for some random website just to read an article or create an account? Sounds like a bad joke, but tech overlords are trying to shove this down our throats right now.

What the hell is everyone malding about?

Cruising through Hacker News, I bumped into a massive thread of devs roasting the absolute state of online identity (KYC) and age verification. The OP simply dropped a title: "I'm reluctant to verify my identity or age for any online services," and it instantly farmed almost 900 points.

TL;DR: Everybody in the industry knows this isn't about "keeping the community safe" or genuine policy. It's a thinly veiled data-mining operation. In an era where massive data breaches are just a regular Tuesday and servers get nuked constantly, handing over your government ID to a sketchy third-party API feels like asking to get rekt.

The Hacker News Hivemind Speaks

Scrolling through the comments, a few distinct camps emerge:

The Boomer Devs: Back in the day, we didn’t even use our real names online. We used edgy aliases on forums. Now? They want your birthdate, phone number, and probably your firstborn. Even handing a phone number to Google feels gross, let alone a physical ID.

The Honeypot Victims: One dude shared a painful horror story. He naively submitted his entire life history to a background check service for a job. Turned out the service didn't verify squat; they just hoarded his inputs. Fast forward: they got breached, and his entire digital identity ended up in a massive data leak. Conclusion: Verification services are literally honeypots for hackers.

The Generational Divide: A senior dev watched a young adult browse the web and had an existential crisis. The kid just aggressively smashed "Accept Cookies" and handed out their email to every popup without blinking. We older folks protested when governments wanted to see library records. Now, the youth are conditioned to surrender data to dark patterns. Pro tip from a random wizard in the thread: Use Firefox Focus. Smash accept on everything, then nuke the session when you close the browser.

The "It depends" Crew: Sure, filing taxes or logging into your bank requires KYC. That makes sense. But here's the kicker: even government apps use third-party backend providers (like Persona) for biometric scans. You have literally zero choice in who gets to store your face.

The Takeaway for Code Monkeys

Look, let's be real here. We are the ones coding these intrusive forms. We are the ones hooking up tracking pixels so the marketing team can run ads and survive the loss of UUIDs. But when we take off our dev hats and become normal users, we see how absolutely unhinged this is.

The survival guide? First, stop believing in "military-grade bulletproof security." If it's pushed to a database, assume it will eventually become public data. Second, as developers, if your PM pushes for aggressive data harvesting or dark patterns, push back. Or at the very least, encrypt the damn database properly. Karma is real, my friends. Today you write a script to harvest user data, tomorrow your own passport is being sold on a Telegram channel.

Anyway, I'm gonna go purge my cookies and boot up my VPN. See ya!


Source: Hacker News