zlacker

Hack Club: A story in three acts (a.k.a., the shit sandwich)

submitted by alexkr+(OP) on 2025-11-13 11:31:23 | 277 points 93 comments
[view article] [source] [links] [go to bottom]
replies(26): >>3roden+P7 >>1a527d+X7 >>tomala+59 >>prodig+K9 >>jstumm+S9 >>blende+Sb >>Benjam+Vb >>ForHac+me >>aborin+Pe >>Philip+ph >>Agreed+Wh >>1317+Sr >>josefr+nt >>josefr+Ju >>tinfoi+av >>korse+KC >>linsom+DD >>Cactus+EM >>reeser+3T >>sadesh+tV >>patcon+BV >>GuB-42+881 >>ilovew+1q3 >>luna11+sM5 >>casq+EOb >>zachla+3Rf
1. 3roden+P7[view] [source] 2025-11-13 12:33:26
>>alexkr+(OP)
Sounds like Hack Club is doing a great job at preparing teenagers for the real world: nobody cares about the things you care about as much as you do. The most important skill to learn for the real world is to pick your battles. Using ChatGPT for legal advice is dumb, but it’s not your battle to fight.
replies(1): >>edent+o8
2. 1a527d+X7[view] [source] 2025-11-13 12:34:29
>>alexkr+(OP)
Not sure if it is just me, but the background animation absolutely kill my browser (Chrome) and scrolling is _super_ laggy.
replies(9): >>GaryBl+u8 >>Philip+G8 >>NSPG91+T8 >>udev40+U8 >>aavshr+k9 >>embedd+Za >>Elfene+Kb >>mid-ki+tr >>johnis+xr
◧◩
3. edent+o8[view] [source] [discussion] 2025-11-13 12:38:23
>>3roden+P7
It absolutely is their battle to fight. This organisation appears to be exploiting them and their data.
replies(1): >>Chabsf+j9
◧◩
4. GaryBl+u8[view] [source] [discussion] 2025-11-13 12:38:57
>>1a527d+X7
I'm using a high-end ThinkPad for CAD and it's slowing down the page for me too.
◧◩
5. Philip+G8[view] [source] [discussion] 2025-11-13 12:40:08
>>1a527d+X7
FWIW it's smooth on my $150 android shitbox.
◧◩
6. NSPG91+T8[view] [source] [discussion] 2025-11-13 12:42:32
>>1a527d+X7
the animation is so useless and doesnt add anything to the actual post
◧◩
7. udev40+U8[view] [source] [discussion] 2025-11-13 12:42:49
>>1a527d+X7
I would highly suggest to block JS while you're only browsing. It loads fast, most trackers won't load and better security as most browser exploits leverage JS all the time
replies(1): >>a02231+6t
8. tomala+59[view] [source] 2025-11-13 12:44:16
>>alexkr+(OP)
Companies should quickly realize that ChatGPT can go both ways - it can turn a "script-kiddie" into fully fledged hacker if vulnerabilities continue to be this sloppy. I am fairly certain that low-skill hacker sweatshops already heavily rely on LLMs to quickly exploit trivial vulnerabilities like these.

Like it or not but I feel like account logins, PII and payment stuff will have to be handled by central big orgs. Ideally, I would like that to be a competent open-source government service. For now it is big companies like Google that can shove its SSO around in accessible manner to other sites.

◧◩◪
9. Chabsf+j9[view] [source] [discussion] 2025-11-13 12:45:24
>>edent+o8
Agreed.

DEATH handing out swords to kids as Santa in the Hogfather is a funny joke, not an example to follow.

◧◩
10. aavshr+k9[view] [source] [discussion] 2025-11-13 12:45:45
>>1a527d+X7
yes, had to use reader mode.
11. prodig+K9[view] [source] 2025-11-13 12:48:08
>>alexkr+(OP)
I'm usually the type to be annoyed at hn people who nitpick about articles but.. this is unreadable.
replies(1): >>blende+ee
12. jstumm+S9[view] [source] 2025-11-13 12:48:53
>>alexkr+(OP)
> so in july 2025, i discovered that neighbourhood was exposing thousands of users' full legal names through an unprotected API endpoint. literally anyone with a slack ID could access this data. no authentication, no nothing. just a URL parameter and boom, there's your real name.

> i sent formal breach notifications to security@hackclub.com and gdpr@hackclub.com on july 9th. radio silence. nothing. not even an automated "we've received your email" response.

> when i tried talking to HQ staff informally, the responses were... well, shocking doesn't quite cover it. the first intern told me that since hack club is US-based, they're "not held to GDPR," that if fined "nothing compels us to pay it," and that EU people "void your EU protections" by coming to the US.

What? How did we get from (allegedly) informing them about a security vulnerability to them responding "nothing compels us to pay it"? It feel like the author is not being quite as candid in their account of the events as one would hope.

replies(2): >>contra+nc >>xx_ns+wz
◧◩
13. embedd+Za[view] [source] [discussion] 2025-11-13 12:55:06
>>1a527d+X7
I have a RTX Pro 6000 as my main GPU currently, and this website pins it to ~40% utilization! Never seen a website do that before, some sort of kudos to the webmaster is deserved.

It still renders smoothly though and doesn't go above 40C so I guess it could have been worse.

replies(1): >>pohuin+De
◧◩
14. Elfene+Kb[view] [source] [discussion] 2025-11-13 13:00:29
>>1a527d+X7
I had no performance problems on my Thinkpad T410.

Oh wait, it's because it is too old to have WebGL support so the background crashed and thus consumed no processing power.

15. blende+Sb[view] [source] 2025-11-13 13:01:00
>>alexkr+(OP)
Wow! Just wow! Just as I think the situation cannot get any worse, the OP reveals even worse things going on. I know the UX of this blog and the lack of capitalization is going to turn many people off! But I urge you to power through and read the whole OP anyway.

Use reader mode, block Javascript or whatever it takes. Give the author a break. They're a teenager. What kind of websites were you making as a teenager? I'm sure one of those dark background websites with MARQUEEs and BLINKs with glaring contrast colors! So give them a break. Behind the annoying UX is an article about serious and appalling privacy and security issues.

Like read this:

> i raised this with chris, who's a full-time staff member (not a teenager), and he insisted that exposing physical addresses and sensitive info was "just a vuln" not a breach. said he's "never heard the term 'data breach' used that way" and... also relied on chatgpt instead of actual legal advice.

Actually this Chris guy has a point. I don't call it breach either. It's PII data exposure but it is a serious exposure. So I don't 100% agree with the OP but the cavalier attitude towards security coming from the staff of a legitimate organization is appalling.

It's just mind boggling that an organization handling PII data has such appalling privacy and security lapses and they still remain arrogantly indignant about it making bold claims about laws they don't understand, why, because ChatGPT told them so? Cherry on top is they are employing teenagers to answer legal questions! Not kidding! Just read the OP! Unbelievable!

replies(2): >>hrimfa+1D >>SigmaE+f12
16. Benjam+Vb[view] [source] 2025-11-13 13:01:07
>>alexkr+(OP)
If they're ignoring GDPR because they're in the US, you can potentially flag these as COPPA violations. COPPA is serious stuff. Courts can fine over $50k for each violation, where each individual impacted can be considered a unique violation. COPPA applies to under 13s, I'm not sure if there are age restrictions in place to join Hack Club, but if there isn't even a privacy policy, I doubt age restrictions are properly enforced.
replies(1): >>lefrog+nf
◧◩
17. contra+nc[view] [source] [discussion] 2025-11-13 13:04:11
>>jstumm+S9
It sounds like the author started off by telling them they're doing illegal stuff. It's unclear if it's actually illegal or not.. but they naturally got the other side defensive and tried to avoid the author

If instead they framed it in terms of "hey you guys are sharing stuff you probably didn't mean to" then the reaction would have likely been different

◧◩
18. blende+ee[view] [source] [discussion] 2025-11-13 13:15:53
>>prodig+K9
It's an article by a teenager. We weren't making any great websites as teenagers either. I remember websites with glaring contrast and moving marquees and blinks everywhere. At least the author here writes full words without abbreviating every word. So the author is already writing better than what I wrote as a teenager.

May I suggest you use reader mode to remove the annoying flashing background? If you can get past the annoying UX of the article, it has interesting stories about serious issues.

19. ForHac+me[view] [source] 2025-11-13 13:17:35
>>alexkr+(OP)
> i discovered that neighbourhood was exposing thousands of users' full legal names through an unprotected API endpoint.

Headline really buries the lede: this is the issue, not some missing ToS boilerplate.

The map is not the territory, the security policy is not the security.

replies(1): >>Benjam+6f
◧◩◪
20. pohuin+De[view] [source] [discussion] 2025-11-13 13:18:53
>>embedd+Za
40% might just mean nothing because your core is probably not running at full clock.
replies(1): >>embedd+gf
21. aborin+Pe[view] [source] 2025-11-13 13:20:30
>>alexkr+(OP)
Who cares? I mean, obviously this author, but pointing out "GDPR this" and "GDPR that" isn't going to make a difference or move the needle. Many companies have given up on GDPR - I've made requests and had blanket refusals to provide data.

Report them, you say? Many DPC's such as the Irish DPC are very friendly in terms of their lax approach to the regulation, just ask Max Schrems, he's been at this for years. I think the EU and the regulators do not have resources to enforce the law, so whilst there are requirements to protect customer data, nothing bad happens if you don't. Just check the top of HN as I write this [1] "Checkout.com hacked, refuses ransom payment, donates to security labs". Will anyone be arrested, charged, fined, or otherwise penalized? Nope, not a chance. I 100% guarantee absolutely nothing will happen as a result of this article. GPT makes it so easy to capture user data these days and people will just willingly hand it over.

The truth is, you should be very careful what data you hand out, always. Use an alias, use privacy tools, always be weary and check if they have a privacy policy, check to see if it works (make a dummy account, do GDPR request, if no reply, be weary).

If they are not serious about privacy, stop, think and act accordingly. While it is a disgrace what these individuals have done, individuals need to take personal responsibility just as in a real world, would you trust a random stranger giving you pills? Hopefully not!

[1]: >>45912698

◧◩
22. Benjam+6f[view] [source] [discussion] 2025-11-13 13:22:32
>>ForHac+me
I'm not going to pretend this is an easy read. So I wouldn't blame you if you stopped early. However, there's a section titled "the surveillance infrastructure (orpheus engine)" which claims that children's private information is being distributed to third-parties without consent.
replies(1): >>VEBee+cw2
◧◩◪◨
23. embedd+gf[view] [source] [discussion] 2025-11-13 13:24:06
>>pohuin+De
With that website open, runs at 2850 MHz to be specific, it normally idles at 400-500 MHz with ~20 processes (firefox, gnome-shell, alacritty, etc, etc) using the GPU
◧◩
24. lefrog+nf[view] [source] [discussion] 2025-11-13 13:24:38
>>Benjam+Vb
Hack Club realized this, and now doesn’t allow anyone under the age of 13 to participate in its programs (COPPA doesn’t apply to people over 13).
replies(1): >>Diaphr+s83
25. Philip+ph[view] [source] 2025-11-13 13:36:47
>>alexkr+(OP)
No idea why this was flagged. This is a really good article in terms of both form and content and I was very surprised to learn that the author is actually also a teenager.

I get it, some people dislike the appearance but c'mon, this is HN. If we can use vi(1) on a 80 column terminal, reading an html page is not an impossible task.

26. Agreed+Wh[view] [source] 2025-11-13 13:40:14
>>alexkr+(OP)
As someone who is part of the Hack Club community, I would urge caution before blindly trusting this account.

- This person has also used their access to attempt to extort the admins and their Airtable data, demanding a bounty payment for access they were previously given. - In her arguments about the program leads earning higher bounties, they had said that they both did bounties for Coinbase and Google, neither of which being non-profits - Many of her arguments are flawed in other ways.

Theo (yes the ffmpeg guy) also commented on it in a livestream, and I would just point to that:

> This feels really in the weeds of something we are not supposed to see externally. It is a lot of writing for what seems like clueless people doing backend

replies(4): >>linsom+WD >>immibi+hK >>rlmine+jj2 >>Diaphr+g93
◧◩
27. mid-ki+tr[view] [source] [discussion] 2025-11-13 14:36:16
>>1a527d+X7
The worst part to me is the lack of a scroll bar. Had to dust off the pgup/pgdown keys to check my progress in the article.
◧◩
28. johnis+xr[view] [source] [discussion] 2025-11-13 14:37:08
>>1a527d+X7
>13 years old hardware, Linux, Chromium-based browser, seems fine to me.
29. 1317+Sr[view] [source] 2025-11-13 14:38:43
>>alexkr+(OP)
Also see https://web.archive.org/web/20250920074405/https://ella.ad/p...
◧◩◪
30. a02231+6t[view] [source] [discussion] 2025-11-13 14:44:52
>>udev40+U8
Exactly this. I was surprised to see these comments and then I realized that NoScript blocked the JS (as it should have). The web is so much nicer without JS.
31. josefr+nt[view] [source] 2025-11-13 14:45:59
>>alexkr+(OP)
Data privacy should not be optional.
32. josefr+Ju[view] [source] 2025-11-13 14:52:40
>>alexkr+(OP)
Asking AI to give free legal advice is a special kind of stupid.
replies(1): >>SigmaE+mH1
33. tinfoi+av[view] [source] 2025-11-13 14:55:00
>>alexkr+(OP)
I participated in a few hackathons early in my career. I quickly realized that I wasn't benefitting at all from participating in them. In fact, they were a great way to fall behind in the work I actually needed to get done. Those organizing the hackathons on the other hand...

I'm not at all surprised that people are trying to program young teenage minds to think hackathons are a good pathway to advancing one's tech skills / career. Nor am I surprised to hear all of the sketchy behavior surrounding this organization and their leadership. It all fits very nicely together.

replies(1): >>ecshaf+iE
◧◩
34. xx_ns+wz[view] [source] [discussion] 2025-11-13 15:16:54
>>jstumm+S9
Their other blog post[1] shares some more information which seems like it's relevant.

From the post:

> then i found this one:

> https://juice.hackclub.com/api/get-roommate-data?email=dont@...

> yep. no auth. just an email parameter. and what did it return?

> full names. emails. phone numbers. flight receipts. all just by passing an email address in a URL.

> i reported it through their security bounty program, made a bug fix pr (because apparently that's how you get things done around here), and maybe made the slight mistake of sharing the vulnerable endpoint in that group chat - which less than 10 people saw, for what that's worth.

The author then proceeds:

> their security bounty program states minimum payouts for this kind of thing start around $150. but exposing passport numbers (which are classed as government documents) should bump it up significantly. apparently "responsible disclosure" means "don't tell anyone, even in a private chat" so they docked the entire payout.

I'm not sure why they're being seemingly sarcastic about responsible disclosure. Yes, responsible disclosure absolutely means that you disclose this to the vendor before disclosing it to anyone else. As someone who works as a penetration tester and security researcher (both at work and in my free time), in my opinion, there should be no confusion about what responsible disclosure is. You disclosing the vulnerability in public before the vendor has had the chance to fix or apparently even triage it is not "responsible disclosure" or a "slight mistake".

[1] - https://kys.llc/blog/oops-leaked-your-passport

35. korse+KC[view] [source] 2025-11-13 15:31:58
>>alexkr+(OP)
I don't understand the UX complaints? I thought we needed to re-wild the web and do more weird shit when we feel like it?
◧◩
36. hrimfa+1D[view] [source] [discussion] 2025-11-13 15:33:09
>>blende+Sb
> Actually this Chris guy has a point. I don't call it breach either. It's PII data exposure but it is a serious exposure.

At least California defines it as

> unencrypted personal information, as defined, was acquired, or reasonably believed to have been acquired, by an unauthorized person.

https://oag.ca.gov/privacy/databreach/reporting

replies(1): >>bo1024+qu1
37. linsom+DD[view] [source] 2025-11-13 15:35:53
>>alexkr+(OP)
My child has been involved in Hack Club for a number of years, and I support their mission. However, HC do seem to be lacking in "adult supervision", and I understand that is kind of their approach: having the kids figure stuff out on their own. However, there are things that kids, due to lack of experience, just can't figure out for themselves. For example, the reliance on ChatGPT and reluctance to use professional SMEs is a very "immature" attitude.

This sort of cavalier attitude is going to get them in trouble; I'm honestly surprised that this hasn't already gotten them into trouble. Hack Club has enough money that they can easily be a worthwhile target if any of their decisions turns out badly.

I'm going to be a bit oblique here because I don't want HC to take this out on my child, but at one of the HC events, the "figure it out for yourselves" lead to our child making decisions and taking actions that could have very easily turned into life threatening. Another situation led to our child being "ditched" in a foreign city and unsure how to get ahold of anyone on the ground to help.

Hack Club is a great idea, and I'm glad it exists, but I do think that the way it is currently organized is going to end badly.

replies(2): >>embedd+lU1 >>SigmaE+U32
◧◩
38. linsom+WD[view] [source] [discussion] 2025-11-13 15:37:20
>>Agreed+Wh
>As someone who is part of the Hack Club community, I would urge caution before blindly trusting this account.

As the parent of a Hack Clubber, a lot of what is said here rings true to our experience with the Hack Club leadership.

◧◩
39. ecshaf+iE[view] [source] [discussion] 2025-11-13 15:39:10
>>tinfoi+av
Hackathons can be fun. And I think that people should try and do one or two when they are in college (ideally run by a university, not a shady 3rd party). The microsoft puzzle challenge (idk if that still exists) is also great. These are fun, give you a bit of networking, probably wont get you a job. Your university work gets you a job.
◧◩
40. immibi+hK[view] [source] [discussion] 2025-11-13 16:03:40
>>Agreed+Wh
They created a new website just for this topic, and named it "kill yourself LLC". Not something you'd do if you wanted to be taken seriously, just IMO. Smells more like a KiwiFarms user.

However there's still no excuse for these problems if they are describing it correctly. When you're storing the home address of thousands of users, (1) you shouldn't do that at all for this type of organisation and (2) you should be very careful to protect it and (3) the first several times it gets stolen, you should think harder about whether your protection is working and there should never be a several+1th time.

replies(1): >>rlmine+uj2
41. Cactus+EM[view] [source] 2025-11-13 16:15:25
>>alexkr+(OP)
I expected this to happen. I knew people who were involved in the organization who were unnecessarily chummy to TPOT/Postrat/FTX culture before it blew up.
42. reeser+3T[view] [source] 2025-11-13 16:45:07
>>alexkr+(OP)
As a union organizer with Hack Club staff, this is only the surface - the things that are clear to the end consumer. It gets a whole lot worse on the inside; from payment below minimum wage, mandatory overtime beyond child labor law, hiring kids as contractors to deny them rights, union busting & retaliation and a blatant disrespect for members and community democracy despite pretending to be `teen-led.` I'm not going to re-hash the whole thing here, I've written an article on my blog, but Hack Club is a deeply misleading "charity" that suckers teens in trying to build a better world and funnels them towards supporting our ever-rapid decline into techno-fascism at the hands of the wealthy elite funding them.
replies(2): >>Charmu+811 >>Agreed+571
43. sadesh+tV[view] [source] 2025-11-13 16:57:00
>>alexkr+(OP)
For all of you discussing the chatgpt, this was after borderline harassing an intern who quoted ChatGPT as a joke in her DMs. There was no legal advice. There used to be a previous version with receipts and screenshots if I remember correctly, with very, very extensive discussions within Hack Club (to the order of thousands of messages of critical discussion).

Please take what's said here with a grain of salt. This is the same person who attempted to extort Hack Club out of thousands by using an airtable token they previously had (all tokens have since been examined as to whether they are truly necessary).

> another asked: "if you found a security vulnerability within hackclub, severe or major, given how they have currently handled reports so far, would YOU report it and go through the same process and payouts that previous people have experienced?"

> the answer from most people was a resounding no.

Popular request is for the program to be expanded. I don't know about the "resounding no".

> teenagers are positioned as "independent contractors" to avoid employment protections, holiday pay, and wage floors. this isn't "scrappy nonprofit" energy - it's child exploitation dressed up as opportunity.

It isn't a full-time job.

> email compliance failures

Recently, email sending has been revamped, and there are tools to subscribe to individual mailing lists.

Criticism isn't ever censored - there's anonymous reporting, a public forum channel for feedback (which only has temporary threadlocks upon very inflammatory or irrelevant discussion), and you can discuss it anywhere else within the Slack.

I could keep going, but the raw truth is that this misses a lot of context for independent observers.

replies(1): >>VEBee+Bt5
44. patcon+BV[view] [source] 2025-11-13 16:57:34
>>alexkr+(OP)
As someone who has co-founded and co-organized a leaderful non-hierarchical community that has lasted 10 years of weekly hacknights (we've literally never missed a week) and many generations of stewards... I've done reflection on the value of messiness/disorder and "aggressively relaxed" constraints. I sometimes tongue-in-cheek describe myself as having some meagre expertise in "operationalising anarchy", which is only half a joke :)

I suspect the things this author is critiquing and the internal resistance to it is DIRECTLY related to the wonderful things this org can do and how it operates.

I'm of the belief that you can't truly love a thing without loving its mother. This applies to orgs as it does all creatures undergoing evolutionary processes. If you do straddle this belief tension, you perhaps love something other than the thing you thought you loved. And this other thing you love will eventually take shape under your care and watch. Which is nice, that "what we put our attention on grows".[1]

So obviously, you are permitted to love a thing and take issue with its incubating process/culture, but I would suggest you're the site of contradiction that has some explaining to do. If you win and change the process of the thing you love, the thing you love is on a new path toward being something else. And maybe that's fine. A new seed will grow in the empty space. People probably need to have a thing to love that looks like the thing you loved. It will be back.

But there's some other healthy dissonance here that the author isn't grasping. I would say this to them: You are the bringer of the end of what you love, not its saviour. It's all good -- these transitions happen, and in a more zen sense, it can come to pass without [my] judgement. But just please understand your role. You're not a hero, you're a death. Maybe a healthy one, but a death all the same. The thing you love perhaps won't survive your care.

To be clear, I have very mixed feelings. The critiques are valid, but I wish I could acknowledge them without compulsion to demand an action. I think orgs that work like this need to stay small, only scale horizontally (inspiring/supporting other sister orgs to grow), and resist any central/vertical scaling that brings you under the rules and norms that they are desperately trying to steer clear of, but are now accountable to (according to our shared societal values).

[1]: http://adriennemareebrown.net/2012/08/09/giftingmyattention/

replies(1): >>SigmaE+FH2
◧◩
45. Charmu+811[view] [source] [discussion] 2025-11-13 17:18:54
>>reeser+3T
This user was banned from Hack Club for attempting to stage an "uprising" against the org, and has also engaged in tactics like Wikipedia vandalism. I would not take their word for being "a union organizer with Hack Club staff", although their blog does make several good points (https://place.reeseric.ci/writings/2024-05-05/)
◧◩
46. Agreed+571[view] [source] [discussion] 2025-11-13 17:43:42
>>reeser+3T
More transparency on the background of this poster: https://hackmd.io/@alexjs/Bkm1KIpxR
47. GuB-42+881[view] [source] 2025-11-13 17:48:34
>>alexkr+(OP)
> Hack Club has been handling children's data for 4 years without a privacy policy

The title doesn't make is sound bad.

I mean, besides lawyers, who cares if some legal document is missing. You can respect privacy without a privacy policy, plenty of people do.

Here, it seems the actual problem is that there is no adult in the room, literally. Just kids that are completely clueless about how to care about personal data. Here, "no privacy policy" doesn't just mean "we dislike paperwork", it means "we are letting kids play with personal data without adult supervision".

◧◩◪
48. bo1024+qu1[view] [source] [discussion] 2025-11-13 19:28:00
>>hrimfa+1D
So I guess if you authorize the entire world to read the data, it’s not a breach.
replies(1): >>SigmaE+E42
◧◩
49. SigmaE+mH1[view] [source] [discussion] 2025-11-13 20:37:22
>>josefr+Ju
It would have been stupid if that's what actually happened :)

I am the Chris cited in the piece. We have actual legal counsel that we go to for legal advice! However, that's not what was being sought here. In this conversation, the question on the table was "What is a data breach?" according to common convention (setting aside the more technical question of what it means specifically in the context of GDPR). The author contended that a single address record—her own record, IIRC—retrieved as a test of an unsecured endpoint counts as a data breach, and therefore that we are legally obligated under GDPR to email all 5,000 participants about it. My contention was/is that a data breach implies exfiltration of a meaningful amount of data. This was a vulnerability, which we patched within about a day, but we had no reason to believe there was a breach by any definition. I pointed to a few sources to demonstrate the consensus definition of "data breach", and one of them was Gemini (or "Omniscient Robot God", as I called it in the conversation).

There are real issues touched on in this post, but the author is not a reliable narrator and they are flattening a very complex issue into a narrative that centers themself as the hero. In reality, this user was banned from our community for a long string of conduct violations, culminating in repeated incidents of saying horribly abusive things to other teenagers. They have been pursuing a grudge against the organization ever since.

◧◩
50. embedd+lU1[view] [source] [discussion] 2025-11-13 21:43:24
>>linsom+DD
> the "figure it out for yourselves" lead to our child making decisions and taking actions that could have very easily turned into life threatening

I haven't heard about Hack Club until this very story, so forgive my ignorance, but what exactly happened here? According to their website, it seems to be about a community for teenage programmers, who build open source projects together, sometimes during events. Looking around at the types of events they host, nothing really looks life threatening at all? I'm not doubting your experience, just curious how a bunch of programmers could end up in a life threatening situation during those sort of events.

replies(1): >>Charmu+Dq2
◧◩
51. SigmaE+f12[view] [source] [discussion] 2025-11-13 22:20:37
>>blende+Sb
Hello, Chris here!

Nobody—certainly not any adult staff—at Hack Club relied on ChatGPT for legal advice. Nor do we employ teenagers to answer legal questions, we have actual legal counsel for that! Or in my personal case I ask my wife, who is a law professor, and then she asks ChatGPT (just kidding).

There is too much nonsense in this post to rebut line by line, and these conversations have all been had to death within Hack Club (we put a lot of time into transparently and publicly discussing our programs, problems, and decisions). Here's the short version of this saga:

- The author found a serious vuln in one of our programs introduced by a junior engineer

- We take vulns seriously—especially the serious ones! It was fixed immediately by a senior engineer upon report (within a day?)

- The author insisted that their test of the vuln to access their own address was a data breach, therefore obligating us to notify all 5,000 participants of this "breach" as per GDPR

- We judged this to be Prima Facie incorrect. A lawyer has since confirmed this judgment.

- It is, in fact, bad practice to notify users for every vulnerability. If this were the norm, you would inundated with notices from practically every software product you interact with. Almost all of these notices would be virtually non-actionable by the user, and they would wash out the few notices of breaches which are actionable. There is a good reason why the GDPR does not demand notice for vulns; mass notices are reserved for incidents where there is a known exfiltration of a meaningful amount of user data!

- The author was ultimately banned from the community not for their opinions on this matter, but because of a long streak of unrelated conduct issues that culminated in a spree of saying horribly abusive things to multiple other members of the community.

— They have been pursuing a grudge against the organization ever since. They are not a reliable narrator, this post is a fantasy version of events that casts them as a martyred hero.

Hack Club is an oddly-shaped organization with operations that often raise very real security concerns, but these are wrapped up in a complex web of tradeoffs that are very much still evolving as we refine and expand our core infrastructure. We are not Google, and it is a mistake to import reasoning from that kind of environment when analyzing our security/threat model. Nonetheless, privacy/security is something we think about and invest extensively in. In the past year we have started an organization-wide bounty system, moved all PII storage into a central "identity vault", and consulted extensively with a very fancy lawyer who specializes in corporate compliance with the growing raft of online privacy laws around the world. The good news is, according to that lawyer we already do almost everything we need to be compliant; we just need to publish a privacy policy! We are actively iterating on a mostly-finished draft of this document with our counsel, but it is taking time because, well, this stuff is very complicated. We serve or have served teenagers in almost every country, and GDPR is just the most prominent of many laws that are now on the books worldwide.

replies(2): >>Throwa+Vd2 >>VEBee+vv2
◧◩
52. SigmaE+U32[view] [source] [discussion] 2025-11-13 22:36:40
>>linsom+DD
Hello! This is Chris from Hack Club staff (the one cited in the post)

I addressed the post itself in another comment (https://news.ycombinator.com/reply?id=45921428&), so I'll skip that part.

I would really like to know more about these incidents at HC events. We have a lot of very complex tradeoffs within hack club involving security/privacy/safety for exactly the reasons you identified (ie, giving teenagers a very high level of agency/responsibility in running programs). However, staff try to be extremely conscious of these tradeoffs and highly attentive to the realistic risk vectors that come about in our operations.

No teenager will ever (ever!) have anything 'taken out' on them by myself or anyone else that works here. Any time things go wrong or almost go wrong, we just want to know so we can manage that risk in the future. If you are willing to share, please reach out at cwalker@hackclub.com

replies(1): >>linsom+KF2
◧◩◪◨
53. SigmaE+E42[view] [source] [discussion] 2025-11-13 22:41:54
>>bo1024+qu1
If nobody reads the data it is not a breach.
replies(1): >>Benjam+mi2
◧◩◪
54. Throwa+Vd2[view] [source] [discussion] 2025-11-13 23:48:12
>>SigmaE+f12
So was kids' data exposed or no?
replies(2): >>SigmaE+Ij2 >>rlmine+sk2
◧◩◪◨⬒
55. Benjam+mi2[view] [source] [discussion] 2025-11-14 00:28:36
>>SigmaE+E42
So the junior engineer who couldn't secure an endpoint implemented thorough request logging and auditing? Impressive.
◧◩
56. rlmine+jj2[view] [source] [discussion] 2025-11-14 00:40:14
>>Agreed+Wh
As someone who is/was also a part of the hack club community, this article is mostly correct. I've seen most of these events occur second hand as well in real time and can mostly corroborate with the accuracy of the article, except the minors in legal roles part. The community is severely mismanaged, data leaks happen often in very predicable ways and it does seem as if much of it is symptoms of vibe coding.
◧◩◪
57. rlmine+uj2[view] [source] [discussion] 2025-11-14 00:42:26
>>immibi+hK
I am not the OP but I think I know the back story behind this name and if I'm not wrong, it is related to events that went down in hackclub revolving a suicide attempt in HC being taken unseriously.
◧◩◪◨
58. SigmaE+Ij2[view] [source] [discussion] 2025-11-14 00:45:11
>>Throwa+Vd2
The short answer is no.
replies(2): >>Benjam+Yk2 >>dapoyo+Ps4
◧◩◪◨
59. rlmine+sk2[view] [source] [discussion] 2025-11-14 00:52:33
>>Throwa+Vd2
Not exposed but hackclub's security practices always seems to make it easy to access if you want to.
◧◩◪◨⬒
60. Benjam+Yk2[view] [source] [discussion] 2025-11-14 00:57:33
>>SigmaE+Ij2
It most certainly was. You have someone outside your organization who accessed the data, and you know about it. Here's what you just wrote about the person who accessed this endpoint:

> - The author was ultimately banned from the community not for their opinions on this matter, but because of a long streak of unrelated conduct issues that culminated in a spree of saying horribly abusive things to multiple other members of the community.

> — They have been pursuing a grudge against the organization ever since. They are not a reliable narrator, this post is a fantasy version of events that casts them as a martyred hero.

Someone who has been acting maliciously against your organization accessed that data. And you think it's fine? They're a teenager. An angry teenager, who is acting out. You honestly believe you can trust they didn't distribute this data or tell anyone else about the problem before you found out about it?

When I was a teenager, someone in my year level gained access to a lot of personal data about a bunch of people in our year level. This was a smart individual who at least somewhat understood the gravity of the situation. But they were also a kid, of course they distributed some of the data — bragging rights and what not.

What about the section titled "the surveillance infrastructure (orpheus engine)" where the teenager claims children's data was intentionally being sent out to third parties, specifically to profile kids? What's that all about?

Look, no-one read this article and thought "Wow, this is well written article by a super mature well-adjusted individual. I'm taking this as gospel." The article is clearly written by an angry teenager. I feel far more invested in this now that I've seen your responses. The way you're handling this, and yourself, is just downright absurd. Stop.

replies(2): >>SigmaE+Nl2 >>VEBee+Ev2
◧◩◪◨⬒⬓
61. SigmaE+Nl2[view] [source] [discussion] 2025-11-14 01:06:13
>>Benjam+Yk2
I never said anything was fine. I said it was a serious vuln, and we took it seriously.

We patched the vulnerability, quickly. We addressed it with the engineer and made clear that this is no joke. We have extensive refactoring happening within our infrastructure to move to a model where this information is handled as much as possible through secure, audited, centralized systems. Is there something else we should be doing?

The crux of the question here was about whether GDPR obligates us to email all 5,000 people signed up for this program about this vulnerability. The two lawyers we have consulted on this have both said no. One of them specifically specializes in privacy compliance. It's not a complicated legal question, the answer is just no.

replies(1): >>Benjam+qr2
◧◩◪
62. Charmu+Dq2[view] [source] [discussion] 2025-11-14 01:58:42
>>embedd+lU1
During Hack Club's IRL Hackathons, teens can get their parents to sign a "freedom waiver" to allow them to leave the hackathon venue and explore the city (they usually happen in high profile cities like NYC or Boston) without supervision. I assume what happened to them was they got lost during this optional exploration period
replies(1): >>linsom+hF2
◧◩◪◨⬒⬓⬔
63. Benjam+qr2[view] [source] [discussion] 2025-11-14 02:07:25
>>SigmaE+Nl2
Look. This isn't on the front page of HN anymore. So I'm mostly writing this to you. You've work to do on your communication. This style of communication probably works just fine with teenagers, but it's not going to hold up to scrutiny with adults.

> The crux of the question here was about whether GDPR obligates us to email all 5,000 people signed up for this program about this vulnerability.

You are just not going to be able to control the narrative like this. Trying to tell someone else what the "crux of the issue is" will not allow you to shift the goal posts. The article described a pattern of issues, and in my previous comment I specifically raised one. No determined individual is going to just leave that thread dangling for you.

> Is there something else we should be doing?

Yes. Obviously. That's the point.

> The crux of the question here was about whether GDPR obligates us to email all 5,000 people signed up for this program about this vulnerability. The two lawyers we have consulted on this have both said no. One of them specifically specializes in privacy compliance.

It's not a great look for the leader of a children's organization to so blatantly flout that they lack a moral compass. You're currently interacting with the public, not the legal system. Sure, whether or not you're legally required to inform your kids is relevant. However, the law is quite literally the bare minimum of what you're obligated to do.

No-ones reading this thinking. "Oh great, they've done the bare minimum legally required of them." They're thinking, "Wait. Companies notify people of breaches all the time. You apologise, and explain what you're doing to rectify the situation. What have they got to hide? Are they worried they'll get an influx of outrage because this lack of care was something people in the community were already concerned about?" With the context given from the odd parent in this thread, it certainly comes across as the latter.

> It's not a complicated legal question, the answer is just no.

This detracts so much credibility from your communication. There is no lawyer on Earth that will describe this as "not a complicated legal question". No adult that's ever had any communication with a lawyer is going to believe this for a second. Lawyers are notorious for their non-committal attitude toward providing legal advice. Nothing is black and white — it's all grey. So this comes across as:

a. You've never interacted with a lawyer in your life. Or, b. You're telling porkies, or at the very least, are way too flippant with hyperbole.

replies(1): >>SigmaE+xH2
◧◩◪
64. VEBee+vv2[view] [source] [discussion] 2025-11-14 02:46:25
>>SigmaE+f12
As a longtime member of hackclub, I can confirm that while OP may have been banned, most of her points are completely valid and I can find most of the original sources for them. Point-by-point:

> - We take vulns seriously—especially the serious ones! It was fixed immediately by a senior engineer upon report (within a day?)

What? From the many, many #meta posts and other sources I cannot back this up.

> - The author was ultimately banned from the community not for their opinions on this matter, but because of a long streak of unrelated conduct issues that culminated in a spree of saying horribly abusive things to multiple other members of the community.

OP did say some bad stuff, but it wasn't a spree and was an isolated incident. I don't agree with her actions, but I see where she was coming from: she didn't feel heard and just wanted to get back at people she saw as having wronged her. She definitely shouldn't have done what she did but it was an isolated incident or two.

> — They have been pursuing a grudge against the organization ever since. They are not a reliable narrator, this post is a fantasy version of events that casts them as a martyred hero.

You'll note that in the article that isn't what she portrays herself as and she explicitly bookends the article with paragraphs of text praising the mission and all of the good hackclub has done. Which is it, is she rightfully praising the organization but rightfully getting angry about it or is she wrongfully praising the organization and wrongfully getting angry?

> Nonetheless, privacy/security is something we think about and invest extensively in.

Based on HQ's HCB, #meta, posts in #hq, and more this is not true in the slightest.

> In the past year we have started an organization-wide bounty system, moved all PII storage into a central "identity vault" Bounties were addressed in the article and last thing I heard PII is still massively distributed. If that isn't the case anymore, please actually make a post about it so the community is aware?

> consulted extensively with a very fancy lawyer who specializes in corporate compliance with the growing raft of online privacy laws around the world

That's good but again, make an announcement in hackclub?

> The good news is, according to that lawyer we already do almost everything we need to be compliant; we just need to publish a privacy policy!

The fuck?? No?? if this has happened in the last year, how angry has your lawyer about the numerous vulnerabilities that were pushed, not notified, underpaid bounties, and more? Oh, and don't forget you TAKING DOWN THE GDPR EMAIL AND NOT DELETING DATA??

> We are actively iterating on a mostly-finished draft of this document with our counsel, but it is taking time because, well, this stuff is very complicated.

I can definitely understand that. I really love hackclub and think the mission is amazing but at the moment I don't feel safe with my data in its hands.

replies(1): >>throww+Wg4
◧◩◪◨⬒⬓
65. VEBee+Ev2[view] [source] [discussion] 2025-11-14 02:47:35
>>Benjam+Yk2
By the way, orpheus engine is available publicly at https://github.com/hackclub/orpheus-engine.
◧◩◪
66. VEBee+cw2[view] [source] [discussion] 2025-11-14 02:53:57
>>Benjam+6f
Orpheus engine is publicly available at https://github.com/hackclub/orpheus-engine.
◧◩◪◨
67. linsom+hF2[view] [source] [discussion] 2025-11-14 04:42:38
>>Charmu+Dq2
No, that was not the situation, it happened at the event.
replies(1): >>embedd+Qj3
◧◩◪
68. linsom+KF2[view] [source] [discussion] 2025-11-14 04:47:48
>>SigmaE+U32
The incident has already been discussed with organizers at the time.
◧◩◪◨⬒⬓⬔⧯
69. SigmaE+xH2[view] [source] [discussion] 2025-11-14 05:07:28
>>Benjam+qr2
> You've work to do on your communication. This style of communication probably works just fine with teenagers, but it's not going to hold up to scrutiny with adults. > … > It's not a great look for the leader of a children's organization to so blatantly flout that they lack a moral compass.

I'm not the leader of anything, that would be Zach Latta. He's a much better diplomat than I am, but I am doing my honest best to speak plainly and matter-of-factly to you about a complex situation that frankly requires a lot more context to properly understand than I think is possible to acquire from the information you have.

I'm also not trying to absolve our organization of all sins. We mess up all the time. We are working on many fronts to learn from these experiences and make imperfect systems a little better every day. We make mistakes, we apologize, we do our best to make amends, then we move on to the next mistake. It is the nature of doing new, hard things with real stakes.

> You're currently interacting with the public, not the legal system. Sure, whether or not you're legally required to inform your kids is relevant. However, the law is quite literally the bare minimum of what you're obligated to do. > > No-ones reading this thinking. "Oh great, they've done the bare minimum legally required of them." They're thinking, "Wait. Companies notify people of breaches all the time.

This is addressed in the top comment I left. Notifying 5k people about a patched vuln is not "more than the minimum", it's legitimately bad practice. That is not my opinion, it is industry standard practice! Absent any reason to believe there has been a data breach, absent any sort of actionable information, we are not going to send an email to thousands of people.

I call the GDPR thing the crux of the question because probably 80% of the thousands of Slack messages sent on this topic, a solid majority of them were about that question. That was the impasse. Staff considered the issue and concluded that from a moral, legal, and industry standard practice perspective, notifying every user was not the correct decision. Nothing was being hidden, that team logged and discussed the vulnerability publicly within the community from the start. They fixed, disclosed, discussed, learned, and moved on.

> This detracts so much credibility from your communication. There is no lawyer on Earth that will describe this as "not a complicated legal question". No adult that's ever had any communication with a lawyer is going to believe this for a second. Lawyers are notorious for their non-committal attitude toward providing legal advice. Nothing is black and white — it's all grey. So this comes across as: > > a. You've never interacted with a lawyer in your life. Or, b. You're telling porkies, or at the very least, are way too flippant with hyperbole.

I am married to a law professor for whom I lived through 3 years at Yale Law and 3 years of PhD/fellowship, I have about as much exposure to law as you can get without it actually being your job. I assure you, uncomplicated legal questions exist.

replies(1): >>pupwit+Dv7
◧◩
70. SigmaE+FH2[view] [source] [discussion] 2025-11-14 05:10:21
>>patcon+BV
You nailed it.
◧◩◪
71. Diaphr+s83[view] [source] [discussion] 2025-11-14 10:56:05
>>lefrog+nf
An 11 year old child's account was promised to be deactivated, went through the dramatic "welp, you had a nice run" text wall, and then absolutely nothing happened.
◧◩
72. Diaphr+g93[view] [source] [discussion] 2025-11-14 11:09:55
>>Agreed+Wh
For context, this is the Theo clip: https://files.catbox.moe/1i7w08.mp4

It's a really long article so he only seemed to read a few paragraphs about the security vulnerability and then said the line while scrolling too fast to read all of the other points. Can't blame him, not going to lie.

◧◩◪◨⬒
73. embedd+Qj3[view] [source] [discussion] 2025-11-14 13:16:20
>>linsom+hF2
You don't have to share any specifics or details, but could you at least share how they could end up in a life threatening situation while attending a programming event?
replies(1): >>linsom+Zv3
74. ilovew+1q3[view] [source] 2025-11-14 14:09:41
>>alexkr+(OP)
Hi, I'm the author of the article. I wanted to clarify a few things from the discussion here.

Just to be clear: I didn't post this on Hacker News myself, and I'm not trying to present myself as high and mighty or as some kind of villain. I'm just someone who documented what I observed, made mistakes along the way, and wanted to share my perspective on the discussion that's happening here.

On data exposure:

Chris said "The short answer is no" when asked if kids' data was exposed. From my perspective, the Neighbourhood API exposed thousands of users' full legal names through an unauthenticated endpoint. There was also the Juice vulnerability that exposed passport numbers, flight receipts, phone numbers, and addresses. A log file with minors' PII was pushed to a public Git repository. The Orpheus Engine code is publicly available on GitHub and shows data being sent to third parties.

Whether this meets the technical GDPR definition of "breach" is a legal question I'm not qualified to answer definitively. But the data was accessible to unauthorised parties, which is what I documented.

On ChatGPT legal advice:

Chris said "nobody relied on ChatGPT for legal advice." I have screenshots of a teenage intern using ChatGPT to answer GDPR compliance questions. Whether that counts as "relying on ChatGPT for legal advice" or just using it as a reference tool is a matter of interpretation. I was concerned about a teenager making legal determinations using AI tools, but I can see how others might view this differently.

On the timeline:

Chris said the vulnerability was "fixed immediately... within a day." From my perspective, it was reported on July 3rd and wasn't fixed until after I made it public. Other community members have also questioned this timeline. I may be wrong about this - I'm just sharing what I observed.

On the ban:

Chris is right that I said horrible things to people. I was in a terrible mental state at the time - Chris was involved in my mental health crisis in other occasions beforehand (he called an ambulance to my house). That doesn't excuse my behavior, and I've taken accountability for it. I included this context because I felt it was relevant, but I understand why others might see it as making excuses.

On DSARs and privacy policy:

I mentioned in the article that I sent DSARs (data subject access requests) that went unanswered for months. Chris didn't address this in his response, so I'm not sure what the current status is. I also noted that there's still no privacy policy after 3+ months of promises. Chris mentioned they're "actively iterating" on one, which may be true - I'm just sharing what I observed up to when I was banned.

I also mentioned that the GDPR email address was removed after I raised concerns. Other community members have confirmed this happened. I'm not sure why it was removed or if it's been replaced with something else.

On forced de-anonymisation:

There was a recent incident where a student (who had already bought flights) was told they needed to reveal their identity to get an explanation for why their Parthenon (an in-person event, see https://athena.hackclub.com) invite was revoked. They complied and revealed their identity publicly, but still didn't receive an explanation.

Christina Asquith (Hack Club's COO) responded by accusing them of lying, showing "bad faith," making "false accusations," and "harassing staff." She said "Character matters at hack club" and refused to work with them anymore after they posted in the #meta channel (which is specifically for community feedback). When the student tried to handle it privately first, they got one response and then were ghosted. After they revealed their identity and asked directly for an explanation, Christina still refused to provide one, saying the reason "will not be released" and that "no amount of info will ever be enough for them to stop arguing."

The student later described feeling like they were "talking to a stone wall that showed no emotion" and that they only got help from people who weren't part of the organizing team. Christina has also publicly stated she's "less likely to reply" to anonymous posts and has a problem with people not putting their names behind questions.

For context: Hack Club has a bot called Prox2 that allows community members to post anonymously in the #meta channel (a channel for feedback and concerns). This was created specifically to allow people to raise concerns without fear of retribution, especially given the power imbalance between adults in leadership positions and teenagers in the community. However, staff can refuse to engage unless people reveal themselves, which undermines the purpose of having an anonymous posting system. I'm not sure if this is official policy or just Christina's personal preference, but it's concerning when combined with claims that "no teenager will ever have anything taken out on them."

On multiple issues:

Chris focused his response on the Neighbourhood vulnerability, but the article documented multiple issues (Juice, the Git log file, Orpheus Engine, etc.). I understand he can't address everything, but I wanted to note that the article covered a pattern of issues, not just one incident.

I also noticed that all of these vulnerabilities that I reported came from the same person (Thomas). In Chris's response, he referred to this person as a "junior engineer," but in Hack Club's Slack and other communications, this person's title was "Capability Changing Events Lead." I'm not sure why the title changed in Chris's post, but I thought it was worth noting. This person is still working at Hack Club, and from what I observed, there didn't seem to be much accountability or consequences for the repeated security issues. I may be wrong about this - I'm just sharing what I observed.

On the "lawyer" claim:

Chris mentioned that Hack Club has consulted with "a very fancy lawyer who specializes in corporate compliance." From my perspective, I haven't seen evidence of this legal work - there's still no published privacy policy, no designated DPO (Data Protection Officer), no named compliance contact, and no data-retention policy. I'm not saying the lawyers don't exist - I'm just noting that the community hasn't seen any tangible output from this legal consultation yet. Maybe it's all happening behind the scenes, but from the outside it's hard to tell.

On the pattern of response:

I've noticed that concerns raised in the community sometimes don't get responses for a while, and then when people speak up publicly, staff engage more actively. Other community members have described similar experiences where they felt ignored until they raised things publicly. I'm not saying this is intentional - it could just be that staff are busy and public posts get more attention. But from the perspective of people raising concerns, it can feel like the only way to get a response is to make things public, which isn't ideal for anyone.

On the article:

I tried to be clear that I'm not trying to be a hero or villain - just document what happened. The article starts and ends with praise for Hack Club's mission. Other community members (VEBee, rlmineing_dead) have corroborated some of my points, but I'm sure I got things wrong too. The Orpheus Engine code is public if people want to verify that part themselves.

I wrote the article because I thought these issues were important to document, but I'm sure there are perspectives and context I'm missing. I'm not asking anyone to take my word for it - the code is public, the vulnerabilities are documented, and people can verify things themselves.

I want to be clear: Hack Club has done a lot of good. It's helped thousands of teenagers learn to code, build projects, and find community. Many of my friends came from Hack Club, and I'm genuinely grateful for the opportunities it gave me. That's why I care about these issues - because I want Hack Club to be better, not because I want to tear it down. The problems I've documented are real, but so is the positive impact Hack Club has had on many people's lives.

◧◩◪◨⬒⬓
75. linsom+Zv3[view] [source] [discussion] 2025-11-14 14:43:48
>>embedd+Qj3
https://www.cnn.com/2015/01/19/world/taiwan-gamer-death#:~:t...
replies(1): >>embedd+GH3
◧◩◪◨⬒⬓⬔
76. embedd+GH3[view] [source] [discussion] 2025-11-14 15:42:39
>>linsom+Zv3
Do they let children sit and program for 3 days (without breaks?) at these events without a single person checking in on them?! That's absolutely bananas if true, how could something like that even happen, is it a sweatshop of programmers or what's going on?

Truly, if they're forcing children to sit and code for 3 days straight someone should call the police this moment.

replies(2): >>Charmu+XK3 >>linsom+9S4
◧◩◪◨⬒⬓⬔⧯
77. Charmu+XK3[view] [source] [discussion] 2025-11-14 15:58:44
>>embedd+GH3
No one is forced to code, they have sleeping areas, and plenty of time for breaks, and no one will care if someone decides to take a break for a bit
replies(2): >>embedd+vY3 >>pupwit+0v7
◧◩◪◨⬒⬓⬔⧯▣
78. embedd+vY3[view] [source] [discussion] 2025-11-14 17:11:15
>>Charmu+XK3
The previous commentator said "could have very easily turned into life threatening" and when asked what that was about, they sent the link about that person dying after sitting playing games for 3 days.

Are you saying they're lying or are wrong about this? They seemed to have personal experience about it, and I'm assuming they're not outright lying, but I do think it sounds strange they would let children sit and code for 3 days straight.

replies(1): >>sadesh+ad4
◧◩◪◨⬒⬓⬔⧯▣▦
79. sadesh+ad4[view] [source] [discussion] 2025-11-14 18:15:58
>>embedd+vY3
That article has no relation to Hack Club whatsoever.

But that's beside the point - they provide rooms, plenty of food and snacks, workshops, and activities to do during breaks. Organizers are on-site at all times, and there is a live hotline for parents or kids to call at any time. "sit and code for 3 days straight" is a gross mischaracterization.

Here's an example of an event hosted: https://www.youtube.com/watch?v=uXWMr0gdLJA

replies(1): >>embedd+jR4
◧◩◪◨
80. throww+Wg4[view] [source] [discussion] 2025-11-14 18:31:14
>>VEBee+vv2
If possible, could you link any of those posts, or post them through Prox2 in Slack? I'd be interested in reading it, because that's not the vibe I've gotten.

> OP did say some bad stuff, but it wasn't a spree and was an isolated incident. I don't agree with her actions, but I see where she was coming from: she didn't feel heard and just wanted to get back at people she saw as having wronged her. She definitely shouldn't have done what she did but it was an isolated incident or two.

If I remember correctly, she admitted that her ban was justified. But also, she didn't just do "some bad stuff", she did a lot of it - there's even a recent #meta thread referencing this exact post.

> You'll note that in the article that isn't what she portrays herself as and she explicitly bookends the article with paragraphs of text praising the mission and all of the good hackclub has done. Which is it, is she rightfully praising the organization but rightfully getting angry about it or is she wrongfully praising the organization and wrongfully getting angry?

Nuance does exist.

> That's good but again, make an announcement in hackclub?

Zach did.

> The fuck?? No?? if this has happened in the last year, how angry has your lawyer about the numerous vulnerabilities that were pushed, not notified, underpaid bounties, and more? Oh, and don't forget you TAKING DOWN THE GDPR EMAIL AND NOT DELETING DATA??

I'm more inclined to trust Chris than an anon account that straight up denies that internal conversations happened. You also seem to be regurgitating posts from earlier without seeing Chris's context.

replies(1): >>VEBee+9s5
◧◩◪◨⬒
81. dapoyo+Ps4[view] [source] [discussion] 2025-11-14 19:17:43
>>SigmaE+Ij2
lies <- a hack clubber
replies(1): >>SigmaE+Jd5
◧◩◪◨⬒⬓⬔⧯▣▦▧
82. embedd+jR4[view] [source] [discussion] 2025-11-14 21:22:05
>>sadesh+ad4
So again then, what exact "life threatening situations" could children be put in, besides the things parent already said it wasn't about, during these events? Parent themselves linked that article, I'm not 100% sure what they meant, but all I could think was that they experienced something similar, otherwise I'm not sure why they'd link that.
◧◩◪◨⬒⬓⬔⧯
83. linsom+9S4[view] [source] [discussion] 2025-11-14 21:27:47
>>embedd+GH3
There was no forcing involved. Since there seems to be a lot of interest in this, I'll go into more details. As I said, this was discussed with organizers at the time, largely it was largely a matter of "the kids'll figure it out" failure. Some specifics will be vague due to time.

This event was a camp out. They had tents for the campers, but it was, in my kids view, a free-for-all. Like a "go figure out the tent situation", and my child couldn't figure out the tent situation, so decided to sleep outside. And woke up with a bunch of bugs (I don't remember exactly what, leaches sticks in my mind). So they decided they'd caffeinate the rest of the event and not sleep.

(edit: Typo fix)

◧◩◪◨⬒⬓
84. SigmaE+Jd5[view] [source] [discussion] 2025-11-15 00:11:40
>>dapoyo+Ps4
What data was exposed, and to whom? Single records accessed by a white hat to test a vulnerability do not count.
◧◩◪◨⬒
85. VEBee+9s5[view] [source] [discussion] 2025-11-15 02:47:12
>>throww+Wg4
> If I remember correctly, she admitted that her ban was justified. But also, she didn't just do "some bad stuff", she did a lot of it - there's even a recent #meta thread referencing this exact post.

I think I've read through the #meta post you're referencing and commented in it and yeah, but it still wasn't a spree. It was not a lot of it? cite your sources as well

> > That's good but again, make an announcement in hackclub? > Zach did.

Where?

> I'm more inclined to trust Chris than an anon account that straight up denies that internal conversations happened. You also seem to be regurgitating posts from earlier without seeing Chris's context.

Well yeah, I'm on a throw away as I don't want to be deanon'd. If you really want to talk contact https://hackclub.slack.com/team/U09Q734PGUU, it's an alt I have. Where did I deny internal conversations as well? And wdym regurgitating posts without Chris' context? I literally broke his reply down point-by-point?

◧◩
86. VEBee+Bt5[view] [source] [discussion] 2025-11-15 03:06:58
>>sadesh+tV
> This is the same person who attempted to extort Hack Club out of thousands by using an airtable token they previously had (all tokens have since been examined as to whether they are truly necessary).

I could be wrong, but I don't think that was OP.

> Popular request is for the program to be expanded. I don't know about the "resounding no".

Do a poll then. I for one agree with that and don't think that most people would report it.

> > teenagers are positioned as "independent contractors" to avoid employment protections, holiday pay, and wage floors. this isn't "scrappy nonprofit" energy - it's child exploitation dressed up as opportunity. > > It isn't a full-time job.

It quite literally is?

> Recently, email sending has been revamped, and there are tools to subscribe to individual mailing lists.

That I'll give you. They did recently revamp that and make it be functional.

> Criticism isn't ever censored - there's anonymous reporting, a public forum channel for feedback (which only has temporary threadlocks upon very inflammatory or irrelevant discussion), and you can discuss it anywhere else within the Slack.

Not true. Thread locks are often for 6 months to a year and the posts often aren't even inflammatory, just anti-HQ.

If you do want to actually talk more, contact me on my alt at https://hackclub.slack.com/team/U09Q734PGUU.

87. luna11+sM5[view] [source] 2025-11-15 08:18:43
>>alexkr+(OP)
I appreciate techspymax for making me realise the truth to a certified hacker who knows a lot about what his doing. I strongly recommend you hire him because his the best out there and always delivers. I have referred over 10 people to him and all had positive results. He can help you hack into any devices, social networks including – Facebook, Hangout, iMessages, Twitter accounts, Snap chat , Instagram, Whatsapp, wechat, text messages ,smartphones cloning ,tracking emails and also any other social media messenger or sites. It’s advisable to hire a professional hacker. Thank me later. Contact him here.Techspymax@ gm ail c o m
◧◩◪◨⬒⬓⬔⧯▣
88. pupwit+0v7[view] [source] [discussion] 2025-11-16 03:22:29
>>Charmu+XK3
Hey! You can probs recognize me by the username. Dunno anyone else who's open about being a fuckin dog on the slack.

During Scrapyard, Hackatime was mandatory, and was one of the biggest defining factors to HQ about the success of a satellite. So yeah, technically attendees aren't _forced_ to code, but getting the most weighted grants is still your biggest focus.

For those who don't know, HC uses a unit called "weighted grants" which supposedly equates to 10 hours of good quality work, in order to determine success. The issue is, the definition of good quality work is currently set as "most lines written", excluding R&D and the 20 other steps that it takes to design something.

◧◩◪◨⬒⬓⬔⧯▣
89. pupwit+Dv7[view] [source] [discussion] 2025-11-16 03:32:44
>>SigmaE+xH2
Glad to see you here, actually interacting. I've made this clear on the slack, and truthfully I'm disappointed in the fact that it took so long and external involvement from a parent on HN to get a response.

Another example: there was a relatively civil debate about a new hackathon yall are putting out, funded by.... AMD, and the US government's fund to "teach AI literacy" or whatever the fuck that means. Due to this, _you region locked an entire Hack Club event_. This is the kind of stunt Nintendo would pull, but an organization that thrives itself in "everyone is welcome".

When confronted, yall decided to..... shut down any internal discussion, and avoid the thread at all costs, directly going against you other claims of "radical transparency" and "openness to feedback"/

What long game are you playing here? The game of "make Hack Club suck for 5 years, and lose our motives, morals, and the trust of our community, for an extra few bucks on the 6th?

It's complicated to handle the law. It's why lawyers cost, per your quote, $500 an hour. But it's not complicated to listen to people and genuinely try to turn back from the wrong turn you took somewhere during Juice.

The only reason we got an update from you in the first place is the opposite of what it should have been. Send this to Christina as well: https://mondaynote.com/united-broken-culture-6b35267c8a10

About the vuln, Ella is exaggerating and has very minimal basis if at all. She did some pentesting, vuln got patched, problem solved. Does HQ need to be more responsible here? Yes. Should critical infrastructure be written by AI? Absolutely not! But does Ella have the basis to start claiming legal superiority over here? Also no.

But, now that you absolutely insist you need to keep my passport indefinitely in order to ship me a sticker that says "summer of making" on it, I expect you to be a little more responsible in: - Who you give access to - How you give said access - How long you give it for - How strict you are about conduct when person is in possession of said access.

TL;DR: Ella's point sucks. Hack Club data handling, also socks. Hack Club PR? Might be worse.

90. casq+EOb[view] [source] 2025-11-17 22:24:25
>>alexkr+(OP)
I just wanted to jump in as Hack Club cofounder and say Hack Club acknowledges this post-- it’s written by a young person we are familiar with: they were banned from Hack Club for harassing transgender kids, and they then recently tried to extort Hack Club for money, threatening to create problems and drama like this after we refused.

This post should not be taken seriously because the implication is wrong: Hack Club is compliant with data protection rules and is very careful with student data; Unlike almost every where else teenagers hang out on the internet, Hack Club does NOT monetize or sell student data or allow advertising to young people.

During one of our many summer programs, we had a situation where some students’ info was accessible publicly by mistake, and as soon as it was reported, we fixed it. No one accessed it and we apologized. You GOT us, ok? It happens and the young programmer responsible feels really badly about the fact that it keeps getting brought up in new and twisted ways.

We work around the clock with a fully trained staff to make sure that there won’t be any problems and to address them immediately if they come up. As I’ve stated in the past, this original post is from a disgruntled student was banned for really ugly behavior and yet they continue and it's sad to see it getting amplified here.

replies(2): >>501234+xEc >>mathia+qMc
◧◩
91. 501234+xEc[view] [source] [discussion] 2025-11-18 07:22:15
>>casq+EOb
Prove it.
◧◩
92. mathia+qMc[view] [source] [discussion] 2025-11-18 08:41:16
>>casq+EOb
Ella wasn't transphobe as she was herself transgender
93. zachla+3Rf[view] [source] 2025-11-19 01:09:28
>>alexkr+(OP)
Hi all, Hack Club founder here. I just posted this on the Hack Club Slack and want to share here too:

Hi everyone, I should have jumped in sooner. I’m sorry - I’ve been afraid to post because I’ve been worried that any response whatsoever would be crucified. That’s left a lot of you understandably asking questions and that’s on me.

This has been a very difficult set of accusations to deal with this week, and a lot of bad memories have been brought up. Please keep in mind that there is often a lot of context not mentioned and that Hack Club can’t talk about everything as transparently as we’d like due to privacy for the people involved.

First - I want to give an update on the privacy policy. We hired a data privacy lawyer in August through a referral from our main lawyer. We’ve been working with them and expect to be able to release the privacy policy in ~2 weeks. It won’t be anything earth shattering - basically that Hack Club doesn’t sell your data.

From day 1 we have cared about data privacy at Hack Club. When I was a teenager, I’d PGP sign all my emails and refused to use Gmail / etc because of privacy. When Slack made it possible for organizations to read DMs of members in ~2017, we made a public commitment to never do that for Hack Clubbers unless legally compelled (and have never done so today). That’s part of why 100% of all of the code at Hack Club is open source, which none of our peer organizations do (to my knowledge).

Part of why we haven’t been sooner to respond or release a policy is because a privacy policy != security. Practices = security. We haven’t wanted to release something imperfect, so we didn’t release anything at all. We should have just hired a privacy lawyer earlier and published what they recommended - that’s on me.

I believe that Hack Club currently meets or exceeds the security and data practices of other organizations in our space, and where we have found issues (or people have helped us find issues), we have resolved them as quickly as possible. For example, most reports through https://security.hackclub.com are resolved in less than 24 hours. Earlier this year I found a bug (https://gist.github.com/zachlatta/f86317493654b550c689dc6509...) in Google Workspace that enabled phishing from g.co, which is owned by Google - it took them 11 months to fix it (I filed in Jan 2025, got a bounty payout 2 months after reporting, and just got confirmation the bug was fixed 11 days ago).

Here are some of the various steps we’ve taken to enhance security over the past year:

- Essential staff carry YubiKeys, including myself

- https://security.hackclub.com bug bounty program was introduced

- We moved to role-based access control in Airtable and Fillout

- We moved Hackatime and other sensitive apps out of the main self-hosted servers into their own separated server group

- https://identity.hackclub.com was introduced to securely handle ID verifications with audit logs and all documents stored encrypted at rest so individual programs don’t need to handle as much PII. Servers are completely separated from the rest of HC infra.

- We started working pro-bono with a cybersecurity firm that works with Tailscale and other security-critical orgs

- We separated PII collection across YSWSs so programs generally only have access to the individual data people submit to their program (and not the full Hack Club users table)

- And a lot more small things

There are a small number of known cases of accidentally unprotected API endpoints in YSWSs, which were all quickly fixed after being reported through https://security.hackclub.com. We don’t have any evidence any data was leaked. The people who reported all received bounty payouts. Since then, the staff members responsible have been trained and feel very badly about their mistakes.

I hope we can all have a breather and have a better day tomorrow. Thank you all. More soon.

[go to top]