frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Ultraviolet light illuminates biofluorescent casque patterns in cassowaries

https://www.nature.com/articles/s41598-026-40230-1
1•bryanrasmussen•1m ago•1 comments

Amazon Reportedly in Talks to Buy Apple Satellite Partner Globalstar

https://www.macrumors.com/2026/04/02/amazon-buy-apple-satellite-partner-globalstar/
1•tosh•1m ago•0 comments

Show HN: I ran 28 OpenClaw instances as a team for 2 months

https://github.com/CorellisOrg/corellis
1•TJ_FLEET•5m ago•0 comments

Enable Real-Time Detection with Synthetic Lidar Data Generation

https://blog.savoirfairelinux.com/en-ca/2026/synthetic-lidar-data-generation-real-time-detection/
1•pilingual•5m ago•0 comments

Show HN: Skales – I built a desktop AI agent a 6-year-old can use

https://github.com/skalesapp/skales
1•marioskales•6m ago•0 comments

Show HN: Dochia – automated API testing for agentic build-test-fix loops

https://dochia.dev/
1•ludovicianul•6m ago•0 comments

Medics Are Now Targets [video]

https://www.youtube.com/watch?v=8sAyXiOwmq0
1•keepamovin•8m ago•0 comments

Days since last OpenClaw CVE

https://days-since-openclaw-cve.com/
4•sparkle_fish•9m ago•0 comments

Show HN: Fonic – turning scattered work into a shareable report

https://fonic.ai
2•darraghmckay•9m ago•1 comments

OmniVoice, high-quality TTS for 600+ Languages

https://zhu-han.github.io/omnivoice/
1•drakirus•11m ago•1 comments

'I hate customer-service chatbots': The consumer-AI refund relationship is rocky

https://www.cnbc.com/2026/04/01/ai-chatbot-customer-service-complaints-refunds.html
1•cebert•11m ago•0 comments

CC leak: skills are better than I thought

https://www.dardar.co/articles/skills-arent-just-context
2•KaseKun•13m ago•1 comments

The end of push-wait-guess CI

https://depot.dev/blog/the-end-of-push-wait-guess-ci
1•kylegalbraith•15m ago•0 comments

'System failure' paralyzes Baidu robotaxis in China

https://techcrunch.com/2026/04/01/system-failure-paralyzes-baidu-robotaxis-in-china/
1•Brajeshwar•15m ago•0 comments

Show HN: Walkie-Clawkie – Push-to-talk between AI agents, one file, zero deps

https://github.com/jahala/walkie-clawkie
1•jahala•16m ago•1 comments

'Scare Quotes'

https://linguistlaura.blogspot.com/2012/06/scare-quotes.html
1•JumpCrisscross•16m ago•0 comments

Brooklyn-Based Pizza Makers Declare Quantum Supremacy in Qulinary Breakthrough

https://thequantuminsider.com/2026/04/01/brooklyn-based-pizza-makers-declare-quantum-supremacy-in...
1•giuliomagnifico•16m ago•0 comments

XploitScan – Security scanner built for AI-generated code

https://www.xploitscan.com/
1•bgage725•18m ago•0 comments

Show HN: DataRamen, navigate your DB without a single line of SQL (no AI)

1•oleksandr_dem•18m ago•0 comments

Visions of Mythos

https://thezvi.substack.com/p/ai-162-visions-of-mythos
1•7777777phil•19m ago•0 comments

It is now day 34 of Iran's Internet blackout

https://mastodon.social/@netblocks/116333973783282768
3•ukblewis•20m ago•0 comments

Show HN: SparrowDB, SQLite of graph DB, written in Rust, Cypher compatible

https://github.com/ryaker/SparrowDB
1•ryaker•21m ago•0 comments

A Founder Tried to Pitch – and Got a Restraining Order

https://trellis.law/case/26-civ-00518/a16z-capital-management-llc-vs-dulat-akan
2•elonmm•22m ago•0 comments

Leaked IRGC manual shows systematic use of civilian sites as missile cover

https://www.iranintl.com/en/202603319302
6•ukblewis•22m ago•1 comments

Show HN: Dualhook – Lightweight WhatsApp coexistence layer, zero message storage

https://dualhook.com
1•porr0•22m ago•0 comments

Show HN: Zabbix MCP Server – 225 tools to let AI agents manage Zabbix monitoring

https://github.com/initMAX/zabbix-mcp-server
2•hermanekt•29m ago•0 comments

Show HN: A daily archive of the top stories on Hacker News, organized by date

https://github.com/tamnd/hn-daily-index
1•tamnd•29m ago•0 comments

Post-Mortem of the EU Europa Breach: A Masterclass in IAM Misconfiguration

https://cyberalert.com.pl/articles/shinyhunters-eu-europa-breach-analysis.html
1•D__S•29m ago•1 comments

Magnitude 4.6 Earthquake Rattles Northern California

https://www.nytimes.com/2026/04/02/us/earthquake-california-boulder-creek.html
2•metadat•30m ago•0 comments

Tracing Goroutines in Realtime with eBPF

https://sazak.io/articles/tracing-goroutines-in-realtime-with-ebpf-2026-03-31
2•darccio•31m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•11mo ago

Comments

kemotep•11mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.