frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenAI's AI New Deal [pdf]

https://cdn.openai.com/pdf/561e7512-253e-424b-9734-ef4098440601/Industrial%20Policy%20for%20the%2...
1•devInCamelCase•33s ago•0 comments

Show HN: ZeroID – Open-source identity for AI agents based on OIDF standards

https://github.com/highflame-ai/zeroid
1•jalbrethsen•3m ago•1 comments

Tech industry lays off nearly 80k employees in the first quarter of 2026

https://www.tomshardware.com/tech-industry/tech-industry-lays-off-nearly-80-000-employees-in-the-...
1•speckx•4m ago•0 comments

Git-fire – back up every local repo in one command

https://github.com/git-fire/git-fire
1•bschell•4m ago•1 comments

Deterministic Primality Testing for Limited Bit Width

https://www.jeremykun.com/2026/04/07/deterministic-miller-rabin/
1•ibobev•4m ago•0 comments

Pentagonal numbers are truncated triangular numbers

https://www.johndcook.com/blog/2026/04/01/truncated-triangular-numbers/
1•ibobev•4m ago•0 comments

Artemis II: Integrity completes its first return trajectory correction burn

https://www.nasa.gov/blogs/missions/2026/04/07/artemis-ii-flight-day-7-first-return-correction-bu...
1•Bubble1296•5m ago•1 comments

Two Years of Valkey

https://redmonk.com/sogrady/2026/04/06/valkey-at-two/
1•j03b•6m ago•0 comments

Claude Code Usage Dashboard

https://github.com/phuryn/claude-usage
2•neamar•6m ago•0 comments

An interactive map of river basins and watersheds of North and South America

https://python-maps-vis.vercel.app
2•alphabetatango•7m ago•0 comments

Show HN: Embenx – agentic memory layer for AI agents

https://github.com/adityak74/embenx
1•akarnam37•8m ago•0 comments

The Abbey That Fueled Scotland's Street Violence and Saved the Bees

https://www.governance.fyi/p/the-abbey-that-fueled-scotlands-street
1•bigbobbeeper•8m ago•0 comments

Thoughts on Slowing the Fuck Down

https://mariozechner.at/posts/2026-03-25-thoughts-on-slowing-the-fuck-down/#toc_5
2•lebek•9m ago•0 comments

Giving AI coding agents a Principal Engineer's mind and cost of intern

https://github.com/juyterman1000/entroly
1•abbyedd•9m ago•2 comments

Pine Trees – A 1,400-line private reflection harness for Claude instances

https://github.com/Habitante/pine-trees
2•daniel-navarro•10m ago•1 comments

92% of MCP servers have security issues (and how to fix it)

https://github.com/arbitusgateway/arbitus
3•nicholasfvelten•13m ago•0 comments

Convert Temperature and Humidity to Solar Radiation and Heat Flux with FiaPhy

https://github.com/fiaos-org/FiaPhy
1•openrockets•14m ago•0 comments

Frontier AI models are the most cost-efficient

https://arxiv.org/abs/2507.03834
2•mzelling•14m ago•0 comments

AI Sycophancy: The Yes-Man Problem

https://the-infrastructure-mindset.ghost.io/ai-sycophancy-the-yes-man-problem/
1•wphillipmoore•14m ago•1 comments

Show HN: Emotional probes for Gemma 4 – Replicating Anthropic's emotion research

https://github.com/RyanCodrai/emotional-probes
1•justsomeguy1996•15m ago•1 comments

TorchTPU: Running PyTorch Natively on TPUs at Google Scale

https://developers.googleblog.com/torchtpu-running-pytorch-natively-on-tpus-at-google-scale/
1•markerbrod•15m ago•0 comments

Is software support the real expiration date of modern electronics?

https://borisljevar.substack.com/p/the-climate-crisis-illusion-of-action
2•blnlx•16m ago•0 comments

Software job openings surge this year, defying AI fears

https://www.businessinsider.com/ai-isnt-killing-software-coding-jobs-booming-trueup-2026-4
1•b-man•16m ago•1 comments

Why Microsoft's war on Windows' Control Panel is taking so long

https://www.theverge.com/news/908624/microsoft-windows-control-panel-removal-explanation
2•rpgbr•16m ago•0 comments

Iran demands Bitcoin fees for ships passing Hormuz during ceasefire

https://www.ft.com/content/02aefac4-ea62-48db-9326-c0da373b11b8
2•pavlov•17m ago•2 comments

Gym-Anything: Turn Any Software into an Agent Environment

https://cmu-l3.github.io/gym-anything/
3•wellecks•17m ago•0 comments

Why some California homeowners feel trapped in houses they want to leave

https://www.sfgate.com/california/article/gains-taxes-california-housing-22183896.php
3•stevenwoo•18m ago•1 comments

Show HN: We fingerprinted 178 AI models' writing styles and similarity clusters

https://rival.tips/research/model-similarity
2•nuancedev•18m ago•0 comments

A security scanner as fast as a linter – written in Rust

https://github.com/peaktwilight/foxguard
1•peaktwilight•18m ago•0 comments

App that fixes what is broken

https://career-journey-mvp.vercel.app/
1•TheHRPassionGuy•19m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•11mo ago

Comments

kemotep•11mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.