frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

WordPress Manifesto – 15 Years In, Here's What's Broken

https://marcindudek.dev/blog/wordpress-manifesto/
1•ValentineC•51s ago•0 comments

A Sociologist's Take on the Artemis Moon Round-Trip

https://discursiveanomalies.com/2026/04/15/a-sociologists-take-on-the-artemis-moon-round-trip/
1•panic•3m ago•0 comments

KeePassChi

https://codeberg.org/keepasschi
1•LeoPanthera•3m ago•0 comments

Viral victory: Iran is beating the land of tech bros in the social media wars

https://www.theguardian.com/world/2026/apr/15/iran-beating-us-social-media-wars
1•hebelehubele•4m ago•0 comments

Omega Constant

https://en.wikipedia.org/wiki/Omega_constant
1•cl3misch•5m ago•0 comments

Microsoft Raises Prices for All Surface PCs, Higher Than Mac Equivalents

https://www.macrumors.com/2026/04/14/microsoft-surface-pc-price-hike/
2•mgh2•9m ago•1 comments

Meeting Myself Again: Conversations in the Dark

https://www.patreon.com/posts/155646763
1•raynchad•9m ago•0 comments

Flinku – I built a Firebase Dynamic Links replacement after the shutdown

https://www.flinku.dev/
1•luky_dev•10m ago•0 comments

What if you didn't need to write back end code for your app?

https://linkedrecords.com/getting-started/
1•WolfOliver•12m ago•1 comments

Coupling (Computer Programming)

https://en.wikipedia.org/wiki/Coupling_(computer_programming)
1•downboots•16m ago•0 comments

NASA's Artemis Moon Mission Was a State Failure and a Human Triumph

https://www.bloomberg.com/opinion/features/2026-04-14/nasa-s-artemis-moon-mission-was-a-state-fai...
1•helsinkiandrew•18m ago•1 comments

Curriculum 68: Recommendations for academic programs in Computer Science

https://www.slideshare.net/slideshow/curriculum-68-recommendations-for-academic-programs-in-compu...
1•pramodbiligiri•19m ago•0 comments

Generative AI in 2016 [video]

https://www.youtube.com/watch?v=sfFTvtwLCaU
1•frag•20m ago•0 comments

High-temperature memristors enabled by interfacial engineering

https://www.science.org/doi/10.1126/science.aeb9934
2•joak•25m ago•1 comments

Amazon to Acquire Globalstar and Expand Amazon Leo Satellite Network

https://www.businesswire.com/news/home/20260414237496/en/Amazon-to-Acquire-Globalstar-and-Expand-...
10•homarp•26m ago•0 comments

Qwen OAuth Free tier will be discontinued on 2026-04-15

https://github.com/QwenLM/qwen-code/pull/3207
2•angst•28m ago•0 comments

Roy Fielding's Misappropriated REST Dissertation (2020)

https://twobithistory.org/2020/06/28/rest.html
1•locknitpicker•31m ago•0 comments

REST APIs must be hypertext-driven (2008)

https://roy.gbiv.com/untangled/2008/rest-apis-must-be-hypertext-driven
2•locknitpicker•33m ago•1 comments

The 'Annoyance Economy' Is More Than Just Annoying

https://www.nytimes.com/2026/04/12/business/annoyance-economy-costs.html
1•vinni2•33m ago•0 comments

Unidentified deep sea creature encountered off the coast of Japan

https://phys.org/news/2026-04-rich-biodiversity-japan-deepest-ocean.html
2•lfaw•34m ago•1 comments

Chris Taylor on AI (2005)

https://main.kanoogi.com/updates?updates=kanoogi_updates&topic=0013#blogstart
1•fho•35m ago•0 comments

ASML raises 2026 sales outlook to €36B–€40B

https://www.asml.com/en/news/press-releases/2026/q1-2026-financial-results
2•felipevb•39m ago•0 comments

Acid-Free Paper

https://en.wikipedia.org/wiki/Acid-free_paper
2•tosh•40m ago•0 comments

Burn Peak Health for Healthy Weight Management [pdf]

https://storage.prod.researchhub.com/uploads/papers/users/187827/aceef47a-9ba6-48db-b4f1-eebb0107...
1•Zacspencet•41m ago•0 comments

LazyVim for Ambitious Developers: Second Edition

https://www.patreon.com/posts/lazyvim-for-155631128
1•DavideNL•44m ago•0 comments

People are pretending to be AI chatbots – for fun

https://www.npr.org/2026/04/14/nx-s1-5776842/ai-chatbot-comedy-ben-palmer-chatgpt
5•geox•46m ago•0 comments

Show HN: My favorite local-feeling remotely accessible Claude Code setup

https://gist.github.com/Reebz/99db98ad4d3c45ebed84989a13710788
3•Reebz•49m ago•0 comments

Capture the Narrative: Wargaming Social Media Manipulation

https://capturethenarrative.com/
2•jruohonen•52m ago•0 comments

Popular Flutter GetX repo disappeared briefly

https://github.com/jonataslaw/getx
1•nativeforks•52m ago•0 comments

Make AI say your name correctly

https://hamanlp.org/research/names/
1•boodleboodle•53m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•11mo ago

Comments

kemotep•11mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.