frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The AI Splurge Is Costing Big Tech Its Workforce

https://www.wsj.com/tech/ai/the-ai-splurge-is-costing-big-tech-its-workforce-34a88e68
1•mmurph211•1m ago•0 comments

Release PiClaw v2.0.3 – Wormulon · rcarmo/piclaw

https://github.com/rcarmo/piclaw/releases/tag/v2.0.3
1•rcarmo•2m ago•0 comments

Invincat-CLI: A Self-Learning Agent That Gets Smarter as You Use It

https://github.com/dog-qiuqiu/invincat
1•qiuqiu123•2m ago•1 comments

"Why not just use Lean?"

https://lawrencecpaulson.github.io//2026/04/23/Why_not_Lean.html
1•ibobev•3m ago•0 comments

My Workflow for Understanding LLM Architectures

https://magazine.sebastianraschka.com/p/workflow-for-understanding-llms
1•ibobev•4m ago•0 comments

Nim Version 2.2.10 Released

https://nim-lang.org//blog/2026/04/24/nim-2210.html
2•ibobev•4m ago•0 comments

Code Is a System, Not Elegant Prose

https://www.lesecretairedefernand.co/en/tech/code-is-a-system/
1•lbdremy•4m ago•0 comments

HIITify – A clean, all-in-one HIIT and Interval Timer (Beta)

https://testflight.apple.com/join/XnDw8aDC
1•pclslopes•6m ago•0 comments

Built a free market scanner for options flow, looking for feedback

https://earlybell.app
1•Pascal_F•6m ago•0 comments

Barbara Liskov – Data Abstraction, Dijkstra, Distributed Systems [video]

https://www.youtube.com/watch?v=T9CGjbPZeaM
1•justin66•6m ago•0 comments

Strings Reviewer: review your app's strings faster and with confidence

https://stringsreviewer.app/
1•efenande•6m ago•1 comments

FerresDB is now open-source – A high-performance vector database

https://github.com/ferres-db/ferres-db
1•Ferres•6m ago•0 comments

OpenAI could be making a phone with AI agents replacing apps

https://techcrunch.com/2026/04/27/openai-could-be-making-a-phone-with-ai-agents-replacing-apps/
1•Brajeshwar•7m ago•0 comments

China blocks Meta from acquiring AI startup Manus

https://www.npr.org/2026/04/27/g-s1-118892/china-blocks-meta-from-acquiring-ai-startup-manus
2•oopsiremembered•7m ago•0 comments

OpenAI and Microsoft renegotiated their deal for the second time in 6 months

https://www.businessinsider.com/openai-microsoft-partnership-agreement-changes-cloud-providers-ag...
1•vinnyglennon•9m ago•0 comments

Tarsier (Tarsiidae) – the littlest suicidal primates

https://redactedquirk.beehiiv.com/p/tarsiers-tarsiidae
1•speckx•10m ago•0 comments

AI gives more praise, less criticism to Black students

https://hechingerreport.org/proof-points-ai-bias-feedback/
1•jcdelaney•10m ago•0 comments

Neanderthals may have shared key DNA for complex language

https://phys.org/news/2026-04-neanderthals-key-dna-complex-language.html
1•gmays•11m ago•0 comments

Using LLMs to find Python C-extension bugs

https://lwn.net/SubscriberLink/1067234/801a0f084f7f0493/
1•lumpa•15m ago•0 comments

X's translate feature injects Zionist propaganda

https://twitter.com/Hezbolsonaro/status/2048227481736593589
1•sosomoxie•15m ago•0 comments

A Timeline to China Blocking Meta's $2B Manus Acquisition (Built Using Manus)

https://metamanus-rsbcnkpx.manus.space/
2•mattcollins•15m ago•0 comments

Pharmacovigilance

https://en.wikipedia.org/wiki/Pharmacovigilance
2•_Microft•17m ago•0 comments

Codedb: Code intelligence server for AI agents

https://github.com/justrach/codedb
1•doppp•17m ago•0 comments

Zork-bench: An LLM reasoning eval based on text adventure games

https://www.lowimpactfruit.com/p/zork-bench-an-llm-reasoning-eval
1•nicholasjbs•18m ago•0 comments

2026 Hugo Award Finalists

https://blog.zarfhome.com/2026/04/2026-hugo-finalists
1•speckx•20m ago•0 comments

Rvidia-exporter – Prometheus metrics exporter for Nvidia GPUs

https://github.com/neo-airouter/rvidia-exporter
1•sacrelege•20m ago•1 comments

Live coverage: SpaceX to launch final ViaSat-3 satellite on Falcon Heavy rocket

https://spaceflightnow.com/2026/04/27/live-coverage-spacex-to-launch-final-viasat-3-satellite-on-...
1•bookmtn•20m ago•0 comments

Review: The Greatest Knight, by Thomas Asbridge

https://www.thepsmiths.com/p/review-the-greatest-knight-by-thomas
1•jger15•21m ago•0 comments

Postgres's lateral joins allow for quite the good eDSL

https://bensimms.moe/postgres-lateral-makes-quite-a-good-dsl/
1•nitros•21m ago•0 comments

Bookshop.org founder on how small retailers are taking on Amazon

https://www.fastcompany.com/91529634/independent-bookstore-day-bookshop-org-founder-on-how-small-...
1•helterskelter•21m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•12mo ago

Comments

kemotep•12mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.