frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Promptguard JSON Schema Tests for LLM Outputs in GitHub Actions

https://eternallypanicked.github.io/
1•kernelpanic_dev•1m ago•1 comments

UpScrolled

https://en.wikipedia.org/wiki/UpScrolled
1•doener•2m ago•0 comments

For These Women, Grok's Sexualized Images Are Personal

https://www.rollingstone.com/culture/culture-features/grok-sexualized-image-xai-elon-musk-women-1...
2•speckx•2m ago•0 comments

Open-source AI agent starter – phone calls, email, WhatsApp, memory

https://github.com/Swimhack/strickland-agent-starter
1•Swimhack•4m ago•1 comments

One C++ header file retro game engine

https://github.com/OneLoneCoder/olcPixelGameEngine
1•mariogianota•5m ago•0 comments

Claude Code and core dumps: Finding the radio stream that hosed our servers

https://blog.marcua.net/2026/01/28/claude-code-and-core-dumps.html
1•marcua•5m ago•0 comments

Mousefood – Build embedded terminal UIs for microcontrollers

https://github.com/ratatui/mousefood
1•orhunp_•6m ago•0 comments

US tobacco brands bypass Instagram rules restricting youth access to content

https://bmjgroup.com/major-us-tobacco-brands-flouting-platform-federal-policies-to-restrict-young...
3•giuliomagnifico•6m ago•0 comments

AutoSP: Unlocking Long-Context LLM Training via Compiler-Based SP (ICLR 2026)

https://openreview.net/pdf?id=0fgsHvmBBI
1•matt_d•6m ago•0 comments

HARMless – ARM64 ELF Packer for Linux Security Research

https://github.com/litemars/hARMless
1•litemars•8m ago•1 comments

Software in a Post-Abundance World

https://newsletter.terminalprompt.com/p/software-in-a-post-abundance-world
1•joaoqalves•9m ago•0 comments

Snap spins off smart glasses team into separate company

https://www.neowin.net/news/snap-spins-off-smart-glasses-team-into-separate-company/
1•bundie•10m ago•0 comments

DanceJump for YouTube – Rhythm Dance Game – v0.3.3 Released

https://chromewebstore.google.com/detail/dancejump-for-youtube-rhy/hhdeflibphdghcpblkekakmbennfcaci
1•maaydin•10m ago•1 comments

Moderators on Reddit's R/programming are a bunch of wankers

2•mariogianota•11m ago•0 comments

Google settles for $68M after lawsuit claimed it recorded users

https://thehill.com/homenews/nexstar_media_wire/5707309-google-settles-for-68-million-after-lawsu...
2•kyrofa•11m ago•1 comments

The Ipe extensible drawing editor

https://ipe-web.otfried.org/index.html
1•remywang•12m ago•0 comments

Taghash launches services layer to streamline fund operations and compliance

https://entrackr.com/snippets/taghash-launches-services-layer-to-streamline-fund-operations-and-c...
1•koolhead17•13m ago•0 comments

How to Build a Copilot Agent

https://www.honeybadger.io/blog/copilot-custom-agents/
1•mooreds•13m ago•0 comments

New AI Agent 'Clawdbot' Exposes Users to Remote Hijacking – The Shib Daily

https://news.shib.io/2026/01/27/new-ai-agent-clawdbot-exposes-users-to-remote-hijacking/
1•ereli1•13m ago•0 comments

Yarn 6 Preview (written in Rust)

https://yarn6.netlify.app/blog/2026-01-28-yarn-6-preview/
1•jakub_g•14m ago•0 comments

A Treatise on AI Chatbots Undermining the Enlightenment

https://maggieappleton.com/ai-enlightenment
1•colinprince•14m ago•0 comments

Ask HN: Home Security for Home Owners

1•a_lifters_life•15m ago•0 comments

Computer History Museum Opens Virtually

https://hackaday.com/2026/01/28/computer-history-museum-opens-virtually/
1•oldnetguy•17m ago•0 comments

Bellingcat supplements local news coverage with forensic analysis in U.S. cities

https://www.niemanlab.org/2026/01/in-minneapolis-and-other-u-s-cities-bellingcat-supplements-loca...
2•giuliomagnifico•17m ago•0 comments

28th Virginia Battle Flag

https://en.wikipedia.org/wiki/28th_Virginia_battle_flag
1•nappy-doo•17m ago•0 comments

Two Cities Under Siege

https://radleybalko.substack.com/p/two-cities-under-siege
2•speckx•18m ago•0 comments

FOSDEM 2026 Schedule

https://fosdem.org/2026/schedule/
1•weinzierl•18m ago•0 comments

Favourite well-made apps and sites

https://unsung.aresluna.org/favourite-well-made-apps-and-sites/
1•colinprince•18m ago•0 comments

From Random Idea (AI) to 600 Users (and Shutdown) in 4 Months

https://ryanranas.medium.com/from-random-idea-ai-to-600-users-and-shutdown-in-4-months-974d4cb76848
1•ryanrana•19m ago•0 comments

Ask HN: Need for AI usage disclosure system?

1•seagram•20m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•9mo ago

Comments

kemotep•9mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.