frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Amiga Desktops Worth Seeing

https://datagubbe.se/wbshots/
1•naves•49s ago•0 comments

Keeping 20k GPUs Healthy

https://modal.com/blog/gpu-health
1•birdculture•1m ago•0 comments

Like Kompose for K8s but for Ansible

https://github.com/gh-PonyM/ansible-deploy-docker-compose-template
1•PonyM•2m ago•1 comments

Libtree: Ldd as a tree saying why a library is found or not

https://github.com/haampie/libtree
1•fanf2•2m ago•0 comments

Musk's XAI Burns Almost $8B, Reveals Optimus Plan

https://finance.yahoo.com/news/musk-xai-burns-almost-8-001211671.html
1•pinewurst•3m ago•0 comments

Database Development with AI in 2026

https://www.brentozar.com/archive/2026/01/database-development-with-ai-in-2026/
1•jiffyjlu•4m ago•0 comments

Revelium Studio turns a single image into a navigable 3D Gaussian Splat model

https://twitter.com/revelium_studio/status/2009570090568577045
1•ytpete•6m ago•0 comments

Ask HN: Where are you keeping your LLM logs?

1•platypii•8m ago•0 comments

Going for Gold: The Story of the Golden Lego RCX and NXT

https://bricknerd.com/home/going-for-gold-the-story-of-the-golden-lego-rcx-and-nxt-9-9-21
1•kotaKat•9m ago•0 comments

Former Biden Disinformation Czar Backs Foreign Penalties Against US Platforms

https://foundationforfreedomonline.com/disinformation-czar-nina-jankowicz-foreign-governments/
1•iamnothere•12m ago•1 comments

The Ainex Limit: Geometric Proof of LLM Collapse via Recursive Loops

https://github.com/mhh1430hacker/Ainex-Limit-Experiment
1•Mhh1430•13m ago•0 comments

Apple-1 Computer Prototype Board #0 – The

https://www.rrauction.com/auctions/lot-detail/350902407346003-apple-1-computer-prototype-board-0-...
1•pseudolus•13m ago•0 comments

Show HN: Auto-refreshing web screenshots in an iOS and macOS widget

https://apps.apple.com/us/app/busybody-reloading-web-widget/id6757285099
2•bluepeter•14m ago•0 comments

Exercise can be nearly as effective as therapy for depression

https://www.sciencedaily.com/releases/2026/01/260107225516.htm
1•mustaphah•15m ago•0 comments

Debian goes retro with a spatial desktop that time forgot

https://www.theregister.com/2026/01/09/desktop_classic_system/
1•speckx•18m ago•1 comments

Claude skill to search the browser history

https://github.com/mquandalle/browser-history-skill
1•httpteapot•19m ago•0 comments

Show HN: HN Dark Mode

https://chromewebstore.google.com/detail/hn-dark-mode/abpjflhoidbeaacggmdjoahiakcledna
1•vednig•19m ago•0 comments

Vibe Coding: Generating tech debt at the speed of light

https://www.augmentcode.com/blog/generating-tech-debt-at-the-speed-of-light
2•emmabotbot•20m ago•1 comments

Noise complaints spark Vietnam pickleball wars

https://www.japantimes.co.jp/sports/2025/12/31/more-sports/vietnam-pickleball-noise-wars/
1•PaulHoule•20m ago•0 comments

Show HN: Flickle–A daily puzzle based on cinematography,not trivia(PWA, Next.js)

https://www.flickle.co
1•rgb1903•20m ago•0 comments

Deconstructing the LuaJIT Pseudo Memory Leak

https://blog.openresty.com/en/luajit-plus/
1•dgares•21m ago•0 comments

Wts: Tmux friendly Git worktree management tool

https://www.npmjs.com/package/@desplega.ai/wts
1•tarasyarema•21m ago•0 comments

Ask HN: What's your preferred digital payment method?

1•vednig•22m ago•5 comments

Lord of War, meet Lord of Tokens: Testing image models on design-agency task

https://singhkays.com/blog/lord-war-test-image-models/
1•singhkays•22m ago•0 comments

Claude Code Hits Different (From Interconnects by Nathan Lambert)

https://www.interconnects.ai/p/claude-code-hits-different
1•dpflan•23m ago•1 comments

NASA Releases the Long-Awaited Video of Kepler's Supernova Remnant

https://www.universetoday.com/articles/nasa-releases-the-long-awaited-video-of-keplers-supernova-...
1•bookofjoe•23m ago•1 comments

The Lost Subways

https://www.lostsubways.com/map-index
2•Amorymeltzer•23m ago•0 comments

Meta makes nuclear power deals with 3 companies

https://www.bnnbloomberg.ca/business/technology/2026/01/09/meta-strikes-nuclear-power-agreements-...
1•mpweiher•24m ago•1 comments

AT&T Blocks T-Mobile's Data Portability Efforts

https://blog.ericgoldman.org/archives/2026/01/att-blocks-t-mobiles-data-portability-efforts-guest...
5•hn_acker•24m ago•0 comments

MCP CLI: Call MCP Servers Efficiently

https://www.philschmid.de/mcp-cli
1•ingve•26m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•8mo ago

Comments

kemotep•8mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.