frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Add –implementation-language flag to Bun

https://github.com/oven-sh/bun/issues/30897
1•quasigloam•12m ago•0 comments

Show HN: Built a verifiable, open-source SoC 2 readiness scanner

https://loxeai.com
1•arjavmehta•17m ago•0 comments

Show HN: I built a free PDF editor to fix Claude's horribly-generated PDFs

https://composer-sepia.vercel.app
2•chaidhat•19m ago•1 comments

Quick, Draw - can a neural network learn to recognize doodling?

https://quickdraw.withgoogle.com/
1•nilsbunger•19m ago•0 comments

Independent dev's physics code stuns PhysicsSE admin

https://physics.stackexchange.com/questions/872398/self-organizing-acceleration-and-stability-in-...
1•spenx•20m ago•0 comments

Fisker went bankrupt and owners built an open source car company from the ashes

https://electrek.co/2026/05/16/fisker-ocean-open-source-ev-story-after-bankruptcy/
3•breve•20m ago•0 comments

OpenAI seals deal in Malta to give all Maltese access to ChatGPT Plus

https://finance.yahoo.com/sectors/technology/articles/openai-seals-deal-malta-maltese-103120887.html
1•embedding-shape•20m ago•0 comments

Self-Complementary Graphs

https://mathworld.wolfram.com/Self-ComplementaryGraph.html
1•lorenzohess•22m ago•1 comments

Curl maintainer: AI security reports are no longer slop

https://daniel.haxx.se/blog/2026/04/22/high-quality-chaos/
1•notRobot•27m ago•0 comments

Show HN: Anagardens: A Daily Word Game

https://www.anagardens.com/
1•mperrotta•28m ago•0 comments

The offline desk gadget that got me to sit up straight

https://techcrunch.com/2026/05/16/the-offline-desk-gadget-that-actually-got-me-to-sit-up-straight/
1•jnord•32m ago•1 comments

Insdubai.com: Motor insurance policies, data of insured persons was exposed

https://write-ups.security-chu.com/2026/05/insdubai-data-breach-incident.html
1•news_rt•33m ago•0 comments

Quantum-COSMOLOGICAL ALIGNMENT (d=16)

https://github.com/lizbeth307/quantum-superactivation-refutation
1•NeoOdim•36m ago•0 comments

Near-Earth Asteroid 2026 JH2 close encounter: 18 May 2026

https://www.virtualtelescope.eu/2026/05/12/near-earth-asteroid-2026-jh2-extremely-close-encounter...
1•rolph•37m ago•0 comments

My Thoughts on Bun's Rust Rewrite

https://en.liujiacai.net/2026/05/16/bun-rust-port/
1•jwzxgo•39m ago•0 comments

Singapore Former Prime Minister Lee Hsien Loong's Sudoku Solver Written in C++

https://github.com/Doppp/LHL-Sudoku-Solver
1•doppp•45m ago•0 comments

Let's Talk about Benchmarks

https://spacetimedb.com/blog/benchmarking
1•ChadNauseam•46m ago•0 comments

My Son's Math Homework Is Essentially Just Pokémon

https://www.theatlantic.com/technology/2026/05/homework-video-games-ed-tech/687198/
2•tekdude•47m ago•0 comments

Arm Holdings to Face US Antitrust Probe

https://www.bloomberg.com/news/articles/2026-05-15/arm-holdings-said-to-face-us-antitrust-probe-o...
5•fork-bomber•53m ago•0 comments

OpenAI is offering ChatGPT Plus to citizens of Malta for a year

https://www.engadget.com/2174473/openai-is-offering-chatgpt-plus-to-citizens-of-malta-for-a-year/
1•SpyCoder77•1h ago•0 comments

Assembly Language – Jesse Colin Jackson's Marching Cubes

https://www.creativeapplications.net/project/assembly-language-jesse-colin-jacksons-marching-cubes/
2•figomore•1h ago•0 comments

Your brain is always a fraction of a second behind the present

https://www.sciencefocus.com/the-human-body/brain-lives-past
3•amichail•1h ago•0 comments

Experimental weight-loss drug outperforms original GLP-1s

https://www.foxnews.com/health/experimental-obesity-drug-outperforms-traditional-weight-loss-trea...
2•paulpauper•1h ago•0 comments

We built a zero-telemetry Native Rust AI engine. (Ghost Lock included)

https://github.com/jrabbass/-esai-community-edition
1•jrabbass•1h ago•0 comments

Show HN: QuantTakeoff – Construction PDFs to takeoff and 3D scene

1•acaciabengo•1h ago•0 comments

Ane: CLI editor that uses LSPs to let agents explore/edit code with fewer tokens

https://github.com/prettysmartdev/ane
3•archnet•1h ago•0 comments

AI's eyes to help with component inspections

https://newsreleases.sandia.gov/ai-inspections/
1•hhs•1h ago•0 comments

Show HN: Where do I stand? – Household Health

https://wheredoistand.me/
1•vgrocha•1h ago•0 comments

Singapore Foreign Minister's Keynote at AI Engineer Singapore

https://www.youtube.com/watch?v=t-4a20_iYhg
2•doppp•1h ago•0 comments

White monkeys to make Chinese business look more global

https://www.theguardian.com/lifeandstyle/2026/may/16/fake-lawyers-scientists-chefs-punters-white-...
2•andsoitis•1h ago•1 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•1y ago

Comments

kemotep•1y ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.