frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

ICE Is Not Like the Brownshirts, the Brownshirts Identified Themselves

https://www.mcsweeneys.net/articles/ice-is-nothing-like-the-brownshirts-because-the-brownshirts-a...
1•bjourne•2m ago•0 comments

The Responsibility of Intellectuals

https://www.nybooks.com/articles/1967/02/23/a-special-supplement-the-responsibility-of-intelle/
1•andsoitis•7m ago•0 comments

US SEC: India refused to serve summons to Adani Group under Hague Convention

https://economictimes.indiatimes.com/news/company/corporate-trends/us-regulator-seeks-to-bypass-i...
2•alok-g•8m ago•1 comments

Alex Honnold completes Taipei 101 skyscraper climb without ropes or safety net

https://www.cnn.com/sport/live-news/taiwan-alex-honnold-climb-taipei-101-01-25-26-intl-hnk
8•keepamovin•10m ago•1 comments

The Bay Area Has Lost Its Soul. No Wonder Everyone's Leaving [video]

https://www.youtube.com/watch?v=9_bsaF5TTEE
1•keepamovin•13m ago•0 comments

Prototyping NixOS with FDE, tang and Podman using Claude.AI

https://claude.ai/public/artifacts/e7cdb55a-3960-4dc9-bd1a-3c73a3145fb9
1•cptnslow•13m ago•1 comments

Show HN: VM-curator – a TUI alternative to libvirt and virt-manager

https://github.com/mroboff/vm-curator
1•theYipster•15m ago•0 comments

nvidia-smi hangs indefinitely after ~66 days

https://github.com/NVIDIA/open-gpu-kernel-modules/issues/971
2•tosh•18m ago•0 comments

Kb_text_shape: Harfbuzz like single file C/C++ text shaping library

https://github.com/JimmyLefevre/kb
1•inxode•19m ago•0 comments

ADSL Works over Wet String

https://www.revk.uk/2017/12/its-official-adsl-works-over-wet-string.html
1•Tiberium•20m ago•0 comments

AI Adoption Rates by Country

https://www.visualcapitalist.com/ai-adoption-rates-by-country/
2•divbzero•23m ago•1 comments

Managing High Performers

https://twitter.com/staysaasy/status/2015026826217742509
1•thisismytest•27m ago•1 comments

The case against ultrasonic humidifiers

https://dynomight.net/humidifiers/
3•arbuge•29m ago•2 comments

Unidentified Aerial Phenomena Near Nuclear Facilities – Enigma Labs

https://enigmalabs.io/collection/a7111520-9526-4939-9a66-d225db45ba80
1•lukeplato•30m ago•0 comments

BookLore: A self-hosted, multi-user digital library

https://github.com/booklore-app/booklore
2•thunderbong•31m ago•0 comments

Second Win11 emergency out of band update to address disastrous Patch Tuesday

https://www.windowscentral.com/microsoft/windows-11/windows-11-second-emergency-out-of-band-updat...
4•speckx•34m ago•0 comments

Inside Anduril's Bolt-M Kamikaze Drone Program

https://www.twz.com/uncategorized/inside-andurils-bolt-m-kamikaze-drone-program
2•breve•37m ago•2 comments

Bluesky CEO Jay Graber: Banning under-16s won't fix social media

https://www.ft.com/content/c6980fc4-97b6-40bf-a3d0-c40c3a6cac56
3•sealeck•40m ago•1 comments

Enterprises are eyeing End-To-End AI gateways

https://llmgateway.io/blog/unified-ai-gateway
1•steebchen•41m ago•1 comments

Show HN: React-meta-SEO – Rebuilding SEO for React 19 (3KB, no providers)

https://www.npmjs.com/package/react-meta-seo
1•Hacakthon•43m ago•0 comments

Shared Garden

https://sharedgarden.io/
2•lucaspauker•46m ago•0 comments

Google's AI Detection Tool Can't Decide If Its Own AI Doctored Photo of Activist

https://theintercept.com/2026/01/24/googles-ai-detection-white-house-synthid-gemini/
1•Qem•50m ago•0 comments

Show HN: PicoFlow – a minimal Python workflow for LLM agents

2•shijizhi_1919•53m ago•0 comments

Temporal tissue dynamics from a spatial snapshot

https://www.nature.com/articles/s41586-025-09876-1
1•bookofjoe•54m ago•0 comments

Building a High-Performance Rotating Bloom Filter in Java

https://medium.com/@udaysagar.2177/building-a-high-performance-rotating-bloom-filter-in-java-a9e7...
2•udaysagar•1h ago•0 comments

David Patterson: Challenges and Research Directions for LLM Inference Hardware

https://arxiv.org/abs/2601.05047
2•transpute•1h ago•0 comments

CoCoRaHS – Community Collaborative Rain, Hail and Snow Network

https://www.cocorahs.org/
1•reaperducer•1h ago•0 comments

SenseCAP T1000: A Compact LoRaWAN/Meshtastic GNSS Tracker

https://wiki.seeedstudio.com/SenseCAP_T1000_tracker/Introduction/
1•Lwrless•1h ago•0 comments

OpenAI's GPT-5.2 model cites Grokipedia

https://www.engadget.com/ai/report-reveals-that-openais-gpt-52-model-cites-grokipedia-192532977.html
7•bhouston•1h ago•3 comments

Show HN: I built a quote search engine via "vibe coding" as a junior dev

https://www.aimoviequotes.com
1•mosbyllc•1h ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•9mo ago

Comments

kemotep•9mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.