frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

An Oral History of Unix (Thompson/Ritchie/12-More Interview Transcripts)

https://www.tuhs.org/Archive/Documentation/OralHistory/
1•rramadass•5m ago•0 comments

GABRIEL – turn messy qualitative corpora into analysis-ready datasets

https://github.com/openai/GABRIEL
1•michaelsbradley•5m ago•0 comments

Show HN: I reviewed about 300 academic papers of 2025 to write a book on startup

1•albertoasquer•6m ago•0 comments

Show HN: Founder-OS: Open Sourcing how I automate my company

https://github.com/cloudrepo-io/founder-os
1•256BitChris•9m ago•0 comments

Self-Contained Map Component for Swift with Multiple, Aggregated, Custom Markers

https://github.com/LittleGreenViper/BigJuJuMap
1•mooreds•9m ago•0 comments

The Riemann Hypothesis: Past, Present and a Letter Through Time

https://arxiv.org/abs/2602.04022
1•stared•9m ago•0 comments

Show HN: Savior – Prevent silent form data loss in the browser

https://github.com/Pepp38/Savior
1•Pepp38•11m ago•0 comments

OpenAI and Ginkgo Bioworks (YC S14) used GPT5 to lower protein production costs

https://openai.com/index/gpt-5-lowers-protein-synthesis-cost/
1•snitty•16m ago•0 comments

PPE Stockpile Degradation

https://chillphysicsenjoyer.substack.com/p/ppe-stockpile-degradation
1•crescit_eundo•16m ago•0 comments

What's the hardest thing about tracking your validated learnings?

1•localeyes•17m ago•0 comments

Show HN: Atomic Afterglow – Local-first audio analysis (Librosa/Streamlit)

https://atomic-afterglow.streamlit.app/
1•phasesequencer•18m ago•0 comments

ICE and CBP's Face-Recognition App Can't Verify Who People Are

https://www.wired.com/story/cbp-ice-dhs-mobile-fortify-face-recognition-verify-identity/
2•cdrnsf•19m ago•0 comments

Spotify, a Major Audiobook Provider, Will Soon Offer Physical Books

https://www.wsj.com/business/media/spotify-a-major-audiobook-provider-will-soon-offer-physical-bo...
2•bookofjoe•19m ago•1 comments

Distributed ML training through Web Cams

https://www.sarthakmangla.com/blog/wccl
1•amrrs•20m ago•0 comments

Unlocking a global audience with auto dubbing

https://blog.youtube/news-and-events/youtube-auto-dubbing-expressive-speech/
2•ingve•23m ago•0 comments

Ask HN: Will Crypto Currencies survive past this market downturn?

1•halamadrid•25m ago•2 comments

RMA – Compile Semgrep rules to native Rust/Tree-sitter matchers

https://github.com/bumahkib7/rust-monorepo-analyzer
1•bumahkib7•26m ago•1 comments

AI coding gap: Why senior devs are getting faster and juniors spin their wheels

https://www.zdnet.com/article/why-gen-ai-boosts-productivity-some-developers-not-others/
2•CrankyBear•27m ago•0 comments

Outlawed executable code encoded in a prime number

https://www.cs.cmu.edu/~dst/DeCSS/Gallery/Stego/illegal-primes.html
2•nucatus•27m ago•0 comments

How do you deal with SEO nowadays?

3•jackota•28m ago•6 comments

My bird has a pet hamster

https://brooke.substack.com/p/my-bird-has-a-pet-hamster
1•surprisetalk•30m ago•0 comments

The Gap Between Machines and Citizens

https://llm-politics.foaster.ai/
1•surprisetalk•30m ago•0 comments

Efficient near-telomere-to-telomere assembly of nanopore simplex reads

https://www.nature.com/articles/s41586-026-10105-6
2•bookofjoe•33m ago•0 comments

MatPy – Pure Python linear algebra library with ODE solvers

https://github.com/njryan-boou/matpy
1•njryan20051•33m ago•0 comments

Starlink fuels SpaceX growth with potential phone, more internet services

https://www.reuters.com/business/media-telecom/starlink-fuels-spacex-growth-with-potential-phone-...
3•TMWNN•36m ago•0 comments

OpenClaw (MoltBot) as a Service on DigitalOcean

https://www.digitalocean.com/blog/openclaw-digitalocean-app-platform
1•perelin•37m ago•0 comments

Show HN: Linear MCP Fast – 10x faster Linear MCP reads from local cache

https://github.com/everything-chalna/linear-mcp-fast
1•liabilityuk0•39m ago•0 comments

My Issues with ProtonMail

https://tildeweb.nl/~michiel/protonmail-issues.html
2•roywashere•43m ago•0 comments

Jane Street Blog – What if writing tests was a joyful experience?

https://blog.janestreet.com/the-joy-of-expect-tests/
2•ryanhn•44m ago•1 comments

I accidentally became a FOSS maintainer

https://www.hughrundle.net/i-accidentally-became-a-foss-maintainer-and-all-i-got-was-this-lousy-n...
1•cratermoon•44m ago•0 comments
Open in hackernews

Are Your Passwords in the Green? (2025)

https://www.hivesystems.com/blog/are-your-passwords-in-the-green
1•kemotep•9mo ago

Comments

kemotep•9mo ago
With NIST finally updating their standards to recommend 15 character password minimums last, I like to use their recommendations and compare them to these charts show how effective such a password would be.

Using E = L x log2(R), where E is entropy, L is number of characters in the password (15), and R is the total number of possible characters used (26 for all lowercase letters), you can get ~70 bits of entropy. Using a password manager like Bitwarden for a 15 character password using the full character set minus the ambiguous characters (65 characters total) leads to ~90 bits of entropy.

Using these charts and figures from the article, a well configured bcrypt setup means even the fastest computer systems still in 2025 cap out at 1 billion hashes per second for offline cracking (without getting into Nation States spending billions on just cracking your passwords, or dedicating all the world’s supercomputers or some other speculations). So to calculate how long it would take with a “realistic” password cracker in 2025, would use this formula:

((((((2^(70-1))/ 1 billion hashes per second)/ 60 seconds)/ 60 minutes)/ 24 hours)/ 365 days) to get ~18,700 years. (Nearly 20 billion years for the Bitwarden generated one)

But without a password filter checking for known bad passwords somewhere like Have I Been Pwned, even a 30 character password that has been leaked is useless. Would be instantly “cracked”. So I personally would have the password policy be:

1. 15 character minimum, no composition rules.

2. All passwords filtered for known bad passwords against HIBP.

3. Accounts protected by MFA.

4. Combination of network controls, best practices security configurations, and alerts and monitoring to help detect and limit/eliminate password guessing attacks, password database dumps.