frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Deep Delta Learning

https://github.com/yifanzhang-pro/deep-delta-learning
1•pama•50s ago•0 comments

'They sowed chaos to no avail': the lasting legacy of Elon Musk's DOGE

https://www.theguardian.com/technology/2026/jan/01/elon-musk-doge-legacy-government
2•jethronethro•1m ago•0 comments

The Year That Kicked My Ass

https://furbo.org/2026/01/01/the-year-that-kicked-my-ass/
1•bangonkeyboard•1m ago•0 comments

Secure File Cloud

https://nulldrop.xyz
1•thximpulse•1m ago•0 comments

Things Every Fresh Graduate Should Know About Software Performance

https://johnnysswlab.com/9-things-every-fresh-graduate-should-know-about-software-performance/
1•kiriberty•2m ago•1 comments

DeepSeek MHC: Manifold-Constrained Hyper-Connections

https://twitter.com/Dorialexander/status/2006680750230249839
1•naves•4m ago•0 comments

Notes on Taiwan

https://www.thefitzwilliam.com/p/notes-on-taiwan
1•MajesticFrogBoy•7m ago•0 comments

Tech Startups Are Handing Out Free Nicotine Pouches to Boost Productivity

https://www.wsj.com/tech/tech-startups-are-handing-out-free-nicotine-pouches-to-boost-productivit...
1•gpi•14m ago•1 comments

Owning a smartphone at age 12 linked to mental and physical health risks

https://medicalxpress.com/news/2025-12-smartphone-age-linked-mental-physical.html
3•PaulHoule•14m ago•0 comments

Six Harmless Bugs Lead to Remote Code Execution

https://mehmetince.net/the-story-of-a-perfect-exploit-chain-six-bugs-that-looked-harmless-until-t...
1•ozirus•15m ago•0 comments

Oxidation and Radiation – the Rise of uv in 2025

https://zahlman.github.io/posts/2025/12/31/oxidation/
4•zahlman•18m ago•0 comments

My personal data collection practice evolved over the years

https://www.artfish.ai/p/2025-data-collection-wrapped
1•yenniejun111•18m ago•0 comments

PlayStation 5 ROM Keys Leaked

https://www.psdevwiki.com/ps5/Keys
1•tragiclos•19m ago•0 comments

Starlink satellites being lowered from 550 km to 480 km

https://twitter.com/michaelnicollsx/status/2006790372681220530
2•wmf•19m ago•0 comments

Eric Fromm and New Year's Irresolutions

https://achad4.substack.com/p/eric-fromm-and-new-years-irresolutions
1•achad45•19m ago•0 comments

A Man Who Was Supposed to Kill Martin Luther King Jr

https://slate.com/news-and-politics/2025/12/martin-luther-king-mlk-fbi-files-murder-assassination...
1•rmason•21m ago•0 comments

Show HN: Topological Obstruction Proof for P vs. NP (Derived in Solitary)

https://www.academia.edu/145628758/P_NP_Spectral_Geometric_Proof_via_Homological_Obstructions_in_...
1•MohskiBroskiAI•21m ago•1 comments

Introduction – Create Your Own Programming Language with Rust

https://createlang.rs
2•birdculture•21m ago•0 comments

A new type of compass [video]

https://www.youtube.com/watch?v=eiDhbZ8-BZI
1•xomiachuna•25m ago•1 comments

A love song for Linux gamers with old GPUs

https://timur.hu/blog/2025/love-song-for-linux-gamers-with-old-gpus-eoy2025
1•epakai•26m ago•0 comments

Show HN: Speak Your Find – Voice-first intent matching with Gemini and pgvector

https://speakyourfind.com/
1•sameg14•26m ago•0 comments

Updated for 2026: Forward Deployed Engineer Rule Book

https://www.amazon.com/dp/B0FXSZW5HB
2•STEM-AI-FDE•28m ago•0 comments

Show HN: Securing a no-traffic VPS by watching SSH and HTTP logs

1•muthuishere•29m ago•0 comments

Better ELF symbol lookup via DT_GNU_HASH

https://flapenguin.me/elf-dt-gnu-hash
1•dboon•29m ago•0 comments

Namecheap takes down domain hosting video archives of Israeli war crimes

https://neosmart.net/blog/namecheap-com-revokes-domain-hosting-video-archives-of-israeli-war-crimes/
6•ComputerGuru•30m ago•1 comments

Change is the root of all (evil) bugs

https://fhur.me/posts/2026/change-is-the-root-of-all-evil-bugs
1•fernandohur•39m ago•0 comments

Show HN: Wreckruiter – Check a recruiter before you respond

https://www.wreckruiter.com
2•ohMoshko•40m ago•1 comments

Prompting People

https://kuber.studio/blog/Reflections/Prompting-People
1•kuberwastaken•43m ago•0 comments

Truthsorting

https://dailybaffle.com/truthsorting
4•triword•44m ago•3 comments

Writing an eigenvalue solver in Rust for WebAssembly

https://abstractnonsense.xyz/blog/2025-12-31-eigenvalue-solver-in-rust-for-webassembly/
1•subset•45m ago•0 comments
Open in hackernews

No as a Service

https://github.com/hotheadhacker/no-as-a-service
64•radeeyate•8mo ago

Comments

Haeuserschlucht•8mo ago
:)
artogahr•8mo ago
:)
blahaj•8mo ago
> Rate Limit: 10 requests per minute per IP

I understand that one wants some rate limiting so that others don't just use this as a backend for their own service causing every single request for their service to also create an API request. But this is as simple and resource unintensive as it gets for an HTTP server. 10 requests per minute is just silly.

Also could it be that the limit isn't enforced against the origin IP address but against the whole Cloudflare reverse proxy?

jaywcarman•8mo ago
10 requests per minute per IP is plenty enough to play around with and have a little fun. For anything more than that you could (should!) host it yourself.
blahaj•8mo ago
So it is just purposefully made to be less useful? Is that part of the joke?

The rate limit still pretty surely isn't applied per IP.

arp242•8mo ago
Mate, it's a joke, not a serous service. The only silly thing here is going off on a tangent about the rate limit.
mindtricks•8mo ago
If it helps you, think of the rate limiter as the "no" final boss.
choult•8mo ago
Well this is something... someone creating a service off the back of a meme that's been flying around my networks for the past two days...
ziddoap•8mo ago
Fun idea. I wonder why the rejection messages are repeated so often in the "reasons" file.

"I truly value our connection, and I hope my no doesn't change that." shows up 45 times.

Seems like most of the rejections appear between 30 and 50 times.

khanan•8mo ago
Was wondering the same thing.. Probably cruft so it looks impressive at a glance.
Retr0id•8mo ago
If you ask LLMs for a long enough list of things, they often repeat entries.
MalbertKerman•8mo ago
There are 25 unique responses in that 1000-line file.
justin_oaks•8mo ago
Once you remove the duplicates that are different only because of the typos in them, yes, that's correct.
mikepurvis•8mo ago
A single large file is also sadness for incorporating suggestions from collaborators as you're always dealing with merge conflicts. Better might be a folder of plain text files, where each can have multiple lines in it, and they're grouped by theme or contributor or something.
spiffyk•8mo ago
A folder of plain text files will be sadness for performance. It's a file with basically line-wise entries, merge conflicts in that will be dead easy to resolve with Git locally. It won't be single-click in GitHub, but not too much of a hassle.
Retr0id•8mo ago
It's ~fine for performance if you load them once at service startup. But I agree, merging is also no big deal.
mikepurvis•8mo ago
In fairness, I doubt most of these kinds of meme projects have a maintainer active enough to be willing to conduct local merges, even if it's "dead easy" to do so.

Maybe then this is really a request for Github to get better/smarter merge tools in the Web UI, particularly syntax-aware ones for structured files like JSON and YAML, where it would be much easier to guess, or even just preset AB and BA as the two concrete options available when both changes inserted new content at the same point. It could even read your .gitattributes file for supported mergers that would be able to telegraph "I don't care about the order" or "Order new list entries alphabetically" or whatever.

cf. https://github.com/jonatanpedersen/git-json-merge

KTibow•8mo ago
It might be a weighted random.
ziddoap•8mo ago
Might be!

Not the way I'd approach it, but as a joke service, if it works it works.

varun_ch•8mo ago
> {"error":"Too many requests, please try again later."}

I guess it still works.

lgl•8mo ago
Bug report: when the server is overloaded, the No's are no longer random :)
kenrick95•8mo ago
Classic Hacker News hug of death
xnorswap•8mo ago
It looks like it's limited to 10 requests per minute, it's less of a hug and more of a gentle brush past.

It's documented as "Per IP", but I'm willing to bet either that documentation is wrong, or it's picking up the IP address of the reverse proxy or whatever else is in-front of the application server, rather than the originator IP.

Why do I think that? Well these headers:

    x-powered-by Express

    x-ratelimit-limit 10

    x-ratelimit-remaining 0

Which means it's not being rate-limited by cloudflare, it's express doing the rate limiting.

And I haven't yet made 10 requests, so unless it's very bad at picking up my IP, it's picking up the cloudflare IP instead.

egberts1•8mo ago
Probably all those cookies tipped and triggered the connection rate limiter.
xnorswap•8mo ago
I'm not following you at all?
NotMichaelBay•8mo ago
It's so elegant. Even in failure, it's still operational.
riquito•8mo ago
Love it, it's brilliant, but I think the rate limiting logic is not doing what the author really wants, it actually costs more cpu to detect and produce the error than returning the regular response (then my mind goes on how to actually over optimize this thing, but that's another story :-D )
hotheadhacker•8mo ago
Rate limiting has been removed
Retr0id•8mo ago
It could be genuinely useful for testing HTTP clients if it had a wider array of failure modes.

Some ideas:

- All the different HTTP status codes

- expired/invalid TLS cert

- no TLS cipher overlap

- invalid syntax at the TLS and/or HTTP level

- hang/timeout

- endless slowloris-style response

- compression-bomb

- DNS failure (and/or round-robin DNS where some IPs are bad)

- infinite redirect loop

- ipv6-only

- ipv4-only

- Invalid JSON or XML syntax

zikani_03•8mo ago
Not exactly what you are asking for, but reminded me that Toxiproxy[0] exists if you want to test your applications or even HTTP clients against various kinds of failures:

[0]: https://github.com/Shopify/toxiproxy

deanputney•8mo ago
Not sure why, but reasons.json is mostly duplicates (as many as 50!) of the same 25 responses: https://gist.github.com/deanputney/4143ca30f7823ce53d894d3ed...

It'd be easier to add new ones if they were in there a single time each. Maybe the duplication is meant to handle distribution?

finnh•8mo ago
ah, yes, the "memory is no object" way of obtaining a weighted distribution. If you need that sweet sweet O(1) selection time, maybe check out the Alias Method :)
justin_oaks•8mo ago
Knowing that there are only 25 responses, it makes it all the more funny that rate limiting is mentioned.

And you can host the service yourself! Hard pass. I'll read the 25 responses from your gist. Thanks!

thih9•8mo ago
Example responses:

https://raw.githubusercontent.com/hotheadhacker/no-as-a-serv...

anonymousiam•8mo ago
Looks impressive, but out of the 1000 possible responses, only 26 are unique.
qrush•8mo ago
Oh great, it's Balatro's Wheel of Fortune card as a Service (WoFaaS)
hombre_fatal•8mo ago
I made a lot of things like this as a noob and threw them up on github.

As you gain experience, these projects become a testament to how far you've come.

"An http endpoint that returns a random array element" becomes so incredibly trivial that you can't believe you even made a repo for it, and one day you sheepishly delete it.

blahaj•8mo ago
I don't think things have to be impressive to be shown. A funny little idea is all you need, no matter how simple the code. Actually I find exactly that quite neat.
TehCorwiz•8mo ago
I think you'll enjoy this better: https://github.com/EnterpriseQualityCoding/FizzBuzzEnterpris...
seabass•8mo ago
{"error":"Too many requests, please try again later."}

a missed opportunity for some humor

richrichardsson•8mo ago
{"error":"Computer says no."}
readthenotes1•8mo ago
Beats "I have a headache"
n8m8•8mo ago
inb4 someone genuinely doesn't understand why you wouldn't do this with an LLM
macleginn•8mo ago
A worthy spiritual disciple of the Journal of Universal Rejection (https://www.universalrejection.org/)
svilen_dobrev•8mo ago
nice. Reminds me of BOFH (Bastard operator from Hell) . And those box-like calendars with page-per-day with some excuse^w^w tip on each :)

https://bofh.bjash.com/bofh/bofh1.html

hotheadhacker•8mo ago
The API rate limiting has been removed.