frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

InvizCrypt – Secure Cloud Documents

https://invizcrypt.com/
1•htewari•1m ago•0 comments

WebGPU support in llama.cpp

https://reeselevine.github.io/llamas-on-the-web/
1•relivin•5m ago•0 comments

Fraud Indicators Skyrocket in Minnesota Presidential Elections from 2016 Onwards

https://electiontruthalliance.substack.com/p/fraud-indicators-skyrocket-in-minnesota
2•filoeleven•6m ago•0 comments

Protégé Short Course 2026

https://protege.stanford.edu/shortcourse/
2•marcosmr•10m ago•1 comments

Lecture Notes on Statistical Physics and Neural Networks

https://arxiv.org/abs/2605.06394
1•Anon84•10m ago•0 comments

Client approvals via magic link, no more lost feedback

https://puxeline.com
1•pleedchan•10m ago•0 comments

The Pkg.go.dev API

https://go.dev/blog/pkgsite-api
2•yogorenapan•11m ago•0 comments

web-ai-sdk: experimenting with browser-native AI APIs and WebMCP

https://web-ai-sdk.dev/
1•obetomuniz•15m ago•0 comments

Where is the best place to build a bridge in Chicago?

https://thomasdhughes.com/ccac/
1•thomasdhughes2•16m ago•0 comments

One bitmask in task_struct fixes 15 years of Linux signal conflicts

https://gkoreli.com/linux-signal-stack-conflict
1•gogakoreli•16m ago•0 comments

Machine Learning with Dynamics

https://unconv.ai/blog/machine-learning-with-dynamics/
1•trextrex•21m ago•0 comments

OpenClaw leads official ARC-AGI-3 community leaderboard

https://arcprize.org/leaderboard/community
1•falcor84•22m ago•0 comments

Initial release of GrapheneOS Speech Services for text-to-speech

https://discuss.grapheneos.org/d/35722-initial-release-of-grapheneos-speech-services-for-text-to-...
2•Cider9986•26m ago•0 comments

Will agents like Git any more than we do?

https://www.amplifypartners.com/blog-posts/will-agents-like-git-any-more-than-we-do
5•itunpredictable•30m ago•0 comments

Self-hosted wikis shouldn't need an ops team

https://leafwiki.com/blog/self-hosted-wikis-shouldnt-need-an-ops-team/
1•perber•31m ago•0 comments

Debatable but likely not insane: there MAY be an issue with SpaceX' hiring

2•adinhitlore•33m ago•0 comments

Takeaways from Democrats' autopsy of Harris's 2024 loss

https://www.nytimes.com/2026/05/21/us/politics/dnc-election-autopsy-report-takeaways.html
2•brandonb•35m ago•0 comments

New Talk: From LLM Wikis to LLM Artifacts

https://academy.dair.ai/events/cmovobp97000904l5h0n9a2yz
1•omarsar•36m ago•0 comments

Meta settles social media case brought by rural Kentucky school district

https://apnews.com/article/meta-school-lawsuit-settlement-tiktok-snap-b20cdfe88dbcb55fb14808fe7f9...
4•1vuio0pswjnm7•40m ago•0 comments

Some code I played around with for reprocessing user and post positions

https://submatrix.net/article/MatrixDev/EiSRAXJDJC
1•x0x7•41m ago•0 comments

Improving my self-hosted actions runner setup

https://excipio.tech/blog/improving-my-self-hosted-actions-runner-setup/
1•lvales•41m ago•0 comments

Dakota Dust Storms Expose a $150B Economic Nightmare

https://www.bloomberg.com/opinion/articles/2026-05-21/dakota-dust-storms-expose-a-150-billion-eco...
3•littlexsparkee•42m ago•0 comments

What are the biggest challenges of building solo in the AI era?

https://partiful.com/e/SvBNyriEGJkIT0Wgzc9v
1•patrickliu007•44m ago•1 comments

When Dawkins met Claude. Could this AI be conscious?

https://unherd.com/2026/05/is-ai-the-next-phase-of-evolution/
1•tzury•44m ago•0 comments

The Maintainer's Dilemma

https://spf13.com/p/the-maintainers-dilemma/
1•nickcw•44m ago•0 comments

Jen Can Never Leave

https://www.darthealth.com/blog/jen-can-never-leave
2•mooreds•44m ago•0 comments

Agent CRM: Headless CRM for Claude and Codex

https://github.com/cluster-software/agent-crm
2•enrique_goudet•45m ago•0 comments

OpenAI and 1Password Bring Agentic Security to Codex

https://www.forbes.com/sites/timkeary/2026/05/19/openai-and-1password-bring-password-security-to-...
1•mooreds•45m ago•0 comments

Uv is fantastic, but its package management UX is a mess

https://www.loopwerk.io/articles/2026/uv-ux-mess/
2•nchagnet•46m ago•0 comments

Open Access to Standards Documents

https://discourse.llvm.org/t/rfc-open-access-to-standards-documents/90856
2•vitaut•46m ago•0 comments
Open in hackernews

Passwords are okay, impulsive Internet isn't

https://www.dedoimedo.com/life/passwords-passkeys.html
3•brycewray•1y ago

Comments

palata•1y ago
Hmm... I see a rant against the state of software (bad software, AI diarrhea, ...) and TooBigTech having control over everything. I can agree with that, but it has nothing to do with the "passwords vs passkeys" question.

The rant against passkeys? I don't get it. Just like one can use a password manager controlled by TooBigTech or KeePass, one can use a passkey controlled by TooBigTech or a Yubikey. I find it great to authenticate directly with my Yubikey (over FIDO2) instead of using my Yubikey to decrypt a password and copying it in a form.

And then there is the part that is completely wrong about security. They say that they "can't trust their phone" so they don't want to keep the passkeys there. But that is not correct: if the passkeys are encrypted and the key is stored in a TPM, then that's effectively similar to having a security key (you have to trust the TPM, just as you have to trust the security key of course).

And then there is the nonsense:

> I can set up KeePass Portable on a USB key, run it in Linux via WINE, place it inside an encrypted VeraCrypt container, copy to any which file sharing service, if I want.

If the device where you enter the password is compromised, then the password will be compromised as soon as you enter it on that device. No matter how much you show off with your funny setup with WINE and VeraCrypt. A password manager doesn't protect against that, so passwords can be exfiltrated as they are used. Whereas a FIDO2 authentication requires the passkey every time. E.g. I need to physically touch my Yubikey for it to sign the challenge. It could be MitM, but it is visible ("I touched my Yubikey and it didn't work, what happened?").

Authenticating over FIDO2 with a security key is strictly superior to entering a password in a field, period.