frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Symbients on Stage Coming Soon: Autonomous AI Entrepreneurs

https://www.forbes.com/sites/robertwolcott/2025/06/30/symbients-on-stage-coming-soon-autonomous-ai-entrepreneurs/
1•Bluestein•51s ago•0 comments

Can Large Language Models Help Students Prove Software Correctness?

https://arxiv.org/abs/2506.22370
1•elashri•4m ago•0 comments

Developing with GitHub Copilot Agent Mode and MCP

https://austen.info/blog/github-copilot-agent-mcp/
1•miltonlaxer•4m ago•0 comments

I got removed from GitHub for making open source stuff

2•Hasturdev•5m ago•1 comments

NASA plans to stream rocket launches on Netflix starting this summer

https://www.cnbc.com/2025/06/30/nasa-rocket-launches-netflix.html
1•rustoo•7m ago•0 comments

Large Language Model-Powered Agent for C to Rust Code Translation

https://arxiv.org/abs/2505.15858
1•elashri•9m ago•0 comments

Let's create a Tree-sitter grammar

https://www.jonashietala.se/blog/2024/03/19/lets_create_a_tree-sitter_grammar/
1•fanf2•10m ago•0 comments

Musk said to bet on Tesla delivering Robotaxi in June, those who did lost big

https://electrek.co/2025/06/30/elon-musk-bet-tesla-delivering-robotaxi-june-lost-big/
1•reaperducer•10m ago•1 comments

The story how I acquired the domain name Onions.com

https://twitter.com/searchbound/status/1939658564420641064
1•eightturn•11m ago•1 comments

Offline-First AI Platform for Resilient Edge and IoT Applications

https://github.com/GlobalSushrut/mcp-zero
1•Global_Sushrut•13m ago•0 comments

Three-Dimensional Time: A Mathematical Framework for Fundamental Physics

https://www.worldscientific.com/doi/10.1142/S2424942425500045
1•haunter•14m ago•0 comments

Young job applicants fight fire (ATS systems) with fire (AI) – Global trends

https://www.coversentry.com/ai-job-search-statistics
2•coversentry•14m ago•0 comments

Google to buy fusion startup Commonwealth's power- if they can ever make it work

https://www.theregister.com/2025/06/30/google_fusion_commonwealth/
1•rntn•15m ago•0 comments

A hoax ended up on the HN front page

https://twitter.com/AdamRFisher/status/1938959933803728997
3•nailer•16m ago•2 comments

Apple Execs on what went wrong with Siri, iOS 26 and more [video]

https://www.youtube.com/watch?v=wCEkK1YzqBo
1•amai•16m ago•0 comments

Adding Text-to-Speech to Your Blog with OpenAI's TTS API

https://econoben.dev/posts/adding-text-to-speech-to-your-blog-openai-tts-pipeline
1•EconoBen•22m ago•1 comments

Do Car Buyers Care Which Engine Is Under the Hood? A Ford Exec Doesn't Think So

https://www.thedrive.com/news/do-car-buyers-care-which-engine-is-under-the-hood-a-ford-exec-doesnt-think-so
3•PaulHoule•25m ago•1 comments

CertMate – SSL Certificate Management System

https://github.com/fabriziosalmi/certmate
2•indigodaddy•27m ago•0 comments

Ask HN: How to build a LifeOS using vibe coding?

1•agcat•28m ago•0 comments

Show HN: On-chain Fund Administration Protocol

https://www.fume.finance/
1•fume_protocol•28m ago•0 comments

Portal, for the C64

https://www.jamiefuller.com/portal/
4•rbanffy•29m ago•0 comments

Defending Savannah from DDoS Attacks

https://www.fsf.org/bulletin/2025/spring/defending-savannah-from-ddos-attacks
3•HieronymusBosch•34m ago•0 comments

Beltabol: An eager functional esolang based on the Expanse

https://github.com/demaere-oiie/beltabol
2•akkartik•37m ago•0 comments

Show HN: Transform handwritten chess notation to Lichess or chess.com instantly

https://chess-notation.com
1•coolwulf•39m ago•0 comments

Dias on the Web – Pandas Rewriter

https://www.pandas-rewriter.com/
1•baziotis•40m ago•0 comments

Bulk Lots of DB-19s for Sale

https://www.bigmessowires.com/2025/06/30/bulk-lots-of-db-19s-for-sale/
2•zdw•40m ago•0 comments

The Impact of Early Galaxy Formation on the Cosmic Microwave Background

https://arxiv.org/abs/2505.04687
1•sb057•41m ago•0 comments

My Database Is My Application: Rethinking Webhook Logic with DuckDB and SQL

https://www.hey.earth/posts/duckdb-webhook-gateway
3•chw9e•45m ago•0 comments

Jony Ive's AI gadget might be a pen

https://www.bloomberg.com/opinion/articles/2025-06-30/jony-ive-s-first-ai-gadget-clues-point-to-a-pen
3•theyinwhy•46m ago•1 comments

"Fuck the algorithm"?: What to learn from the UK's A-level grading fiasco (2020)

https://blogs.lse.ac.uk/impactofsocialsciences/2020/08/26/fk-the-algorithm-what-the-world-can-learn-from-the-uks-a-level-grading-fiasco/
1•djoldman•47m ago•0 comments
Open in hackernews

Auth for B2B SaaS: it's not like auth for consumer software

https://tesseral.com/blog/b2b-auth-isnt-that-similar-to-b2c-auth
55•noleary•5h ago

Comments

nijave•3h ago
Seems pretty good although it'd be good to callout OpenIDC as a predecessor to SAML. OpenIDC is pretty widely supported with the added benefit of not having to deal with certificate expiry.
SahAssar•3h ago
> it'd be good to callout OpenIDC as a predecessor to SAML

SAML is older than OpenID Connect by ~13 years.

jpc0•2h ago
OIDC does not in any way offer the same functionality as SCIM and SAML.

SAML is approximately OIDC + SCIM + Legacy Cruft

OkayPhysicist•1h ago
What is the extra stuff that is provided compared to OIDC? I was implementing some of this stuff recently, and for my use case (who is this user? Do they have permission to use this application? Which parts of the application are they allowed to use?) OIDC seemed to cover everything, so I'm pretty curious if I missed some functionality that SAML provides.
jpc0•1h ago
Creating the user in your application before first logon.

Removing the user from your application immediately and not when their session eventually expires.

Doing those things in batch.

Querying that data at will to produce reports.

Updating a users group membership when needed and immediately and not when you decide to do so.

And then you only need an opaque userid from me and not a fat OIDC token that knows everything about my internal structure.

deathanatos•1h ago
You're putting words in their mouth by adding in SCIM.
jpc0•1h ago
> SAML is approximately OIDC + SCIM + Legacy Cruft

I believe I added sufficient context for why I added SCIM into the mix.

nylonstrung•3h ago
How does this compare to zitadel
noleary•2h ago
(I am a cofounder of Tesseral)

Honestly, I'm not intimately familiar with Zitadel's solution. At a quick glance, it seems quite powerful! But it does seem like our product is more opinionated -- and is more narrowly focused on serving B2B applications.

I suspect that if you have the appetite and experience to build something unusual or otherwise complex, Zitadel will be a great fit. Perhaps they are like Keycloak in this respect. On the other hand, we try very hard to steer developers into a 'pit of success' by abstracting away a lot of details that most people don't need to worry about.

But I'll admit that comparison may be inaccurate; I probably will have to look in more detail. (The comparison will certainly seem wrong months / years into the future as our companies evolve!).

joseonjok•1h ago
You are building an auth and you didn't even bother doing a in depth look at what Zitadel does ???? This doesn't communicate any serious commitment or product depth. Zitadel already does B2B very well and it is not only mature but very flexible to use across much of the enterprise space.
funerr•3h ago
How does this compare to better-auth?
noleary•3h ago
(I'm a cofounder of Tesseral)

We're huge fans of Better Auth -- it's a really great offering. They might have their own take on how we differ, but here's my best attempt at a quick comparison.

We take pretty different approaches to roughly the same family of problems.

Better Auth is focused on being a great library for TypeScript. If you write Typescript and want to build your own auth, they're a great bet.

We're more of an API-first service that's agnostic to the language or framework that you use. We have a pretty opinionated product that is meant to handle auth for you -- it's not really an auth library per se.

jpc0•2h ago
I’m hoping the asked might have already known but pricing?
joseonjok•1h ago
I'm not even sure better auth is worth comparing to, there are so many critical open issues that impact not only security but feature parity with much more established and mature open source solutions.

Not to be harsh but the website not loading earlier clearly doesn't set a good first impression.

koakuma-chan•3h ago
https://tesseral.com/

Application error: a client-side exception has occurred while loading tesseral.com (see the browser console for more information).

rsstack•3h ago
Next.js doing that is like ASP.NET in production "in debug mode" printing stack traces, or PHP applications printing their MySQL connection errors. So sad.
koakuma-chan•3h ago
They gotta start catching error that webgl is disabled.
mrweasel•3h ago
Or you know, just remove the animation all together, it's not like it makes the product more compelling.
jamil7•3h ago
I've been seeing this all over the internet, even on news websites that have already loaded their content. So Next doesn't allow me to read text that's already loaded in my browser because of some random JS error I don't care about.
noleary•3h ago
oops, thanks for flagging. we'll fix this! we only recently did a complete overhaul of our website and are still patching up some details
skeptrune•3h ago
I think making it easier to respond to the super annoying requests like "make everyone use a yubikey" is a real pain point I'd buy something to solve.
weitendorf•3h ago
I've been thinking a ton about this over the last year and I think this is actually overcomplicating things. Generally from what I can tell, most of what makes Auth so painful is overcomplicating things.

My belief is that the only two things you need to know to understand Auth are Identity and your Authorization model. Everything else is just a consequence of those two things.

Consumer and B2B auth are different mostly because they have different identity and authorization models, neither of which are really that complicated to identify:

1. Consumers theoretically control their own identity but in practice almost all delegate it to gmail, facebook, microsoft, etc. Businesses have actual control over their employee's identities because they own domains and emails get routed to wherever they point their domain at.

2. Consumer authorization models by default give the user access to all of their data and none of anybody else's data, unless explicitly configured otherwise. Business authorization models work exactly the same way for admins (meaning, control of the business' source of identity gives them access to ~all of the business' data). It's kind of insane to give everybody access to everybody's data so businesses create ontologies of roles/groups/scopes so that each employee only gets just as much admin powers as they require.

Why does it work that way? Well, when you control your own identity like consumers and admins, you want to just get things done without permission and auth getting in the way. When you control other people's identity you aren't personally subject to the difficulties that arise from locking things down, but you are responsible for their identity and what that identity can do, so you do what you can to limit access.

It all kinda reduces down to the problem that the Internet didn't come with a good system for managing identity, so we all use accounts based on email, which is based on domains, which route traffic using DNS, which basically sends all the account recovery/verification/communication record for every employee of a company to one spot. There is an inherent escalation of privilege vulnerability there, and there's no good fix, so we resign ourselves to a security model that says 1. centralize all information in one place 2. do whatever possible to hide, compartmentalize, and limit access to that information. It feels insane because it is insane.

Being responsible for only your own identity, actions, access, and data: makes sense. Being responsible for everybody else's actions, access, and data (because your job is managing the thing that centralized it all in one place): nightmare fuel.

magicalhippo•2h ago
> Business authorization models work exactly the same way

Except you got people from the parent company wanting access to certain stuff, and then there's the third-party auditor that needs access and so on.

So no, B2B isn't exactly the same necessarily.

ehutch79•1h ago
From the authentication systems perspective, what exactly is the difference between an employee and 3rd party auditor?

From the authorization system, why would it care who they work for, as opposed to the permissions assigned to them?

magicalhippo•1h ago
> From the authentication systems perspective, what exactly is the difference between an employee and 3rd party auditor?

Might require different authentication providers.

> From the authorization system, why would it care who they work for, as opposed to the permissions assigned to them?

Take the case of the accountant in the parent company. Either you create a user for that accountant in each of the child companies and manage access individually for each company, or you have a single user which has access to different child companies through separate permissions or something like that.

If you do it the first way, it's more like a regular B2C case, but not exactly because you still gotta do things like automatically disable those child-users when the accountant quits the parent company.

We've hit these scenarios as customer requirements in our B2B product, YMMV.

vivzkestrel•2h ago
how does it compare to supertokens
Analemma_•2h ago
I know it is bad form to level accusations at other commenters, but I have to ask: have the LLMs infested this thread? What is with all the content-free "how does it compare to [X]" comments in here?
Polizeiposaune•1h ago
I would expect LLMs to generate a wall of text rather than ask simple questions.
rorylaitila•1h ago
I've standardized on a couple defaults that save me a lot of pain down the road. First is I always tenant by an "Organization" as the article suggests, even when the initial organization is a user of one. This allows for creating teams or organization sharing. Which for anything other than "will always be a single user app" every app eventually wants multi-user organizations.

Two, I appear as RBAC but implement ABAC under the hood. Technically the App is ABAC, but to the initial users, all they see are Roles. They cannot configure their resources. Later on, I can build interfaces for ABAC to manage their own Resources and Roles.

Bonus third, all Resources resolve to URL routes GET or POST. The application firewall prevents calls to URLs that they do not have resource permission. The server strips links and buttons from the HTML that they do not have permission to (or decorates them with a style). Thus there is no "if has resource show" code all polluting my UI.

joseonjok•1h ago
I'm puzzled as to why this area is constantly seeing reinventing the wheels? I can name a few very mature (20 years in teh making) open source projects that pretty much lets you self host everything you might possibly need to handle all sorts of authentication schemes

It seems like if its not written in Javascript people have aversion to it and this "keep everything typescript" really makes no sense to me especially when you deal with the missio n critical nature of backends.