frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Carbon Chauvinism

https://en.wikipedia.org/wiki/Carbon_chauvinism
1•bookofjoe•55s ago•0 comments

Researchers create safer nonstick surface, cutting use of 'forever chemicals'

https://phys.org/news/2025-07-safer-nonstick-surface-chemicals.html
1•mikhael•1m ago•0 comments

The Depopulation Bomb, Two Economists Make the Case for Humans

https://mishtalk.com/economics/the-depopulation-bomb-two-economists-make-the-case-for-humans/
1•Bluestein•1m ago•0 comments

National Aviation Reporting Center on Anomalous Phenomena

https://www.narcap.org
1•handfuloflight•2m ago•0 comments

Is Jeff Bezos killing The Washington Post on purpose or by accident?

2•dotcoma•6m ago•3 comments

Russian networks flood Internet with propaganda, aiming to corrupt AI chatbots

https://thebulletin.org/2025/03/russian-networks-flood-the-internet-with-propaganda-aiming-to-corrupt-ai-chatbots/
2•dotcoma•13m ago•0 comments

Satirist Tom Lehrer dies at 97

https://www.bbc.com/news/articles/cpv02yd2714o
2•Teever•14m ago•0 comments

Navigate Gates

https://mht.wtf/post/navigate/
2•martinhath•16m ago•0 comments

The size and homogeneity of acquaintanceship networks in the Netherlands

https://www.sciencedirect.com/science/article/pii/S0378873325000383
1•PaulHoule•16m ago•0 comments

Revontuli Colorscheme Collection

https://codeberg.org/akselmo/Revontuli
1•todsacerdoti•18m ago•0 comments

Watching the world, one quintillionth of a second at a time

https://knowablemagazine.org/content/article/physical-world/2025/studying-the-world-an-attosecond-at-a-time
2•rntn•20m ago•0 comments

An empirical approach to economic intelligence in World War II [pdf]

https://www.cia.gov/readingroom/docs/CIA-RDP79R01001A001300010013-3.pdf
2•downboots•23m ago•0 comments

I Tested ChatGPT Agent vs. Manus AI [video]

https://www.youtube.com/watch?v=hPnCZFWgdWo
3•dulldata•24m ago•0 comments

Fuck Microsoft

https://studium.dev/tech/fuck-microsoft
7•jerlendds•27m ago•2 comments

Scaling 'Frontier' ZK Proofs on Solana

https://sculpt.fun/bloom
1•nikshepsvn•29m ago•1 comments

Every Model Learned by Gradient Descent Is Approximately a Kernel Machine

https://arxiv.org/abs/2012.00152
2•LordNibbler•29m ago•0 comments

TIL: Exception.add_note

https://daniel.feldroy.com/posts/til-2025-05-exception-add_note
2•todsacerdoti•30m ago•0 comments

Apparently a mail my server sent was stalled for 22 years??

https://old.reddit.com/r/sysadmin/comments/1ma2nlk/apparently_a_mail_my_server_sent_was_stalled_for/
1•taubek•30m ago•0 comments

IncuNest, an open-source, low-cost incubator for babies

https://www.medicalopenworld.org/en/proyecto-incunest/
1•fodmap•30m ago•0 comments

Figma Make Is Not the Future of Design

https://stackdiver.com/posts/figma-make-is-not-the-future-of-design/
4•low_tech_punk•37m ago•1 comments

Tom Lehrer, song satirist and mathematician, dies at 97

https://apnews.com/article/tom-lehrer-son-satirist-mathematician-dies-9caa7ee01faf4fbfb793d7ba984c179d
2•thedailymail•38m ago•0 comments

Open source BOM management (for me)

https://www.vincentuden.xyz/blog/pcb_management
2•vincent-uden•41m ago•0 comments

Ask HN: Is Google Evil Now?

6•roschdal•41m ago•4 comments

Why we need to talk about periods, breasts and injuries in women's sport

https://www.bbc.co.uk/news/articles/cq53v066x52o
1•microsoftedging•42m ago•0 comments

Halfway Through 2025: These Are the Open Source Tools Everyone's Talking About

https://faun.dev/c/stories/eon01/top-open-source-tools-2025-developers-love/
1•eon01•45m ago•1 comments

Pin-protected secret sharing with client-side encryption

https://github.com/streetsmart-ai/zkshare
2•streetsmartai•45m ago•0 comments

Understanding Memory Management, Part 7: Advanced Garbage Collection

https://educatedguesswork.org/posts/memory-management-7/
1•ekr____•46m ago•0 comments

When Fluid Flows Become Computers: A New Limit to AI's Predictive Power

https://lightcapai.medium.com/when-fluid-flows-become-computers-a-new-limit-to-ais-predictive-power-c601a35df20d
1•WASDAai•53m ago•1 comments

The Grizzled Mechanic Who Saved Pogacar's Tour de France

https://www.wsj.com/sports/tadej-pogacar-tour-de-france-crash-mechanic-2da6796d
2•impish9208•59m ago•2 comments

Itch.io is the latest marketplace to crack down on adult games

https://techcrunch.com/2025/07/27/itch-io-is-the-latest-marketplace-to-crack-down-on-adult-games/
9•Sourabhsss1•1h ago•2 comments
Open in hackernews

Instrumenting Next.js with runtime secret injection

https://phase.dev/blog/instrumenting-nextjs-with-runtime-secret-injection/
6•nimishk•2h ago

Comments

latchkey•2h ago
"https://api.phase.dev"

100% uptime, I'm sure.

cowthulhu•39m ago
Are you making the argument that they should have a default API route? I don't think that's very common.
latchkey•19m ago
I'm making the argument that I wouldn't rely on an API endpoint to serve up the secrets that enable my application to work. Imagine a network outage or endpoint failure when the app just happens to be redeployed.
duncanfwalker•11m ago
I think it depends on the API - we do this with AWS Secret Managers. I haven't seen it fail but if did it would only effect new instances coming into service so I think we'd have to be pretty unlucky for it to have a noticeable impact.
latchkey•8m ago
This wasn’t an AWS Secrets Manager example, and yes, there’s a guy named Murphy who wrote a law about this kind of thing.
karmakaze•5m ago
That's a whole category of software that makes large systems work: etcd, Zookeeper, HashiCorp Vault, etc.
ashwinsundar•5m ago
Looks like the Next.js gish-gallop machine is firing on all cylinders, augmented by generative AI.

    .env files are problematic because they often end up in version control or left lying on local disks unencrypted, increasing the risk of a secret leak. They're nearly impossible to manage securely at scale, are difficult to distribute across a team, and offer no access control or security.
Sure, if your developers live in a bubble and don't know any better. Otherwise, .env files are fantastic because they are dead simple. Keeping them out of VCS is simple. echo ".env" >> .gitignore

Need to share a secret value? Use any number of secure communications systems your company has in place. Or generate your own from the system that is issuing secrets. It's not the 1950s, when sharing a secret was considered a national security endeavor. This doesn't need to be rocket science.

You can communicate what's supposed to go in the .env file with a .env.template file, with a list of env variables set equal to an empty string.

I'm glad they at least share the nightmare that is client-side environment variables. Prepare to waste days/weeks of your life sifting through unresolved issues in Next.js repo on GitHub, only to discover that you have to re-architect vast swaths of an application just so a secret (of any kind) is never required on the client. This is incredibly challenging and frustrating to deal with, especially when on a deadline and you're 95% done with a working solution.

In typical Next.js fashion, the official documentation for instrumentation.ts is complete dog crap. It's deceptively short, making the naive developer think it's simple to configure. In reality, you should first read through the 50 open and 71 closed GitHub issues related just to instrumentation (https://github.com/vercel/next.js/issues?q=is%3Aissue%20stat...), and make sure you understand all the undocumented ways in which instrumentation.js will destroy any semblance of productivity or enjoyment of programming.

I'd highly recommend staying away from the dumpster fire that is Next.js. It's too bad it's like the top skill asked for by employers these days, who seem to have no idea what they're signing up for.