frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

China Is Not an "Engineering State"

https://catchingmice.substack.com/p/china-is-not-an-engineering-state
1•mike_hearn•1m ago•0 comments

Will AI Choke Off the Supply of Knowledge?

https://www.wsj.com/tech/ai/will-ai-choke-off-the-supply-of-knowledge-8a71cbcd
1•ryan_j_naughton•2m ago•0 comments

Liquid Glass Component for React Native

https://github.com/callstack/liquid-glass
1•mustaphah•2m ago•0 comments

Edit and Generate Images with Nano Banana AI

https://bananaai.live
1•MintNow•3m ago•1 comments

Eating the Future: The Metabolic Logic of AI Slop

https://www.e-flux.com/architecture/intensification/6782975/eating-the-future-the-metabolic-logic...
1•jbegley•5m ago•0 comments

Show HN: JSON Schema for Google Gemini Image Generation

https://github.com/pauhu/gemini-image-prompting-handbook
1•pauhu•5m ago•0 comments

The Last Programmers

https://www.xipu.li/posts/the-last-programmers
2•kiyanwang•10m ago•0 comments

Hallucination Risk Calculator

https://github.com/leochlon/hallbayes
1•jadelcastillo•13m ago•0 comments

Batched Critical Sections

http://kprotty.me/2025/09/08/batched-critical-sections.html
2•Bogdanp•15m ago•0 comments

Show HN: Emergency Digital Location – Share your exact location, fast and easy

https://emergencydigitalocation.com
1•JuGaDev•16m ago•0 comments

Apollo Client 4.0: A Leaner and Cleaner GraphQL Client with No Compromises

https://www.apollographql.com/blog/announcing-apollo-client-4-0
1•hackandthink•20m ago•0 comments

It Gets on Your Nerves

https://crookedtimber.org/2025/09/05/occasional-paper-it-gets-on-your-nerves/
1•stareatgoats•21m ago•0 comments

Mojeek Is Not an Answer Engine

https://blog.mojeek.com/2025/09/mojeek-is-not-an-answer-engine.html
1•dotcoma•22m ago•0 comments

How evolution explains autism rates in humans

https://phys.org/news/2025-09-evolution-autism-humans.html
1•pseudolus•23m ago•0 comments

AirPods Pro 3 Won't Get 'Major' Audio or Active Noise Cancellation Improvements

https://www.macrumors.com/2025/09/08/airpods-pro-3-no-major-anc-improvement/
1•wiry•24m ago•0 comments

Weird CPU architectures, the MOV only CPU (2020)

https://justanotherelectronicsblog.com/?p=771
1•v9v•25m ago•0 comments

Show HN: Htms-JS - Streaming HTML pipelines for Node.js

https://htms.skarab42.dev
1•skarab42•26m ago•0 comments

When Monitoring Breaks Your Front End Performance

https://www.differentshelf.com/watching-the-watchers/
1•seductivebarry•26m ago•1 comments

How off-grid solar microgrids can power the AI race (2024)

https://www.offgridai.us/
1•energy123•27m ago•0 comments

Considered Harmful

https://en.wikipedia.org/wiki/Considered_harmful
1•benbreen•27m ago•0 comments

Show HN: Seedream 4.0 (image to image), free to use 5 times per day

https://mixhubai.com/ai-models/seedream/seedream-4
1•liualexander112•27m ago•0 comments

Nepal PM Oli quits as anti-corruption protests spiral

https://www.reuters.com/world/asia-pacific/nepal-pm-oli-quits-anti-corruption-protests-spiral-202...
1•kaajoo•27m ago•0 comments

UK NHS Trust league tables published for first time

https://www.england.nhs.uk/long-read/nhs-oversight-framework-nhs-trust-performance-league-tables-...
1•6LLvveMx2koXfwn•28m ago•0 comments

X Design Notes: GADTs

https://blog.polybdenum.com/2025/09/08/x-design-notes-gadts.html
1•ibobev•28m ago•0 comments

Petition for a standardized pan-European 'EU–INC' corporate structure

https://www.eu-inc.org/cta
3•resiros•31m ago•1 comments

What I've learned about startups

https://claudio.uk/posts/startups.html
1•csantini•35m ago•0 comments

Oh no, not again a meditation on NPM supply chain attacks

https://tane.dev/2025/09/oh-no-not-again...-a-meditation-on-npm-supply-chain-attacks/
2•tanepiper•35m ago•0 comments

Car Financing – and Why It's a Trap Today

https://aristocarware.com/about
1•odogwu200•35m ago•1 comments

Show HN: Pinterest Video Downloader-The Best Free Downloader for Pinterest

https://pinterestvideodownload.org
1•Sunfin•39m ago•0 comments

Resizing images in Rust, now with EXIF orientation support

https://alexwlchan.net/2025/create-thumbnail-is-exif-aware/
2•ingve•40m ago•0 comments
Open in hackernews

Docker Considered Harmful (2025)

https://quantum5.ca/2025/03/18/docker-considered-harmful/
12•Wicher•6h ago

Comments

trilogic•5h ago
Docker is like infecting your pc on purpose, running whatever in slowmotion. Do the math!
akerouanton•4h ago
> Every time the Docker daemon starts, it changes iptables’s FORWARD chain’s policy to DROP for no reason.

Prior to v28, iptables rules were written in such a way that they depended upon the default `FORWARD` policy. To get proper container isolation, that default policy had to be set to `DROP`.

That's not the case anymore. Iptables rules have been rewritten to not depend on that default policy, but we're still setting it as users might (un)knowingly depend on that to secure their system. We thought it wasn't worth the trouble to change that after so many years. However, we added an escape hatch in the form of a new daemon parameter (named `ip-forward-no-drop`) to not force users to disable iptables integration altogether when they don't want that default policy.

We published a blog post about that, and other security hardening measures we took in v28: https://www.docker.com/blog/docker-engine-28-hardening-conta...

v29.0 will have support for nftables. It'll be marked as experimental in the first few releases to allow us to change anything without worrying about backward compatibility. However, it already provides the same feature coverage as iptables. Things will be a bit different with this firewall backend though - the Engine will refuse to start if sysctl `net.ipv4.ip_forward` is not set to 1. Users will have to set it on their own, consider the security implications, and take the necessary measures to block forwarding between non-Docker interfaces. Our rules will be isolated in their own nft table, so hopefully it'll feel less like "Docker owns the system".

> Docker’s lack of UID isolation by default

This is not my area of expertise but this is omitting that user namespaces tend to drastically increase the attack surface (despite what some vendors say). For instance: https://blog.qualys.com/vulnerabilities-threat-research/2025....

> Docker makes it quite difficult to deploy IPv6 properly in containers, [...] since Docker relies on NAT [...] The only way around this is to… write your own firewall rules

This is not true anymore. We added a network-level parameter to use IPv6 without NAT, and keep the semantic of `-p` (the port-publishing flag).

For instance, you can create a non-NAT / "routed" network with: `docker network create -o com.docker.network.bridge.gateway_mode_ipv6=routed --ipv6 testnet`. That network will get a ULA subnet assigned if no IPv6 `--subnet` was provided.

If you run a container with a published port, e.g. `docker run --network testnet -p 80/tcp …`, you container's port 80 will be accessible but not other ports.

The downside of that approach is that some / all of your routers in your local network need to learn about this subnet to correctly route it to the Docker host.

stevefan1999•4h ago
They tried to kill Kubernetes, now they try to kill Docker. Fascinating
Joker_vD•36m ago
> Docker’s lack of init by default

If anything, it's the problem with the design of the UNIX's process management, inherited thoughtlessly, which Docker decided to not deal with on its own. Why does there have to be a whole special, unkillable process whose only job is to call wait(2) in an infinite loop? Because in the original UNIX design, Ken Thompson apparently did not want to do too much work in the kernel during exit(2): if process A calls exit(2) while having 20 already exited children it didn't wait for, you either have to reap those 20 processes (which involves reading their PCBs from the swap on disk), and then potentially reap their already exited children, and their grandchildren... or you can just iterate over the process table and set the ppid of A's children to 1 and schedule PID 1 to run and let it deal with reaping one process at a time in wait(2). Essentially, the work is pushed to the scheduler, but the logic itself lives in the user space at the cost of PID space pollution.