frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: TinqerJS – LINQ Inspired ORM for TypeScript Supporting Postgres, SQLite

https://tinqerjs.org
1•jeswin•37s ago•0 comments

Buffalo: Buffalo:Buffalo

https://blog.ganets.ky/Buffalo/
1•signa11•51s ago•0 comments

From Docker Desktop (300% CPU) to Colima and Portainer (0.2%) on macOS

1•muthuishere•1m ago•0 comments

Delineating Urban Boundaries by Integrating Light Data and Spectral Indices

https://www.mdpi.com/2673-7086/5/3/49
1•PaulHoule•1m ago•0 comments

Taking remote control over industrial generators

https://eaton-works.com/2025/10/06/industrial-generator-hack/
1•EatonZ•1m ago•0 comments

OpenAI, Jony Ive struggle with technical details on secretive new AI gadget

https://arstechnica.com/ai/2025/10/openai-jony-ive-struggle-with-technical-details-on-secretive-n...
2•apparent•1m ago•0 comments

Trump sends Navy officers wild with powerful message claiming he's 'unwell'

https://www.dailymail.co.uk/news/article-15166393/Trump-friendly-doc-healthiest-president.html
1•Bender•1m ago•0 comments

Absolute beginners guide to Emacs (2012)

https://www.jesshamrick.com/post/2012-09-10-absolute-beginners-guide-to-emacs/
1•sonderotis•1m ago•0 comments

Show HN: Sidefy – Screen-edge timeline event aggregator for macOS

https://sidefyapp.com
1•sha2kyou•2m ago•0 comments

Show HN: Use the right credit card every time

https://whichcard.info
1•soelost•3m ago•0 comments

Apple's Unlawful Evil

https://pluralistic.net/2025/10/06/rogue-capitalism/#orphaned-syrian-refugees-need-not-apply
4•treadump•3m ago•0 comments

Mount Everest: 100s stranded as rescuers battle heavy snow after Blizzard

https://www.bbc.com/news/live/c0m4309mxygt
1•tosh•4m ago•0 comments

Turkey has become a top destination for hair transplants

https://www.npr.org/2025/10/06/nx-s1-5544362/turkey-hair-transplants-tourism
1•bookofjoe•4m ago•0 comments

Red Hat Confirms GitLab Instance Hack, Data Theft

https://www.securityweek.com/red-hat-confirms-gitlab-instance-hack-data-theft/
2•Bender•5m ago•1 comments

Expected Attention: KV Cache Compression by Estimating Attention

https://arxiv.org/abs/2510.00636
1•sonabinu•6m ago•0 comments

OpenAI, AMD Announce Computing Deal, Marking New Phase of AI Boom

https://www.wsj.com/tech/ai/openai-amd-deal-ai-chips-ed92cc42
2•airstrike•7m ago•0 comments

Goguardian

https://blocked.goguardian.com/teacher/block.html?ctx=b2k9MTM4NTE4NDE3NDAmb3U9aHR0cHMlM0ElMkYlMkZ...
1•NNDJNNninbkjk•8m ago•0 comments

Bloomberg: 'Why Fears of a Trillion-Dollar AI Bubble Are Growing'

https://finance.yahoo.com/news/why-fears-trillion-dollar-ai-130008034.html
4•MilnerRoute•14m ago•1 comments

The Shift from Animal Testing

https://www.asimov.press/p/animal-testing
2•mailyk•15m ago•0 comments

A Responsibility to the Industry

https://lmnt.me/blog/a-responsibility-to-the-industry.html
1•signa11•15m ago•0 comments

I Only Design Mobile Apps for One Type of Client Now

https://dnsk.work/blog/why-i-only-design-mobile-apps-for-one-type-of-client-now/
1•tanya-donska•15m ago•1 comments

X-ray scans reveal the hidden risks of cheap batteries

https://www.theverge.com/news/784966/lumafield-x-ray-ct-scan-lithium-ion-battery-risks-manufactur...
1•kblissett•15m ago•0 comments

Blackstone weighs options for Ancestry.com, including sale or IPO

https://www.reuters.com/business/exclusive-blackstone-mulls-options-ancestrycom-including-possibl...
3•ilamont•16m ago•0 comments

Confessions of a Perpetual Beginner

https://80yos.substack.com/p/confessions-of-a-perpetual-beginner
1•condronk•17m ago•0 comments

Breaking "Provably Correct" Leftpad

https://lukeplant.me.uk/blog/posts/breaking-provably-correct-leftpad/
1•birdculture•17m ago•0 comments

Dual-Engine Search: How Perplexity Could Challenge Google (Interactive Mockup)

https://github.com/bharathirajaj/perplexity_dual_engine_mockup
2•bharathiraja01•18m ago•0 comments

Photographic Revision vs. Reality

https://hackerfactor.com/blog/index.php?/archives/1079-Photographic-Revision-vs-Reality.html
1•milliams•18m ago•0 comments

The perils of letting AI plan your next trip

https://www.bbc.com/travel/article/20250926-the-perils-of-letting-ai-plan-your-next-trip
1•speckx•19m ago•0 comments

I brain coded a static image gallery in a few hours

https://domm.plix.at/perl/2025_10_braincoded_static_image_gallery.html
1•domm•20m ago•0 comments

Show HN: Open-Source Lovable Alternative

https://github.com/bahodirr/surgent
2•justb15•20m ago•1 comments
Open in hackernews

Vibe Coding Is the New Open Source–In the Worst Way Possible

https://www.wired.com/story/vibe-coding-is-the-new-open-source/
3•FinnLobsien•2h ago

Comments

FinnLobsien•1h ago
I thought this was an interesting article that gets a few things wrong. Obviously, shipping AI-coded stuff to prod will introduce security risks.

But I also think it's important to define what level of security is actually needed for some of these apps. Obviously if you're shipping a product to thousands of enterprise customers, security needs to be tight.

But I would equate it similar to food safety: Many common practices in home kitchens would get you fired immediately in a restaurant.

But home kitchens serve very few people, store less food and store it for less time. They also have fewer people working on them.

I think the same is true for websites and apps.

There's something to be said for the security your type of project needs vs. perfect security.

dtagames•53m ago
When I worked at IBM as a mainframe programmer in the 90's, the first lesson we were taught is, "There is no such thing as computer security, only the appearance of computer security. Usually, that is enough."

This true at the processor level because any "security" relies on the outcome of a single branch instruction in machine code. If all your security passed, we branch to the "let me in" code. If not, not. No matter how complicated your security is, it will all come down to a single branch instruction and a programmer who can affect the outcome of that branch will bypass any restrictions you put in place.

This is a fundamental truism of computer science, and the software we worked on at IBM did things like run ATMs. When was the last time you heard of someone hacking one of those to spit out bills? Usually, the appearance of computer security is enough.

FinnLobsien•23m ago
That's true. Plus the question of how much security you actually need. I've interacted with many, many websites and apps that were horribly insecure (e.g. a hotel checkin tool that stored passport scans in a public firebase bucket...).

In the vast majority of cases, this doesn't actually matter (the passport thing of course is pretty bad). If someone found a vulnerability in a vibe-coded event calendar and hacked into it to change the timing of trivia at your local sports bar... who cares?

It's like home security. If you're not rich, famous or extremely unpopular, you should definitely lock your doors, but you probably don't need armed guards.