frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: A smarter app directory built on real-time news relevance

https://www.worldpulsenow.com/apps
1•x110•18s ago•0 comments

Moonshot Space Raises $12M for Electromagnetic Launch

https://payloadspace.com/moonshot-space-raises-12m-for-electromagnetic-launch/
1•myth_drannon•59s ago•0 comments

DJI will end support for these drones, payloads next month

https://dronedj.com/2025/12/02/dji-service-support-matrice-drones/
1•bookofjoe•1m ago•0 comments

Next job may come from a stranger

https://www.careersycoaching.com/blog/your-next-job-may-come-from-a-stranger
1•andrewstetsenko•1m ago•0 comments

Ask HN: Does anything beat Hetzner storage boxes for the price?

1•opengrass•2m ago•0 comments

Learning Rust: Download and deserialize 10 000 files in 9.833 seconds

https://rup12.net/posts/download-and-deserialize-10000-files-in-10-seconds/
1•auraham•5m ago•0 comments

Show HN: HCL-Schema – Create HCL Schemas Using HCL Files

https://github.com/avestura/hcl-schema
1•avestura•6m ago•0 comments

Harden Runner Detected the SHA1-Hulud Supply Chain Attack in CNCF's Backstage

https://www.stepsecurity.io/blog/how-harden-runner-detected-the-sha1-hulud-supply-chain-attack-in...
1•varunsharma07•6m ago•1 comments

I made a little audio speed calculator

https://evanhahn.com/playback-speed-calculator/
1•speckx•6m ago•0 comments

Slide (Dyanmic strudel player and collection)

https://harambe.merkoba.com/post/01kbjwcnnt
1•caliweed•7m ago•0 comments

CVE-2025-55182: pre-auth remote code execution in React Server Components

https://nvd.nist.gov/vuln/detail/CVE-2025-55182
2•janandonly•8m ago•0 comments

Trumpkin's Notes on Building a Sauna

https://localmile.org/trumpkins-notes-on-building-a-sauna/
1•stevekemp•9m ago•0 comments

Getting the most out of Claude Code

https://www.aitidbits.ai/p/claude-code-best-practices
1•wordsaboutcode•9m ago•0 comments

Show HN: Outrage – contact your local elected representatives in minutes

https://www.outrage.gg/
1•bitforger•9m ago•0 comments

Apple Design Official Alan Dye Poached by Meta in Major Coup

https://www.bloomberg.com/news/articles/2025-12-03/apple-design-executive-alan-dye-poached-by-met...
2•ChrisArchitect•9m ago•0 comments

Google is staring to force age verification

https://old.reddit.com/r/degoogle/comments/1pd4hlx/its_starting/
4•cft•10m ago•0 comments

Nearly Half of Young Japanese Workers Spend Big on Fandom Activities

https://www.tokyoweekender.com/japan-life/news-and-opinion/young-japanese-workers-spend-big-on-id...
1•PaulHoule•11m ago•0 comments

Rocketable: Buy companies and fire all their employees (YC W25)

https://www.ycombinator.com/companies/rocketable
1•conartist6•11m ago•1 comments

Russia blocks access to US children's gaming platform Roblox

https://www.reuters.com/technology/russia-blocks-access-us-childrens-gaming-platform-roblox-2025-...
2•c420•12m ago•0 comments

Apple Design VP Alan Dye Departing for Meta

https://9to5mac.com/2025/12/03/apple-design-vp-alan-dye-departing-for-meta/
4•jbredeche•13m ago•2 comments

Utah's proposed homeless camp claims to be 'most compassionate policy anywhere'

https://www.deseret.com/politics/2025/10/29/utah-governor-says-homeless-campus-is-most-compassion...
1•nephihaha•14m ago•2 comments

Unified Vision-Language Agents – Detect, Segment, OCR, Generate and More

https://github.com/vlm-run/vlmrun-cookbook/blob/main/notebooks/12_orion_image_understanding.ipynb
3•fzysingularity•14m ago•1 comments

Show HN: Niccup – Hiccup-Like HTML Generation in ~120 Lines of Pure Nix

https://embedding-shapes.github.io/introducing-niccup/
1•embedding-shape•15m ago•0 comments

Miracle

https://en.wikipedia.org/wiki/Miracle
1•marysminefnuf•17m ago•0 comments

A super-fast, no-signup Planning Poker tool I built for remote teams

https://scrumpoker-online.de/en/
1•syn-ack-syn•20m ago•1 comments

Protestant Magic Today

https://www.thefitzwilliam.com/p/protestant-magic-today
1•MajesticFrogBoy•20m ago•0 comments

No room for error – A case study of Gleam in production at Uncover

https://gleam.run/case-studies/uncover/
3•kamilap•21m ago•0 comments

Everyone in Seattle hates AI

https://jonready.com/blog/posts/everyone-in-seattle-hates-ai.html
28•mips_avatar•24m ago•9 comments

The Future of EU eCall: Why Automotive Crash Reporting Is About to Get Smarter

https://www.smarteye.se/blog/euro-ncap-2026-ecall-crash-reporting/
1•walterbell•24m ago•0 comments

A sick tool for visualizing graphs built with DuckDB WASM and cosmos.gl

https://cosmograph.app
1•ernaem•24m ago•0 comments
Open in hackernews

Using ClickHouse for L7 DDoS and Bot Traffic Analytics with Tempesta FW

https://tempesta-tech.com/blog/defending-against-l7-ddos-and-web-bots-with-tempesta-fw/
1•krizhanovsky•50m ago

Comments

krizhanovsky•50m ago
Most open-source L7 DDoS mitigation and bot-protection approaches rely on challenges (e.g., CAPTCHA or JavaScript proof-of-work) or static rules based on the User-Agent, Referer, or client geolocation. These techniques are increasingly ineffective, as they are easily bypassed by modern open-source impersonation libraries and paid cloud proxy networks.

We explore a different approach: classifying HTTP client requests in near real time using ClickHouse as the primary analytics backend.

We collect access logs directly from Tempesta FW (https://github.com/tempesta-tech/tempesta), a high-performance open-source hybrid of an HTTP reverse proxy and a firewall. Tempesta FW implements zero-copy per-CPU log shipping into ClickHouse, so the dataset growth rate is limited only by ClickHouse bulk ingestion performance - which is very high.

WebShield (https://github.com/tempesta-tech/webshield/), a small open-source Python daemon:

* periodically executes analytic queries to detect spikes in traffic (requests or bytes per second), response delays, surges in HTTP error codes, and other anomalies;

* upon detecting a spike, classifies the clients and validates the current model;

* if the model is validated, automatically blocks malicious clients by IP, TLS fingerprints, or HTTP fingerprints.

To simplify and accelerate classification — whether automatic or manual — we introduced a new TLS fingerprinting method.

WebShield is a small and simple daemon, yet it is effective against multi-thousand-IP botnets.