frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: I built a toy compiler as a young dev

https://vire-lang.web.app
1•xeouz•22s ago•0 comments

You don't need Mac mini to run OpenClaw

https://runclaw.sh
1•rutagandasalim•1m ago•0 comments

Learning to Reason in 13 Parameters

https://arxiv.org/abs/2602.04118
1•nicholascarolan•3m ago•0 comments

Convergent Discovery of Critical Phenomena Mathematics Across Disciplines

https://arxiv.org/abs/2601.22389
1•energyscholar•3m ago•1 comments

Ask HN: Will GPU and RAM prices ever go down?

1•alentred•3m ago•0 comments

From hunger to luxury: The story behind the most expensive rice (2025)

https://www.cnn.com/travel/japan-expensive-rice-kinmemai-premium-intl-hnk-dst
1•mooreds•4m ago•0 comments

Substack makes money from hosting Nazi newsletters

https://www.theguardian.com/media/2026/feb/07/revealed-how-substack-makes-money-from-hosting-nazi...
4•mindracer•5m ago•1 comments

A New Crypto Winter Is Here and Even the Biggest Bulls Aren't Certain Why

https://www.wsj.com/finance/currencies/a-new-crypto-winter-is-here-and-even-the-biggest-bulls-are...
1•thm•5m ago•0 comments

Moltbook was peak AI theater

https://www.technologyreview.com/2026/02/06/1132448/moltbook-was-peak-ai-theater/
1•Brajeshwar•6m ago•0 comments

Why Claude Cowork is a math problem Indian IT can't solve

https://restofworld.org/2026/indian-it-ai-stock-crash-claude-cowork/
1•Brajeshwar•6m ago•0 comments

Show HN: Built an space travel calculator with vanilla JavaScript v2

https://www.cosmicodometer.space/
2•captainnemo729•6m ago•0 comments

Why a 175-Year-Old Glassmaker Is Suddenly an AI Superstar

https://www.wsj.com/tech/corning-fiber-optics-ai-e045ba3b
1•Brajeshwar•6m ago•0 comments

Micro-Front Ends in 2026: Architecture Win or Enterprise Tax?

https://iocombats.com/blogs/micro-frontends-in-2026
1•ghazikhan205•9m ago•0 comments

These White-Collar Workers Actually Made the Switch to a Trade

https://www.wsj.com/lifestyle/careers/white-collar-mid-career-trades-caca4b5f
1•impish9208•9m ago•1 comments

The Wonder Drug That's Plaguing Sports

https://www.nytimes.com/2026/02/02/us/ostarine-olympics-doping.html
1•mooreds•9m ago•0 comments

Show HN: Which chef knife steels are good? Data from 540 Reddit tread

https://new.knife.day/blog/reddit-steel-sentiment-analysis
1•p-s-v•10m ago•0 comments

Federated Credential Management (FedCM)

https://ciamweekly.substack.com/p/federated-credential-management-fedcm
1•mooreds•10m ago•0 comments

Token-to-Credit Conversion: Avoiding Floating-Point Errors in AI Billing Systems

https://app.writtte.com/read/kZ8Kj6R
1•lasgawe•10m ago•1 comments

The Story of Heroku (2022)

https://leerob.com/heroku
1•tosh•10m ago•0 comments

Obey the Testing Goat

https://www.obeythetestinggoat.com/
1•mkl95•11m ago•0 comments

Claude Opus 4.6 extends LLM pareto frontier

https://michaelshi.me/pareto/
1•mikeshi42•12m ago•0 comments

Brute Force Colors (2022)

https://arnaud-carre.github.io/2022-12-30-amiga-ham/
1•erickhill•15m ago•0 comments

Google Translate apparently vulnerable to prompt injection

https://www.lesswrong.com/posts/tAh2keDNEEHMXvLvz/prompt-injection-in-google-translate-reveals-ba...
1•julkali•15m ago•0 comments

(Bsky thread) "This turns the maintainer into an unwitting vibe coder"

https://bsky.app/profile/fullmoon.id/post/3meadfaulhk2s
1•todsacerdoti•16m ago•0 comments

Software development is undergoing a Renaissance in front of our eyes

https://twitter.com/gdb/status/2019566641491963946
1•tosh•16m ago•0 comments

Can you beat ensloppification? I made a quiz for Wikipedia's Signs of AI Writing

https://tryward.app/aiquiz
1•bennydog224•17m ago•1 comments

Spec-Driven Design with Kiro: Lessons from Seddle

https://medium.com/@dustin_44710/spec-driven-design-with-kiro-lessons-from-seddle-9320ef18a61f
1•nslog•17m ago•0 comments

Agents need good developer experience too

https://modal.com/blog/agents-devex
1•birdculture•19m ago•0 comments

The Dark Factory

https://twitter.com/i/status/2020161285376082326
1•Ozzie_osman•19m ago•0 comments

Free data transfer out to internet when moving out of AWS (2024)

https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/
1•tosh•20m ago•0 comments
Open in hackernews

Intel x86 considered harmful [pdf]

https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
7•throwoutway•1mo ago

Comments

FrankWilhoit•1mo ago
"Intel x86" means the ISA. They are not talking about the ISA.

They are talking about what might be called the "common-practice" PC platform. They constantly say "overly complex", but without specifying any metric, even a comparative one. What they really mean is "unfit for purpose". Suppose we agree that it is unfit for purpose: the reasons are down to other factors as well as complexity, or even the management of complexity.

Neglecting the fact that any platform that has evolved incrementally through so many generations would necessarily look very, very much like what we find, they make the point that the excessive points of failure and attack are down to the excessive number of handoffs between responsibilities. The list of those responsibilities has grown over time; it already includes irreconcilable responsibilities; it will continue to grow. Which of them would you exclude? Which are excessive? Unnecessary? Illegitimate? Who would say? These are not technical questions and they do not have technical answers.

The point is that the addition of each successive responsibility invalidated the previous architecture. Who was it said that you cannot retrofit security? If security is what you want, then define it -- now, once, for all time -- and get it right, up front. Else your efforts will be wasted. Do you say that no definition can remain valid forever? Very well, when (not if) the definition of security changes, you must (in general) start fresh. An incremental approach would be as if you were trying to retrofit some more security, and that wouldn't work even if "security" were a one-dimensional spectrum, which it isn't.

What they seem to miss is that the number of attack vectors does not scale with the number of implementation components or the number of contributors to the supply chain, or even to the platform definition. It scales with the number of requirements. If you want fewer attack vectors, you must have fewer requirements. And then we see that this applies to all aspects of computing systems, not just security.