frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Over 65? Congratulations, You Own the Economy

https://www.wsj.com/economy/over-65-congratulations-you-own-the-economy-5acea4c4
1•lucaspauker•1m ago•0 comments

R3forth: A Concatenative Language Derived from ColorForth

https://github.com/phreda4/r3/blob/main/doc/r3forth_tutorial.md
1•tosh•2m ago•0 comments

Laser writing in glass for dense, fast and efficient archival data storage

https://www.nature.com/articles/s41586-025-10042-w
1•saganus•2m ago•0 comments

Indistinguishable from Magic: Manufacturing Modern Computer Chips (2013) [video]

https://www.youtube.com/watch?v=NGFhc8R_uO4
1•saganus•3m ago•0 comments

A Solver for Semantle

https://victoriaritvo.com/blog/semantle-solver/
1•evakhoury•5m ago•0 comments

Complexity Science and Emergent Order: How Simple Rules Create Complex Systems

https://mysticryst.com/blogs/the-mystic-journal/complexity-science-emergent-order-simple-rules-co...
1•rolph•6m ago•0 comments

Apple iWork apps send analytics data when "Share Analytics Data" is off

https://mastodon.social/@mysk/116093012865554607
1•cdrnsf•6m ago•0 comments

Structured reasoning beats context injection 2.8x for solving the car wash

https://github.com/JO-HEEJIN/interview_mate/tree/main/car_wash
1•midmost44•7m ago•0 comments

Building an n8n AI Agent (Tutorial – Step by Step)

https://theowllogic.com/n8n-ai-agent-workflow
1•wayofthekatana•8m ago•0 comments

Discrete Structures [pdf]

https://kyleormsby.github.io/files/113spring26/113full_text.pdf
1•mathgenius•8m ago•0 comments

Godot maintainers struggle with 'demoralizing' AI slop PRs

https://www.theregister.com/2026/02/18/godot_maintainers_struggle_with_draining/
1•beardyw•8m ago•0 comments

I built 3 websites with Claude Code in 6 hours. Git is still the wall

https://www.streaming-radar.com/p/who-needs-squarespace-anymorehttps://www.streaming-radar.com/p/...
1•lbostral•8m ago•0 comments

Show HN: Free AI math solver with step-by-step explanations (no paywall)

https://www.quizwhiz.ai/tools/math-solver/
1•sunnyville•9m ago•0 comments

AI harness for PG –> CH migrations

https://clickhouse.com/blog/ai-powered-migraiton-from-postgres-to-clickhouse-with-fiveonefour
1•oatsandsugar•12m ago•0 comments

Portabase 1.2.7: Large database backup support, UI/UX improvements

2•rambokdev•13m ago•1 comments

Writes and Write-Nots

https://paulgraham.com/writes.html
2•supriyo-biswas•14m ago•0 comments

Computronium

https://en.wikipedia.org/wiki/Computronium
2•dvrp•14m ago•0 comments

Phoenix pay system fiasco: 10 years of mistakes and lessons

https://www.cbc.ca/news/canada/ottawa/federal-phoenix-pay-system-10-year-anniversary-9.7093933
3•Teever•17m ago•0 comments

Microsoft's new 10k-year data storage medium: glass

https://arstechnica.com/science/2026/02/microsofts-new-10000-year-data-storage-medium-glass/
3•danousna•17m ago•0 comments

A benchmark for vericoding: formally verified program synthesis

https://arxiv.org/abs/2509.22908
1•luskira•18m ago•0 comments

Show HN: CogmemAi – Persistent Memory for Claude Code via MCP

https://github.com/hifriendbot/cogmemai-mcp
1•hifriendbot•19m ago•0 comments

Debit, Charge, or Credit: Which Card Program Is Right for Your Business?

https://www.synctera.com/post/debit-charge-or-credit-which-card-program-is-right-for-your-business
2•thatdrew•19m ago•0 comments

Show HN: Syncpack v14, Monorepo CLI tool

https://syncpack.dev/
2•fold_left•19m ago•0 comments

Ex-DeepMind's David Silver Eyes $1B Fundraise for Ineffable Intelligence

https://techfundingnews.com/ex-deepmind-ai-researcher-eyes-1b-fundraise-for-london-based-ineffabl...
1•chrisloy•20m ago•0 comments

Popcorn Time R3 – The Reboot on Ethereum

https://bitcoin-zero-down-2ea152.gitlab.io/gallery/gallery-item-neg-863/
2•machardmachard•20m ago•1 comments

The Transcritical CO2 Cycle: Promise, Pitfalls, and Prospects

https://www.mdpi.com/1996-1073/19/3/585
1•PaulHoule•21m ago•0 comments

Thunderbolt 4 on PC NVM firmware update from Intel breaks compatibility

https://asusproart.medium.com/thunderbolt-on-pc-is-a-nightmare-of-intels-own-making-edd3141cc03f
2•ibobev•21m ago•0 comments

The Philosopher's Elevator

https://practicalradicalism.substack.com/p/the-philosophers-elevator
2•paulpauper•22m ago•0 comments

Texas Sues TP-Link over 'Web of Deception' About Alleged China Ties

https://www.pcmag.com/news/texas-sues-tp-link-over-web-of-deception-about-alleged-china-ties?test...
2•speckx•22m ago•0 comments

Show HN: See – searchable JSON compression, smaller than ZSTD (on our data)

https://github.com/kodomonocch1/see_proto
1•Tetsuro•22m ago•1 comments
Open in hackernews

DNS-Persist-01: A New Model for DNS-Based Challenge Validation

https://letsencrypt.org/2026/02/18/dns-persist-01.html
27•todsacerdoti•1h ago

Comments

TrueDuality•29m ago
I think this is solving a real operational pain point, definitely one that I've experienced. My biggest hesitation here is the direct exposure of the managing account identity not that I need to protect the accounts key material, I already need to do that.

While "usernames" are not generally protected to the same degree as credentials, they do matter and act as an important gate to even know about before a real attack can commence. This also provides the ability to associate random found credentials back to the sites you can now issue certificates for if they're using the same account. This is free scope expansion for any breach that occurs.

I guarantee sites like Shodan will start indexing these IDs on all domains they look at to provide those reverse lookup services.

krunck•23m ago
Exactly. They should provide the user with a list of UUIDs(or any other randomish ID tied to the actual account) that can be used in the accounturi URL for these operations.
mmh0000•9m ago
I really like and hate this at the same time.

Years ago, I had a really fubar shell script for generating the DNS-01 records on my own (non-cloud) run authoritative nameserver. It "worked," but its reliability was highly questionable.

I like this DNS-PERSIST fixes that.

But I don't understand why they chose to include the account as a plain-text string in the DNS record. Seems they could have just as easily used a randomly generated key that wouldn't mean anything to anyone outside Let's Encrypt, and without exposing my account to every privacy-invasive bot and hacker.