frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Proof of Corn

https://proofofcorn.com/
72•rocauc•55m ago•47 comments

Radicle: The Sovereign Forge

https://radicle.xyz
204•ibobev•5h ago•97 comments

Microsoft gave FBI set of BitLocker encryption keys to unlock suspects' laptops

https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock...
113•bookofjoe•53m ago•101 comments

KORG phase8 – Acoustic Synthesizer

https://www.korg.com/us/products/dj/phase8/
87•bpierre•4h ago•51 comments

AI is a horse (2024)

https://kconner.com/2024/08/02/ai-is-a-horse.html
370•zdw•3d ago•184 comments

Booting from a vinyl record (2020)

https://boginjr.com/it/sw/dev/vinyl-boot/
215•yesturi•8h ago•62 comments

Show HN: Zsweep – Play Minesweeper using only Vim motions

https://zsweep.com
36•oug-t•5d ago•15 comments

Show HN: New 3D Mapping website - Create heli orbits and "playable" map tours.

https://www.easy3dmaps.com/gallery
10•dobodob•1h ago•4 comments

Killing the ISP Appliance: An eBPF/XDP Approach to Distributed BNG

https://markgascoyne.co.uk/posts/ebpf-bng/
12•chaz6•1h ago•4 comments

Show HN: Whosthere: A LAN discovery tool with a modern TUI, written in Go

https://github.com/ramonvermeulen/whosthere
140•rvermeulen98•6h ago•53 comments

Proton Spam and the AI Consent Problem

https://dbushell.com/2026/01/22/proton-spam/
402•dbushell•11h ago•250 comments

I built a light that reacts to radio waves [video]

https://www.youtube.com/watch?v=moBCOEiqiPs
393•codetheweb•13h ago•86 comments

Gas Town's Agent Patterns, Design Bottlenecks, and Vibecoding at Scale

https://maggieappleton.com/gastown
124•pavel_lishin•2h ago•130 comments

European Alternatives

https://european-alternatives.eu
333•s_dev•5h ago•139 comments

Updates to our web search products and Programmable Search Engine capabilities

https://programmablesearchengine.googleblog.com/2026/01/updates-to-our-web-search-products.html
182•01jonny01•9h ago•156 comments

Kotlin's Rich Errors: Native, Typed Errors Without Exceptions

https://cekrem.github.io/posts/kotlin-rich-errors-elm-union-types/
13•todsacerdoti•5d ago•4 comments

Three RCEs in Ilias Learning Management System

https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce
17•hack223•3h ago•4 comments

Show HN: isometric.nyc – giant isometric pixel art map of NYC

https://cannoneyed.com/isometric-nyc/
1202•cannoneyed•1d ago•220 comments

Route leak incident on January 22, 2026

https://blog.cloudflare.com/route-leak-incident-january-22-2026/
5•nomaxx117•57m ago•0 comments

Flying with Photons: Rendering Novel Views of Propagating Light

https://anaghmalik.com/FlyingWithPhotons/
24•pillars•3d ago•8 comments

GPTZero finds 100 new hallucinations in NeurIPS 2025 accepted papers

https://gptzero.me/news/neurips/
917•segmenta•1d ago•489 comments

House Vote Keeps Federal "Kill Switch" Vehicle Mandate

https://reclaimthenet.org/house-vote-keeps-federal-kill-switch-vehicle-mandat
11•mikece•12m ago•0 comments

What has Docker become?

https://tuananh.net/2026/01/20/what-has-docker-become/
199•tuananh•6h ago•212 comments

Capital One to acquire Brex for $5.15B

https://www.reuters.com/legal/transactional/capital-one-buy-fintech-firm-brex-515-billion-deal-20...
371•personjerry•21h ago•295 comments

Replacing Protobuf with Rust to go 5 times faster

https://pgdog.dev/blog/replace-protobuf-with-rust
145•whiteros_e•9h ago•102 comments

AI Usage Policy

https://github.com/ghostty-org/ghostty/blob/main/AI_POLICY.md
435•mefengl•9h ago•221 comments

Why does SSH send 100 packets per keystroke?

https://eieio.games/blog/ssh-sends-100-packets-per-keystroke/
622•eieio•23h ago•331 comments

Presence in Death

https://rubinmuseum.org/presence-in-death/
59•tock•6h ago•22 comments

I was banned from Claude for scaffolding a Claude.md file?

https://hugodaniel.com/posts/claude-code-banned-me/
682•hugodan•1d ago•588 comments

The state of modern AI text to speech systems for screen reader users

https://stuff.interfree.ca/2026/01/05/ai-tts-for-screenreaders.html
72•tuukkao•9h ago•30 comments
Open in hackernews

Path is a utility for working with paths

https://gitlab.com/SpyrjaGaldr/path
60•spyrja•9mo ago
A recent post here got me thinking about my own personal gripes with OS path handling offerings. So I've basically spent the passed couple of days working on a little project in an attempt to rectify the situation somewhat (in the spirit of cross-platform development). It should also work pretty well with existing tools. Let me know what you think, and feel free to open an issue or a pull-request if you have any problems getting it running it on your system. Enjoy!

Github link: https://github.com/SpyrjaGaldr/path

https://simonsafar.com/2025/path_as_system_call/

https://news.ycombinator.com/item?id=43788728

Comments

vesinisa•9mo ago
What can this do that standard Unix find can not do?
autobodie•9mo ago
cross platform support, according to the description.
indemnity•9mo ago
fd exists https://github.com/sharkdp/fd
spyrja•9mo ago
Looks like it has a pretty good interface as well. It does however seem a just a bit too top-heavy (lot's of dependencies) not to mention a few more bugs than I particularly care for. But sheesh, 37K stars, it must be good for something!
blooalien•9mo ago
> ... "it must be good for something!"

It's good for finding files fast, and piping the resulting file paths into other tools for further action / handling. It does what it claims to do and does it well. :)

spyrja•9mo ago
I would say the default behaviour just isn't very ergonomic. Suppressing warnings for example requires piping to /dev/null (whereas `path` supresses permission warnings by default), if you want to limit the number of results you have to pipe the output to another command, getting xargs-like behaviour (obviously), or putting quotes around lines with embedded spaces, there are simply more hoops to jump through. It's much easier to type "path -sf .jpg .jpeg .png" than whatever would be required to get the `find` utility to do the same. (Or, say, finding all node_modules folders with "path -z n_m", it's just so much more satisfying.) But yes, these are mostly just syntactic-sugar kinds of issues. Aside from that (and perhaps the lack of cross-platform compatibility), I would say there is nothing inherently deficient about the `find` command. It's a work-horse which probably has more features than `path` does. But the latter really is growing on me. It is actually quite fun to use, if I may say so myself!
jimbokun•9mo ago
“A more ergonomic find command” is a nice elevator pitch.
pimlottc•9mo ago
From the name and description, I expected this to perform operations on file path strings, like convert relative to absolute (and vice versa), expand symlinks, convert unix paths to dos, etc. This is more like a find command.
spyrja•9mo ago
I don't see why it necessarily couldn't, my only question would be if there are really many actual use cases for such things? As far as symlinks go, I suppose being able to expand them (but not following them!) might be somewhat useful. But converting to DOS paths and vice-versa? That just doesn't seem very useful. Nevermind converting to-and-fro relative and absolute paths, I can't even imagine what the point of that would be. But perhaps I'm just not seeing the forest for the trees, as they say.
qrobit•9mo ago
As a rule of thumb I always make paths absolute when handling files in scripts. But then sometimes I need to copy a directory tree relative to $CWD somewhere else, so I convert them back to relative

Fish, being a great shell, provides this via `path` command[0]

[0]: https://fishshell.com/docs/current/cmds/path.html

jl6•9mo ago
> for the primary purpose of helping other programs know where to find stuff

Potential footgun to make a program rely on this to locate, say, a shared library (as in one of the examples), if there’s a possibility that someone has smuggled a malware’d version of it into, say, /tmp, since it defaults to searching the root directory.

spyrja•9mo ago
Kind of, but also kind of not. I mean if someone can smuggle a file into some random directory, chances are they have enough access to write directly to the "correct" folder to begin with. Personally I wouldn't execute or otherwise load any sort of executable content from a non-root directory (although certainly there are many people who wouldn't even think twice before doing such a thing). So it really just boils down to having a sane security-policy. Restrict searches with something like "path -d /usr *" and you are guaranteed not to scoop-up something that was world-writable in the first place. In fact in the example given in the README, that is precisely how that would have worked. Both /lib32 and /lib64 are owned by "root" and hence not a concern.
jl6•9mo ago
Naturally every footgun is guaranteed to be safe as long as you use it right :)

I wonder if a safer default would be to start searches at the current directory rather than the root directory?

spyrja•9mo ago
I did actually consider that at one point, but eventually decided against it because I felt would have meant a sacrifice in performance; first you'd do the local search, then start at the very top and recurse back down, checking every single entry against the local path to be sure that you don't do the local traversal all over again. Fortunately the code base is very clean and straight-forward, so it would be a fairly trivial excercise to just fork the repo and make those changes yourself to get that kind of behaviour.
spyrja•9mo ago
Well I ran a bunch of tests and it turns out that the performance wasn't actually impacted very much after all. So the changes are official. I also made some other adjustments to the default behaviour; if no pattern is specified then it just matches everything. In other words, "path -f" prints every regular file in the filesystem (starting in the current one). Anyway, thanks for the suggestion, otherwise I may not gone down that (decidedly satisfying) rabbit-hole!
account-5•9mo ago
I've been finding nushell's `ls` with a where clause is pretty good for this. There's also the `find` command too.