frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Beginning January 2026, all ACM publications will be made open access

https://dl.acm.org/openaccess
1726•Kerrick•18h ago•202 comments

Getting bitten by Intel's poor naming schemes

https://lorendb.dev/posts/getting-bitten-by-poor-naming-schemes/
118•LorenDB•4h ago•59 comments

We pwned X, Vercel, Cursor, and Discord through a supply-chain attack

https://gist.github.com/hackermondev/5e2cdc32849405fff6b46957747a2d28
869•hackermondev•15h ago•327 comments

1.5 TB of VRAM on Mac Studio – RDMA over Thunderbolt 5

https://www.jeffgeerling.com/blog/2025/15-tb-vram-on-mac-studio-rdma-over-thunderbolt-5
411•rbanffy•12h ago•121 comments

Texas is suing all of the big TV makers for spying on what you watch

https://www.theverge.com/news/845400/texas-tv-makers-lawsuit-samsung-sony-lg-hisense-tcl-spying
823•tortilla•2d ago•412 comments

History LLMs: Models trained exclusively on pre-1913 texts

https://github.com/DGoettlich/history-llms
507•iamwil•11h ago•202 comments

From Zero to QED: An informal introduction to formality with Lean 4

https://sdiehl.github.io/zero-to-qed/01_introduction.html
48•rwosync•5d ago•1 comments

Show HN: Orbit a systems level programming language that compiles .sh to LLVM

https://github.com/SIE-Libraries/orbit
14•TheCodingDecode•1h ago•5 comments

Noclip.website – A digital museum of video game levels

https://noclip.website/
203•ivmoreau•8h ago•25 comments

Making Google Sans Flex

https://design.google/library/google-sans-flex-font
49•meetpateltech•4h ago•17 comments

The state of the kernel Rust experiment

https://lwn.net/SubscriberLink/1050174/63aa7da43214c3ce/
99•dochtman•6d ago•49 comments

GPT-5.2-Codex

https://openai.com/index/introducing-gpt-5-2-codex/
487•meetpateltech•16h ago•253 comments

How China built its ‘Manhattan Project’ to rival the West in AI chips

https://www.japantimes.co.jp/business/2025/12/18/tech/china-west-ai-chips/
345•artninja1988•15h ago•378 comments

Designing a Passive Lidar Detector Device

https://www.atredis.com/blog/2025/11/20/designing-a-passive-lidar-detection-sensor
6•speckx•3d ago•0 comments

Prompt caching: 10x cheaper LLM tokens, but how?

https://ngrok.com/blog/prompt-caching/
119•samwho•2d ago•16 comments

Reconstructed Commander Keen 1-3 Source Code

https://pckf.com/viewtopic.php?t=18248
77•deevus•6h ago•9 comments

Pingfs: Stores your data in ICMP ping packets

https://github.com/yarrick/pingfs
9•linkdd•5d ago•2 comments

Property-Based Testing Caught a Security Bug I Never Would Have Found

https://kiro.dev/blog/property-based-testing-fixed-security-bug/
23•nslog•10h ago•3 comments

Show HN: Picknplace.js, an alternative to drag-and-drop

https://jgthms.com/picknplace.js/
298•bbx•2d ago•112 comments

SMB Direct – SMB3 over RDMA – The Linux Kernel Documentation

https://docs.kernel.org/filesystems/smb/smbdirect.html
28•tambourine_man•8h ago•5 comments

Skills for organizations, partners, the ecosystem

https://claude.com/blog/organization-skills-and-directory
266•adocomplete•17h ago•145 comments

2026 Apple introducing more ads to increase opportunity in search results

https://ads.apple.com/app-store/help/ad-placements/0082-search-results
156•punnerud•4h ago•158 comments

Show HN: Stop AI scrapers from hammering your self-hosted blog (using porn)

https://github.com/vivienhenz24/fuzzy-canary
241•misterchocolat•2d ago•168 comments

Firefox will have an option to disable all AI features

https://mastodon.social/@firefoxwebdevs/115740500373677782
427•twapi•16h ago•390 comments

Great ideas in theoretical computer science

https://www.cs251.com/
106•sebg•11h ago•21 comments

Top Open Source Authorization Libraries (2024)

https://permify.co/post/open-source-authorization-libraries/
12•mooreds•3d ago•4 comments

Telegraph chess: A 19th century tech marvel

https://spectrum.ieee.org/telegraph-chess
32•sohkamyung•6d ago•8 comments

Two kinds of vibe coding

https://davidbau.com/archives/2025/12/16/vibe_coding.html
93•jxmorris12•13h ago•62 comments

T5Gemma 2: The next generation of encoder-decoder models

https://blog.google/technology/developers/t5gemma-2/
136•milomg•14h ago•24 comments

I've been writing ring buffers wrong all these years (2016)

https://www.snellman.net/blog/archive/2016-12-13-ring-buffers/
116•flaghacker•2d ago•49 comments
Open in hackernews

OpenEoX to Standardize End-of-Life (EOL) and End-of-Support (EOS) Information

https://openeox.org/
31•feldrim•7mo ago

Comments

feldrim•7mo ago
An SBOM-like approach to EOL/EOS issues is on the way.
rollcat•7mo ago
I think the only large projects that presently take SBOMs seriously are Nix, Guix, and Go (non-cgo). Bootstrapping is non-trivial, but at least builds are reproducible and can be compared against existing binaries.

"Oh, just write plain C". Which compiler do you mean? GCC? LLVM/clang? On top of what OS/kernel? What firmware? Etc.

Arnavion•7mo ago
Some distros packaging Rust software (OpenSUSE at least) also transparently set up CARGO=cargo-audit to get embedded SBOMs.
wallrat•7mo ago
How does this relate to the OWASP/Ecma Common Lifecycle Enumeration Specification (https://tc54.org/cle/)?
wpollock•7mo ago
In my experience, many software projects become abandoned and no notice is given. I don't see how this standard helps in such cases.
repelsteeltje•7mo ago
I think it will take a while for people to realize this effort looked great, but wasn't the right approach. Or no silver bullet, at least.

The presentation with a simple diagram that combines this data with an sbom to yield "information" gives me navel gazing vibes of UML being the future of coding.

Just as architecture didn't equate to well designed and maintainable software, I fear this initiative won't fix horribly outdated and vulnerable deployments. Software life cycle, deprecation, abandonment, supply chains are mostly a process problem, standards and technology won't fix that.

Arnavion•7mo ago
It doesn't force someone who already wasn't checking their dependencies for CVEs / maintained-ness to start doing that. It does make someone who *was* doing that be able to show they're doing that in some standard way.

In other words it doesn't force you to add an SBOM + EOX checker step to your CI pipeline. But if your compliance auditor wants you to check your dependencies, adding such a standardized step makes it easier to satisfy the auditor.

repelsteeltje•7mo ago
I'm basing this mostly off first hand and anecdotal evidence - but through the years I've found that the major contribution of audits lies in having to think about the checkboxes every now and then. And what they mean in the context of my organization or project.

Rarely have I found that compliance to the goals was an issue in themselves. Or that making changes to tick a checkbox correlated to material improvements.

That is to say that if this leads to more efficiency and makes it easier for compliance audits and such, I fear is stream lining the least impactful part of its goals.

hiatus•7mo ago
> Rarely have I found that compliance to the goals was an issue in themselves. Or that making changes to tick a checkbox correlated to material improvements.

I am confused when I hear people say stuff like this. I guess if you turn on a tool and never look at it again, it won't result in material improvements. But complying with regulations or a particular compliance regime should _absolutely_ result in at least _some_ material improvement to your security posture. Like you can implement segregation of duties just as a checkbox, or use the requirement to revisit the way you gate changes to production, as just one example.

repelsteeltje•7mo ago
It depends on where you're coming from. Your code base, that is.

If it's already outstanding, you spend a lot of time revalidating what you already know and it's often a noisy process with many false positives.

If it's in a horrible state, however, the regulation often leaves a lot of wiggle room where you do some work to achieve, say, PCI compliance and then spend a lot of time arguing why this and that don't apply in your specific case.

So admitted, the is probably some improvement in the latter case but it's hardly proportional.

So IMHO, it doesn't help those of good will & expertise and does too little for the negligent. It adds noise and in the end quality still depends on factors other than compliance and certification.

T3OU-736•7mo ago
Htm. So, how does this compare, and/or is different from https://endoflife.date?
Arnavion•7mo ago
The standard is for software to report its own EOL / EOS status. The website you linked is the opposite direction - it's aggregating that status for a certain set of software.
T3OU-736•7mo ago
Aha. Very good point. SW self-reporting requires buy-in, though, which seems like a pretty high barrier.

I am very much hoping the effort succeeds, but I am also mindful of the fact that the site to which I have linked is more successful by virtue of having better coverage.

captn3m0•7mo ago
We (endoflife.date) are also excited about OpenEoX.
mud_dauber•7mo ago
JEDEC has long maintained an EOL/EOS standard for semiconductors. This was a big part of a previous PM gig. Sounds boring, and it was. But having a process kept us out of serious hot water.
Hackbraten•7mo ago
That EoX logo though.

Every organization or committee that designs a logo should be legally required to have at least one teenager on the board to prevent accidental goatse or other inadvertent blunders.

genter•7mo ago
Goatse has been around long enough that the teenagers are now in their thirties.