frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

How I use Claude Code: Separation of planning and execution

https://boristane.com/blog/how-i-use-claude-code/
406•vinhnx•7h ago•239 comments

Japanese Woodblock Print Search

https://ukiyo-e.org/
60•curmudgeon22•4h ago•11 comments

A Botnet Accidentally Destroyed I2P

https://www.sambent.com/a-botnet-accidentally-destroyed-i2p-the-full-story/
84•Cider9986•6h ago•43 comments

Show HN: Llama 3.1 70B on a single RTX 3090 via NVMe-to-GPU bypassing the CPU

https://github.com/xaskasdf/ntransformer
213•xaskasdf•10h ago•51 comments

How Taalas "prints" LLM onto a chip?

https://www.anuragk.com/blog/posts/Taalas.html
64•beAroundHere•12h ago•25 comments

Two Bits Are Better Than One: making bloom filters 2x more accurate

https://floedb.ai/blog/two-bits-are-better-than-one-making-bloom-filters-2x-more-accurate
72•matheusalmeida•4d ago•13 comments

How far back in time can you understand English?

https://www.deadlanguagesociety.com/p/how-far-back-in-time-understand-english
496•spzb•3d ago•264 comments

Gamedate – A site to revive dead multiplayer games

https://gamedate.org/
64•msuniverse2026•1d ago•6 comments

Evidence of the bouba-kiki effect in naïve baby chicks

https://www.science.org/doi/10.1126/science.adq7188
117•suddenlybananas•9h ago•31 comments

Parse, Don't Validate and Type-Driven Design in Rust

https://www.harudagondi.space/blog/parse-dont-validate-and-type-driven-design-in-rust/
171•todsacerdoti•12h ago•40 comments

Scientists discover recent tectonic activity on the moon

https://phys.org/news/2026-02-scientists-tectonic-moon.html
45•bookmtn•4d ago•3 comments

zclaw: personal AI assistant in under 888 KB, running on an ESP32

https://github.com/tnm/zclaw
150•tosh•19h ago•81 comments

Claws are now a new layer on top of LLM agents

https://twitter.com/karpathy/status/2024987174077432126
266•Cyphase•1d ago•715 comments

CXMT has been offering DDR4 chips at about half the prevailing market rate

https://www.koreaherald.com/article/10679206
193•phront•17h ago•175 comments

Coccinelle: Source-to-source transformation tool

https://github.com/coccinelle/coccinelle
90•anon111332142•23h ago•27 comments

Toyota Mirai hydrogen car depreciation: 65% value loss in a year

https://carbuzz.com/toyota-mirai-massive-depreciation-one-year/
132•iancmceachern•13h ago•304 comments

The Human Root of Trust – public domain framework for agent accountability

https://humanrootoftrust.org/
11•3du4rd0v3g4•17h ago•5 comments

Forward propagation of errors through time

https://nicolaszucchet.github.io/Forward-propagation-errors-through-time/
23•iNic•2d ago•0 comments

A New Perspective on Drawing Venn Diagrams for Data Visualization

https://arxiv.org/abs/2601.06980
5•IdealeZahlen•3d ago•2 comments

I verified my LinkedIn identity. Here's what I handed over

https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/
1238•ColinWright•1d ago•431 comments

Canvas_ity: A tiny, single-header <canvas>-like 2D rasterizer for C++

https://github.com/a-e-k/canvas_ity
84•PaulHoule•12h ago•31 comments

Carelessness versus Craftsmanship in Cryptography

https://blog.trailofbits.com/2026/02/18/carelessness-versus-craftsmanship-in-cryptography/
12•ingve•3d ago•0 comments

Wave Twisters (2001)

https://www.youtube.com/watch?v=cQVRTdRnQiQ
4•hyperific•3d ago•2 comments

Be wary of Bluesky

https://kevinak.se/blog/be-wary-of-bluesky
302•kevinak•1d ago•195 comments

“Playmakers,” reviewed: The race to give every child a toy

https://www.newyorker.com/magazine/2026/02/16/playmakers-the-jewish-entrepreneurs-who-created-the...
14•fortran77•1d ago•2 comments

A16z partner says that the theory that we’ll vibe code everything is wrong

https://www.aol.com/articles/a16z-partner-says-theory-well-050150534.html
121•paulpauper•1d ago•188 comments

EDuke32 – Duke Nukem 3D (Open-Source)

https://www.eduke32.com/
179•reconnecting•11h ago•64 comments

Finding forall-exists Hyperbugs using Symbolic Execution

https://dl.acm.org/doi/full/10.1145/3689761
35•todsacerdoti•5d ago•2 comments

Keep Android Open

https://f-droid.org/2026/02/20/twif.html
2042•LorenDB•1d ago•694 comments

What not to write on your security clearance form (1988)

https://milk.com/wall-o-shame/security_clearance.html
433•wizardforhire•14h ago•191 comments
Open in hackernews

OpenEoX to Standardize End-of-Life (EOL) and End-of-Support (EOS) Information

https://openeox.org/
31•feldrim•9mo ago

Comments

feldrim•9mo ago
An SBOM-like approach to EOL/EOS issues is on the way.
rollcat•9mo ago
I think the only large projects that presently take SBOMs seriously are Nix, Guix, and Go (non-cgo). Bootstrapping is non-trivial, but at least builds are reproducible and can be compared against existing binaries.

"Oh, just write plain C". Which compiler do you mean? GCC? LLVM/clang? On top of what OS/kernel? What firmware? Etc.

Arnavion•9mo ago
Some distros packaging Rust software (OpenSUSE at least) also transparently set up CARGO=cargo-audit to get embedded SBOMs.
wallrat•9mo ago
How does this relate to the OWASP/Ecma Common Lifecycle Enumeration Specification (https://tc54.org/cle/)?
wpollock•9mo ago
In my experience, many software projects become abandoned and no notice is given. I don't see how this standard helps in such cases.
repelsteeltje•9mo ago
I think it will take a while for people to realize this effort looked great, but wasn't the right approach. Or no silver bullet, at least.

The presentation with a simple diagram that combines this data with an sbom to yield "information" gives me navel gazing vibes of UML being the future of coding.

Just as architecture didn't equate to well designed and maintainable software, I fear this initiative won't fix horribly outdated and vulnerable deployments. Software life cycle, deprecation, abandonment, supply chains are mostly a process problem, standards and technology won't fix that.

Arnavion•9mo ago
It doesn't force someone who already wasn't checking their dependencies for CVEs / maintained-ness to start doing that. It does make someone who *was* doing that be able to show they're doing that in some standard way.

In other words it doesn't force you to add an SBOM + EOX checker step to your CI pipeline. But if your compliance auditor wants you to check your dependencies, adding such a standardized step makes it easier to satisfy the auditor.

repelsteeltje•9mo ago
I'm basing this mostly off first hand and anecdotal evidence - but through the years I've found that the major contribution of audits lies in having to think about the checkboxes every now and then. And what they mean in the context of my organization or project.

Rarely have I found that compliance to the goals was an issue in themselves. Or that making changes to tick a checkbox correlated to material improvements.

That is to say that if this leads to more efficiency and makes it easier for compliance audits and such, I fear is stream lining the least impactful part of its goals.

hiatus•9mo ago
> Rarely have I found that compliance to the goals was an issue in themselves. Or that making changes to tick a checkbox correlated to material improvements.

I am confused when I hear people say stuff like this. I guess if you turn on a tool and never look at it again, it won't result in material improvements. But complying with regulations or a particular compliance regime should _absolutely_ result in at least _some_ material improvement to your security posture. Like you can implement segregation of duties just as a checkbox, or use the requirement to revisit the way you gate changes to production, as just one example.

repelsteeltje•9mo ago
It depends on where you're coming from. Your code base, that is.

If it's already outstanding, you spend a lot of time revalidating what you already know and it's often a noisy process with many false positives.

If it's in a horrible state, however, the regulation often leaves a lot of wiggle room where you do some work to achieve, say, PCI compliance and then spend a lot of time arguing why this and that don't apply in your specific case.

So admitted, the is probably some improvement in the latter case but it's hardly proportional.

So IMHO, it doesn't help those of good will & expertise and does too little for the negligent. It adds noise and in the end quality still depends on factors other than compliance and certification.

T3OU-736•9mo ago
Htm. So, how does this compare, and/or is different from https://endoflife.date?
Arnavion•9mo ago
The standard is for software to report its own EOL / EOS status. The website you linked is the opposite direction - it's aggregating that status for a certain set of software.
T3OU-736•9mo ago
Aha. Very good point. SW self-reporting requires buy-in, though, which seems like a pretty high barrier.

I am very much hoping the effort succeeds, but I am also mindful of the fact that the site to which I have linked is more successful by virtue of having better coverage.

captn3m0•9mo ago
We (endoflife.date) are also excited about OpenEoX.
mud_dauber•9mo ago
JEDEC has long maintained an EOL/EOS standard for semiconductors. This was a big part of a previous PM gig. Sounds boring, and it was. But having a process kept us out of serious hot water.
Hackbraten•9mo ago
That EoX logo though.

Every organization or committee that designs a logo should be legally required to have at least one teenager on the board to prevent accidental goatse or other inadvertent blunders.

genter•9mo ago
Goatse has been around long enough that the teenagers are now in their thirties.