frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Setting up a free *.city.state.us locality domain

https://fredchan.org/blog/locality-domains-guide/
140•speckx•1h ago•28 comments

Why I'm leaving GitHub for Forgejo

https://jorijn.com/en/blog/leaving-github-for-forgejo/
324•jorijn•3h ago•171 comments

I Moved My Digital Stack to Europe

https://monokai.com/articles/how-i-moved-my-digital-stack-to-europe/
599•monokai_nl•4h ago•411 comments

Open Source Resistance: keep OSS alive on company time

https://ossresistance.com/
25•mikemcquaid•1h ago•6 comments

S-100 Virtual Workbench

https://grantmestrength.github.io/S100/
9•rbanffy•28m ago•1 comments

Reverting the incremental GC in Python 3.14 and 3.15

https://discuss.python.org/t/reverting-the-incremental-gc-in-python-3-14-and-3-15/107014
100•curiousgal•3d ago•24 comments

Xs of Y – roguelike that names itself every run. Written in 4kLoC

https://github.com/nooga/xsofy
18•andsoitis•3d ago•0 comments

An idiot's guide to lead optimisation for proteins

https://magnusross.github.io/posts/protein-lead-optimisation-1/
69•magni121•2d ago•2 comments

Preserving Fisher-Price Pixter

https://dmitry.gr/?r=05.Projects&proj=37.%20Pixter
145•dmitrygr•2d ago•22 comments

New stainless steel can survive conditions for hydrogen production in seawater

https://www.sciencedaily.com/releases/2026/05/260510030950.htm
211•HardwareLust•2d ago•86 comments

Dutch suicide prevention website shares data with tech companies without consent

https://nltimes.nl/2026/05/13/dutch-suicide-prevention-hotline-shares-visitor-data-tech-companies
204•giuliomagnifico•3h ago•144 comments

50K Tahoe residents need power as utility eyes redirecting lines to data centers

https://fortune.com/2026/05/12/lake-tahoe-data-center-49000-residents-power-source/
38•cdrnsf•1h ago•12 comments

Nailing jelly to a wall: is it possible? (2005)

https://greem.co.uk/otherbits/jelly.html
30•microsoftedging•3d ago•7 comments

Restore full BambuNetwork support for Bambu Lab printers

https://github.com/FULU-Foundation/OrcaSlicer-bambulab
599•Murfalo•18h ago•263 comments

Substrate (YC S24) Is Hiring a Technical Success Manager

https://www.ycombinator.com/companies/substrate/jobs/T2fMBhD-technical-success-manager
1•kunle•4h ago

Heritability of human life span is ~50% when heritability is redefined

https://dynomight.net/lifespan/
17•surprisetalk•1d ago•9 comments

Using OR-Tools CP-SAT for Scheduling Problems

https://atalaykutlay.com/or-tools-cp-sat-for-scheduling-problems.html
49•akutlay•5h ago•10 comments

Deterministic Fully-Static Whole-Binary Translation Without Heuristics

https://arxiv.org/abs/2605.08419
263•matt_d•11h ago•63 comments

Googlebook

https://googlebook.google/
876•tambourine_man•22h ago•1452 comments

Kickstarter Is Forced to Ban Adult Content by Payment Processors

https://kotaku.com/kickstarter-is-the-latest-platform-seemingly-forced-to-ban-adult-content-by-pa...
103•stalfosknight•53m ago•85 comments

Web Server on a Nintendo Wii

http://wii.sjmulder.nl/
71•adunk•3d ago•15 comments

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://github.com/cactus-compute/needle
575•HenryNdubuaku•22h ago•165 comments

The limits of Rust, or why you should probably not follow Amazon and Cloudflare

https://kerkour.com/the-limits-of-rust
36•randomint64•1h ago•14 comments

The Boring Part of Bell Labs (2025)

https://acesounderglass.com/2025/11/15/the-boring-part-of-bell-labs/
95•surprisetalk•5d ago•13 comments

Why senior developers fail to communicate their expertise

https://www.nair.sh/guides-and-opinions/communicating-your-expertise/why-senior-developers-fail-t...
722•nilirl•1d ago•308 comments

How to make your text look futuristic (2016)

https://typesetinthefuture.com/2016/02/18/futuristic/
438•_vaporwave_•20h ago•56 comments

Fragnesia Made Public as Latest Linux Local Privilege Escalation Vulnerability

https://www.phoronix.com/news/Linux-Fragnesia
7•mikece•18m ago•0 comments

European Stagnation Is Real

https://www.siliconcontinent.com/p/european-stagnation-is-real
6•devitoria•1h ago•5 comments

CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq

https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html
354•chizhik-pyzhik•22h ago•187 comments

Scrcpy v4.0

https://github.com/Genymobile/scrcpy/releases/tag/v4.0
321•xnx•19h ago•48 comments
Open in hackernews

OpenEoX to Standardize End-of-Life (EOL) and End-of-Support (EOS) Information

https://openeox.org/
31•feldrim•1y ago

Comments

feldrim•1y ago
An SBOM-like approach to EOL/EOS issues is on the way.
rollcat•1y ago
I think the only large projects that presently take SBOMs seriously are Nix, Guix, and Go (non-cgo). Bootstrapping is non-trivial, but at least builds are reproducible and can be compared against existing binaries.

"Oh, just write plain C". Which compiler do you mean? GCC? LLVM/clang? On top of what OS/kernel? What firmware? Etc.

Arnavion•1y ago
Some distros packaging Rust software (OpenSUSE at least) also transparently set up CARGO=cargo-audit to get embedded SBOMs.
wallrat•1y ago
How does this relate to the OWASP/Ecma Common Lifecycle Enumeration Specification (https://tc54.org/cle/)?
wpollock•1y ago
In my experience, many software projects become abandoned and no notice is given. I don't see how this standard helps in such cases.
repelsteeltje•1y ago
I think it will take a while for people to realize this effort looked great, but wasn't the right approach. Or no silver bullet, at least.

The presentation with a simple diagram that combines this data with an sbom to yield "information" gives me navel gazing vibes of UML being the future of coding.

Just as architecture didn't equate to well designed and maintainable software, I fear this initiative won't fix horribly outdated and vulnerable deployments. Software life cycle, deprecation, abandonment, supply chains are mostly a process problem, standards and technology won't fix that.

Arnavion•1y ago
It doesn't force someone who already wasn't checking their dependencies for CVEs / maintained-ness to start doing that. It does make someone who *was* doing that be able to show they're doing that in some standard way.

In other words it doesn't force you to add an SBOM + EOX checker step to your CI pipeline. But if your compliance auditor wants you to check your dependencies, adding such a standardized step makes it easier to satisfy the auditor.

repelsteeltje•1y ago
I'm basing this mostly off first hand and anecdotal evidence - but through the years I've found that the major contribution of audits lies in having to think about the checkboxes every now and then. And what they mean in the context of my organization or project.

Rarely have I found that compliance to the goals was an issue in themselves. Or that making changes to tick a checkbox correlated to material improvements.

That is to say that if this leads to more efficiency and makes it easier for compliance audits and such, I fear is stream lining the least impactful part of its goals.

hiatus•1y ago
> Rarely have I found that compliance to the goals was an issue in themselves. Or that making changes to tick a checkbox correlated to material improvements.

I am confused when I hear people say stuff like this. I guess if you turn on a tool and never look at it again, it won't result in material improvements. But complying with regulations or a particular compliance regime should _absolutely_ result in at least _some_ material improvement to your security posture. Like you can implement segregation of duties just as a checkbox, or use the requirement to revisit the way you gate changes to production, as just one example.

repelsteeltje•12mo ago
It depends on where you're coming from. Your code base, that is.

If it's already outstanding, you spend a lot of time revalidating what you already know and it's often a noisy process with many false positives.

If it's in a horrible state, however, the regulation often leaves a lot of wiggle room where you do some work to achieve, say, PCI compliance and then spend a lot of time arguing why this and that don't apply in your specific case.

So admitted, the is probably some improvement in the latter case but it's hardly proportional.

So IMHO, it doesn't help those of good will & expertise and does too little for the negligent. It adds noise and in the end quality still depends on factors other than compliance and certification.

T3OU-736•1y ago
Htm. So, how does this compare, and/or is different from https://endoflife.date?
Arnavion•1y ago
The standard is for software to report its own EOL / EOS status. The website you linked is the opposite direction - it's aggregating that status for a certain set of software.
T3OU-736•1y ago
Aha. Very good point. SW self-reporting requires buy-in, though, which seems like a pretty high barrier.

I am very much hoping the effort succeeds, but I am also mindful of the fact that the site to which I have linked is more successful by virtue of having better coverage.

captn3m0•1y ago
We (endoflife.date) are also excited about OpenEoX.
mud_dauber•1y ago
JEDEC has long maintained an EOL/EOS standard for semiconductors. This was a big part of a previous PM gig. Sounds boring, and it was. But having a process kept us out of serious hot water.
Hackbraten•1y ago
That EoX logo though.

Every organization or committee that designs a logo should be legally required to have at least one teenager on the board to prevent accidental goatse or other inadvertent blunders.

genter•1y ago
Goatse has been around long enough that the teenagers are now in their thirties.