frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Defeating a 40-year-old copy protection dongle

https://dmitrybrant.com/2026/02/01/defeating-a-40-year-old-copy-protection-dongle
557•zdw•13h ago•170 comments

Apple's MacBook Pro DFU port documentation is wrong

https://lapcatsoftware.com/articles/2026/2/1.html
107•zdw•7h ago•20 comments

My iPhone 16 Pro Max produces garbage output when running MLX LLMs

https://journal.rafaelcosta.me/my-thousand-dollar-iphone-cant-do-math/
302•rafaelcosta•13h ago•130 comments

Show HN: Wikipedia as a doomscrollable social media feed

https://xikipedia.org
208•rebane2001•10h ago•74 comments

Show HN: NanoClaw – “Clawdbot” in 500 lines of TS with Apple container isolation

https://github.com/gavrielc/nanoclaw
376•jimminyx•11h ago•134 comments

Ratchets in Software Development

https://qntm.org/ratchet
29•nvader•3d ago•5 comments

Actors: A Model of Concurrent Computation [pdf] (1985)

https://apps.dtic.mil/sti/tr/pdf/ADA157917.pdf
89•kioku•9h ago•33 comments

What Most People Miss About Getting Promoted – By Yue Zhao

https://news.theuncommonexecutive.com/p/what-most-people-miss-about-getting
8•yuezhao•1h ago•23 comments

Contracts in Nix

https://sraka.xyz/posts/contracts.html
57•todsacerdoti•1d ago•14 comments

Apple I Advertisement (1976)

http://apple1.chez.com/Apple1project/Gallery/Gallery.htm
239•janandonly•16h ago•129 comments

Adventure Game Studio: OSS software for creating adventure games

https://www.adventuregamestudio.co.uk/
323•doener•20h ago•67 comments

Treasures found on HS2 route stored in secret warehouse

https://www.bbc.com/news/articles/c93v21q5xdvo
65•breve•12h ago•33 comments

Attilio Berni plays the sub-contrabass saxophone [video]

https://www.youtube.com/watch?v=9BiW2mVKk0w
8•surprisetalk•3d ago•3 comments

Ian's Shoelace Site

https://www.fieggen.com/shoelace/
170•righthand•15h ago•32 comments

Leaked Chats Expose the Daily Life of a Scam Compound's Enslaved Workforce

https://www.wired.com/story/the-red-bull-leaks/
123•smurda•5h ago•54 comments

Time Machine-style Backups with rsync (2018)

https://samuelhewitt.com/blog/2018-06-05-time-machine-style-backups-with-rsync
80•accrual•10h ago•35 comments

Building Your Own Efficient uint128 in C++

https://solidean.com/blog/2026/building-your-own-u128/
79•PaulHoule•13h ago•33 comments

Rev Up the Viral Factories

https://www.science.org/content/blog-post/rev-viral-factories
12•etiam•2d ago•0 comments

Efficient String Compression for Modern Database Systems

https://cedardb.com/blog/string_compression/
125•jandrewrogers•2d ago•32 comments

Two kinds of AI users are emerging

https://martinalderson.com/posts/two-kinds-of-ai-users-are-emerging/
203•martinald•10h ago•183 comments

Founding is a snowball

https://blog.bawolf.com/p/founding-is-a-snowball
82•bryantwolf•3d ago•27 comments

MicroPythonOS graphical operating system delivers Android-like user experience

https://www.cnx-software.com/2026/01/29/micropythonos-graphical-operating-system-delivers-android...
217•mikece•3d ago•80 comments

Netbird – Open Source Zero Trust Networking

https://netbird.io/
685•l1am0•1d ago•264 comments

FOSDEM 2026 – Open-Source Conference in Brussels – Day#1 Recap

https://gyptazy.com/blog/fosdem-2026-opensource-conference-brussels/
233•yannick2k•1d ago•161 comments

Building a Telegram Bot with Cloudflare Workers, Durable Objects and Grammy

https://flashblaze.xyz/posts/cloudflare-workers-durable-objects-telegram-bot/
22•flashblaze•7h ago•5 comments

Towards a science of scaling agent systems: When and why agent systems work

https://research.google/blog/towards-a-science-of-scaling-agent-systems-when-and-why-agent-system...
86•gmays•16h ago•30 comments

A Crisis comes to Wordle: Reusing old words

https://forkingmad.blog/wordle-crisis/
93•cyanbane•16h ago•103 comments

EU launches government satcom program in sovereignty push

https://spacenews.com/eu-launches-government-satcom-program-in-sovereignty-push/
9•benkan•1h ago•1 comments

Amiga Unix (Amix)

https://www.amigaunix.com/doku.php/home
127•donatj•23h ago•54 comments

Stop Using Pseudo-Types

https://f2r.github.io/en/stop-using-pseudo-types.html
13•speckx•4d ago•1 comments
Open in hackernews

Building my npx business card

https://ashley.dev/posts/turning-feedback-into-features/
8•edent•8mo ago

Comments

steele•8mo ago
Ooh, free real estate, let's colonize and gentrify package management
aabhay•8mo ago
Lmao, gentrify cracked me up
neilv•8mo ago
Do these npx business cards run arbitrary code on your computer?
cypherpunks01•8mo ago
npx

Run a command from a local or remote npm package

Description

This command allows you to run an arbitrary command from an npm package (either one installed locally, or fetched remotely), in a similar context as running it via npm run.

neilv•8mo ago
Yes, then is a "command from an npm package" arbitrary code?

And what is this "similar context as running it via npm run"?

Would it be better to answer the question directly?

joshka•8mo ago
Yeah, this seems like a very smart but inherently flawed idea.
cypherpunks01•8mo ago
Yes I agree! OSS package management ecosystems are a great idea, but allowing submissions without any review or vetting is just asking for supply chain attacks.
Xss3•8mo ago
May as well just release an executable tbh.
theamk•8mo ago
Reminds me of JAPH [0] - a tiny Perl program that was used in email/newsgroup signature to give it personal touch.

[0] https://www.perlmonks.org/?node_id=412464

watusername•8mo ago
Terminal business cards are a nice idea, but RCE business cards are just asking for trouble. Instead of npx, what happened to good'ol curl? Something like

$ curl ashley.dev

Some decades ago, we had finger (https://en.wikipedia.org/wiki/Finger_%28protocol%29) which is designed for this very use case. Sadly it's no longer installed by default with most distros:

$ finger @ashley.dev

queezey•8mo ago
This would be a great advertisement for security consulting.

"I was just able to run arbitrary code on your computer. Here is a sample of your recent browser history. Let me tell you help you mitigate your security vulnerabilities."