frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Photos taken inside musical instruments

https://www.dpreview.com/photography/5400934096/probe-lenses-and-focus-stacking-the-secrets-to-incredible-photos-taken-inside-instruments
396•worik•7h ago•22 comments

Valkey Turns One: Community fork of Redis

https://www.gomomento.com/blog/valkey-turns-one-how-the-community-fork-left-redis-in-the-dust/
88•cebert•5h ago•19 comments

Surprisingly fast AI-generated kernels we didn't mean to publish yet

https://crfm.stanford.edu/2025/05/28/fast-kernels.html
221•mfiguiere•8h ago•54 comments

Mary Meeker's first Trends report since 2019, focused on AI

https://www.bondcap.com/reports/tai
106•kjhughes•8h ago•34 comments

Reverse engineering of Linear's sync engine

https://github.com/wzhudev/reverse-linear-sync-engine
48•flashblaze•1d ago•2 comments

Show HN: MCP Defender – OSS AI Firewall for Protecting MCP in Cursor/Claude etc.

https://mcpdefender.com
8•gsundeep•1d ago•0 comments

Beating Google's kernelCTF PoW using AVX512

https://anemato.de/blog/kctf-vdf
260•anematode•11h ago•79 comments

Show HN: Leap – Full-stack AI developer agent that deploys to AWS

https://leap.new
5•machekb•12h ago•0 comments

The 'white-collar bloodbath' is all part of the AI hype machine

https://www.cnn.com/2025/05/30/business/anthropic-amodei-ai-jobs-nightcap
320•lwo32k•14h ago•523 comments

Show HN: Icepi Zero – The FPGA Raspberry Pi Zero Equivalent

https://github.com/cheyao/icepi-zero
106•Cyao•2d ago•23 comments

Java Virtual Threads Ate My Memory: A Web Crawler's Tale of Speed vs. Memory

https://dariobalinzo.medium.com/virtual-threads-ate-my-memory-a-web-crawlers-tale-of-speed-vs-memory-a92fc75085f6
40•dariobalinzo•1d ago•14 comments

Microsandbox: Virtual Machines that feel and perform like containers

https://github.com/microsandbox/microsandbox
268•makeboss•14h ago•125 comments

Revenge of the Chickenized Reverse-Centaurs

https://pluralistic.net/2022/04/17/revenge-of-the-chickenized-reverse-centaurs/
65•GreenWatermelon•2d ago•18 comments

Anthropic launches a voice mode for Claude

https://techcrunch.com/2025/05/27/anthropic-launches-a-voice-mode-for-claude/
54•kordlessagain•2d ago•17 comments

Systems Correctness Practices at Amazon Web Services

https://cacm.acm.org/practice/systems-correctness-practices-at-amazon-web-services/
309•tanelpoder•15h ago•111 comments

Ray Tracing in J

https://idle.nprescott.com/2020/ray-tracing-in-j.html
52•todsacerdoti•2d ago•8 comments

Silicon Valley finally has a big electronics retailer again: Micro Center opens

https://www.microcenter.com/site/mc-news/article/micro-center-santa-clara-photos.aspx
167•modeless•5h ago•86 comments

How large should your sample size be?

https://vickiboykis.com/2015/08/04/how-large-should-your-sample-size-be/
3•sebg•2d ago•0 comments

Every 5x5 Nonogram

https://pixelogic.app/every-5x5-nonogram
30•eieio•3h ago•9 comments

StackAI (YC W23) Is Looking for SWR and Tailwind Wizards

https://www.ycombinator.com/companies/stackai/jobs/C1rOopy-frontend-engineer
1•baceituno•7h ago

The Darwin Gödel Machine: AI that improves itself by rewriting its own code

https://sakana.ai/dgm/
152•birriel•16h ago•157 comments

Jerry Lewis's “The Day the Clown Cried” discovered in Sweden after 53 years

https://www.thenationalnews.com/arts-culture/film-tv/2025/05/29/jerry-lewis-day-the-clown-cried-discovered/
145•danso•7h ago•65 comments

The radix 2^51 trick (2017)

https://www.chosenplaintext.ca/articles/radix-2-51-trick.html
397•blobcode•1d ago•78 comments

Show HN: Circle Crop Image

https://circlecropimage.io/
5•artiomyak•2d ago•5 comments

How to Run CRON Jobs in Postgres Without Extra Infrastructure

https://wasp.sh/blog/2025/05/28/how-to-run-cron-jobs-in-postgress-without-extra-infrastructure
51•Liriel•2d ago•19 comments

Show HN: Smart Silence – Remind your iPhone to stay quiet in quiet places

https://testflight.apple.com/join/47CJ31VK
26•ebagsnave•2d ago•5 comments

Copy Excel to Markdown Table (and vice versa)

https://thisdavej.com/copy-table-in-excel-and-paste-as-a-markdown-table/
75•thisdavej•1d ago•14 comments

Adam Riess and the Hubble tension

https://www.theatlantic.com/science/archive/2025/05/adam-riess-hubble-tension/682980/
78•samizdis•13h ago•65 comments

Why Writing by Hand Is Better for Memory and Learning

https://www.scientificamerican.com/article/why-writing-by-hand-is-better-for-memory-and-learning/
21•andsoitis•1h ago•6 comments

Show HN: W++ – A Python-style scripting language for .NET with NuGet support

https://github.com/sinisterMage/WPlusPlus
87•sinisterMage•13h ago•49 comments
Open in hackernews

Show HN: Entropy – Sharing screen is scary in SaaS age

https://entropysec.io/
21•RazCo•1d ago
Sharing screen is really scary today with all PIIs and secrets sprawling around your screen, so I built Entropy, a small Chrome extension that spots API keys, tokens, emails, and throws a blur overlay on them in real time.

The goal is to make screen-sharing feel safe again without adding steps to a demo.

Everything runs locally—regex + entropy heuristics compiled to WASM—and the extra CPU cost averages ~1 ms per mutation on my M1.

Custom rules can be added with a JSON file for teams that have proprietary token formats.

visit https://entropysec.io

Feedback please <3

Comments

pinkmuffinere•1d ago
Congrats! Launching is hard. Feedback:

- I can't tell what this is until I scroll "below the fold" (ie, below the first visible screen). I think your tagline just needs to be clearer. Even your first sentence in the post here could be a decent description ("Entropy, a small Chrome extension that spots API keys, tokens, emails, and throws a blur overlay on them in real time")

- I'm not very comp-sec minded. I've never in my life worried about leaking API keys, tokens, email addresses, etc via screen share. I have worried about leaking bookmarks, sensitive email drafts, slack messages, etc. But I also don't think I care enough to pay for something that blocks those. Hopefully there are people that do care enough to pay

- An idea for a possible pivot: Ad agencies sometimes want to show how much money or traffic they bring in for clients. Made up data isn't convincing to close a sale, but real pages can have sensitive data like company names, logos, ad spend, etc. With a slight pivot, you might be able to provide them something to obscure that info. I only have second-hand knowledge of this problem, so you'd need to verify that they care enough about this -- don't take my word for it.

mattbessey•1d ago
I would recommend doing more than gaussian blurring. Blurring makes it harder but not impossible to recover, especially if you know the exact font and font size in an image (which is easily recovered when the attacker can visit the website to work it out!).
pockybum522•1d ago
https://youtu.be/acKYYwcxpGk here's a citation for that being possible, in case anyone's interested. Also has some of the methods posted on github from what I remember.
pushcx•1d ago
Yep: https://github.com/bishopfox/unredacter
randomtoast•1d ago
We would need actual black bars.
kevincox•1d ago
Or if you want it to look "authentic" replaced it with blurred random text.

But personally I like solid bars as it makes it obvious what is happening and that it is secure.

sureglymop•1d ago
A very cool idea but I think instead of blurring, you should just put a black bar over the recognized secrets. I mean think about it: you're going all the way when it comes to detection but only halfway when it comes to actually obscuring.
cheschire•1d ago
Or make it customizable! Maybe I want to cover my secrets with daisies. Or fig leaves.
phoronixrly•1d ago
Soo... No source? Requires access to 'Read and change all your data on all websites'? Pinky-promises not to send data to a server?

On top of that it uses blur to hide secrets when it has been proven that blurring leaks enough information for the obscured data to be reconstructed.

On top of that it's a $4/mo subscription service for what in your words amounts to regex + entropy heuristics + some enshittification (you're not allowed to have custom regex unless you pay subscription)...

Xss3•1d ago
What, you don't trust strangers with all your web browsers data? Don't be so paranoid.
owebmaster•1d ago
Now developers have to give their source code for free and can also not monetize subscription. Is it some kind of modern slavery?
phoronixrly•1d ago
No source - no pay. Even if source, in case the licensing scheme is subscription-based, there better be some service rendered that has recurring expenses, otherwise -- still no pay.
owebmaster•1d ago
yes source - still no pay. What is the benefit in satisfying your demands? Code it yourself and make it open source.
castillar76•1d ago
The only place I'm insistent about source-code is things like this that need access to a ton of my data at all times. An app that only has access to the data I choose to share with it, I'm more willing to give-and-take on the show-me-the-code front.

As far as subscriptions go, a lot of devs have moved to a subscription-train model, which I really like: you pay for the subscription (which funds development and pays for support), but at any time you can _stop_ paying the subscription cost and keep the version you're currently running without further updates. That's a good trade-off to me, since I can choose to end my subscription without it becoming a catastrophic migration event that has to be carefully planned and executed fully before opting to stop paying.

mouse_•1d ago
Dude, just install the closed source screen reader that tries to find PII/credit cards/social security numbers on your computer. It's for Cyber Security!
dinfinity•1d ago
Agreed. Flagged the article. Borderline malware advertisement.
pinkmuffinere•1d ago
They built a new thing and shared it. Hn is news for “hackers”, and sharing early products like this is one of the intended use cases. Sure it lacks polish, but flagging seems extreme
phoronixrly•20h ago
I mean, drumming up a chrome extension on HN to get a userbase, then abusing it or selling it off to be abused shouldn't be the sort of entrepreneurial/hacking mindset HN appreciates.
pinkmuffinere•2h ago
> abusing it or selling it off

I got no indication that the author was planning to do either of these things

keepamovin•1d ago
This is a great example of a product that doesn't really need to exist in a super completed state but that "gracefully degrades" to the customer tiers that come in. Like technically the features in the tiers are not complex or difficult (not disparagement to the effort and design, instead respect) - but the natural "peak solution" (using LLM to detect secrets) is advertised and achievable.

Well done!

stephantul•1d ago
“Colleagues”, the first prompt on the main page, is misspelled as “collegues”
nssnsjsjsjs•1d ago
Nice line of defence! Ofc. people should avoid a situation where a secret on screen is worth something. Use MFA, VPN, key vault, JWT, OTP etc. etc.
CommenterPerson•1d ago
A Google Chrome extension to hide your secrets? Wouldn't that be self contradicting?
ttoinou•1d ago
Feature idea for another product based on the exact same stack tech : replace private information that are less private than secret keys but still not for public release (filepath files folders names in file system, user accounts names etc.) so that developer can easily make product screen recording / screenshot to showcase their product to the public. Then replace those strings by dummy strings generated by AI. You could sell it for more. I need this.
ajb•1d ago
In security, whitelisting is preferable to blacklisting. However given that people can already whitelist by only sharing one window (which is what I, and I guess most security conscious people, always do) I'm not sure there's a business here.
castillar76•1d ago
I was puzzled by that, too: I'm always mystified when people share their entire screen on a Zoom call instead of just the one window they need to show me. Zoom even makes it easy to change out what you're sharing (add / subtract) any time.

Having seen a giant work meltdown stemming from a colleague's Slack DM accidentally broadcast over a Zoom call, I'm always paranoid about it.

bitbasher•1d ago
Sharing secrets is scary. Instead we share your screen and secrets to third party LLM providers!