frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

FFmpeg merges WebRTC support

https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/167e343bbe75515a80db8ee72ffa0c607c944a00
353•Sean-Der•4h ago•86 comments

The iPhone 15 Pro's Depth Maps

https://tech.marksblogg.com/apple-iphone-15-pro-depth-map-heic.html
127•marklit•2h ago•29 comments

Autonomous drone defeats human champions in racing first

https://www.tudelft.nl/en/2025/lr/autonomous-drone-from-tu-delft-defeats-human-champions-in-historic-racing-first
23•picture•42m ago•3 comments

A proposal to restrict sites from accessing a users' local network

https://github.com/explainers-by-googlers/local-network-access
88•doener•2h ago•47 comments

Why I wrote the BEAM book

https://happihacking.com/blog/posts/2025/why_I_wrote_theBEAMBook/
349•lawik•10h ago•104 comments

Redesigned Swift.org is now live

https://swift.org/
36•lawgimenez•1h ago•9 comments

IRS Direct File on GitHub

https://chrisgiven.com/2025/05/direct-file-on-github/
297•nickthegreek•4h ago•112 comments

The Prompt Engineering Playbook for Programmers

https://addyo.substack.com/p/the-prompt-engineering-playbook-for
69•vinhnx•4h ago•20 comments

Fakespot will shut down on July 1

https://www.fakespot.com/
25•yasp•33m ago•5 comments

When memory was measured in kilobytes: The art of efficient vision

https://www.softwareheritage.org/2025/06/04/history_computer_vision/
39•todsacerdoti•3h ago•7 comments

A practical guide to building agents [pdf]

https://cdn.openai.com/business-guides-and-resources/a-practical-guide-to-building-agents.pdf
75•tosh•5h ago•7 comments

How We Reduced the Impact of Zombie Clients

https://letsencrypt.org/2025/06/04/how-we-reduced-the-impact-of-zombie-clients/
51•jaas•4h ago•8 comments

VC money is fueling a global boom in worker surveillance tech

https://restofworld.org/2025/employee-surveillance-software-vc-funding/
173•Brajeshwar•4h ago•111 comments

Cloud Run GPUs, now GA, makes running AI workloads easier for everyone

https://cloud.google.com/blog/products/serverless/cloud-run-gpus-are-now-generally-available
267•mariuz•12h ago•159 comments

Show HN: Cloudflare Workers Compatible MCP Boilerplate with OAuth & PostgreSQL

https://github.com/f/mcp-cloudflare-boilerplate
19•fka•1h ago•3 comments

Curtis Yarvin's Plot Against America

https://www.newyorker.com/magazine/2025/06/09/curtis-yarvin-profile
191•bitsavers•1h ago•161 comments

The Right to Repair Is Law in Washington State

https://www.eff.org/deeplinks/2025/06/right-repair-law-washington-state
288•doener•5h ago•100 comments

Merlin Bird ID

https://merlin.allaboutbirds.org/
523•twitchard•17h ago•184 comments

Doubling Down on Open Source

https://langfuse.com/blog/2025-06-04-open-sourcing-langfuse-product
56•clemo_ra•6h ago•3 comments

DiffX – Next-Generation Extensible Diff Format

https://diffx.org/
341•todsacerdoti•18h ago•147 comments

Show HN: GPT image editing, but for 3D models

https://www.adamcad.com/
81•zachdive•4h ago•48 comments

Preventing Flash of Incomplete Markdown when streaming AI responses

https://engineering.streak.com/p/preventing-unstyled-markdown-streaming-ai
20•biot•3h ago•7 comments

Mistral Code

https://mistral.ai/products/mistral-code
139•tosh•2h ago•65 comments

From Steam to Silicon: Patterns of Technological Revolutions

https://ianreppel.org/from-steam-to-silicon/
29•hbartab•5h ago•3 comments

Cockatoos have learned to operate drinking fountains in Australia

https://www.science.org/content/article/cockatoos-have-learned-operate-drinking-fountains-australia
250•pseudolus•11h ago•107 comments

The History of R2E and the Micral - The second personal computer

https://www.abortretry.fail/p/the-history-of-r2e-and-the-micral
5•rbanffy•2h ago•3 comments

Binary Wordle

https://wordle.chengeric.com/
240•eh8•17h ago•124 comments

Depot (YC W23) is hiring an enterprise support engineer (UK/EU)

https://www.ycombinator.com/companies/depot/jobs/NdCr76D-enterprise-support-engineer
1•jacobwg•13h ago

Machine Code Isn't Scary

https://jimmyhmiller.com/machine-code-isnt-scary
151•surprisetalk•15h ago•176 comments

Ask HN: Has anybody built search on top of Anna's Archive?

253•neonate•18h ago•116 comments
Open in hackernews

Reducing Cargo target directory size with -Zno-embed-metadata

https://kobzol.github.io/rust/rustc/2025/06/02/reduce-cargo-target-dir-size-with-z-no-embed-metadata.html
52•todsacerdoti•2d ago

Comments

KolmogorovComp•2d ago
> Currently, it seems like it might be considered to be a backwards compatibility break though, as the Cargo team is unsure if some people weren’t relying on the metadata being present in the .rlib files

It seems wild to consider such intermediate files as part of public API. Someone relying on it does not automatically make it a breaking change if it’s not documented.

saghm•2d ago
This metadata has been around for years, and Rust releases new versions every six weeks. Whether or not it's technically a "breaking change" or not, it's not unreasonable to spend a likely time to figure out if something will break for someone if they remove it; it's only another month and a half at most before the next chance to stabilize it comes.

At a higher level, as much as it's easier to pretend that "breaking" or "non-breaking" changes are a binary, the terms are only useful in how they describe the murkier reality of how people actually use something. The point of having those distinctions is in how they communicate things to users; developers are promising not to break certain things so that users can rely on them to remain working. That doesn't mean that other changes won't have any impact to users though, and there's nothing wrong with developers taking that into account.

As an analogy, imagine if I promise to mow your lawn every week, and then I mow your neighbor's lawn as well without making them the same promise. I notice that my old mower takes a long time to finish your lawn, and I realize that a newer electric mower with a higher power usage would help me do it faster. I need to make sure that higher power usage is safe for me to use on your property, but I'm not breaking my promise to you if I delay my purchase to check with your neighbor about whether it would be safe for theirs as well and take that into account in my decision. That doesn't mean I'm committing to only buying it if it's safe for their lawn, but it's information that still has some value for me to know in advance, and if it means that your lawn will continue to get cut with the old mower while I figure that out, it doesn't mean that I'm somehow elevating the concern of their lawn to the same level as yours. You might not choose to care about the neighbors lawn in my position, but I don't think it's particularly "wild" that some people might think it's worthwhile to take it into consideration.

wyldfire•2d ago
Hyrum's law:

> With a sufficient number of users of an API, it does not matter what you promise in the contract: all observable behaviors of your system will be depended on by somebody.

ronsor•2d ago
This is why you should randomize all behaviors which should not be depended on. Change things quickly and often if you're not making any promises.
drdaeman•2d ago
While I can imagine some edge cases where this approach can be meaningful, isn't that generally counterproductive?

Not only one has to be actively aware about all the behaviors they don't document (which is surely not an easy task for any large project), they have to spend a non-negligible amount of time adding randomness to it in a way that would still allow all the internal use cases to work cohesively. This means you spend less time on doing something actually useful.

Instead of randomizing, it should be sufficient to just figure out the semantics for clearly communicating what's the public APIs and stable, and what's internal and subject to change at whim. And maybe slap a big fat warning "if something is not documented - it's internal, and $deity help you if you depend on it, for we make no guarantees except that it'll break on some fine day and that day won't be so fine anymore". Then it's not your problem.

evertedsphere•2d ago
until the day when the person/project/company whose code it breaks has a sufficient amount of pull over you/your team that it becomes your problem

that's why you prevent it from ever coming into existence if you can

madars•2d ago
TLS does this with GREASE (Generate Random Extensions And Sustain Extensibility) - https://www.rfc-editor.org/rfc/rfc8701.html . HN discussion: https://news.ycombinator.com/item?id=39416277 (19 points, 8 comments)

Go's implementation of JSON format for protobufs also does this: https://protobuf.dev/reference/go/faq/#unstable-json

> To avoid giving the illusion that the output is stable, we deliberately introduce minor differences so that byte-for-byte comparisons are likely to fail.

koito17•1d ago
Go also randomizes the iteration of map keys, to emphasize that maps are unordered and code should not rely on insertion order. For demonstration:

  package main
  
  import "fmt"
  
  func main() {
    m := map[string]int{"a": 1, "b": 2, "c": 3}
    for k, _ := range m {
      fmt.Println(k)
    }
    for k, _ := range m {
      fmt.Println(k)
    }
  }
Sample output:

  c
  a
  b
  a
  b
  c
Each run may produce different key orders.
metaltyphoon•1d ago
I was under the assumption most languages to this.
db48x•1d ago
Very few do, and only quite modern ones. Although I believe there are hashtable libraries where the iteration order is unspecified but generally consistent, only changing when a resize shuffles the elements into different buckets.
keybored•1d ago
Certain discussions on HN are just diagrams thanks to Laws(tm) and various one-liner tier references.

- Hyrum’s Law (85%)

- Emacs spacebar overheating (15%)

The only way to prevent the decision diagram is to anticipate them and spell them out in the last paragraph. But on the other than that doesn’t very fun right.

keybored•1d ago
> But on the other than that doesn’t very fun right.

When you write something an hour after your bedtime.

epage•2d ago
> It seems wild to consider such intermediate files as part of public API. Someone relying on it does not automatically make it a breaking change if it’s not documented.

To find what is considered an intermediate vs a final artifact from cargo, you need to check out https://doc.rust-lang.org/cargo/reference/build-cache.html

We are working on making this clearer with https://github.com/rust-lang/cargo/issues/14125 where there will be `build.build-dir` (intermediate files) and `build.target-dir` (final artifacts).

When you do a `cargo build` inside of a library, like `clap`, you will get an rlip copied into `build.target-dir` (final artifacts). This is intended for integration with other build systems. There are holes with this workflow though but identifying all of the relevant cases for what might be a "safe" breakage is difficult.

merb•1d ago
https://xkcd.com/1172/

I mean yeah, some things are awkward. But well some people rely on things. And I mean it’s still possible to make the new behavior the default and add a switch to not have the metadata