frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma

https://rhodesmill.org/brandon/2009/commands-with-comma/
56•theblazehen•2d ago•11 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
637•klaussilveira•13h ago•188 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
935•xnx•18h ago•549 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
35•helloplanets•4d ago•30 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
113•matheusalmeida•1d ago•28 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
13•kaonwarb•3d ago•11 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
45•videotopia•4d ago•1 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
222•isitcontent•13h ago•25 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
214•dmpetrov•13h ago•106 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
324•vecti•15h ago•142 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
374•ostacke•19h ago•94 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
478•todsacerdoti•21h ago•237 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
359•aktau•19h ago•181 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
278•eljojo•16h ago•165 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
407•lstoll•19h ago•273 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
17•jesperordrup•3h ago•10 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
85•quibono•4d ago•21 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
57•kmm•5d ago•4 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
27•romes•4d ago•3 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
245•i5heu•16h ago•193 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
14•bikenaga•3d ago•2 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
54•gfortaine•11h ago•22 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
143•vmatsiiako•18h ago•64 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1061•cdrnsf•22h ago•438 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
179•limoce•3d ago•96 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
284•surprisetalk•3d ago•38 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
137•SerCe•9h ago•125 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
70•phreda4•12h ago•14 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
28•gmays•8h ago•11 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
63•rescrv•21h ago•23 comments
Open in hackernews

How Frogger 2’s source code was recovered from a destroyed tape [video]

https://www.youtube.com/watch?v=lvEO4IaEJlw
208•perching_aix•7mo ago

Comments

NaOH•7mo ago
Related:

The long road to recover Frogger 2 source from tape drives - https://news.ycombinator.com/item?id=36061574 - May 2023 (213 comments)

CSMastermind•7mo ago
Absolutely heroic effort. And that data recovery company should go out of business.
chii•7mo ago
It is named and shamed in the comments of that video somewhere.

Data recovery companies ought to have the integrity to just say no to a job, if they cannot do it risk free. Trying and failing with the risk of damaging the original data could be very costly to the customer, even if they don't charge money - the customer's lost data could be priceless.

sllabres•7mo ago
A lot of work, but with success as reward! Makes you wonder how easy or difficult it will be in 30 years to 'recover' data from today.
dehrmann•7mo ago
> Makes you wonder how easy or difficult it will be in 30 years to 'recover' data from today.

The challenges will be different. Flash loses its charge in 30 years, most disks are encrypted, and on-site physical backups are mostly a thing of the past. The source might survive in a cloud repo, but it'll either be tied up for legal reasons or deleted when the customer stops paying the bill. But storage is cheap and getting cheaper!

ljlolel•7mo ago
Easy. The “deleted” even overwritten data can leave ghosts even multiple layers deep (think of a clay tablet or painting with multiple inscriptions)

Encryption for 30 years ago? Trivially breakable with quantum

rjst01•7mo ago
> Encryption for 30 years ago? Trivially breakable with quantum

I wouldn't be so sure - quantum computers aren't nearly as effective for symmetric algorithms as they are for pre-quantum asymmetric algorithms.

b112•7mo ago
Regardless of the parent's statement, just normal compute in 30 years, plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.

I can't think of anything from 30 years ago that isn't just a joke today. The same will likely be true by 2050, quantum computing or not. I wonder how many people realise this?

Even if one disagrees with my certainty, I think people should still plan for the concept that there's a strong probability it will be so. Encryption is really not about preventing data exposure, but about delaying it.

Any other view regarding encryption means disappointment.

charcircuit•7mo ago
>normal compute

You are underestimating the exponential possibilities of keys.

>plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.

You can't just assume that there is always going to be new vulnerabilities that cause it to be broken. It ignores that people have improved at designing secure cryptography over time.

b112•7mo ago
From a security perspective, I argue ypu must assume precisely that.

An example being, destroying sensitive backup media upon its retirement, regardless of data encryption.

Dylan16807•7mo ago
> I can't think of anything from 30 years ago that isn't just a joke today.

AES is only 3 years shy of 30.

If you used MD5 as a keystream generator I believe that would still be secure and that's 33 years old.

3DES is still pretty secure, isn't it? That's 44 years old.

As for today's data, there's always risk into the future but we've gotten better as making secure algorithms over time and avoiding quantum attacks seems to mostly be a matter of doubling key length. I'd worry more about plain old leaks.

b112•7mo ago
I'll concede your point re: current status of some encryption. However there are loads that were comprised.

How do you tell which will fall, and which will succeed in 30 years?

All this said, I just think proper mental framing helps. Considering the value of encrypted data, in 30 years, if it is broken.

In many cases... who cares. In others, it could be unpleasant.

bluGill•7mo ago
30 years ago we had a good idea. Anything considered good 30 years ago - 3DES- still is. Anything not considered good has turned out not to be. We don't know what the future will hold so it is always possible someone will find a major flaw in AES, but as I write this nobody has indicated they are even close.
Dylan16807•7mo ago
> However there are loads that were comprised.

There are a lot of interactive systems that have attacks on their key exchange or authentication. And there are hashes that have collision attacks.

But compromises that let you figure out a key that's no longer in use have not been common for a while. And even md5 can't be reversed.

I agree with you about being wary, but I think encryption itself can be one of the stronger links in the chain, even going out 30 years.

retrac•7mo ago
> I can't think of anything from 30 years ago that isn't just a joke today

The gold standard 30 years ago was PGP. RSA 1024 or 2048 for key exchange. IDEA symmetric cipher.

This combination is, as far as I am aware, still practically cryptographically secure. Though maybe not in another 10 or 20 years. (RSA 1024 is not that far from brute forcing with classical machines.)

rjst01•7mo ago
I was wondering exactly how hard factoring RSA-1024 would be today and found this stackexchange answer: https://crypto.stackexchange.com/a/111828

In summary, it estimates the cost at $3.5 billion using commodity hardware, and I'd expect a purpose-built system could bring that cost down by an order of magnitude.

NewsaHackO•7mo ago
I would go as far as saying anyone who mentions quantum computers breaking block encryption doesn’t know what they’re talking about.
jetbalsa•7mo ago
Has this been proven for flash storage? Once a flash charge is depleted its gone forever, its not like magnetic storage of old.
mjg59•7mo ago
Shor's algorithm is primarily relevant to asymmetric cryptography, and disk encryption is pretty much universally symmetric. Quantum computers do nothing to break modern disk encryption.
privatelypublic•7mo ago
Not this tripe again.

The reality is, as soon as humanity figures out how to distinguish between two values (magnetic flux, voltage, pits/lands, etc) we use it to store more data, or move it faster.

The end.

ljlolel•7mo ago
Sure but we are talking 30 year old disks so they don’t have that
bayindirh•7mo ago
Don't forget that flash drives are not accessed linearly. Your data might look linear to you, but without that sector addressing table, you're looking at noise.

On top of that static wear leveling can move all your data around when your disk is idle, and TRIM will effectively zero your unused areas when you are not looking.

So, it's a very different landscape.

rietta•7mo ago
Data not continuously copied is lost. Ironically the most future proof media is becoming increasingly rare. Those gold layer dvds may last well into the future but the readers will not be available.
rietta•7mo ago
A major plot of my fictional book is going to be the resurrection of data from a DVD recovered from an archaeological site in from the ancient North American period (from the pov of the characters). It is a significant challenge fraught with perils, including the professor responsible being threatened with failure after failure in the field, budget cuts, and political barriers. But success will be the first glimpse after thousands of years into the unknown dark age that so little is known about.
nullc•7mo ago
Flash seems to lose its charge a lot faster than that, -- I found ordinary SSDs left in a closet for two years to be full of errors while matched sibling drives left in running systems were fine.
Cthulhu_•7mo ago
Hard, but it depends on backup / duplication strategies; this is why e.g. the internet archive is so important, and I hope there are multiple parties doing the same thing for redundancy.
rietta•7mo ago
Hard. I am slowly writing a book set in the future where we are a “digital dark age” where little to nothing is known about our time tentatively called Professor Bitrot.
heavensteeth•7mo ago
I'm not surprised by the data recovery company story, it feels like I only hear bad things about that industry. I remember something similar happened with LinusTechTips.
tomashubelbauer•7mo ago
The source code: https://github.com/HighwayFrogs/frogger2-vss

I enjoyed skimming through this: https://github.com/HighwayFrogs/frogger2-vss/blob/main/teamS...

Jean-Papoulos•7mo ago
Line 427 makes this game NSFW !
javcasas•7mo ago
This is dedicated to the people in the other thread about forbidding swearwords in code.

Take this!

wkat4242•7mo ago
Which file? Now I'm curious :)
Rendello•7mo ago
The second link in the comment, the devlog.
wkat4242•7mo ago
Ahhh ok I was thinking it was in the actual code. Because the devlog wouldn't be part of the game. Thinking too literally :)
secondcoming•7mo ago
Committing ASCII-art of a scantily clad woman is quite the power move.
darepublic•7mo ago
In those days every save was a commit?
chris_wot•7mo ago
Here’s a gist that might be enlightening:

https://github.com/Kneesnap/onstream-data-recovery/blob/main...

Simran-B•7mo ago
Another entertaining piece by the Lego Island guy!

My takeaway is that you should choose a passion project as your hobby and put in the time to learn and do whatever is necessary to achieve your goal on your own or together with similarly motivated people rather than relying on anyone external you have to pay - things go downhill fairly often and quickly it seems. Is any business a scam to some degree nowadays?

dylan604•7mo ago
I once wrote a DAM that wrote to LTO tapes just using tar. The tape was operated with forward/rewind commands from mt. Nobody needed access to the tapes until after I was no longer at the company. Apparently, they spent weeks trying to install various backup software to read the tapes, but none could. They eventually contacted me, but due to how much software they had tried to use the original computer it was attached to was no longer the OS. At that point, they asked 3rd party companies for help and eventually found someone with a drive attached to a Linux system. I was then able to walk them through how to read and extract data.

Tape storage can be an absolute nightmare. Most will do the writes, some will say they verify with a read, but few actually test with a full restore. Just because the software says it can read the tape to show you the listings does not mean it can read the files themselves. This was alluded to in TFA(TFV??) but been there done that on trying to read from a bum tape/bad write. It gets worse if you write in one tape drive and read from another also mentioned in TFV. Now I feel old just thinking about it all

nullc•7mo ago
AFAICT the way most 'recovery' places work is that they'll recover data if there are no issues and any ordinarily skilled IT tech could also recover it. And then otherwise they'll claim it's unrecoverable. Sometimes, it seems, they'll even just claim its unrecoverable because they didn't happen to have or find a compatible drive when that's all that was needed.

I've recovered data from media a number of times a recovery company said it was unrecoverable with no particular difficulty.

xenadu02•7mo ago
This seemed to be a point of confusion in the original story and the video wasn't super clear but:

Pretty much all tape backup software writes headers as it is streaming the file to tape. Just more bytes in the buffer.

For normal restores it consults its local database because that is way faster. If you don't have the local database you do a "Catalog Tape" operation that scans the file headers on the tape to reconstruct the database. For whatever reason ARCServe couldn't complete the catalog with that specific kind of tape. Whether that was the specific version he found or was a general problem with support for those tape drives I don't know.