frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

France's homegrown open source online office suite

https://github.com/suitenumerique
340•nar001•3h ago•172 comments

British drivers over 70 to face eye tests every three years

https://www.bbc.com/news/articles/c205nxy0p31o
81•bookofjoe•1h ago•74 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
408•theblazehen•2d ago•150 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
76•AlexeyBrin•4h ago•14 comments

First Proof

https://arxiv.org/abs/2602.05192
29•samasblack•1h ago•17 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
765•klaussilveira•19h ago•239 comments

Reinforcement Learning from Human Feedback

https://arxiv.org/abs/2504.12501
49•onurkanbkrc•4h ago•3 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
23•vinhnx•2h ago•2 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
1015•xnx•1d ago•579 comments

Coding agents have replaced every framework I used

https://blog.alaindichiappari.dev/p/software-engineering-is-back
153•alainrk•3h ago•182 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
154•jesperordrup•9h ago•56 comments

Leisure Suit Larry's Al Lowe on model trains, funny deaths and Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
4•thelok•1h ago•0 comments

72M Points of Interest

https://tech.marksblogg.com/overture-places-pois.html
5•marklit•5d ago•0 comments

Software Factories and the Agentic Moment

https://factory.strongdm.ai/
8•mellosouls•1h ago•5 comments

A Fresh Look at IBM 3270 Information Display System

https://www.rs-online.com/designspark/a-fresh-look-at-ibm-3270-information-display-system
14•rbanffy•4d ago•0 comments

StrongDM's AI team build serious software without even looking at the code

https://simonwillison.net/2026/Feb/7/software-factory/
5•simonw•1h ago•0 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
100•videotopia•4d ago•26 comments

Making geo joins faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
152•matheusalmeida•2d ago•40 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
260•isitcontent•19h ago•30 comments

Show HN: Kappal – CLI to Run Docker Compose YML on Kubernetes for Local Dev

https://github.com/sandys/kappal
15•sandGorgon•2d ago•3 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
273•dmpetrov•19h ago•145 comments

Ga68, a GNU Algol 68 Compiler

https://fosdem.org/2026/schedule/event/PEXRTN-ga68-intro/
32•matt_d•4d ago•8 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
543•todsacerdoti•1d ago•262 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
415•ostacke•1d ago•108 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
61•helloplanets•4d ago•60 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
361•vecti•21h ago•161 comments

Google staff call for firm to cut ties with ICE

https://www.bbc.com/news/articles/cvgjg98vmzjo
94•tartoran•1h ago•20 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
331•eljojo•22h ago•202 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
454•lstoll•1d ago•298 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
370•aktau•1d ago•194 comments
Open in hackernews

Configuring Split Horizon DNS with Pi-Hole and Tailscale

https://www.bentasker.co.uk/posts/blog/general/configuring-pihole-to-serve-different-records-to-different-clients.html
121•gm678•7mo ago

Comments

leipert•7mo ago
> Chromecasts ignore local DNS... grrr

Can’t you force traffic to 8.8.8.8 / 8.8.4.4 (especially port 53) to hit your PiHole instead?

joombaga•7mo ago
I think you can just block Google's servers and it'll use the DHCP-configured DNS server.
temp0826•7mo ago
Iptables can be used to dump any traffic destined for port 53 to a dns server of your choosing, but I don't know if something like that exists in consumer routers. (Blocking a baked in doh client is a lot more complicated...)
Melatonic•7mo ago
Yeah it would depend on your equipment - but basically if stuff pins and IP instead of doing DNS you would have to block the IP's of all the common resolvers (or at least the ones it will try)
VTimofeenko•7mo ago
Why not forbid going outside on port 53 and (optionally) redirect to the local DNS servers:

(nftables syntax)

ip saddr != @lan_dns ip daddr != @lan_dns udp dport 53 counter dnat ip to numgen inc mod 2 map { 0 : 192.168.1.1, 1 : 192.168.1.2 } comment "Force all DNS traffic to go through local DNS servers"

watersb•7mo ago
My older Kindle Fire HD 10 flips over to DNS over HTTPS if it can't see Google on port 53.

I've tried to add a couple of rules in iptables on my Ubiquiti Dream Machine (UDM), but the out-of-box configuration on the UDM is pages and pages to iptables rules. I can modify that config via a shell interface (a shell script with four iptables command lines), but it doesn't play with the web based GUI, and I have yet to figure out how the UDM handles such traffic.

Yes, I've simply blocked all traffic for 8.8.8.8 and 8.8.4.4, via the UDM GUI, the rules are there. The Kindle still shows me ads.

It may be possible to delete the entries for Google DNS on the Kindle via adb commands during boot, but I haven't gotten that far.

Someday I will get around to setting up a homelab network enough to learn iptables etc without blacking out my home network. As any network outage bring immediate screams from the house, I have to treat the firewall configuration as critical infrastructure: brittle. Don't touch.

ectospheno•7mo ago
Hagezi and others provide reasonable DoH block lists.
OptionOfT•7mo ago
With the UDM you can do DNS masquarade to redirect traffic destined for 8.8.8.8:53 to your local pihole / AdGuard instance.
api•7mo ago
On my LAN I send all DNS traffic to pi.hole with iptables. Won’t help if they DoH tunnel it though.
gerdesj•7mo ago
Its a trick one. Traditional DNS runs over port 53/udp and fails over to 53/tcp for large queries/results. That's easy to deal with on a packet filter firewall.

Then in the name of ... something, something, security ... DNS over http(s) was invented. Now you can balkanize DNS by requiring certain SSL certificates be involved. To my knowledge this hasn't been abused large scale yet but it could.

Let's go easy on the tinfoil and simply redirect outbound traffic to 53/udp and tcp to a PiHole or other DNS server under your control.

If you insist on the tin foil, you will probably need to look into a MitM proxy such as Squid - look into "bump" and "spice".

esseph•7mo ago
This falls apart when you realize DoH can (and does) just go out to 443/TCP.

It looks like a web request, which was literally the point of the specification.

"DoH ensures that attackers cannot forge or alter DNS traffic. DoH uses port 443, which is the standard HTTPS traffic port, to wrap the DNS query in an HTTPS request. DNS queries and responses are camouflaged within other HTTPS traffic, since it all comes and goes from the same port."

Now if you get into that territory, as you have suggested with your proxy comment, now you are breaking the security model for not just DNS requests but much of the overall traffic on the network.

vladvasiliu•7mo ago
> Now if you get into that territory, as you have suggested with your proxy comment, now you are breaking the security model for not just DNS requests but much of the overall traffic on the network.

You may be breaking things altogether, actually, since many of the devices for which this song and dance needs to exist don't actually offer a way to alter certificates. I don't know that my smart tv actually uses DoH (it's not physically connected to the network), but I have no idea how I'd add a trusted certificate to its chain, even for other purposes.

gerdesj•7mo ago
I know exactly (within reason) how TLS works. However that enforceable guarantee may not be in the end user's best interests.

Your browser could require via TLS certain CA only signed responses and even covertly do that and flatly refuse to use the system configured DNS and fib and lie. At least DNS over UDP/TCP can be easily manipulated locally through a packet filter and via NAT n that and it can be inspected by the end user easily.

No, I am not suggesting you break any security model - a MitM run by yourself is yours and yours alone. If you consider your browser might be hostile <tin foil crackling sound effect here> then you really have to look quite deeply into what security model you are dealing with and how it really works.

Proxies and so on are just tools for a job as are DNS servers (I have one just for my customer's Let's Encrypt challenges) and all the rest.

I like to forget the usual trite networking bollocks and think quite clearly about how it all really hangs together. I start with what I would like to be the source of "truth" with regards the thing I type into the browser and the IP address that is returned and connected to.

1oooqooq•7mo ago
of course. ads are the life blood of google.

It's the same reason why they reverted silently the options to disable referrer (the default since chrome took over is now to send full url even on xdomain, which was unthinkable during mozilla vs ie)

anything that impacts delivery of ads (dns on android/chromecast) or attribution (referrer) will be fought against by google.

dolmen•7mo ago
The post says:

> Side note: for those wondering, Tailscale is Canadian and can't see the content of connections (although if you're worried about this it's also possible to self-host using Headscale).

However this is no longer the case. From Tailscale's Terms of service "Schedule A", "New customer accounts on or after September 3, 2024" are bound to "Tailscale US Inc., a Delaware corporation"

doctorpangloss•7mo ago
It can’t see the contents of connections but it records all the metadata. You know a lot about what the contents are going to be based on the ports. The default configuration of Tailscale will also collect all your DNS requests.

https://github.com/tailscale/tailscale/issues/16165

reader9274•7mo ago
This is completely unacceptable for a service like tailscale to not offer an easy way to opt out of all logs. Uninstalling it now from all my machines.
robertlagrant•7mo ago
From the issue:

> I never want to send any fraction of information about my Internet browsing to Tailscale.

I'm slightly confused about this part of the ticket. If you're using Tailscale DNS, how do you avoid sending Tailscale information about your internet browsing?

doctorpangloss•7mo ago
> If you're using Tailscale DNS, how do you avoid sending Tailscale information about your internet browsing?

You can't.

robertlagrant•6mo ago
Then I'm struggling with the ticket in question: how do you use the Tailscale DNS service without sending Tailscale any data at all?
udev4096•7mo ago
I don't trust a VC backed company and neither should you. Headscale is extremely easy to configure and setup, go for it instead
slacktivism123•7mo ago
So Tailscale is now a US company and you can't bind to Headscale? Enshittification.
jen20•7mo ago
> and you can't bind to Headscale?

Can you elaborate on what you actually mean by this? Headscale works fine.

elashri•7mo ago
I do force all plain DNS on port 53 to my local dns (Adguard home + unbound on a gl-inet router). And I block common DoH addresses. There are many lists on Github. I collect them using github action to have one big list of their IP and addresses and block them.

This is not a bullet proof solution in case there is a semi known custom DoH an application use. But it is the best that I can do without Enterprise network gear and more complex setup that I would like to maintain.

baby_souffle•7mo ago
Would you be willing to share the list sources you use?
bozhark•7mo ago
Seconded
metadat•7mo ago
And perhaps automate pushing to a gist or repository?
hk1337•7mo ago
I don’t know about their list but I would start with https://github.com/StevenBlack/hosts
TacticalCoder•7mo ago
> And I block common DoH addresses.

You can also force the browser to behave in "corporate" mode, where DNS requests are analyzed by the corporation (you in this case) to determine which domains can and which cannot be accessed by employees (you and your family in this case).

Here for Firefox:

https://support.mozilla.org/en-US/kb/firefox-dns-over-https

"This article describes DNS over HTTPS and how to enable, edit settings, or disable this feature."

Notice the "or disable this feature".

You change the "trr" value (trusted recursive resolver) and DoH is not supposed to happen anymore.

Setting the browser to not use DoH and blocking known DoH servers is great.

What I wonder is if can then easily configure my DNS resolver (I run unbound) to itself use DoH: I don't have anything against DoH. What I have something against is not being able to blocklist based on domain names.

vladvasiliu•7mo ago
I don't know about GP's motivations in doing the blocking and redirections, but if they're anything like mine, Firefox is not one of them. The main issue is random "IoT" devices, think smart TVs and the like, phoning home for a fresh batch of ads and whatnot.
snvzz•7mo ago
I use headscale and took the high road: Tailscale IPs all the time.

Why trust the wires at all. Just run all traffic through VPN, even if it's in the same LAN.

This way, I know all traffic is encrypted. I don't have to worry about SMB or the like being plaintext.

udev4096•7mo ago
I love how wireguard has made encrypted network connections so easy, fast and extremely convenient
IlikeKitties•7mo ago
SMB can be encrypted aswell.
tenacious_tuna•7mo ago
I've run into some performance issues routing everything over a local wireguard link. I have a 10gig connection between my desktop and my NAS, though I only get ~1.1gbps over the wireguard link to the NAS. Without wireguard I can saturate the link.

I could probably tweak it, but I haven't had the bandwidth (ha) to troubleshoot it.

udev4096•7mo ago
> allow 192.168.3.0/24;

Can't an attacker spoof an IP and do SSRF? Or is nginx too good at detecting those kinds of attacks?

Thorrez•7mo ago
I think the attacker won't be able to complete a TCP handshake if spoofing an IP, because the return packets won't be routed to the attacker.

The attacker would have to be on the local network, in which case the attacker isn't really bypassing the allow rule, because the allow rule is intended to allow anyone on the local netowkr.

JoshWVS•7mo ago
Neat! I set up something very similar a few years ago (just with raw dnsmasq); fun to see someone else hit upon the same solution.[0] For anyone running a similar setup: if you want to keep everything as-is, but also expose a single service to the Internet, you can use Tails ale's "Funnel" feature.[1] I use it to self-host Plausible on my home server (i.e. to allow hits to my blog to be counted by my home server, even though that server isn't "generally" available on the Internet).

[0]: https://simpsonian.ca/blog/securing-home-network-dnsmasq-tai...

[1]: https://simpsonian.ca/blog/selfhosting-plausible/