frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

ChatGPT agent: bridging research and action

https://openai.com/index/introducing-chatgpt-agent/
412•Topfi•6h ago•300 comments

Mistral Releases Deep Research, Voice, Projects in Le Chat

https://mistral.ai/news/le-chat-dives-deep
388•pember•8h ago•83 comments

Apple Intelligence Foundation Language Models Tech Report 2025

https://machinelearning.apple.com/research/apple-foundation-models-tech-report-2025
141•2bit•5h ago•76 comments

Perfume reviews

https://gwern.net/blog/2025/perfume
102•surprisetalk•23h ago•53 comments

Hand: open-source Robot Hand

https://github.com/pollen-robotics/AmazingHand
319•vineethy•11h ago•92 comments

All AI models might be the same

https://blog.jxmo.io/p/there-is-only-one-model
106•jxmorris12•5h ago•49 comments

Anthropic tightens usage limits for Claude Code without telling users

https://techcrunch.com/2025/07/17/anthropic-tightens-usage-limits-for-claude-code-without-telling-users/
110•mfiguiere•2h ago•53 comments

My experience with Claude Code after two weeks of adventures

https://sankalp.bearblog.dev/my-claude-code-experience-after-2-weeks-of-usage/
99•dejavucoder•4h ago•87 comments

Don't Fall for AI: Reasons for Writers to Reject Slop

https://mythcreants.com/blog/dont-fall-for-ai-nine-reasons-for-writers-to-reject-slop/
35•BerislavLopac•1h ago•15 comments

The impact of file position on code review

https://arxiv.org/abs/2208.04259
44•whatever3•5h ago•21 comments

Show HN: Easy alternative to giflib – header-only decoder in C

https://github.com/Ferki-git-creator/TurboStitchGIF-HeaderOnly-Fast-ZeroAllocation-PlatformIndependent-Embedded-C-GIF-Decoder
7•FerkiHN•11h ago•2 comments

Show HN: PlutoFilter- A single-header, zero-allocation image filter library in C

https://github.com/sammycage/plutofilter
36•sammycage•3d ago•7 comments

Self-taught engineers often outperform (2024)

https://michaelbastos.com/blog/why-self-taught-engineers-often-outperform
99•mbastos•8h ago•85 comments

Run TypeScript code without worrying about configuration

https://tsx.is/
34•nailer•5h ago•29 comments

Archaeologists discover tomb of first king of Caracol

https://uh.edu/news-events/stories/2025/july/07102025-caracol-chase-discovery-maya-ruler.php
128•divbzero•3d ago•26 comments

Game of trees hub

https://gothub.org/
13•todsacerdoti•2d ago•3 comments

Writing a competitive BZip2 encoder in Ada from scratch in a few days (2024)

https://gautiersblog.blogspot.com/2024/11/writing-bzip2-encoder-in-ada-from.html
88•etrez•3d ago•43 comments

ICE's Supercharged Facial Recognition App of 200M Images

https://www.404media.co/inside-ices-supercharged-facial-recognition-app-of-200-million-images/
46•joker99•3h ago•19 comments

On doing hard things

https://parv.bearblog.dev/kayaking/
215•speckx•3d ago•80 comments

Nintendo Switch 2 account bans continue: warning after buying old copy of Bayo 3

https://www.tomshardware.com/video-games/nintendo/nintendo-switch-2-account-bans-continue-content-creator-with-over-a-million-subs-issues-warning-after-buying-an-old-copy-of-bayo-3-on-ebay
56•freedomben•3h ago•56 comments

Running TypeScript Natively in Node.js

https://nodejs.org/en/learn/typescript/run-natively
40•jauco•2h ago•16 comments

The AI Replaces Services Myth

https://aimode.substack.com/p/the-ai-replaces-services-myth
62•warthog•4h ago•40 comments

Delaunay Mesh Generation (2012)

https://people.eecs.berkeley.edu/~jrs/meshbook.html
5•ibobev•3d ago•0 comments

What's going on with gene therapies?

https://nehalslearnings.substack.com/p/whats-going-on-with-gene-therapies
50•nehal96•2d ago•40 comments

Stone blocks from the Lighthouse of Alexandria recovered from seafloor

https://archaeologymag.com/2025/07/lighthouse-of-alexandria-rises-again/
64•gnabgib•4d ago•11 comments

3D-printed living lung tissue

https://news.ok.ubc.ca/2025/07/15/ubco-researchers-create-3d-printed-living-lung-tissue/
13•gmays•6h ago•4 comments

Rejoy Health (YC W21) Is Hiring

https://www.ycombinator.com/companies/rejoy-health/jobs/DCsxNgv-software-engineer
1•rituraj_rhealth•11h ago

Ask HN: What Pocket alternatives did you move to?

26•ahmedfromtunis•3h ago•44 comments

ESA’s Moonlight programme: Pioneering the path for lunar exploration (2024)

https://www.esa.int/Applications/Connectivity_and_Secure_Communications/ESA_s_Moonlight_programme_Pioneering_the_path_for_lunar_exploration
77•nullhole•3d ago•19 comments

When is tech not hype? Tulips, toilets, trains and tabs

https://ajmoon.com/posts/when-is-tech-not-hype-tulips-toilets-trains-and-tabs
59•alex-moon•2d ago•47 comments
Open in hackernews

How secure is your Bitcoin wallet's mnemonic seed phrase?

https://bennet.org/blog/how-secure-is-your-bitcoin-wallets-mnemonic-seed-phrase/
27•tombennet•6d ago

Comments

tombennet•6d ago
Hey, author here. I made this to help technically curious people understand what's really going on when they're handed a Bitcoin seed phrase (i.e. why it's not just a password). You can flip bits of entropy, explore checksum validation, and see how mnemonic phrases are turned into deterministic wallets. Feedback welcome. If anything breaks I’ll fix it fast.
brudgers•5d ago
I could not help but think of a class of early internet scam websites offering to check if your credit card number was stolen.

I'm sure that you aren't just collecting wallet seeds, but that's what it reminds me of.

tombennet•4d ago
Thanks - I appreciate the comment. It's a valid concern, and one I thought about while making this. Just to clarify a few things:

- I've explicitly discouraged entering a real mnemonic, in several places. In fact I tried to steer people in a safe direction by putting the random generation component first. The article works best when starting with random entropy.

- All the BIP39 logic is handled client-side using paulmillr/scure-bip39, a minimal audited library.

- It works fully offline - no backend, no database, no server calls.

- There are no cookies or tracking scripts beyond simple pageview stats via Plausible (which is privacy-focused)

That said, I’d genuinely welcome suggestions on how to make it more trustable. Do you think open-sourcing the code for the page/site would help?

jbermudes•3d ago
I think you did enough due diligence by putting the random part first, but I suppose one way to stop someone from putting in a real BIP39 mnemonic would be to use a completely different set of words than those allowed in BIP39.
nick3443•3d ago
Make the text fields non-editable or drop them entirely? The writing and clickable demos provide a very good lesson without using any text input.
sudahtigabulan•3d ago
I think the disclaimer is the best an honest site owner could do in this case.

If the site was malicious, there wouldn't be any disclaimer, and once you insert a passphrase, BIP39 or not, in a text field, it's game over. No need to press Submit even, some JavaScript will send it wherever it has to.

sparkie•3d ago
Can you explain why this is a valid mnemonic?

    bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon
oakwhiz•3d ago
The last word contains checksum bits but not all of the bits it represents are checksum bits. It just so happens to be possible for all of them to be the same word here. In this case it can be bacon (139th word) or one of the following: cupboard, double, jelly, neutral, review, smile, voice
tombennet•3d ago
Exactly what oakwhiz said. Similarly, if you set all 256 bits of the entropy portion to 1 (i.e. you play minesweeper with my grid) then the resulting valid mnemonic is zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote. The last word contains the checksum, which is the hash of the string of 1s.
er4hn•3d ago
This is really fun, thanks for putting it together. I appreciated the checksum and entropy visualizers quite a bit, they made how it works "click" for me.
tombennet•3d ago
Thanks er4hn, I'm glad to hear it!
gblargg•3d ago
Safest way to generate seed words is a set of dice and printed table. It's odd they only encode 256 bits of entropy, which clearly isn't enough to make multiple 256-bit private keys.
Calwestjobs•3d ago
just XOR two photos from your iphone and pick middle part of that... you can even sha512 that.

Maybe Subkey generation ?

udev4096•3d ago
Shit posts making top of the HN, again. Are people really that stupid?
Calwestjobs•3d ago
Maaan, i stopped paying attention to bitcoin after Bitcoin Cash fork fiasco. Everything flew back into my consciousness. eth DAOHACK fail. Website, listing all possible BTC private keys. (de)Dusting. Printing signed transactions offline into QR codes on thermal paper... Good old days.

I am not sure BTC is still worth the hassle, most of hashrate is inside of USA (70+% =>51%...). most of BTC holdings is in USA... btc saga will end soon and badly in my opinion. BTC Cash made me pessimistic.

In Europe they have SEPA Instant Credit Transfer which allows people inter bank transfers in under 15 seconds. All KYC, all legal, all gov approved, gov regulated, all without fees to btc exchange / VISA. BTC does not even makes sense anymore. Technological innovations flew right past the BTC.

i am not even sure BTC infrastructure is quantum safe, blockchain "is", but i doubt rest of infrastructure is...

npoc•3d ago
You're missing its monetary fundamentals that make it the hardest asset mankind has ever seen.
atoav•3d ago
The first question you should ask yourself when tasked to secury literally anything is the same: secure it against whom or what?

This article is about entropy and mostly an explaination why your mnemonic seed is already safe against wild guesses. The question then is how to secure it against attackers who might want to get it otherwise.

If you live alone writing it on a piece of paper and putting it into a locked drawer might literally be enough, since your main concern would probably be online aftacks. If you have 30 guests a week that calculation might change, but then your scenario is to protect against a guest who A) knows you have a lot of bitcoins, B) posseses all other required information to access the wallet and C) is invited or has broken into your flat. If the latter is an issue, maybe getting a decent door and a safe is a good idea.

This is just an example, but if you want to secure a thing, knowing which attack-vectors to secure it against is key.

tomschwiha•3d ago
I'm totally not into Bitcoins but nice and interesting writeup. I very much like the interactivity of the article.
Calwestjobs•3d ago
Yeah, Jupyter notebooks / literate programming for everything !