frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Performance and Telemetry Analysis of Trae IDE, ByteDance's VSCode Fork

https://github.com/segmentationf4u1t/trae_telemetry_research
534•segfault22•4h ago•189 comments

I hacked my washing machine

https://nexy.blog/2025/07/27/how-i-hacked-my-washing-machine/
52•JadedBlueEyes•2h ago•14 comments

Dumb Pipe

https://www.dumbpipe.dev/
481•udev4096•7h ago•107 comments

Ask HN: What are you working on? (July 2025)

90•david927•4h ago•277 comments

GPT might be an information virus (2023)

https://nonint.com/2023/03/09/gpt-might-be-an-information-virus/
32•3willows•1h ago•8 comments

IBM Keyboard Patents

https://sharktastica.co.uk/topics/patents
15•tart-lemonade•1h ago•0 comments

The Bootstrap Load

http://www.intel4004.com/btstrp.htm
14•gone35•1h ago•0 comments

Return of wolves to Yellowstone has led to a surge in aspen trees

https://www.livescience.com/animals/land-mammals/return-of-wolves-to-yellowstone-has-led-to-a-surge-in-aspen-trees-unseen-for-80-years
334•geox•4d ago•174 comments

Tom Lehrer has died

https://www.nytimes.com/2025/07/27/arts/music/tom-lehrer-dead.html
359•detaro•5h ago•67 comments

The JJ VCS workshop: A zero-to-hero speedrun

https://github.com/jkoppel/jj-workshop
40•todsacerdoti•9h ago•0 comments

The many JavaScript runtimes of the last decade

https://buttondown.com/whatever_jamie/archive/the-many-many-many-javascript-runtimes-of-the-last-decade/
121•LinguaBrowse•7h ago•49 comments

Linux on Snapdragon X Elite: Linaro and Tuxedo Pave the Way for ARM64 Laptops

https://www.linaro.org/blog/linux-on-snapdragon-x-elite/
263•MarcusE1W•15h ago•180 comments

Allianz Life says 'majority' of customers' personal data stolen in cyberattack

https://techcrunch.com/2025/07/26/allianz-life-says-majority-of-customers-personal-data-stolen-in-cyberattack/
157•thm•4h ago•84 comments

Formal specs as sets of behaviors

https://surfingcomplexity.blog/2025/07/26/formal-specs-as-sets-of-behaviors/
9•Bogdanp•2h ago•0 comments

Making Postgres 42,000x slower because I am unemployed

https://byteofdev.com/posts/making-postgres-slow/
13•AsyncBanana•1h ago•0 comments

4k NASA employees opt to leave agency through deferred resignation program

https://www.kcrw.com/news/shows/npr/npr-story/nx-s1-5481304
355•ProAm•17h ago•447 comments

Chemical process produces critical battery metals with no waste

https://spectrum.ieee.org/nmc-battery-aspiring-materials
219•stubish•17h ago•23 comments

Katharine Graham: The Washington Post

https://fs.blog/knowledge-project-podcast/outliers-katharine-graham/
61•feross•3d ago•20 comments

Electrified dry reforming of methane on Ni-La2O3–loaded activated carbon

https://www.science.org/doi/10.1126/sciadv.adv1585
5•PaulHoule•2h ago•0 comments

Bits 0x02: switching to orion as a browser

https://andinfinity.eu/post/2025-07-24-bits-0x02/
3•fside•2d ago•0 comments

BlueOS Kernel – Written in Rust, compatible with POSIX

https://github.com/vivoblueos/kernel
94•dacapoday•3d ago•11 comments

Britain's spies-for-hire are running wild

https://www.politico.eu/article/uk-british-spies-private-intelligence-government-ministers/
44•bingden•2d ago•9 comments

The Evilization of Google–and What to Do About It

https://billdembski.substack.com/p/the-evilization-of-googleand-what
32•huijzer•1h ago•18 comments

Hierarchical Reasoning Model

https://arxiv.org/abs/2506.21734
268•hansmayer•15h ago•83 comments

The future is not self-hosted, but self-sovereign

https://www.robertmao.com/blog/en/the-future-is-not-self-hosted-but-self-sovereign
187•robmao•17h ago•162 comments

National Aviation Reporting Center on Anomalous Phenomena

https://www.narcap.org
13•handfuloflight•2h ago•8 comments

Government-Funded Alchemy

https://thebsdetector.substack.com/p/government-funded-alchemy
11•surprisetalk•3d ago•4 comments

High-performance RISC-V processors: UltraRISC UR-DP1000, Zhihe A210, SpacemIT K3

https://www.cnx-software.com/2025/07/22/three-high-performance-risc-v-processors-to-watch-in-h2-2025-ultrarisc-ur-dp1000-zizhe-a210-and-spacemit-k3/
86•fork-bomber•4d ago•14 comments

A Retrospective on Paradigms of AI Programming (2002)

https://norvig.com/Lisp-retro.html
3•swatson741•2h ago•0 comments

Fast and cheap bulk storage: using LVM to cache HDDs on SSDs

https://quantum5.ca/2025/05/11/fast-cheap-bulk-storage-using-lvm-to-cache-hdds-on-ssds/
196•todsacerdoti•18h ago•62 comments
Open in hackernews

Instrumenting Next.js with runtime secret injection

https://phase.dev/blog/instrumenting-nextjs-with-runtime-secret-injection/
16•nimishk•5h ago

Comments

latchkey•5h ago
"https://api.phase.dev"

100% uptime, I'm sure.

cowthulhu•3h ago
Are you making the argument that they should have a default API route? I don't think that's very common.
latchkey•3h ago
I'm making the argument that I wouldn't rely on an API endpoint to serve up the secrets that enable my application to work. Imagine a network outage or endpoint failure when the app just happens to be redeployed.
duncanfwalker•2h ago
I think it depends on the API - we do this with AWS Secret Managers. I haven't seen it fail but if did it would only effect new instances coming into service so I think we'd have to be pretty unlucky for it to have a noticeable impact.
latchkey•2h ago
This wasn’t an AWS Secrets Manager example, and yes, there’s a guy named Murphy who wrote a law about this kind of thing.
karmakaze•2h ago
That's a whole category of software that makes large systems work: etcd, Zookeeper, HashiCorp Vault, etc.
latchkey•1h ago
Yes! All built with redundancy in mind.

https://etcd.io/docs/v3.3/op-guide/

https://zookeeper.apache.org/doc/r3.9.3/zookeeperStarted.htm...

https://developer.hashicorp.com/vault/tutorials/day-one-raft

jitl•1h ago
Where should secrets come from then? Burn them into the deployable artifact??? Place them on the host filesystem in perpetuity???
ashwinsundar•2h ago
Looks like the Next.js gish-gallop machine is firing on all cylinders, augmented by generative AI.

    .env files are problematic because they often end up in version control or left lying on local disks unencrypted, increasing the risk of a secret leak. They're nearly impossible to manage securely at scale, are difficult to distribute across a team, and offer no access control or security.
Sure, if your developers live in a bubble and don't know any better. Otherwise, .env files are fantastic because they are dead simple. Keeping them out of VCS is simple. echo ".env" >> .gitignore.

Need to share a secret value? Use any number of secure communications systems your company has in place. Or generate your own from the system that is issuing secrets. It's not the 1950s, when sharing a secret was considered a national security endeavor. This doesn't need to be rocket science.

You can communicate what's supposed to go in the .env file with a .env.template file, with a list of env variables set equal to an empty string.

I'm glad they at least share the nightmare that is client-side environment variables. Prepare to waste days/weeks of your life sifting through unresolved issues in Next.js repo on GitHub, only to discover that you have to re-architect vast swaths of an application just so a secret (of any kind) is never required on the client. This is incredibly challenging and frustrating to deal with, especially when on a deadline and you're 95% done with a working solution.

In typical Next.js fashion, the official documentation for instrumentation.ts is complete dog crap. It's deceptively short, making the naive developer think it's simple to configure. In reality, you should first read through the 50 open and 71 closed GitHub issues related just to instrumentation (https://github.com/vercel/next.js/issues?q=is%3Aissue%20stat...), and make sure you understand all the undocumented ways in which instrumentation.js will destroy any semblance of productivity or enjoyment of programming.

I'd highly recommend staying away from the dumpster fire that is Next.js. It's too bad it's like the top skill asked for by employers these days, who seem to have no idea what they're signing up for.

politelemon•2h ago
TIL https://en.m.wikipedia.org/wiki/Gish_gallop
jitl•2h ago
> just so a secret (of any kind) is never required on the client

This is how web clients usually work though not NextJS special at all. You have a HTTP only cookie for authentication and proxy requests through your backend to authorize client to perform actions that depend on secrets.

I’m not a NextJS proponent and have experienced frustrations running into its limitations but I think in this case it’s unfair to malign it.

If anything NextJS makes this easier, you just move your function call that uses a secret to a “use server” file and add an authorization check but your client code doesn’t need to change you keep importing it and calling it like a regular async function.

anonzzzies•1h ago
> I'd highly recommend staying away from the dumpster fire that is Next.js. It's too bad it's like the top skill asked for by employers these days, who seem to have no idea what they're signing up for.

100% agree and we need more people saying it. It is crazy how it got so big. Look at the amount of (breaking) changes that benefit no one except vercel (others cannot really keep up, and that's the plan) and the almost unbelievable amount of sloppy CVEs all over the place (patched automatically if you run with vercel). We get called in after things go wrong to monkey patch it so the business keeps going: nextjs issues are delivering us a lot of work.

azemetre•21m ago
I still don't believe it's that big, but they have had consistent revenue growth:

https://getlatka.com/companies/vercel

If there is another sustained recession, I do wonder how these companies will handle the turmoil. Cutting overpaid services seems like a no-brainer if you have to tighten your belt.

I've also never seen next.js mentioned in a job ad where I worked for the last 10 years (greater Boston area), never really heard much from them during the meetup scene during that time either (2015-2020). I wonder if these customers are more associated with SV businesses, where VC's force their portfolio to buy services from each other.

Also can't imagine v0 not being a money drain.

techpression•1h ago
> I'd highly recommend staying away from the dumpster fire that is Next.js. It's too bad it's like the top skill asked for by employers these days, who seem to have no idea what they're signing up for.

Oh yes, Next.js is on my permanent blacklist of ”I won’t take a job if they use it”. It’s truly one of the worst maintained software I’ve ever used, they break stuff constantly, completely without awareness.

ashwinsundar•58m ago
I agree with everything except "completely without awareness"...the game is called "vendor lock-in" and they're intentionally breaking anything that allows people to use Next.js outside their fancy, expensive ecosystem