frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
306•theblazehen•2d ago•103 comments

France's homegrown open source online office suite

https://github.com/suitenumerique
21•nar001•53m ago•10 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
40•AlexeyBrin•2h ago•7 comments

Software Engineering Is Back

https://blog.alaindichiappari.dev/p/software-engineering-is-back
37•alainrk•1h ago•30 comments

Reinforcement Learning from Human Feedback

https://arxiv.org/abs/2504.12501
20•onurkanbkrc•1h ago•1 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
719•klaussilveira•16h ago•222 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
105•jesperordrup•6h ago•38 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
983•xnx•22h ago•562 comments

Ga68, a GNU Algol 68 Compiler

https://fosdem.org/2026/schedule/event/PEXRTN-ga68-intro/
22•matt_d•3d ago•4 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
78•videotopia•4d ago•12 comments

Making geo joins faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
141•matheusalmeida•2d ago•37 comments

Cross-Region MSK Replication: K2K vs. MirrorMaker2

https://medium.com/lensesio/cross-region-msk-replication-a-comprehensive-performance-comparison-o...
5•andmarios•4d ago•1 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
243•isitcontent•16h ago•27 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
245•dmpetrov•17h ago•128 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
346•vecti•18h ago•153 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
511•todsacerdoti•1d ago•248 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
395•ostacke•22h ago•102 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
47•helloplanets•4d ago•48 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
310•eljojo•19h ago•192 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
363•aktau•23h ago•189 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
442•lstoll•23h ago•289 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
77•kmm•5d ago•11 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
98•quibono•4d ago•22 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
26•bikenaga•3d ago•14 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
48•gmays•11h ago•19 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
281•i5heu•19h ago•230 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1092•cdrnsf•1d ago•473 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
312•surprisetalk•3d ago•45 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
160•vmatsiiako•21h ago•73 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
36•romes•4d ago•3 comments
Open in hackernews

Phrack 72

https://phrack.org/issues/72/1
164•todsacerdoti•5mo ago

Comments

jmclnx•5mo ago
Glad to see they are still active
supermatou•5mo ago
Must read

https://phrack.org/issues/72/19#article

supernetworks•5mo ago
This is not unlike the surprise in underground.txt when mendax & co discover that curiosity is not the only state of existence for being a hacker. https://www.gutenberg.org/cache/epub/4686/pg4686.txt

"Riffling through other files, Mendax found mail confirming that the attack had indeed come from inside MILNET. His eyes grew wide as he read on. US military hackers had broken into MILNET systems, using them for target practice, and no-one had bothered to tell the system admin at the target site.

Mendax couldn't believe it. The US military was hacking its own computers. This discovery led to another, more disturbing, thought. If the US military was hacking its own computers for practice, what was it doing to other countries' computers? "

firefax•5mo ago
>This is not unlike the surprise in underground.txt

I thought that was originally a book?

I distinctly remember reading it during an in school suspension in the 2000s.

I tried to go back to my township library and read it again years later, but someone had stolen it around the time that Wikileaks truthfully revealed that the DNC had kneecapped Bernie in the primaries.

(Many folks don't seem to distinguish between the public airing of unpleasant truths that could not be aired without their own actions, and "disinformation" in the "covid is a hoax" vein. To them, anything contrary to their narrative is evil and bad, and if only those dastardly Russians would stop making them look bad my making them send several illegal emails they could stop voting like Republicans)

supernetworks•5mo ago
It is a book, "Underground: Hacking, madness and obsession on the electronic frontier". I seem to recall cross it hosted under mit.edu/~hacker/underground.txt or something like that
firefax•5mo ago
Ah ok. Weird way to cite a book title.
aspenmayer•5mo ago
Previously/related:

In the Realm of the Hackers (2003) [video] - https://news.ycombinator.com/item?id=42281735

contingencies•5mo ago
https://underground-book.net/download.php3
anthk•5mo ago
I hate it. It destroys the original concept of hackers, with the original Jargon file, the best relase (1.5). Lisp and Forth hackers are the original thinkerers.

The Jargon File

https://jargon-file.org/archive/jargon-1.5.0.dos.txt

https://hakmem.org/

These are actual hackers and hacks.

contingencies•5mo ago
That ship had sailed well before the ~1997 launch of the book. See for example https://en.wikipedia.org/wiki/Hackers_(film) (1995) or http://www.takedown.com/ (1996)
anthk•5mo ago
Hacker Crackdown. The PC scene ruined everything.
firefax•5mo ago
>These are actual hackers

[clicks]

>The certificate for hakmem.org expired on 5/8/2021.

hulitu•5mo ago
Thanks. How the world evolved: "Also, if you're curious, view the WebMake source file (warning: this contains the entire book text and markup: 948k in total). "
guitmz•5mo ago
Thank you. Glad you liked it!
jpfromlondon•5mo ago
I can't help but see security professionals as fakers, they seem to mostly be box-tickers rather than the professionally curious, in school and college I was up to no good with tech, but now when my employer is recruiting to establish an in-house cyber team I know I'm not what they're looking for and never was.

I exclude the RE guys who are undoubtedly extraordinary.

awithrow•5mo ago
I think like most things there is a power law distribution when it comes to these sort of roles. I've worked with a few really good security teams in my career. The good ones work with the teams, possibly embedded on improving security. The better ones also write tools and libraries for service teams to consume. The best ones act like internal white hats, constantly probe and assess, and submit patches as well.

Sadly the vast majority of sec teams are not this and exist solely to run some tool that spits out a list of dubious vulns and then dump said list as a pile of tickets into the dev backlog.

One place i worked, the CISO even came up with some slogan for the info-sec along the lines of "observe and report" after I kept trying to show the info-sec how to run, build, test, and patch our various packages and tools their scanners would complain about.

shiftlessunity•5mo ago
Does anyone know of an RSS feed for new phrack publications?
kace91•5mo ago
Damn does this bring back memories.

I learned to code specifically because as a kid I wanted to be a hacker; I was reading explanations of a buffer overflow in physical magazines before I learned how to code.

It’s been more than a decade since I even touched these kind of resources, but in a way those people are still the reason I can put food on the table now.

I really should revisit the community at some point, if only to see what the current environment is like. Things must have changed a lot since the time a teenager could bypass any security in their surroundings.

alisonatwork•5mo ago
There is an ASCII chart in https://phrack.org/issues/72/18_md#article which references https://arxiv.org/pdf/2008.07753 [PDF], a 2020 article showing that open source peaked in 2013. In some qualitative sense that feels intuitively correct, but I am skeptical that in the modern world filled with a zillion NPM dependencies and the cloud YAML explosion and now vibe-coded everything that we are actually producing less lines of open source than we did in 2013. Is anyone aware of newer studies that investigate this?
mid-kid•5mo ago
I imagine they might be counting actual applications and not libraries/dependencies. Lots of things on the web are closed source.
tgrcode•5mo ago
That is my article. The data source (Open Hub) may not be completely representative of open source, but the precise trend I was aiming to cite was hard to find elsewhere (and especially to find a graph for!)
tgrcode•5mo ago
And thanks for reading!
JSR_FDED•5mo ago
This hits home for me.

> Then: We were the kids who saw the blinking cursor not as a barrier, but as an invitation. We typed characters into the voids and got back secrets. Our goal was not destruction, it was understanding — to understand the systems better than those who built them.

> Now: Hacking is a job title. Curiosity has been commodified. A thousand "Bug Bounty Platforms" are trying to monetize your desire for understanding, to turn it into CVEs and T-shirts.

suchoudh•5mo ago
sometime back i downloaded a phrack zip on my ubuntu and noticed it had some special character which did not allow me to delete the files once unzipped.

perhaps some safety measure. i am used to only drwxrwxrwx or lrwxrwxrwx on dirs and files never seen srwx.....

Can someone pls point me to some doc that explains how to deal with it.

theblazehen•5mo ago
That sounds like a socket, are you sure you downloaded a zip and not a tar? And that you didn't extract it as root / another user?

You should check the permissions on it, you may need to chown it to your user, or just remove it as root

jo-lund•5mo ago
Sounds to me like the sticky bit is set on the directory and you are not the owner. If this is set on a directory, then you can't delete files inside this directory unless you are the owner (of the files or the directory) or root. Having write permisson is not enough. This makes directories like for example tmp a bit more secure.
alecco•5mo ago
Highly recommend: Phrack Prophile on Gera https://phrack.org/issues/72/2#article

(Though I'm biased)

jmclnx•5mo ago
Odd, did something change with phrack ? I usually go there using lynx, but this time I get "Alert!: HTTP/1.1 308 Permanent Redirect"

Will try dillo but I guess I will be stuck using Firefox.

edit: dillo worked fine.

alecco•5mo ago
lynx! Now this is nostalgia. Thank you.
yencabulator•5mo ago
This WASM sandbox sloppiness was interesting to me: https://phrack.org/issues/72/10_md#article
zzo38computer•5mo ago
Although I had not used WebAssembly, the problem (and how to mitigate it) were obvious to me right after reading section 2, although perhaps not to everyone (but I expect I am not the only one who finds it obvious; there are probably others).
immibis•5mo ago
Someone gave me a physical copy at WHY2025 in exchange for telling him about Evan Doorbell's Telephone Tapes[1]. I should probably read it. Seems to have a lot of fascinating content.

[1] https://evan-doorbell.com/