frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

FFmpeg 8.0

https://ffmpeg.org/index.html#pr8.0
88•gyan•30m ago•19 comments

Io_uring, kTLS and Rust for zero syscall HTTPS server

https://blog.habets.se/2025/04/io-uring-ktls-and-rust-for-zero-syscall-https-server.html
359•guntars•12h ago•88 comments

LabPlot: Free, open source and cross-platform Data Visualization and Analysis

https://labplot.org/
90•turrini•6h ago•14 comments

Launch HN: Inconvo (YC S23) – AI agents for customer-facing analytics

18•ogham•2h ago•11 comments

What about using rel="share-url" to expose sharing intents?

https://shkspr.mobi/blog/2025/08/what-about-using-relshare-url-to-expose-sharing-intents/
37•edent•4h ago•17 comments

DeepSeek-v3.1

https://api-docs.deepseek.com/news/news250821
646•wertyk•20h ago•202 comments

Making LLMs Cheaper and Better via Performance-Efficiency Optimized Routing

https://arxiv.org/abs/2508.12631
23•omarsar•1h ago•4 comments

Thunderbird Pro August 2025 Update

https://blog.thunderbird.net/2025/08/tbpro-august-2025-update/
110•mnmalst•1h ago•31 comments

Everything is correlated (2014–23)

https://gwern.net/everything
195•gmays•13h ago•88 comments

Control shopping cart wheels with your phone (2021)

https://www.begaydocrime.com/
227•mystraline•14h ago•93 comments

VHS-C: When a lazy idea stumbles towards perfection [video]

https://www.youtube.com/watch?v=HFYWHeBhYbM
106•surprisetalk•4d ago•65 comments

All managers make mistakes; good managers acknowledge and repair

https://terriblesoftware.org/2025/08/22/the-management-skill-nobody-talks-about/
173•matheusml•3h ago•61 comments

Code formatting comes to uv experimentally

https://pydevtools.com/blog/uv-format-code-formatting-comes-to-uv-experimentally/
308•tanelpoder•19h ago•204 comments

Go is still not good

https://blog.habets.se/2025/07/Go-is-still-not-good.html
320•ustad•6h ago•371 comments

An interactive guide to SVG paths

https://www.joshwcomeau.com/svg/interactive-guide-to-paths/
390•joshwcomeau•4d ago•40 comments

Weaponizing image scaling against production AI systems

https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/
453•tatersolid•1d ago•127 comments

How Not to Buy a SSD

https://andrei.xyz/post/how-not-to-buy-a-ssd/
116•speckx•3d ago•104 comments

4chan will refuse to pay daily online safety fines, lawyer tells BBC

https://www.bbc.co.uk/news/articles/cq68j5g2nr1o
152•donpott•5h ago•154 comments

Crimes with Python's Pattern Matching (2022)

https://www.hillelwayne.com/post/python-abc/
229•agluszak•20h ago•93 comments

From GPT-4 to GPT-5: Measuring progress through MedHELM [pdf]

https://www.fertrevino.com/docs/gpt5_medhelm.pdf
116•fertrevino•17h ago•85 comments

How does the US use water?

https://www.construction-physics.com/p/how-does-the-us-use-water
210•juliangamble•1d ago•157 comments

1981 Sony Trinitron KV-3000R: The Most Luxurious Trinitron [video]

https://www.youtube.com/watch?v=jHG_I-9a7FY
82•ksec•1d ago•61 comments

Building AI products in the probabilistic era

https://giansegato.com/essays/probabilistic-era
170•sdan•21h ago•95 comments

Show HN: OS X Mavericks Forever

https://mavericksforever.com/
377•Wowfunhappy•3d ago•170 comments

AWS CEO says using AI to replace junior staff is 'Dumbest thing I've ever heard'

https://www.theregister.com/2025/08/21/aws_ceo_entry_level_jobs_opinion/
1529•JustExAWS•1d ago•648 comments

Being “Confidently Wrong” is holding AI back

https://promptql.io/blog/being-confidently-wrong-is-holding-ai-back
114•tango12•3h ago•175 comments

How well does the money laundering control system work?

https://www.journals.uchicago.edu/doi/10.1086/735665
267•PaulHoule•1d ago•317 comments

My other email client is a daemon

https://feyor.sh/blog/my-other-email-client-is-a-mail-daemon/
180•aebtebeten•1d ago•24 comments

Beyond sensor data: Foundation models of behavioral data from wearables

https://arxiv.org/abs/2507.00191
224•brandonb•1d ago•48 comments

Using Podman, Compose and BuildKit

https://emersion.fr/blog/2025/using-podman-compose-and-buildkit/
291•LaSombra•1d ago•107 comments
Open in hackernews

What about using rel="share-url" to expose sharing intents?

https://shkspr.mobi/blog/2025/08/what-about-using-relshare-url-to-expose-sharing-intents/
37•edent•4h ago

Comments

nashashmi•2h ago
I was thinking A button can also be an alternative with all data sent as post, but apparently the button attributes don’t include any ability to specify form values. This has to be done via JS or via additional tags (which is still an option).
geocar•2h ago
One thing I really don't like about it is the implication that the url and the share-button could refer to different things. I feel like browser vendors probably care about knowing whether users use the share button or copy/paste the URL, but hypothetically they know already and I don't feel like most (any?) websites need that information -- it might correlate to a sophistication-level of the user and be used for targeting by scammers, and that could be bad.

For me, I use history.replaceState to change the url after I've got my campaign tracking to the share link, this way the browser's built-in share button does all the work for me. I can detect trivial-reload by checking the cookie I dropped when the page came in, so I don't mis-attribute shares. It is a shame I cannot do this so easily without JavaScript, but I'm sure I can actually buy non-JavaScript users from Google (and other ad platforms) so I'm not sure it's worth worrying about.

chrismorgan•2h ago
There’s already a better spec from 2016, which has even been shipping in the Chromium family since 2019 (Android) or 2021 (desktop):

https://w3c.github.io/web-share-target/

https://developer.mozilla.org/en-US/docs/Web/Progressive_web...

Use that, and the browser/native platform integration is already there, and ShareOpenly becomes more of stopgap measure.

The only real problem is that you can’t feature-detect share_target support—so you can’t detect if the user is able to add a web app to the user agent’s share targets.

As for ShareOpenly using these things, see https://shareopenly.org/share/?url=https://example.com, and it requires the user to paste a value in once, and then by the looks of it it will remember that site via a cookie. Not great, but I guess it works. But I’m sceptical anyone will really use it.

quectophoton•2h ago
> The only real problem is that you can’t feature-detect share_target support

I didn't know this existed, so the first thing I did is check the caniuse website, and yeah not even they have info about the Web Share Target API[1][2]. As of writing this comment, they only have info about the Web Share API[3].

[1]: https://github.com/Fyrd/caniuse/issues/4670

[2]: https://github.com/Fyrd/caniuse/issues/4906

[3]: https://caniuse.com/web-share

troupo•1h ago
Because as with many, many, many APIs that Chrome ships it's not a spec:

- there's a giant banner on the left saying "unofficial"

- The "Status of this document" section states the following:

--- start quote ---

This document is a draft of a potential specification. It has no official standing of any kind and does not represent the support or consensus of any standards organization.

--- end quote ---

But just because it was shipped in Chrome and has some napkin scribbles resembling an official spec, people will both claim it's a spec and expect everyone to implement it.

chrismorgan•29m ago
Links on support:

https://github.com/mdn/browser-compat-data/blob/main/manifes... (data integrated into the MDN page I linked)

Chromium: https://chromestatus.com/feature/5662315307335680, implemented on Android from M71 and desktop from M89.

WebKit: standards position is neutral <https://github.com/WebKit/standards-positions/issues/11>, and https://bugs.webkit.org/show_bug.cgi?id=194593 shows plenty of developer interest but doesn’t look to have been touched by Apple.

Firefox: standards position is positive <https://mozilla.github.io/standards-positions/#web-share-tar...>, but https://bugzilla.mozilla.org/show_bug.cgi?id=1476515 has languished.

troupo•1h ago
> There’s already a better spec from 2016

aka

This document is a draft of a potential specification. It has no official standing of any kind and does not represent the support or consensus of any standards organization.

chrismorgan•23m ago
It’s been implemented in Chromium for 4–6 years, Firefox’s position is positive (admittedly that was 2019), WebKit’s is neutral, and there are bugs open in both Firefox and WebKit.

I regularly criticise Google-only specs and point out how they’re not standards in any way, but this one is not really like that—it’s just that the other two platforms are missing a couple of other pieces that are better to get in place first, and it’s not a high priority for them.

And certainly in the context of this rel="share-url" outsider proposal, nah, the share_target manifest reference is still way more “official” than that.

uberman•2h ago
I don't care for the dash myself. I would have chosen something more like rel="shareable"
cxr•2h ago
Only tangentially related to the main subject, but the post ends with:

> Extensions to the predefined set of link types may be registered on the microformats page for existing rel values.

Please don't. WHATWG's tendency to self-anoint and all its idiosyncrasies notwithstanding, the IANA maintains the link relation registry[1]. Use the procedure prescribed in the RFCs.

1. <https://www.iana.org/assignments/link-relations/link-relatio...>

rs186•1h ago
The article is proposing a technical solution to a business problem.

I have no doubt this proposal or any other similar proposal would work well in the 90s or early 2000s. Let's go one step further and let browsers work with all those third party website and figure all the details for sharing, and websites never embed anything.

But you see, that's not the problem. These share buttons are often trojans on websites. Facebook tracks you via those share buttons even if you have never had a Facebook account. And people come up with various solutions to tackle that -- adblockers just block network traffic, while a small amount of website owners create a separate switch which you can toggle and then share with Facebook. Isn't all of that stupid? I don't see why Facebook, Instagram will be eager to opt in to this solution and make the experience good.

defraudbah•1h ago
exactly my thought, links work fine as they are, my biggest problem with them is 9 times of 10 I don't know where they lead. Fixing one "share" use case isn't solving a misuse
johannes1234321•1h ago
Yeah, for those branded buttons on websites this isn't an alternative. They want all their JavaScript for collect information on the user, even if they don't press the button.

I believe this is to play with (mobile) browser's share button, while even there I don't get how this is supposed to work.

First: How does this figure out where I want to share to? And then: Would it have to load the shared-to page first, parse it to see if there is such a Tag and then interpret it?

Maybe I am missing something.

biggestfan•1h ago
Does anyone even use share buttons? I always just copy the link, and it seems that anyone I see sharing things does the same. It feels more like a way for the social media companies to advertise/track, and those sites have been sending less and less traffic for years, so I wonder why every site still has them.
0x00000000•7m ago
tiktok share links also dox you. they have a banner with the name and profile picture of the person that shared it
cousin_it•5m ago
Yeah, I think people should stop putting up sharing buttons that lead to abusive platforms. 1) Sharing interesting content on an abusive platform indirectly supports it, making people more likely to stay there. Of course you can't stop it, but why go out of your way to make it easy? 2) It also lets the platform track your site's visitors, which is bad.
blahgeek•1h ago
Does this mean that, when the user clicks a "share to social.network" button in random.com, the browser would first request the full html page of social.network (in the background) only to parse the rel="share-url" link? Seems a bad design.