frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: LocalGPT – A local-first AI assistant in Rust with persistent memory

https://github.com/localgpt-app/localgpt
34•yi_wang•1h ago•13 comments

SectorC: A C Compiler in 512 bytes (2023)

https://xorvoid.com/sectorc.html
224•valyala•9h ago•43 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
131•surprisetalk•9h ago•139 comments

Software factories and the agentic moment

https://factory.strongdm.ai/
166•mellosouls•12h ago•324 comments

Brookhaven Lab's RHIC concludes 25-year run with final collisions

https://www.hpcwire.com/off-the-wire/brookhaven-labs-rhic-concludes-25-year-run-with-final-collis...
54•gnufx•8h ago•54 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
148•vinhnx•12h ago•16 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
172•AlexeyBrin•15h ago•31 comments

IBM Beam Spring: The Ultimate Retro Keyboard

https://www.rs-online.com/designspark/ibm-beam-spring-the-ultimate-retro-keyboard
10•rbanffy•4d ago•1 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
287•jesperordrup•19h ago•93 comments

First Proof

https://arxiv.org/abs/2602.05192
111•samasblack•11h ago•72 comments

FDA intends to take action against non-FDA-approved GLP-1 drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
84•randycupertino•4h ago•183 comments

Show HN: I saw this cool navigation reveal, so I made a simple HTML+CSS version

https://github.com/Momciloo/fun-with-clip-path
64•momciloo•9h ago•13 comments

Al Lowe on model trains, funny deaths and working with Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
93•thelok•11h ago•21 comments

Show HN: A luma dependent chroma compression algorithm (image compression)

https://www.bitsnbites.eu/a-spatial-domain-variable-block-size-luma-dependent-chroma-compression-...
33•mbitsnbites•3d ago•2 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
562•theblazehen•3d ago•206 comments

The F Word

http://muratbuffalo.blogspot.com/2026/02/friction.html
104•zdw•3d ago•52 comments

LLMs as the new high level language

https://federicopereiro.com/llm-high/
30•swah•4d ago•72 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
270•1vuio0pswjnm7•15h ago•452 comments

Microsoft account bugs locked me out of Notepad – Are thin clients ruining PCs?

https://www.windowscentral.com/microsoft/windows-11/windows-locked-me-out-of-notepad-is-the-thin-...
113•josephcsible•7h ago•133 comments

Eigen: Building a Workspace

https://reindernijhoff.net/2025/10/eigen-building-a-workspace/
10•todsacerdoti•4d ago•2 comments

Selection rather than prediction

https://voratiq.com/blog/selection-rather-than-prediction/
28•languid-photic•4d ago•9 comments

The silent death of good code

https://amit.prasad.me/blog/rip-good-code
71•amitprasad•3h ago•73 comments

I write games in C (yes, C) (2016)

https://jonathanwhiting.com/writing/blog/games_in_c/
177•valyala•9h ago•165 comments

Reinforcement Learning from Human Feedback

https://rlhfbook.com/
114•onurkanbkrc•14h ago•5 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
138•speckx•4d ago•212 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
896•klaussilveira•1d ago•273 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
223•limoce•4d ago•124 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
142•videotopia•4d ago•48 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
583•todsacerdoti•1d ago•283 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
298•isitcontent•1d ago•39 comments
Open in hackernews

Tailscale Services

https://tailscale.com/blog/services-beta
171•xd1936•3mo ago
Video walkthrough: https://www.youtube.com/watch?v=mELAg50ljSA

Comments

setheron•3mo ago
Is this like a more robust funnel?
defnnn•3mo ago
This would be great if it supported wildcards for ingress controllers. A service foo would give you foo.tailYYYY.ts.net as well as *.foo.tailYYYY.ts.net.
rhjensen79•3mo ago
Fantastic. So many posibilities
peter_d_sherman•3mo ago
I did not intuitively understand what Tailscale does, so I visited the following related page:

https://tailscale.com/blog/how-tailscale-works

Ah! OK, now I get it! :-)

But, what found particularly interesting on that page was the following:

>" Some especially cruel networks block UDP entirely

, or are otherwise so strict that they simply cannot be traversed using STUN and ICE. For those situations, Tailscale provides a network of so-called DERP (Designated Encrypted Relay for Packets) servers. These fill the same role as TURN servers in the ICE standard, except they use HTTPS streams and WireGuard keys instead of the obsolete TURN recommendations."

DERP seems like one interesting solution (there may be others!) to UDP blockages...

sureglymop•3mo ago
Yup, really in very simple terms they just give you a public-key discovery/exchange server for your wireguard connected devices. Really wouldn't be that hard to create from scratch, wireguard does the heavy lifting.

Would encourage anyone to go look at the wireguard source code, it's amazingly concise and easy to read.

But they do seem to contribute and open source a lot to the community which I am grateful for.

TranquilMarmot•3mo ago
Very cool, I love Tailscale. I use it to connect together a VPS, desktop computer, phone, and a few laptops. My main use case is self-hosted Immich and Forgejo so this is great.
bicepjai•3mo ago
I recently found Tailscale when searching to control my home lab when traveling and have been amazed by how simple it is we can create a private network.
SOLAR_FIELDS•3mo ago
I normally am one to not recommend proprietary services, especially for homelab use but their solution is just so far above all of the alternatives in terms of usability that I make an exception here.
devilbunny•3mo ago
Even better: while some public WiFi spots block VPN authentication, Tailscale (if already connected while on a different network) will continue to send traffic.

You can't VPN out of the guest WiFi at my work (using personal device), but Tailscale, if connected while I'm at my house or via phone hotspot, will happily let me use my home devices as exit nodes. So I just leave it on all the time and only disconnect if there are issues (rare). I can use sketchy WiFi without really worrying about snooping, and for services that require me to use a US IP address... well, my house is definitely in the US and it's not going anywhere.

sharts•3mo ago
i like tailscale but i notice that i get more weird network blippy latency issues when using it. i used to always have my phone connected to my tailnet so i could use my dns, etc. but always occasionally something won’t load right and i have to refresh again couple of times.

It tended to happen a lot more when switching between wifi / cellular when leaving and entering buildings, etc.

Now I just don’t use it

david_van_loon•3mo ago
I've found that using Tailscale on my Android phone became worlds more reliable (as far as the issues you've described) once I stopped using a custom DNS resolver on my Tailnet.
Hikikomori•3mo ago
Want to use my pi-hole as DNS though.
thedougd•3mo ago
Similar struggle here. I don't have custom DNS, but do use MagicDNS.
subarctic•3mo ago
This sounds great, I think it's exactly what I was looking for recently for hosting arbitrary services on my tailnet. I figured out a workaround where i created a wildcard certificate and dns cname record pointing to my raspberry pi on my tailnet but this could be potentially simpler
preisschild•3mo ago
I just wish tailscale would allow you to use long-lived tokens for ephemeral nodes...

Short lived tokens is not always an option

DomBlack•3mo ago
You can use oauth tokens with the permissions of auth_key write to use long lived tokens to permission ephemeral nodes
DominoTree•3mo ago
I have a GitHub action that uses an OAuth token to provision a new key and store it in our secrets manager as part of the workflow that provisions systems - the new systems then pull the ephemeral key to onboard themselves as they come up

It can get especially interesting when you do things like have your GitHub runners onboard themselves to Tailscale - at that point you can pretty much fully-provision isolated systems directly from GitHub Actions if you want

Daviey•3mo ago
I'm curious, which situations are short-lived tokens not an option?
preisschild•3mo ago
I want to give every node in my kubernetes cluster a tailscale key to join the cluster via the cloud-config / userdata. But this key is enforced by tailscale to be short lived, so if the server is reset and it boots again from cloud-config it has the expired key and can't join the tailscale network again.
EKSolutions•3mo ago
I wonder if that architecture screenshot's "MagicDNS" value is a nod to Pangolin, since they are currently working on a new Clients feature that should eventually replicate some of the core Tailscale functionality.
alexktz•3mo ago
I'm afraid it's much more sophisticated. A Pangolin has both a Tail and Scales.
aidos•3mo ago
Does anyone use Tailscale in production as the network layer between services? Would be interested about hearing experiences.

We use it for to allow us to connect in from the outside (and user to user access etc), but not for service to service connections.

Multicomp•3mo ago
Works great to connect fly.io apps that are only exposed to flycast private IPv6 addresses. And I think Tailscale services will replace these.

Performance between fly.io web servers in iad region to RDS databases in us-east-1 via subnet routers has been spotty to say the least.

SOLAR_FIELDS•3mo ago
In addition, do people do so in mesh format? Seems expensive to do so for all of your machines, more often the topology I see is a relay/subnet advertisement based architecture that handles L3 and some other system handles L6/L7
david_van_loon•3mo ago
I'm happy to see this feature added. It's a feature that I didn't quite realize I was missing, but now that I see it described, I can understand exactly how I'll put it to use. Great work as always by the Tailscale team.
dlisboa•3mo ago
If I'm getting this right it's only highly available from a network layer perspective. However if one of your nodes is still responsive but the service that you exposed on it isn't responsive there's no way for Tailscale to know and it'll route the packet just the same? It's not doing health checks like a reverse proxy would I imagine.
SOLAR_FIELDS•3mo ago
Can someone help me understand what this is vs exposing my services via MagicDNS using the tailscale Kubernetes operator? Functionally it looks like a fair amount of overlap but this solution is generic outside of Kubernetes and more baked into tailscale itself? The operator solution obviously uses kube primitives to achieve a fair amount of the features discussed here.
nickdichev•3mo ago
I’m also curious about this since I’ve been exposing services via their experimental caddy plugin.
smallerize•3mo ago
Was the personal plan not always free?
apenwarr•3mo ago
(I'm a Tailscale employee) The recent versions of the Tailscale k8s operator actually used a pre-release of the Services feature to do exactly that. So, not much difference. The official Services release is making that functionality available for more use cases (and generally better documented and user friendly).
keeda•3mo ago
Fascinating to watch Tailscale evolve from what was (at least in my mind) a consumer / home-lab / small-business client networking product into an enterprise server-networking product.
echelon•3mo ago
They're morphing into a B2B centicorn, and the consumer-led tooling route was a genius path.

They provided much-needed solutions to annoying problems and did it in a way that made developers love them.

Really smart and well executed.

SOLAR_FIELDS•3mo ago
I know they are good at what they do because it's dev tooling that I will actually pay for, which is as many people know, a difficult thing to convince developers to do.
paxys•3mo ago
I understand the usefulness of the feature, but find their examples weird. Are people really exposing their company's databases and web hosts on their tailnet?
nickdichev•3mo ago
Yes I host web services for my consumption, like miniflux rss aggregator, that don’t need to be on the public internet.

Similarly I’m going to host my small business’ staging database on a home server and expose that on my tail net.

theshrike79•3mo ago
How is that different from exposing on the company intranet in general? Or hosting them in a publicly accessible AWS endpoint?
pkt0x53•3mo ago
This project exactly does the same thing https://github.com/mascarenhasmelson/TailPass