frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

You should write an agent

https://fly.io/blog/everyone-write-an-agent/
470•tabletcorry•8h ago•213 comments

A Fond Farewell from Farmers' Almanac

https://www.farmersalmanac.com/fond-farewell-from-farmers-almanac
40•erhuve•1h ago•7 comments

Scientists find ways to boost memory in aging brains

https://news.vt.edu/articles/2025/10/cals-jarome-improving-memory.html
82•stevenjgarner•4h ago•25 comments

A Note on Fil-C

https://graydon2.dreamwidth.org/320265.html
81•signa11•3h ago•22 comments

Kimi K2 Thinking, a SOTA open-source trillion-parameter reasoning model

https://moonshotai.github.io/Kimi-K2/thinking.html
650•nekofneko•13h ago•269 comments

Game design is simple

https://www.raphkoster.com/2025/11/03/game-design-is-simple-actually/
180•vrnvu•6h ago•56 comments

Two billion email addresses were exposed

https://www.troyhunt.com/2-billion-email-addresses-were-exposed-and-we-indexed-them-all-in-have-i...
374•esnard•8h ago•251 comments

Show HN: I scraped 3B Goodreads reviews to train a better recommendation model

https://book.sv
300•costco•1d ago•105 comments

A prvalue is not a temporary

https://blog.knatten.org/2025/10/31/a-prvalue-is-not-a-temporary/
11•ingve•1h ago•44 comments

Analysis indicates that the universe’s expansion is not accelerating

https://ras.ac.uk/news-and-press/research-highlights/universes-expansion-now-slowing-not-speeding
120•chrka•7h ago•120 comments

Open Source Implementation of Apple's Private Compute Cloud

https://github.com/openpcc/openpcc
371•adam_gyroscope•1d ago•80 comments

Swift on FreeBSD Preview

https://forums.swift.org/t/swift-on-freebsd-preview/83064
193•glhaynes•11h ago•116 comments

From web developer to database developer in 10 years

https://notes.eatonphil.com/2025-02-15-from-web-developer-to-database-developer-in-10-years.html
20•pmbanugo•2d ago•4 comments

LLMs encode how difficult problems are

https://arxiv.org/abs/2510.18147
120•stansApprentice•10h ago•22 comments

FBI tries to unmask owner of archive.is

https://www.heise.de/en/news/Archive-today-FBI-Demands-Data-from-Provider-Tucows-11066346.html
763•Projectiboga•12h ago•389 comments

Eating stinging nettles

https://rachel.blog/2018/04/29/eating-stinging-nettles/
186•rzk•16h ago•173 comments

I analyzed the lineups at the most popular nightclubs

https://dev.karltryggvason.com/how-i-analyzed-the-lineups-at-the-worlds-most-popular-nightclubs/
146•kalli•15h ago•70 comments

The Geometry of Schemes [pdf]

https://webhomes.maths.ed.ac.uk/~v1ranick/papers/eisenbudharris.pdf
23•measurablefunc•6d ago•4 comments

The purported benefits of effect systems

https://typesanitizer.com/blog/effects-convo.html
15•SchwKatze•5d ago•1 comments

The Parallel Search API

https://parallel.ai/blog/introducing-parallel-search
99•lukaslevert•11h ago•39 comments

Hightouch (YC S19) Is Hiring

https://job-boards.greenhouse.io/hightouch/jobs/5542602004
1•joshwget•7h ago

Show HN: Dynamic code and feedback walkthroughs with your coding Agent in VSCode

https://www.intraview.ai/hn-demo
26•cyrusradfar•12h ago•1 comments

Mathematical exploration and discovery at scale

https://terrytao.wordpress.com/2025/11/05/mathematical-exploration-and-discovery-at-scale/
235•nabla9•19h ago•115 comments

The secret campaign to silence critics of a hospital real estate empire

https://www.motherjones.com/politics/2025/10/medical-properties-trust-mpt-steward-health-care-ed-...
81•hhs•5h ago•4 comments

Auraphone: A simple app to collect people's info at events

https://andrewarrow.dev/2025/11/simple-app-collect-peoples-info-at-events/
43•fcpguru•13h ago•17 comments

Show HN: Ambient light sensor control of keyboard and screen brightness in Linux

https://github.com/donjajo/als-led-backlight
12•donjajo•4d ago•1 comments

ICC ditches Microsoft 365 for openDesk

https://www.binnenlandsbestuur.nl/digitaal/internationaal-strafhof-neemt-afscheid-van-microsoft-365
551•vincvinc•11h ago•178 comments

GT – Experimental multiplexing tensor framework for distributed GPU computing

https://github.com/bwasti/gt
16•brrrrrm•4d ago•1 comments

I may have found a way to spot U.S. at-sea strikes before they're announced

https://old.reddit.com/r/OSINT/comments/1opjjyv/i_may_have_found_a_way_to_spot_us_atsea_strikes/
325•hentrep•1d ago•473 comments

HTML Slides in 22 Lines of JavaScript

https://nbd.neocities.org/slidepresentation/Slide%20presentation%20about%20slides
5•Curiositry•2h ago•0 comments
Open in hackernews

A Note on Fil-C

https://graydon2.dreamwidth.org/320265.html
81•signa11•3h ago

Comments

computersuck•2h ago
403's until you go to https://graydon2.dreamwidth.org/ first
AceJohnny2•2h ago
I only got a captcha prompt on the direct link. Perhaps you have something that disables the captcha, and thus got 403'd?
pizlonator•2h ago
This is super kind and awesome, I'm seriously flattered!
keyle•1h ago
Great work for the community.

This has obviously been 'rust'ling some feathers, as it challenges some of the arguments laid past; but once the dust settles, it is a major net benefit to the community.

I hope you get financed and can support other platforms than linux again.

brucehoult•1h ago
Did you know each other at Apple?

Long long ago, in 2009, Graydon was my official on-boarding mentor when I joined the Mozilla Javascript team. Rust already existed then but, as he notes, was quite different then. For one thing, it was GC'd, like Fil-C. Which I like -- I write a lot of my C/C++ code using Boehm GC, have my own libraries designed knowing GC is there, etc.

pizlonator•1h ago
Yeah we interacted at Apple
kardos•1h ago
I suppose /some/ performance loss is inevitable. But this could be quite a game changer. As more folks play with it, performing benchmarks, etc -- it should reveal which C idioms incur the most/least performance hits under Fil-C. So with some targetted patching of C code, we may end up with a rather modest price for the memory safety
pizlonator•1h ago
And I'm not done optimizing. The perf will get better. Rust and Yolo-C will always be faster, but right now we can't know what the difference will be.

Top optimization opportunities:

- InvisiCaps 2.0. While implementing the current capability model, when I was about 3/4 of the way done with the rewrite, I realized that if I had done it differently I would have avoided two branch+compares on every pointer load. That's huge! I just haven't had the appetite for doing yet another rewrite recently. But I'll do it eventually.

- ABI. Right now, Fil-C uses a binary interface that relies on lowering to what ELF is capable of. This introduces a bunch of overhead on every global variable access and every function call. All of this goes away if Fil-C gets its own object file format. That's a lot of work, but it will happen in Fil-C gets more adoption.

- Better abstract interpreter. Fil-C already has an abstract interpreter in the compiler, but it's not nearly as smart as it could be. For example, it doesn't have octagon domain yet. Giving it octagon domain will dramatically improve the performance of loops.

- More intrinsics. Right now, a lot of libc functions that are totally memory safe but are implemented in assembly are implemented in plain Fil-C instead right now, just because of how the libc ports happened to work out. Like, say you call some <math.h> function that takes doubles and returns doubles - it's going to be slower in Fil-C today because you'll end up in the generic C code version compiled with Fil-C. No good reason for this! It's just grunt work to fix!

- The calling convention itself is trash right now - it involves passing things through a thread-local buffer. It's less trashy than the calling convention I started out with (that allocated everything in the heap lmao), but still. There's nothing fundamentally preventing a Fil-C register-based calling convention, but it would take a decent amount of work to implement.

There are probably other perf optimization opportunities that I'm either forgetting right now or that haven't been found yet. It's still early days!

kragen•36m ago
The savings of two conditional branches sounds interesting; what would the change be?
pizlonator•14m ago
- Don’t put flags in the high bits of the aux pointer. Instead if an object has flags, it’ll have a fatter header. Most objects don’t have flags.

- Give up on lock freedom of atomic pointers. This is a fun one because theoretically, it’s worse. But it comes with a net perf improvement because there’s no need to check the low bit of lowers.

kragen•4m ago
Scary! I'm excited to see how it turns out.
jacquesm•35m ago
This is such an interesting project.

I've always been firmly in the 'let it crash' camp for bugs, the sooner and the closer to the offending piece of code you can generate a crash the better. Maybe it would be possible to embed Fil-C in a test-suite combined with a fuzzing like tool that varies input to try really hard to get a program to trigger an abend. As long as it is possible to fuzz your way to a crash in Fil-C that would be a sign that there is more work to do.

That way 'passes Fil-C' would be a bit like running code under valgrind and move the penalty to the development phase rather than the runtime. Is this feasible or am I woolgathering, and is Fil-C only ever going to work by using it to compile the production code?

jsrcout•1h ago
Getting a "not available in your state" page, does anyone have an archive? I've only recently tried out fil-c and hope to use it in some work projects.
dieggsy•1h ago
https://web.archive.org/web/20251107024022/https://graydon2....
pertymcpert•1h ago
I can see the value this brings vs regular C, but I’m less clear on what this brings on top of -fbounds-safety
pizlonator•58m ago
-fbounds-safety is awesome!

Here’s what Fil-C gives you that -fbounds-safety doesn’t:

- Fil-C gives you comprehensive memory safety while -fbounds-safety just covers bounds. For example, Fil-C panics on use after free and has well defined semantics on ptr-int type confusion.

- -fbounds-safety requires you to modify your code. Fil-C makes unmodified C/C++ code memory safe.

FWIW, I worked on -fbounds-safety and I still think it’s a good idea. :-)

thomasmg•47m ago
Yes, safety got more important, and it's great to support old C code in a safe way. The performance drop and specially the GC of Fil-C do limit the usage however. I read there are some ideas for Fil-C without GC; I would love to hear more about that!

But all existing programming languages seem to have some disadvange: C is fast but unsafe. Fil-C is C compatible but requires GC, more memory, and is slower. Rust is fast, uses little memory, but us verbose and hard to use (borrow checker). Python, Java, C# etc are easy to use, concise, but, like Fil-C, require tracing GC and so more memory, and are slow.

I think the 'perfect' language would be as concise as Python, statically typed, not require tracing GC like Swift (use reference counting), support some kind of borrow checker like Rust (for the most performance critical sections). And leverage the C ecosystem, by transpiling to C. And so would run on almost all existing hardware, and could even be used in the kernel.

spijdar•35m ago
Nim fits most of those descriptors, and it’s become my favorite language to use. Like any language, it’s still a compromise, but it sits in a really nice spot in terms of compromises, at least IMO. Its biggest downsides are all related to its relative “obscurity” (compared to the other mentioned languages) and resulting small ecosystem.
sakompella•34m ago
I think transpiling to C is probably the least interesting way to tap into C. FFI is a lot valuable (and doable).
aw1621107•32m ago
One thing I've been wondering recently about Fil-C - why now? And I don't mean that in a dismissive way at all, I'm genuinely curious about the history. Was there some relatively recent fundamental breakthrough or other change that prevented a Fil-C-like approach from being viable before? Was it a matter of finding the right approach/implementation (i.e., a "software" problem), or is there something about modern hardware which makes the approach impractical otherwise? Something else?
pizlonator•11m ago
I’ve been thinking about this problem since 2004.

Here’s a rough timeline:

- 2004-2018: I had ideas of how to do it but I thought the whole premise (memory safe C) was idiotic.

- 2018-2023: I no longer thought the premise was idiotic but I couldn’t find a way to do it that would result in fanatical compatibility.

- 2023-2024: early Fil-C versions that were much less compatible and much less performant

- end of 2024: InvisiCaps breakthrough that gives current fanatical compatibility and “ok” performance.

It’s a hard problem. Lots of folks have tried to find a way to do it. I’ve tried many approaches before finding the current one.

remexre•3m ago
Beyond the Git history, is there any write-up of the different capability designs you've gone with?

I'm interested in implementing a safe low-level language with less static information around than C has (e.g. no static pointer-int distinction), but I'd rather keep around the ability to restrict capabilities to only refer to subobjects than have the same compatibility guarantees Invisicaps provide, so I was hoping to look into Monocaps (or maybe another design, if there's one that might fit better).