frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: LocalGPT – A local-first AI assistant in Rust with persistent memory

https://github.com/localgpt-app/localgpt
109•yi_wang•4h ago•31 comments

Bye Bye Humanity: The Potential AMOC Collapse

https://thatjoescott.com/2026/02/03/bye-bye-humanity-the-potential-amoc-collapse/
25•rolph•2h ago•17 comments

SectorC: A C Compiler in 512 bytes (2023)

https://xorvoid.com/sectorc.html
245•valyala•11h ago•47 comments

Haskell for all: Beyond agentic coding

https://haskellforall.com/2026/02/beyond-agentic-coding
47•RebelPotato•3h ago•9 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
161•surprisetalk•11h ago•152 comments

Software factories and the agentic moment

https://factory.strongdm.ai/
194•mellosouls•14h ago•344 comments

Brookhaven Lab's RHIC concludes 25-year run with final collisions

https://www.hpcwire.com/off-the-wire/brookhaven-labs-rhic-concludes-25-year-run-with-final-collis...
71•gnufx•10h ago•58 comments

Homeland Security Spying on Reddit Users

https://www.kenklippenstein.com/p/homeland-security-spies-on-reddit
53•duxup•1h ago•13 comments

LLMs as the new high level language

https://federicopereiro.com/llm-high/
58•swah•4d ago•110 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
179•AlexeyBrin•17h ago•34 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
170•vinhnx•14h ago•17 comments

Total Surface Area Required to Fuel the World with Solar (2009)

https://landartgenerator.org/blagi/archives/127
13•robtherobber•4d ago•3 comments

First Proof

https://arxiv.org/abs/2602.05192
132•samasblack•14h ago•76 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
314•jesperordrup•21h ago•97 comments

Show HN: I saw this cool navigation reveal, so I made a simple HTML+CSS version

https://github.com/Momciloo/fun-with-clip-path
77•momciloo•11h ago•16 comments

Vouch

https://twitter.com/mitchellh/status/2020252149117313349
56•chwtutha•2h ago•8 comments

Why there is no official statement from Substack about the data leak

https://techcrunch.com/2026/02/05/substack-confirms-data-breach-affecting-email-addresses-and-pho...
10•witnessme•53m ago•3 comments

FDA intends to take action against non-FDA-approved GLP-1 drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
111•randycupertino•7h ago•232 comments

Al Lowe on model trains, funny deaths and working with Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
102•thelok•13h ago•22 comments

Show HN: A luma dependent chroma compression algorithm (image compression)

https://www.bitsnbites.eu/a-spatial-domain-variable-block-size-luma-dependent-chroma-compression-...
39•mbitsnbites•3d ago•4 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
575•theblazehen•3d ago•208 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
301•1vuio0pswjnm7•18h ago•478 comments

I write games in C (yes, C) (2016)

https://jonathanwhiting.com/writing/blog/games_in_c/
187•valyala•11h ago•169 comments

Microsoft account bugs locked me out of Notepad – Are thin clients ruining PCs?

https://www.windowscentral.com/microsoft/windows-11/windows-locked-me-out-of-notepad-is-the-thin-...
140•josephcsible•9h ago•172 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
231•limoce•4d ago•125 comments

Selection rather than prediction

https://voratiq.com/blog/selection-rather-than-prediction/
31•languid-photic•4d ago•14 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
903•klaussilveira•1d ago•276 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
147•speckx•4d ago•232 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
146•videotopia•4d ago•48 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
303•isitcontent•1d ago•39 comments
Open in hackernews

Cybersecurity breach at Congressional Budget Office remains a live threat

https://www.politico.com/live-updates/2025/11/10/congress/cbo-still-under-threat-00644930
52•mooreds•2mo ago

Comments

lschueller•2mo ago
Reading the short article it feels like the old routine of 1. Cyber incident, 2. sparse information in all directions, 3. after fixed, all personnel returns to old habits with higher level of insecurity against a blurry, unspecific threat and back to square one. while the few sec op folks try to train employees to better secure the systems without really improving the crucial understanding of how such incidents really work. Or do I completely misinterpret such causalities?
vpShane•2mo ago
Sounds about right.
mistrial9•2mo ago
you missed "increase budget and capabilities of overseers"
firefax•2mo ago
>Reading the short article it feels like the old routine

Difference being the shutdown will make remediation much harder and take longer.

neilv•2mo ago
> “Maintain a high level of vigilance and verify the legitimacy of CBO communications by confirming with the sender via telephone that they sent the message,” the note continues.

Depends how sophisticated and incentivized the attacker, of course.

dylan604•2mo ago
Man, and I thought government was inefficient before. Now, after every message they receive, they must then call the person to verify the message before responding. Which naturally means, they then must call you back to verify you sent the response. Electronic messaging was meant to do away with this phone tag scenario, yet now they want to ensure messaging is dependent on phone tag.
terribleperson•2mo ago
Since it's obviously impractical, the procedure will be worked around or ignored 99% of the time. The phone logs will however allow for the picking of a convenient scapegoat in the wake of a future attack.
dylan604•2mo ago
Man, if something ever needed group participation in malicious compliance, this would something I would nominate
retrochameleon•2mo ago
If only telecomms made any sense for the 25th century with easily verifiable sender identification, and it would block malicious, spoofed, and spam messages before they ever got to your phone in the first place.
metalman•2mo ago
in other news, busses in Norway have been found to have had internet conectivity installed by there chinese makers,spy busses and spy cranes, which is supposed to terrify us enough that we stop demanding $10000 chinese electric cars, which will spy on us, and send pictures of our children, likely throwing sandwiches at each other, back to china, for analysis of our eating habits and child rearing practice, so that they can wage profound psychological warfare on us, yes you, YOU, are making your child, FAT!