frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Tailscale state file encryption no longer enabled by default

https://tailscale.com/changelog
138•traceroute66•3h ago•67 comments

Sugar industry influenced researchers and blamed fat for CVD (2016)

https://www.ucsf.edu/news/2016/09/404081/sugar-papers-reveal-industry-role-shifting-national-hear...
589•aldarion•8h ago•363 comments

LMArena is a cancer on AI

https://surgehq.ai/blog/lmarena-is-a-plague-on-ai
111•jumploops•18h ago•40 comments

Notion AI: Unpatched data exfiltration

https://www.promptarmor.com/resources/notion-ai-unpatched-data-exfiltration
57•takira•3h ago•4 comments

Eat Real Food

https://realfood.gov
353•atestu•5h ago•628 comments

Shipmap.org

https://www.shipmap.org/
397•surprisetalk•8h ago•65 comments

NPM to implement staged publishing after turbulent shift off classic tokens

https://socket.dev/blog/npm-to-implement-staged-publishing
106•feross•4h ago•16 comments

US will ban Wall Street investors from buying single-family homes

https://www.reuters.com/world/us/us-will-ban-large-institutional-investors-buying-single-family-h...
456•kpw94•4h ago•469 comments

2026 Predictions Scorecard

https://rodneybrooks.com/predictions-scorecard-2026-january-01/
18•calvinfo•1h ago•8 comments

LaTeX Coffee Stains (2021) [pdf]

https://ctan.math.illinois.edu/graphics/pgf/contrib/coffeestains/coffeestains-en.pdf
262•zahrevsky•8h ago•60 comments

Health care data breach affects over 600k patients, Illinois agency says

https://www.nprillinois.org/illinois/2026-01-06/health-care-data-breach-affects-600-000-patients-...
133•toomuchtodo•6h ago•45 comments

Native Amiga Filesystems on macOS / Linux / Windows with FUSE

https://github.com/reinauer/amifuse
62•doener•4d ago•12 comments

We found cryptography bugs in the elliptic library using Wycheproof

https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-...
38•crescit_eundo•6d ago•2 comments

Claude Code Emergent Behavior: When Skills Combine

https://vibeandscribe.xyz/posts/2025-01-07-emergent-behavior.html
48•ryanthedev•3h ago•27 comments

Creators of Tailwind laid off 75% of their engineering team

https://github.com/tailwindlabs/tailwindcss.com/pull/2388
846•kevlened•7h ago•536 comments

A4 Paper Stories

https://susam.net/a4-paper-stories.html
272•blenderob•10h ago•133 comments

A glimpse into V8 development for RISC-V

https://riseproject.dev/2025/12/09/a-glimpse-into-v8-development-for-risc-v/
26•floitsch•18h ago•3 comments

Many hells of WebDAV

https://candid.dev/blog/many-hells-of-webdav
105•candiddevmike•7h ago•59 comments

What *is* code? (2015)

https://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/
104•bblcla•6d ago•43 comments

ChatGPT Health

https://openai.com/index/introducing-chatgpt-health/
116•saikatsg•3h ago•126 comments

My first paper: A practical implementation of Rubiks cube based passkeys

https://ieeexplore.ieee.org/document/11280260
12•acorn221•1h ago•5 comments

Building voice agents with Nvidia open models

https://www.daily.co/blog/building-voice-agents-with-nvidia-open-models/
64•kwindla•7h ago•6 comments

The Chicken Game and the Evolution of the DRAM Industry from 2006 to 2014 [pdf]

https://s-space.snu.ac.kr/bitstream/10371/95351/1/01%20Jeho%20Lee.pdf
5•walterbell•5d ago•0 comments

SSDs, power loss protection and fsync latency

http://smalldatum.blogspot.com/2026/01/ssds-power-loss-protection-and-fsync.html
12•ingve•2h ago•1 comments

Show HN: I visualized the entire history of Citi Bike in the browser

https://bikemap.nyc/
26•freemanjiang•4h ago•14 comments

So you wanna de-bog yourself (2024)

https://www.experimental-history.com/p/so-you-wanna-de-bog-yourself
12•calvinfo•2h ago•4 comments

Michel Siffre: This man spent months alone underground – and it warped his mind

https://www.newscientist.com/article/mg23931900-400-this-man-spent-months-alone-underground-and-i...
23•Anon84•6d ago•3 comments

Everything You Need to Know About Email Encryption in 2026

https://soatok.blog/2026/01/04/everything-you-need-to-know-about-email-encryption-in-2026/
22•some_furry•3d ago•3 comments

Optery (YC W22) Hiring a CISO and Web Scraping Engineers (Node) (US and Latam)

https://www.optery.com/careers/
1•beyondd•11h ago

Meditation as Wakeful Relaxation: Unclenching Smooth Muscle

https://psychotechnology.substack.com/p/meditation-as-wakeful-relaxation
124•surprisetalk•8h ago•89 comments
Open in hackernews

Show HN: 48-digit prime numbers every git commit

https://textonly.github.io/git-prime/
65•keepamovin•6d ago

Comments

keepamovin•6d ago
Why? Fun. Now every commit is a certified 160-bit prime number.

- Miller-Rabin primality test (40 rounds, ~10^-24 false positive rate)

- Fuzzes commit messages with nonces until finding a prime hash

- Average ~368 attempts to find a prime (based on prime density at 2^160)

- Actual performance: 30-120 seconds depending on luck

The philosophy: shouldn't the global distributed compute grid be used to forward number theoretic random non-goals like primality?

Every developer running git-prime contributes cycles to finding 160-bit primes hidden in SHA-1 space. Corporate pointless, but math & aesthets satisfying.

Install:

  curl -fsSL https://textonly.github.io/git-prime/install.sh | bash
or

  irm textonly.github.io/git-prime/install.ps1 | iex 
on Win

Then just run

  git prime-commit -m "my frickin commit message, etc..."
Side note: disappointed that this Show's item ID is NOT prime. 46454369 = 13 × 3573413. Would've been perfect meta-content, ahah
Retr0id•1d ago
30-120 seconds sounds surprisingly long for ~368 attempts, do you know which part(s) the slowness comes from?
tntxtnt•22h ago
From doing MR rounds in pure Python: https://github.com/textonly/git-prime/blob/main/git-prime-co....

Should be under 5 seconds in C or C++ using gmp

Retr0id•12h ago
No, MR in pure python is ~instantaneous for numbers of this magnitude.

From looking at the code, the overhead will be from repeatedly invoking git as a subprocess.

keepamovin•20h ago
Have not flame graphed or even really considered optimization
tzs•1d ago
> Miller-Rabin primality test (40 rounds, ~10^-24 false positive rate)

It's way better than that. You are using the simplest upper bound for the false positive rate, which is 1/t^4 where t is the number of rounds. More sophisticated analysis can give better bounds.

See the paper "Average Case Error Estimates for the Strong Probable Prime Test" by Ivan Damgård, Peter Landrock and Carl Pomerance, in Mathematics of Computation Vol. 61, No. 203, Special Issue Dedicated to Derrick Henry Lehmer (Jul., 1993), pp. 177-194. Here's a PDF: https://math.dartmouth.edu/~carlp/PDF/paper88.pdf

Here are the bounds given there for t rounds testing a candidate of k bits. I'll give them as Mathematica function definitions because I happen to have them in a Mathematica notebook.

1. This one is valid for k >= 2.

  p1[k_, t_] := k^2 4^(2 - Sqrt[k])
Note this one does not depend on t, and for small k does not give a very useful bound. For 160 the bound is 0.00992742. For large k the story is different. Testing an 8192 bit number this gives a bound of 3.45661 x 10^-46. That's good enough for almost all applications so in most cases if you want an 8192 bit prime one round is good enough.

2. This one is for t = 2, k >= 88 or 3 <= t <= k/9, k >= 21.

  p2[k_, t_] := k^(3/2) 2^t t^(-1/2)  4^(2 - Sqrt[t k])
For k = 160 this is valid for 2 <= t <= 17. For t = 17 it gives 4.1 x 10^-23.

3. This one is for t >= k/9, k >= 21.

  p3[k_, t_] := 
 7/20 2^(-5 t) + 1/7 k^(15/4) 2^(-k/2 - 2 t) + 12 k 2^(-k/4 - 3 t)
For k = 160 this is valid for t >= 18. At 18 it gives 9.75 x 10^-26. At 40 it gives 1.80 x 10^-41.

4. This one is for t >= k/4, k >= 21.

  p4[k_, t_] := 1/7 k^(15/4) 2^(-k/2 - 2 t)
For k = 160 this is valid for k >= 40. At 40 it gives the same bound as p3.

So bottom line is that with your current 40 rounds your false positive rate is under 1.80 x 10^-41, considerably better than 10^-24.

If 10^-24 is an acceptable rate for this application, 18 rounds is sufficient giving a rate under 9.7 x 10^-25.

BTW, the larger the k the lower the rate. I've often seen people looking for 1024+ bit primes doing 64 or more rounds. The simplest 1/4^t bound gives 2.9 x 10^-39. OpenSSL for example does 64 for k up to 2048, and 128 for larger k.

For k = 1024 a mere 6 rounds beats that with a bound of 8.8 x 10^-41.

For k = 2048 it only takes 3 rounds to get 4.4 x 10^-41.

For k = 4096 a mere 2 sounds gives 3.8 x 10^-48.

If we had a population of 1 trillion people, each using 1000 things that needed a 4096 bit prime, and that frequently rekeyed so they needed 1000 new primes per second, and every star in the observable universe also had such a civilization consuming 4096 bit primes at that rate, and they were all using 2 rounds of Miller-Rabin, there would be around 24 false positives a year across the whole universe.

If everyone upped it to 3 rounds there would, across the whole universe, be a false positive approximately every 44 billion years.

tntxtnt•22h ago
There is a formula to calculate number of rounds in https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf Appendix C.1. OpenSSL use it: https://github.com/openssl/openssl/blob/ee8772e3565a84fde9e2...

For 160-bit prime and security level 2^-80, 19 rounds is enough.

keepamovin•20h ago
Thank you. This is the hn I’m here for. Probabilistic tests for definite primes still being so slimmest definitive is amazing to me. What structure are they approximating?
primemegently•7h ago
For those that want more details on this fun rabbit hole of math, see the theory of Strong Pseudoprimes: https://en.wikipedia.org/wiki/Strong_pseudoprime

Miller-Rabin in considered a simplistic/antiquated primality algorithm in computational number theory. For a much better algorithm see the Baillie–PSW primality test: https://en.wikipedia.org/wiki/Baillie%E2%80%93PSW_primality_... . For an implementation see Math::Prime::Util on CPAN: https://metacpan.org/pod/Math::Prime::Util or one of the many others.

The P in BPSW is for Carl Pomerance mentioned in the academic paper above. According to the wikipedia article "No composite number below 2^64 (approximately 1.845 * 10^19) passes the strong or standard Baillie–PSW test" which means if git-prime used this algorithm and the nonce was below 2^64 (very likely) then it would be provably prime instead of a probabilistic prime and hence have much more "mathematical rigor".

I also agree with other comments here that git-prime would be much cleaner if it put the nonce in git commit header data instead of the message. Something like this was done Long Ago in a "for fun" git patch by Jeff King: https://lore.kernel.org/git/CACBZZX5PqYa0uWiGgs952rk2cy+QRCU...

And he even made a multi-threaded version: https://lore.kernel.org/git/20111024204737.GA25574@sigill.in...

irishcoffee•22h ago
Sure hope the first line of that bash script isn’t rm -rf $HOME/*

Please don’t ever suggest to anyone ever to curl a script and pipe it to bash. I’m sure this one is fine (I haven’t looked) but it’s a pretty awful idea. Only way to make it worse is to suggest slapping sudo in front.

keepamovin•20h ago
Damn i forgot to include that. As well as exfil of all ssh keys and env files. Oh well, you can wait for the update, right?

^^

fragmede•20h ago
that ship has sailed
extraduder_ire•4h ago
I think item IDs here are sequential, including comments, so you could have timed the submission to attempt to get one. More likely to get it when the site's quieter.
wiml•1d ago
Nice. I think it would be even more æsthetically pointless if it fuzzed the commit date, message whitespace, etc instead of adding a blob...
keepamovin•20h ago
Pointless yes, but not as aesthetically pleasing at least for me.

This way you can have a choice a ordered primes based on none. Good mood? I’ll go with nonce 773 today.

adzm•1d ago
Finally
keepamovin•20h ago
I made it for you
mlyle•1d ago
Attempt 168: cb80ebbd975f0028... not prime

[PRIME] Found after 168 attempts! Commit: cb80ebbd975f00288dca70d8fa735c688755f947

Why does it say not prime then prime?

themafia•1d ago
Hisenprime.
keepamovin•20h ago
Nice work. We should probably go looking for such a category
cobbal•1d ago
Wolfram alpha thinks it's prime: https://www.wolframalpha.com/input?i=factor+0xcb80ebbd975f00...
keepamovin•20h ago
Bug, or just a example text bug. Now fixed
rbongers•1d ago
Finally, a tool optimized for creating Git commit hash collisions
nlehuen•1d ago
I came here to write that :-)
nlehuen•1d ago
Actually there are π(N) ~ N / ln(N) primes less than N per the Prime Number Theorem, so π(2 ^ 160) ~ 2 ^ 153.2 - this only drops 7 bits. So that does increase the odds of collision but much less than what I expected!
cluckindan•23h ago
It’s ok, you can still assign a unique hash for more than half of the atoms in the universe.
keepamovin•20h ago
Maths saved the day again!

I added a section to the README and pages site noting your logic.

perrygeo•1d ago
Even with git-prime reducing the address space by a few orders of magnitude, there's still (effectively) zero chance for collision. The difference between 10^-29 and 10^-27 isn't that great in practice.
dudeinjapan•1d ago
Claude, copy git-prime but make it git-hexspeak instead https://en.wikipedia.org/wiki/Hexspeak
yencabulator•1d ago
https://github.com/prasmussen/git-vanity-hash
dudeinjapan•16h ago
damn. there's nothing new under the sun...
aidenn0•23h ago
Just be aware that there are more prime hashes than there are hashes with a specific 2 hex-digit prefix, so even relatively short messages will be much harder to find.
dudeinjapan•16h ago
worth it. plus my room is cold so I need my CPU to heat it up.
keepamovin•20h ago
Cute. 8008CAFE
hoten•1d ago
Personally I'd append the Nonce as a git trailer, not to the message body.

And would keep the date constant rather than use the time of each attempt (such that the only thing that actually varies is the Nonce)

And just for more fun... Nonces should only be prime numbers. Probably won't run out :)

AaronFriel•21h ago
Could you explain what a git trailer is if not appended to the message body? My understanding is that trailers are just key-value pairs in a particular format at the end of the message; there's not an alternative storage mechanism.

Even so, trailers or message body might be moot - rerolling the committed at timestamp should be sufficient!

kazinator•21h ago
Trailers are part of the commit message, but are separated from the body by a blank linke:

  Subject ...

  Body body body
  body body ...

  Signed-off-by: ...
This is all one commit message, but it is understood by convention has having several parts: subject line, body and trailers.
kazinator•21h ago
It is a trailer; see the source code, line 100:

            message = f"{base_message}\n\ngit-prime Nonce: {attempt}"
I'm not sure whether that's a valid header name, with the space and all, but I remarked on that in another comment already.
keepamovin•18h ago
It is now a proper git trailer, I think.
haute_cuisine•23h ago
This is amazing. A true proof of work. Have you considered finding hashes with leading zeros or making sure each hash starts with 1337?
keepamovin•20h ago
No but perhaps you can create at git-coin command?

I added three new options

  --difficulty <leading zeroes>

  --prefix <leading digits>

  --hex-prefix <leading hex digis>
Be warned tho, this makes it excessively hard. It takes a long long time.
haute_cuisine•12h ago
Wow, that's fast. Do you know if committer's email also goes into calculation of a git hash? If it is, it should be possible to manipulate git hash in a very discrete way through the email address like this: user+<nonce>@example.com
keepamovin•11h ago
Yes author is hashed i believe.
Retr0id•11h ago
This already exists btw https://github.com/tochev/git-vanity
brw•7h ago
What about changing the committer timestamp slightly until you find a match like https://github.com/mattbaker/git-vanity-sha? That would make it entirely invisible
libeclipse•22h ago
Why not just change the nonce instead of appending it and save some space
keepamovin•20h ago
We do. Unless I’m mistaken?
kazinator•21h ago
> Hash as int

Should be "Hash as decimal". The hexadecimal hash is already the same integer.

> Message: "Fix critical bug" + git-prime Nonce: 167

In the actual code it looks like:

  Fix critical bug
  
  git-prime Nonce: 167
So it is like a trailer. However, can trailer names have spaces in them?

A more conservative choices for the trailer header seems wiser, like:

  Prime-nonce: N
would be a safer choice for the trailer. (The word "git" is not required; we know we are in Git.)

Another subtlety is that if the message already has trailers, then you don't need to separate that from them by a blank line

Git has a command for manipulating trailers; that could be used.

(I see the developer doesn't really believe in this because I don't see the nonces in the commit messages of the project itself.)

keepamovin•19h ago
I added the trailer syntax, and rewrote git-prime history to ensure all commits are now number theoretic certified.

If you wish to do the same in your own repo I added a script "make-whole.sh" to do this - but I don't recommend it as force pushes and history rewrites could break stuff.

Also added a new tool

  git prime-log
To show which commits are already prime.
kazinator•21h ago
Whenever you amend a commit, the commit time stamp changes; that ought to be enough, so that the nonce is not required. However, I think it has only second precision, so if you stick to honest wall time, it means 100 attempts require 100 seconds.
cornonthecobra•11h ago
But if my git hashes are indivisible, how will people fork my repo? /s
extraduder_ire•4h ago
Tangentially, I love how easy it is to add submodules to git. Just put an executable named git-<something> in your $PATH and it will get called by git when invoked like that.