frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Astro Joining Cloudflare

https://astro.build/blog/joining-cloudflare/
254•todotask2•2h ago•139 comments

Michelangelo's First Painting, Created When He Was Only 12 or 13 Years Old

https://www.openculture.com/2026/01/discover-michelangelos-first-painting.html
120•bookofjoe•2h ago•84 comments

6-Day and IP Address Certificates Are Generally Available

https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability
44•jaas•56m ago•9 comments

Just the Browser

https://justthebrowser.com/
289•cl3misch•4h ago•145 comments

Lock-Picking Robot

https://github.com/etinaude/Lock-Picking-Robot
70•p44v9n•4d ago•26 comments

Launch HN: Indy (YC S21) – A support app designed for ADHD brains

https://www.shimmer.care/indy-redirect
5•christalwang•13m ago•1 comments

Read_once(), Write_once(), but Not for Rust

https://lwn.net/SubscriberLink/1053142/8ec93e58d5d3cc06/
25•todsacerdoti•1h ago•12 comments

psc: The ps utility, with an eBPF twist and container context

https://github.com/loresuso/psc
34•tanelpoder•3h ago•11 comments

Training my smartwatch to track intelligence

https://dmvaldman.github.io/rooklift/
77•dmvaldman•1d ago•31 comments

OpenBSD-current now runs as guest under Apple Hypervisor

https://www.undeadly.org/cgi?action=article;sid=20260115203619
345•gpi•13h ago•44 comments

List of individual trees

https://en.wikipedia.org/wiki/List_of_individual_trees
259•wilson090•16h ago•96 comments

Interactive eBPF

https://ebpf.party/
137•samuel246•8h ago•6 comments

Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities

https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html
36•7402•1h ago•34 comments

Show HN: I built a text-based business simulator to replace video courses

https://www.core-mba.pro/
72•Core_Dev•14h ago•34 comments

Apple is fighting for TSMC capacity as Nvidia takes center stage

https://www.culpium.com/p/exclusiveapple-is-fighting-for-tsmc
741•speckx•1d ago•448 comments

Pocket TTS: A high quality TTS that gives your CPU a voice

https://kyutai.org/blog/2026-01-13-pocket-tts
553•pain_perdu•1d ago•127 comments

Dev-Owned Testing: Why It Fails in Practice and Succeeds in Theory

https://dl.acm.org/doi/10.1145/3780063.3780066
43•rbanffy•2h ago•42 comments

The spectrum of isolation: From bare metal to WebAssembly

https://buildsoftwaresystems.com/post/guide-to-execution-environments/
70•ThierryBuilds•7h ago•24 comments

Briar keeps Iran connected via Bluetooth and Wi-Fi when the internet goes dark

https://briarproject.org/manual/fa/
489•us321•20h ago•306 comments

Show HN: mdto.page – Turn Markdown into a shareable webpage instantly

https://mdto.page
14•hjinco•3h ago•11 comments

Why DuckDB is my first choice for data processing

https://www.robinlinacre.com/recommend_duckdb/
30•tosh•5h ago•11 comments

Inside The Internet Archive's Infrastructure

https://hackernoon.com/the-long-now-of-the-web-inside-the-internet-archives-fight-against-forgetting
409•dvrp•2d ago•96 comments

Can You Disable Spotlight and Siri in macOS Tahoe?

https://eclecticlight.co/2026/01/16/can-you-disable-spotlight-and-siri-in-macos-tahoe/
5•chmaynard•1h ago•1 comments

Altaid 8800 (2024)

https://sunrise-ev.com/8080.htm
28•exvi•4d ago•3 comments

Show HN: pgwire-replication - pure rust client for Postgres CDC

https://github.com/vnvo/pgwire-replication
27•sacs0ni•5d ago•6 comments

Ask HN: How can we solve the loneliness epidemic?

685•publicdebates•23h ago•1080 comments

Show HN: Hc: an agentless, multi-tenant shell history sink

https://github.com/alessandrocarminati/hc
24•acarminati•8h ago•2 comments

Bringing the Predators to Life in MAME

https://lysiwyg.mataroa.blog/blog/bringing-the-predators-to-life-in-mame/
51•msephton•2d ago•9 comments

Linux boxes via SSH: suspended when disconected

https://shellbox.dev/
262•messh•20h ago•140 comments

pf: Make af-to less magical

https://undeadly.org/cgi?action=article;sid=20260116085115
42•defrost•7h ago•3 comments
Open in hackernews

Lock-Picking Robot

https://github.com/etinaude/Lock-Picking-Robot
67•p44v9n•4d ago

Comments

JKCalhoun•1h ago
There is a link to AliExpress in the README that is broken. Another comment though suggests something like the "Sputnik Pickling Tool".

Maybe like this wild machine: https://youtu.be/CLcOZhq2GjQ?si=LJktKRzeHPRyXcXR&t=155

showerst•1h ago
What a fun project! The use of wires to get around the corner is such a clever idea, although I see that goes back to the 90s. I'm surprised the idea isn't older.

I wonder what makes it take a minimum of 0.7s per combo, it seems like it could be sped up substantially.

MarkusQ•1h ago
Cool idea but I'm not buying the justification. There are many cases where the correct response to "but law enforcement needs a way in" is "we have a system for that, it's called a warrant."

Further, while standing somewhere for five minutes may be obvious in some situations, there are many cases in which it wouldn't be obvious at all, or the response time would be great enough that this could still be quite useful to bad guys.

Finally, "security through counting on slow hardware" is probably even worse than security through obscurity.

phantom784•1h ago
I don't see how this would bypass the need for a warrant. It'd allow for picking the lock rather than breaking it when you _do_ have a warrant (and whoever has the key isn't available or isn't cooperating).
dec0dedab0de•1h ago
I have seen cops use lockpicking guns while serving warrants. I would much rather them do that then break the door down. Hopefully projects like this can make this better. Even though it’s cool enough on its own to exist just because

Even if the person is stone guilty I don’t think the police should be willy nilly destroying property in the process of serving a warrant.

I know much of the focus is rightly on increasing accountability for the damage done to humans, but I always cringe at the thought of how much damage they can cause while performing a search. Imagine if your kid, or roommate had a warrant and they came in, smashed all your drywall and left you with the bill.

dylan604•46m ago
> I would much rather them do that then break the door down

The fact that law enforcement isn't responsible for damages during a search is problematic. When it's done somewhere when they've screwed up the address is even worse. "oops, sorry" should not be enough.

dec0dedab0de•35m ago
Especially with body cameras becoming ubiquitous, it should be easy enough to distinguish between necessary and excessive damage.
chuckadams•3m ago
[delayed]
showerst•1h ago
I don't think even the non-3d printed commercial ones are for law enforcement purposes.

Besides being for fun, the main draw seems to be that it picks the lock _and_ gives you the bitting. So if you lose all your keys, your locksmith is now in and can easily remake keys without swapping out the lock core.

There may be cases were it's (much) cheaper to pay a locksmith to stand there for ten minutes and spend a few minutes at a key machine, rather than pick a lock in 30 seconds and spend 10 minutes installing a $100 high end lock cylinder.

jabroni_salad•1h ago
I can kinda buy the justification but I dont think the solution will get adoption. The TSA will cut the TSA-compliant locks if it will take the agent longer to find the key than it will to find the cutter. Or at least that's what the airline employee told me when I asked why my compliant lock had been removed. Law enforcement are not going to settle for a 5 minute skeleton key.
observationist•57m ago
Locks are not security, in the sense that you're using. A sledgehammer goes right through 90% of them, or the hasps or latches secured by them. A competent lockpicking enthusiast will take two or three minutes to go through almost any of them. Someone motivated to get in with foreknowledge of the lock type can simply use a $200 camera and photograph your keyring from a couple blocks away, then 3d print all the keys on the ring and walk right in.

Law enforcement can use pick guns, which will open a large majority of door locks, if they don't want to just use a battering ram for some reason.

There are a ton of legitimate reasons to use lock picks, though - being able to use a pair of paperclips, or office supplies, can get you into network cabinets in a pinch, or if you lock your keys in your house or car and have a pick kit in your wallet. If a friend has an emergency and they know you can do it, it can save locksmith fees. Kids can lose keys in astonishing ways.

And the hobby is fun - it's manual dexterity, skill, obscure technical knowledge, and you gain an appreciation for all the lockpicking content out there, and get to see the brazen plot devices when movies portray lockpicking in ridiculous ways. There are engineering attempts at creating unpickable locks with some awesome youtube videos, with engineering geeks creating elaborate locks and shipping them to the lockpickinglawyer or other content creators.

It's also important from an educational standpoint. Knowing how secure you are is important, because assumptions can lead to tragic results. If you have a glass door, it doesn't matter if you've got a million dollar unpickable lock. If you know how trivial it is to open most padlocks, and what form factors of locks are most susceptible, you can make better decisions about securing storage units, trailers, outdoor gates, bikes, and so forth.

A device like this is a novelty, not a serious security threat, and I'd argue the threshold for building it exceeds the threshold for which there are a thousand other trivially accessible ways of bypassing a given lock. There are tools similar to this device in spirit, in which you set pins for a key type manually with the key inserted, and with a little practice, will get you through a door in under a minute.

Start here and enjoy! https://www.youtube.com/channel/UCm9K6rby98W8JigLoZOh6FQ

Edman274•21m ago
The thing about a sledgehammer is that if you're asleep in your house, you, your dog, your SO, or your neighbors might be startled awake by the sound of metal splitting and cracking open. Your security system might be designed to alert on something like a window being smashed. The person attempting to enter the house may be trying to enter undetected, because they know that a broken lock and/or a replaced lock will alert the people they're trying to ambush or steal from. Imagine something like industrial espionage, where a person breaks in undetected, steals an item, and then leaves. The occupant only realizes the item is gone a week later, and wonders if they could've misplaced it. In your scenario, they'd see the sledgehammered lock and immediately call the cops.

I see comments like these all the time on Reddit and Hackernews. Hackers are like, "locks aren't security, a sledgehammer breaks them" and it appears to betray a mental threat model of "what if the cops want my thing" and never "what if someone wishes to do me harm while I am in my house" or "what if a criminal wants to not get caught taking my things" or "what if someone wants to lie in wait in my house", which are not risks to these commenters. They are to a lot of people though.

cush•16m ago
> Imagine something like industrial espionage..

This isn’t the movies. 99% of the time people need their own lock picked because they lost they key

Edman274•11m ago
People don't buy locks so that they can lose their keys and require the lock to be picked. They buy locks to secure access to items or places. The parent I was replying to is saying that locks aren't security because a sledgehammer breaks them. I argue that a sledgehammer is only important for certain threat models. I am quite aware that most lock picking is for lost keys. However, I am describing threat models for which locks are important security. Do you understand?
raincole•8m ago
The parent you were replying to mentioned at least three things:

- lock picking hobbist

- snap gun

- sledgehammer

And you simplified their comment to "locks aren't security because a sledgehammer breaks them" then proceeded to describe threat models where a sledgehammer doesn't work in detail. It's not a very constructive discussion.

JKCalhoun•49m ago
Given that the locks are so pickable anyway (any causal perusal of YouTube will reveal as much) I think lock picking is something of a community service to let people know that locks are, and probably have always been, to keep honest people honest.
tialaramex•19m ago
They also allow you to distinguish legitimate operations. Maybe that armed guard isn't sophisticated enough to realise that your ID is fake, but they do know that you're supposed to use a key to open these lock, you were not supposed to turn up and smash one open -- which means that maybe you're not who you say you are after all and best you stay right there while they call somebody.

Easy picks can mess with that. If I can open this with my tools in two shakes of a lamb's tail because the tolerances are far too big probably that guard doesn't notice, whereas if I'm there heaving and grimacing for ten minutes, or I need a sledgehammer or an angle grinder, they'd have to be completely moronic not to realise I'm not on the up-and-up.

cush•20m ago
The creator doesn’t mention anything about helping law enforcement. They mention cheap off-the-shelf tools that could do a better and faster job than this robot. There are many reasons pick locks, including it being a hobby.
raincole•10m ago
> security through counting on slow hardware

Security through locks doesn't work in the first place. At least not locks that can be picked by this robot. Pick gun is a thing.

3eb7988a1663•54m ago
There is also a Safe Cracking Robot

[0] Blog about it: https://joeleb.com/safe-cracking-robot-defcon/

[1] Defcon video: https://www.youtube.com/watch?v=v9vIcfLrmiA

IshKebab•49m ago
> brute force all possible combinations

Somewhat less impressive than I was expecting. The wire idea is neat though.

hvs•29m ago
I'm a strong supporter of the "I did it because I wanted to see if I could do it" ethos. So this isn't a criticism of the project itself, but I'm pretty sure a snap gun will beat this almost every time.
kittywantsbacon•28m ago
I'm surprised this doesn't use the lishi tools
cush•8m ago
The number of comments in here slandering the developer’s morality for picking locks is actually pretty surprising for a site literally called Hacker News. Every day there’s a story on the front page of some grey/white-hat showing off an exploit they found to infiltrate a site we all use. It’s an odd double standard.
raincole•3m ago
> the number of comments

Two of them in total, if I counted right.