frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Cowork: Claude Code for the rest of your work

https://claude.com/blog/cowork-research-preview
504•adocomplete•4h ago•260 comments

TimeCapsuleLLM: LLM trained only on data from 1800-1875

https://github.com/haykgrigo3/TimeCapsuleLLM
440•admp•7h ago•186 comments

Fabrice Bellard's TS Zip (2024)

https://www.bellard.org/ts_zip/
79•everlier•3h ago•27 comments

The chess bot on Delta Air Lines will destroy you (2024) [video]

https://www.youtube.com/watch?v=c0mLhHDcY3I
123•cjaackie•3h ago•65 comments

Postal Arbitrage

https://walzr.com/postal-arbitrage
224•The28thDuck•6h ago•111 comments

Unauthenticated remote code execution in OpenCode

https://cy.md/opencode-rce/
197•CyberShadow•1d ago•45 comments

Date is out, Temporal is in

https://piccalil.li/blog/date-is-out-and-temporal-is-in/
287•alexanderameye•8h ago•89 comments

LLVM: The bad parts

https://www.npopov.com/2026/01/11/LLVM-The-bad-parts.html
264•vitaut•9h ago•52 comments

F2 (YC S25) Is Hiring

https://www.ycombinator.com/companies/f2/jobs/cJsc7Fe-product-designer
1•arctech•1h ago

Show HN: AI in SolidWorks

https://www.trylad.com
110•WillNickols•6h ago•54 comments

Floppy disks turn out to be the greatest TV remote for kids

https://blog.smartere.dk/2026/01/floppy-disks-the-best-tv-remote-for-kids/
470•mchro•10h ago•276 comments

'I rarely get outside': scientists ditch fieldwork in the age of AI

https://www.nature.com/articles/d41586-025-04150-w
12•Growtika•4d ago•3 comments

Show HN: Agent-of-empires: OpenCode and Claude Code session manager

https://github.com/njbrake/agent-of-empires
47•river_otter•9h ago•12 comments

Perlsecret – Perl secret operators and constants

https://metacpan.org/dist/perlsecret/view/lib/perlsecret.pod
49•mjs•6d ago•8 comments

What old tennis players teach us (2017)

https://www.raphkoster.com/2017/09/22/31098/
27•surprisetalk•4d ago•17 comments

Message Queues: A Simple Guide with Analogies (2024)

https://www.cloudamqp.com/blog/message-queues-exaplined-with-analogies.html
69•byt3h3ad•6h ago•20 comments

GitHub: A case study in link maintenance and 404 pages (2013)

https://chrismorgan.info/blog/github-links-case-study/
9•roryokane•5d ago•1 comments

Apple picks Google's Gemini to power Siri

https://www.cnbc.com/2026/01/12/apple-google-ai-siri-gemini.html
593•stygiansonic•8h ago•331 comments

Non-Essential French Embassy Staff Have Left Iran

https://www.barrons.com/news/non-essential-french-embassy-staff-have-left-iran-sources-d84d1f51
19•mhb•48m ago•4 comments

Anthropic made a mistake in cutting off third-party clients

https://archaeologist.dev/artifacts/anthropic
198•codesparkle•12h ago•167 comments

Show HN: Fall asleep by watching JavaScript load

https://github.com/sarusso/bedtime
41•sarusso•5h ago•14 comments

Superhuman AI exfiltrates emails

https://www.promptarmor.com/resources/superhuman-ai-exfiltrates-emails
29•takira•5h ago•3 comments

Building a 25 Gbit/s workstation for the SCION Association

https://github.com/scionassociation/blog-25gbit-workstation
61•romshark•7h ago•23 comments

Ansible battle tested hardening for Linux, SSH, Nginx, MySQL

https://github.com/dev-sec/ansible-collection-hardening
41•walterbell•5d ago•10 comments

Ai, Japanese chimpanzee who counted and painted dies at 49

https://www.bbc.com/news/articles/cj9r3zl2ywyo
168•reconnecting•14h ago•57 comments

Zen-C: Write like a high-level language, run like C

https://github.com/z-libs/Zen-C
147•simonpure•10h ago•90 comments

Reproducing DeepSeek's MHC: When Residual Connections Explode

https://taylorkolasinski.com/notes/mhc-reproduction/
96•taykolasinski•9h ago•29 comments

Launch a Debugging Terminal into GitHub Actions

https://blog.gripdev.xyz/2026/01/10/actions-terminal-on-failure-for-debugging/
127•martinpeck•11h ago•53 comments

Personal thoughts/notes from working on Zootopia 2

https://blog.yiningkarlli.com/2025/12/zootopia-2.html
290•pantalaimon•5d ago•62 comments

Computers that used to be human

https://digitalseams.com/blog/computers-that-used-to-be-human
53•bobbiechen•8h ago•10 comments
Open in hackernews

Update on age requirements for apps distributed in Texas

https://developer.apple.com/news/?id=8jzbigf4
24•Austin_Conlon•3h ago

Comments

expedition32•2h ago
It is interesting to me that we are running a giant social experiment with people's childhoods- something we know can only be done once.

Meanwhile the silicon valley elite admitted that they don't let their 12 year old daughter on Instagram...

munificent•2h ago
Society has always been running giant social experiments on the next generation. That's what a culture is.
bmitc•1h ago
What are some key examples prior to the Internet?
runako•46m ago
TV, radio, public school, computers, video games, rock & roll, rap, desegregation, etc.
bmitc•38m ago
I guess I was really looking for concrete examples and examples prior to the invention of or not related to the use of electronic technology.

For your non-technological items in your list, I don't see how public school, rock and roll, and desegregation are or were remotely related to experiments being ran on children by society.

gretch•26m ago
You don’t see them as experiments because they succeeded and are now just seen as “normal”.
pyuser583•33m ago
Books, newspapers, concert halls, education ...
conductr•1h ago
It’s more interesting to me why nobody except sv elites can come to the same conclusion themselves regarding <12 year olds on instagram and instead seem to need the government to parent their kids

I hate this law and those like it, mostly because it shouldn’t be necessary for government to overstep like this. But when I look around… maybe it is

wmf•1h ago
It's a collective action problem.
godelski•56m ago
I don't think it is just that. Look at an HN thread on privacy and you will find a lot of people that do not see any issues.

The problem really comes down to complexity and trust. The truth is that there never is a problem if we operate under the assumption that all actors are honest and good natured. But the reality of the world is that this is a naive assumption. All citizens should be concerned about changing objectives from their authorities. A democracy can vote in dictators and a benevolent dictator can quickly change to a malicious one (which has happened frequently historically). We also need to be concerned with non-authority threat actors, from criminals to nation-state actors competing states (and even allies for the same aforementioned reason).

That's the problem. The realistic conditions we need to solve for are far more complex than the ones people operate under and we have a difficult time talking to one another about it. For a privacy conscious person it does not matter if the holder of the data is the most benevolent entity that could exist, it is if there is the opportunity for the data to be held by anyone else. Thus, no one should hold it. No matter how "worthy".

Even on HN there are a large number of users who think they are not the target of hackers, and especially nation-state hackers. Of all places on the internet this should be one of the most informed on the matter and best suited to understand that being "normal" is what makes them a target, to be incorporated into bot-nets or other reasons like being used for lateral movement. It is the exact same problem: the reality is far more complex. The assumption of not being a target is based on the understanding that they are not the end target but the complexity of reality is that this is not the condition for being /a/ target.

I do agree that collective action matters. But it is hard to form collective action when people do not have the motivation for action. And they don't have the motivation because they have a naive approximation of the problems at hand.

MiddleEndian•1h ago
I would not let my (hypothetical) 12 year old on Instagram. I also don't want to give Instagram (or any other site, since I don't use Instagram) my ID to view content on it.
Edmond•2h ago
If the hammer ever comes down on this issue, ie hardcore requirement for age verification, there are ways to do this while protecting privacy.

We are experimenting with bootstraping a PKI certificate trust chain for facilitating trust projection and information verification online. Think of it as the ability to do things like age verification at scale via a peer-2-peer ish mechanism instead of sending your government id to a service provider.

One experiment is with PGP key holders (for now Keybase key holders) as CAs:

https://news.ycombinator.com/item?id=46576590

And also .gov email holders:

https://blog.certisfy.com/2025/12/using-gov-email-addresses-...

It's all self-service and requires no sign-up or download of anything, the app (https://certisfy.com/app) is an in-browser app and all the cryptography happens in the browser.

mschuster91•2h ago
Why so complex. ID cards could solve that issue, every European ID card has a powerful and programmable crypto processor / secure element inside and so do all ICAO compliant passports.

Have the website emit a random nonce (to guide against replay attacks / reuse) plus an information what is requested (name, DOB, address, some like the Croatian ID card even store photographs), the card prepares a response with that data, signs that using its private key (with a 2FA being possible as well by using a PIN/password) and returns it to the website.

The Croatian ID card doesn't even need a middleware because it doesn't do 2FA, you can ask it all of that by pure NFC communication. The German ID card requires a middleware ("AusweisApp", open source) for added protection though.

Edmond•1h ago
Age verification could indeed be implemented in other ways. The approach outlined above is for information verification and trust projection in general, meaning you can put just about any verified information on a certificate and it can be used online.

Here is a concrete example of how trustworthy certificates can be used online, this is my personal profile on bluesky with verification that is independent of the Blue sky service: https://bsky.app/profile/bitlooter.bsky.social

If you click on the profile image you can enter that code into https://certisfy.com/app to verify the identity of the profile. That sticker could be on any online profile to prove high quality authenticity, it could for instance be on an e-commerce site to prove that the site isn't a scam.

LukeShu•1h ago
In 2005, we decided that we were going to have Real ID by 2008. We're now looking at a 2027 completion date.
pyuser583•34m ago
At the airport they said I wouldn't be able to travel unless I had a real ID by 2019.
wmf•1h ago
Google and Apple already have private age verification so I think the time for experiments is past.
vorpalhex•1h ago
Can age assurance be done privately and anonymously? Absolutely.

But the entire point of age laws is to stifle free speech and ruin privacy. Thus why every age law requires uploading an ID.

If it was just age, just require a credit charge of a $1 through an intermediary. Good for a year or whatever.

Nextgrid•1h ago
> the entire point of age laws is to stifle free speech and ruin privacy

Does it? I mean sure, it's a side-effect that some (most?) politicians might find desirable, but there's also people who just want to restrict access to adult material (not taking a position on whether it's a good or bad thing here). Most parents would probably agree with the latter even if they don't with the former.

vorpalhex•1h ago
Is there anyone who can't do this today? Adult websites self label, and both your router and ISP offer removing adult websites as an option.

If your kid is going to get around that by clever vpn use, age gates don't help.

Nextgrid•1h ago
> If your kid is going to get around that by clever vpn use, age gates don't help.

I think politicians and their supporters believe they do help. Of course from their perspective the only way to know for sure is to implement the restrictions (regardless of whether they succeed, at least they fulfill their campaign promises to their electors of "doing something").

michaelt•38m ago
I don't have any children myself, but as I understand it in the modern age:

Your kid's smartphone can connect to home wifi, mobile data, public wifi, and friends' home wifi - so network filtering alone won't cut it. And 'Encrypted SNI', 'DNS over HTTPS' and Cloudflare makes network filtering much harder than it was 15 years ago.

On top of that, there's loads of porn posted on Reddit, Twitter, Twitch and suchlike. So any effective block is going to have a lot of collateral damage.

pyuser583•35m ago
> Adult websites self label

Not social media sites. Sites like Reddit are everything. Some also go out of their way to hide certain information from parents.

Reddit (not to be too picky) does some weird things when a logger is in place, essentially making it impossible to know which subreddit is being accessed.

And that's really where the bad stuff lurks - it's peer to peer interactions.

drakythe•1h ago
While some people may want that, everyone who has the technical know-how to restrict access can name probably a dozen different ways to do it without violating privacy via ID Upload. The only reason to push for ID Upload instead of the other methods is because policy makers are lazy and information resellers want as much information about us all as they can get. Its lazy because it just recreates the liquor store "Can I see your ID please?" experience everyone is so familiar with and takes no explanation, so lazy policy makers find it easy to push for, without accounting for how that data is handled after use. Meanwhile information clearing houses and anti-privacy wanks are salivating at how this can be leveraged so they too push the "ID Upload is the only way!" messaging.
gruez•52m ago
>and information resellers want as much information about us all as they can get.

That seems implausible given that most sites requiring age verification outsource it to some third party, which means they're not getting all the juicy biometrics.

runako•47m ago
You've identified the group that would be incentivized to lobby for this architecture.
gruez•17m ago
That's an unhelpful way of analyzing stuff because you can cynically retort "You've identified the group that would be incentivized to lobby for this" regardless of what happens. No age verification whatsoever? I bet social media companies would like that! Age verification by the government? I bet it's because the government wants to know what porn sites you visit! Maybe verification by the OS instead? Must be the Google/Android OS duopoly! So complicated PKI or zero knowledge proofs solution? There's probably some consultancy that would benefit, not to mention there's still going to be companies that would handle the outsourcing. There's a whole industry for handling user account management/SSO, for instance, and that's entirely open source.
maccard•29m ago
Yes. Look at the UK - in the best case the laws here (OSA) are absolutely trivially bypassable by apps that are openly advertised on the App Store (VPN apps). In the worst case it pushes people onto sites that refuse to comply which are likely holding _actually_ harmful material.

> there’s also people who want to restrict access to adult material

First of all - we’ve been down this path so many times. Won’t someone think of the children is a plea to emotion not to reason. Secondly, there are many ways that people can opt in to those controls already, and for the most part _they work_. Anyone who can bypass those will be able to bypass what’s being rolled out around the world. Lastly; they’re trivially bypassable because a grown up can validate and then just hand the device back to a child.

The UK is pretty good at digital services and had a solid opportunity to make an anonymous, privacy first based age verification system. I designed one (not without flaws) in about 15 minutes, so we definitely could have had something decent. Instead our first move was to make something that basically required a liability shift, and we ended up sending face scans and passport photos to US tech giants - meanwhile the kids were just pointing their cameras at YouTube videos of adults and bypassing the filters.

JoshTriplett•27m ago
https://bsky.app/profile/tupped.bsky.social/post/3lwgcmswmy2...

> The U.K. Online Safety Act was (avowedly, as revealed in a recent High Court case) “not primarily aimed at protecting children” but at regulating “services that have a significant influence over public discourse.”

Nextgrid•1h ago
My concern with this is how far it goes and whether it has unintended side-effects.

There are a lot of situations in history where in retrospect being able to evade government oversight and restrictions turned out to be a good thing. During the Holocaust a number of Jews and other targeted populations were able to escape hostile territory because they were able to get forged passports and other documents, something that strong cryptography would make impossible (even in a perfectly privacy-preserving way).

I'm not sure how old you are or when you started in tech, but in my case I started as a kid and was able to build the skills that now gave me my career thanks to unrestricted Internet access (and sure, I saw pornography a few years earlier than I should have - didn't seem to have any measurable detrimental effect on me, especially not compared to the cigarettes and alcohol).

This wouldn't have been possible if age verification was properly implemented, since a lot of the resources that might be useful for someone to learn programming/sysadmin could also be used to circumvent age verification and thus would've been blocked, and I would probably be working a minimum wage job and/or engaging in crime to sustain myself as a result. If I had to choose whatever harmful effects from pornography versus having a min-wage job, I'll take the porn side-effects any day, at least I have a roof over my head.

rockskon•1h ago
I find claims of any technology being able to simultaneously validate your age while "respecting privacy" to be suspect at best. Even if the technology could work in theory, it would be built on top of an ecosystem designed around an ecosystem hell-bent on monetizing info about you.
jazzyjackson•58m ago
Zero knowledge proofs can perform expressions that check values within a JSON tree without exposing any of those values to the requesting party, for instance "year of birth < 2005" can return true or false without returning the person's numeric birth year. Essentially the requesting party has the holder of the credential perform a computation, the result is guaranteed to be the result of each and every instruction over a target data structure (only knowing the hash and signature chain of the credential, so for instance your government issued id can be signed by your secretary of states public key)

Estonia has a really interesting government issued public key infrastructure where users can validate their identity with their physical ID card and a USB reader (maybe it's NFC by now?) but I don't think I've heard of the above scheme used in practice, just sat through a presentation at the internet identity workshop.

rockskon•39m ago
Zero knowledge proofs based on too little information are trivial to abuse.

To combat this, you need to have it based off of more and more personal info....which is at odds with the privacy-preservation goal.

Sadly when it comes to age assurance, Zero knowledge proofs are little better than marketing.

ekr____•30m ago
In this case the ZKPs are tied to a private key stored in a secure element in the phone, so effectively they are tied to control of the device where the original credential was enrolled.
rockskon•20m ago
That's nice and all for the cryptography but now think about what's needed to associate it with the physical attribute (such as the age) of the user of the device which may or may not change hands over time.
pyuser583•41m ago
I read, from a semi-reliable source, Lousiana has pretty good system for verifying age and protecting ID. But's focused on in-person ID for gambling.

The system was that they hired a company to make the cards, and assume civil liability for any privacy violations. They also required to the company to hold insurance in case of a claim.

So it fell to the insurance company to sign off on the standards, and allowed investors to make money by avoiding claims.

I might be half-remembering it but that seemed like a very good system.

John23832•1h ago
Just let the parents be responsible. Jesus.

Attach minor accounts to the account of the parent, make the parent say yes.

pyuser583•31m ago
Ok, but you're saying two different things. You can't know a minor account is a minor account unless you require age verification.

Don't get me wrong - I support your proposal. But it requires massive state intervention.

ghaff•1h ago
Meanwhile I actually started college at 16 which is illegal in some locales.
Jtsummers•1h ago
> illegal in some locales.

In the US or elsewhere? I've known a lot of people who attended college at 16, and through friends with teenage children know even more these days. They attended (or are attending) schools in a variety of states.

BeetleB•1h ago
I think "illegal" is a strong word. Some states don't allow it in public universities. I suspect they're fine with it at private universities.
Jtsummers•58m ago
> Some states don't allow it in public universities.

But which states? I haven't been able to find anything about states barring minors from attending universities.

runako•44m ago
(Not in Texas)

Did this apply to X (Twitter) at all?