frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

A 26,000-year astronomical monument hidden in plain sight (2019)

https://longnow.org/ideas/the-26000-year-astronomical-monument-hidden-in-plain-sight/
353•mkmk•7h ago•77 comments

Claude Chill: Fix Claude Code's Flickering in Terminal

https://github.com/davidbeesley/claude-chill
68•behnamoh•2h ago•28 comments

California is free of drought for the first time in 25 years

https://www.latimes.com/california/story/2026-01-09/california-has-no-areas-of-dryness-first-time...
244•thnaks•3h ago•110 comments

Instabridge has acquired Nova Launcher

https://novalauncher.com/nova-is-here-to-stay
134•KORraN•7h ago•96 comments

Are Arrays Functions?

https://futhark-lang.org/blog/2026-01-16-are-arrays-functions.html
36•todsacerdoti•1d ago•20 comments

Show HN: Mastra 1.0, open-source JavaScript agent framework from the Gatsby devs

https://github.com/mastra-ai/mastra
82•calcsam•9h ago•36 comments

Provably unmasking malicious behavior through execution traces

https://arxiv.org/abs/2512.13821
23•PaulHoule•3h ago•3 comments

The Unix Pipe Card Game

https://punkx.org/unix-pipe-game/
181•kykeonaut•9h ago•54 comments

I'm addicted to being useful

https://www.seangoedecke.com/addicted-to-being-useful/
496•swah•15h ago•252 comments

Which AI Lies Best? A game theory classic designed by John Nash

https://so-long-sucker.vercel.app/
42•lout332•4h ago•28 comments

Running Claude Code dangerously (safely)

https://blog.emilburzo.com/2026/01/running-claude-code-dangerously-safely/
287•emilburzo•14h ago•233 comments

Who Owns Rudolph's Nose?

https://creativelawcenter.com/copyright-rudolph-reindeer/
9•ohjeez•1h ago•4 comments

The challenges of soft delete

https://atlas9.dev/blog/soft-delete.html
84•buchanae•4h ago•57 comments

Our approach to age prediction

https://openai.com/index/our-approach-to-age-prediction/
61•pretext•6h ago•121 comments

Unconventional PostgreSQL Optimizations

https://hakibenita.com/postgresql-unconventional-optimizations
265•haki•11h ago•45 comments

Building Robust Helm Charts

https://www.willmunn.xyz/devops/helm/kubernetes/2026/01/17/building-robust-helm-charts.html
25•will_munn•1d ago•0 comments

Catching API regressions with snapshot testing

https://kreya.app/blog/api-snapshot-testing/
6•CommonGuy•5d ago•0 comments

Maintenance: Of Everything, Part One

https://press.stripe.com/maintenance-part-one
71•mitchbob•7h ago•13 comments

Cloudflare zero-day: Accessing any host globally

https://fearsoff.org/research/cloudflare-acme
50•2bluesc•9h ago•12 comments

Lunar Radio Telescope to Unlock Cosmic Mysteries

https://spectrum.ieee.org/lunar-radio-telescope
12•rbanffy•3h ago•1 comments

Dockerhub for Skill.md

https://skillregistry.io/
22•tomaspiaggio12•10h ago•12 comments

IP Addresses Through 2025

https://www.potaroo.net/ispcol/2026-01/addr2025.html
153•petercooper•12h ago•121 comments

Show HN: macOS native DAW with Git branching model

https://www.scratchtrackaudio.com
12•hpen•2h ago•11 comments

The world of Japanese snack bars

https://www.bbc.com/travel/article/20260116-inside-the-secret-world-of-japanese-snack-bars
100•rmason•4h ago•62 comments

Show HN: TopicRadar – Track trending topics across HN, GitHub, ArXiv, and more

https://apify.com/mick-johnson/topic-radar
17•MickolasJae•11h ago•3 comments

Fast Concordance: Instant concordance on a corpus of >1,200 books

https://iafisher.com/concordance/
34•evakhoury•4d ago•3 comments

Nvidia Stock Crash Prediction

https://entropicthoughts.com/nvidia-stock-crash-prediction
350•todsacerdoti•10h ago•295 comments

Danish pension fund divesting US Treasuries

https://www.reuters.com/business/danish-pension-fund-divest-its-us-treasuries-2026-01-20/
619•mythical_39•10h ago•646 comments

Ask HN: Do you have any evidence that agentic coding works?

105•terabytest•13h ago•105 comments

The Zen of Reticulum

https://github.com/markqvist/Reticulum/blob/master/Zen%20of%20Reticulum.md
89•mikece•12h ago•60 comments
Open in hackernews

Ask HN: Is Linux Safe to Daily drive in 2026?

16•A_Random_Nerd•1h ago
I have been increasingly interested in daily running ubuntu (sorry, Arch people), and was wondering: how safe is it to daily drive an easy linux distro like Ubuntu in 2026?

To clarify what I'm asking: - Is Linux relatively safe compared to Windows or MacOS in a desktop setting - If it's not, what needs to be changed, configured, or avoided to make it so (if it can be)

Thanks for your time.

EDIT: (clarification) I have been experimenting a little with Linux already. This is more of a second step towards daily use for me. A more pressing concern (for me) is [gui] app sandboxing.

Comments

dismalaf•1h ago
Safe in what sense?

As someone who's been daily running it since 2008, I'm gonna say yes anyway though. It's secure (one definition of safe) and no more likely to eat your data than any other OS. Still back things up though, hardware failures happen.

What to config? Nothing. Don't touch shit if you don't know what you're doing. That's the secret to having a stable system, not messing with it.

Shellban•1h ago
This, exactly. I tend to run into a lot of problems, but that is mostly because I tend to tinker with it in non-standard ways (hard to be surprised about your computer no longer booting when you intentionally tried to change the encryption setup). However, if you install a distro closest to your use-case and and then stick with just general applications (i.e. the kind you can get from Flatpak), you should not run into issues.

Of course, some things will randomly break unexpectedly, but you get that with Windows and MacOS, too.

proof_by_vibes•1h ago
Perfectly safe. I would argue that it is the safest of the three, the least invasive both in terms of its design and in terms of privacy.

The open source model of development has encouraged the correct incentives for people to become active in identifying and fixing possible exploits in a global, communal effort.

Every server on the cloud has (by a large margin) chosen Linux as the OS to trust specifically for this reason.

pravenj•1h ago
I have
loodish•1h ago
Yes. Significantly safer than a Windows system in the default config.

If you expose a Windows server default install to the internet it will be compromised in days. (I don't know how. I do know AWS was very unimpressed with me.)

In contrast Linux systems are often set up that way without issue.

creditscoreprot•1h ago
It is possible to get Linux into a state where it becomes a huge headache to update
Shellban•1h ago
This usually happens when you do non-standard things like try to change the desktop environment and then update to a new major version. If you pick a distro that is already close to what you need in the first place, this should not be as much of an issue.

Source: Personally got it into a state where it became a huge headache to update.

cam_l•7m ago
Ditto for windows.

Source: Personally (like the other poster) I have got both into a state where it became a huge headache to update.

nextos•1h ago
Linux comes in a wide range of distributions, so it is hard to make universal claims. One area where security defaults need to improve is sandboxing.

If security is a major concern, bwrap or firejail can easily provide that extra sandboxing.

NixOS and GuixSD make it quite trivial to sandbox applications in a declarative fashion using firejail.

An alternative is to use e.g. Flatpak, which gets you sandboxing for free via bwrap. But I am not a fan of application images that bypass package management.

A_Random_Nerd•1h ago
I heard about the sandboxing being especially sketchy, thanks for a point in the right direction for mitigation.

Additionally, any thoughts on snap? (presently looking into Flatpak)

Shellban•59m ago
Functionally, it is very similar to Flatpak. The main reason people do not like it (for reasons independent of sandboxed applications in general) is that Canonical controls the store and that it is not open-sourced, and that it is very difficult to remove it on Ubuntu setups (a major pain-point for people who need an unsandboxed Firefox setup).
nextos•54m ago
I wouldn't use snap or Flatpak, just sandbox using bwrap or firejail. They are really easy to use.

Containers also provide good development sandboxing. With distrobox you can run many distributions inside your own within a clean and isolated environment.

iknowstuff•40m ago
Just use flatpak. Let's not steer newbies towards barely maintained untested bespoke solutions.
bubblethink•1h ago
If you mainly use a browser like chrome, it should be pretty safe. The general threat model is likely not as safe/mature as Win/MacOS as far as running a bunch of untrusted apps go.
keyringlight•1h ago
Assuming you're already running a PC with a desktop OS, you can use virtualization to 'get your toe wet' and try linux without diving in entirely with a real install. On windows virtualbox is free for non-commercial use and pretty simple to set up.

If you've got a spare drive then install it on that leaving your existing install alone, or if you have spare space on your existing drive you can shrink a partition (backup important data first) and set up a multi-boot

jmce•1h ago
Yes!
awkii•1h ago
I'll take a contrarian view here. Disclaimer: I'm interpreting "safe" as in "usability". I've been driving Ubuntu for years for gaming purposes, and it's come a long way. Most drivers are installed out-of-the box. The apps I care about run just fine.

But.... Relative to MacOS Ubuntu is certainly not as user-friendly. It's worth noting that Linux distros will force you to confront the command line at some point. If you come from OS-es where the most technical thing you have to do is pop open settings to set screen-share permissions or "right-click -> open" to install a package, you'll notice a stark difference.

m132•1h ago
Linux out of all those three is very specific in that it can be configured to be perfectly secure and, at the same time, if you explicitly ask it to shoot you in the foot, it will.

Generally the out-of-the-box experience of Ubuntu and Fedora is at least as secure or better than that of Windows. macOS tends to lean towards a more hardened configuration. Matching that is possible (Android being a great example), but will require some work on your part and is generally not worth it unless you download and run untrusted software.

And one area where desktop Linux really shines is how easy it makes it to only limit yourself to software you can generally trust: that in the default repositories. If you use a well-maintained distribution, keep your system up to date, and only use software that your distribution delivers, chances of your machine getting compromised by anything other than a strictly targeted attack are very slim.

It's understandable that eventually you might want to run third-party software. In that case, I'd definitely advise against running random scripts or commands from the Internet, especially the `curl | bash` kind, and adding third-party repositories to your system unless you absolutely trust their source. This and running out-of-date Internet-facing software are the most common attack vectors.

For third-party software, consider using Flatpak (desktop) and Podman/Docker (server). These sandbox software by default, limiting the damage it can do to your system. With Flatpak, always pay attention to what permissions your application will be granted (those are listed at installation time) and try to limit their scope as narrowly as possible. You can manage the permissions with `flatpak info -M` and `flatpak override`. There's also Flatseal, a GUI alternative which I personally haven't tried.

One more thing to watch out for: extensions. Some software, such as Visual Studio Code and derivatives, has very lax policies on extensions. Even if you install it from a trusted source, but then install an untrusted extension, the extension will run with full access to your files! If you're using such programs, I recommend installing them in Flatpak and limiting their permissions as well. I've been burned by some VSCode extensions in the official marketplace that immediately contacted Chinese IPs upon installation.

Of course, those are tips for those looking to get started. Long-time users interested in hardening should definitely look into SELinux, seccomp, namespaces, dm-verity, and their associated utilities.

A_Random_Nerd•1h ago
Thanks for the help. I will definitely take that advise into account.
pjdkoch•1h ago
You're fine with out of the box experience in most cases.

Try something from universal blue!

shiroiuma•1h ago
It was safe to daily drive in 1996.
zamalek•1h ago
I've been using it exclusively for a few years now, but I'd still say: it depends. e.g. we've yet to see an actual photoshop replacement in OSS (Krita seems to be on a good trajectory now that they've pivoted to a broader scope). First stop is checking whether you have viable replacements for things that you use.

Ubuntu is going to strong-arm you into Snaps, the snap-ectomy is nontrivial, and they have a habit of reappearing. Some people don't have a problem with Snaps - so non-issue if you don't care. Otherwise I'd go with a downstream distro that removes them: pop os, mint, or even upstream (Debian).

XFS is an extremely mature file system if you don't need anything fancy, and you're probably less likely to lose data compared to $proprietary. The other major ones (ext4 and btrfs) are probably just as good, but XFS honestly does stand out in terms of maturity and simplicity.

A common trap is trusting the installer with partitioning. My last Ubuntu installation ran out of space on EFI. 5gb is overkill, but given how abundant disk space is, who cares. Separating / and /home is a good idea for rescue/reinstalling but without btrfs subvolumes (Ubuntu uses btrfs subvolumes by default) it becomes a bit challenging to figure out how to dice things up: e.g. docker containers are stored in /var, so they can deplete your system drive space. Last time I didn't use btrfs, 200gb for / never caused issues for me.

Oh, and Windows has a habit of removing other boot loaders from its drive. If you dual boot, use a different disk for the entire installation.

That's really the extent of the gotchas I'd give to a person literate enough to install an OS. I would slightly urge towards immutable (Silverblue), but Ubuntu is just fine.

coldsunrays•18m ago
I would say yes! I would consider not sandboxing your internet browsers because the integration isn’t fully there yet, but everything else works. A lot of Flatpaks are maintained by their developers so you get releases faster with a layer of separation from an otherwise “slow” distro.

In my humble opinion, consider Fedora instead because of Ubuntu and Snaps. You’ll have the flexibility of Flatpaks, RPMs, Snaps if you really want, etc. Some suggested immutable distros (Silverblue), but you can adopt a containerized workflow incrementally with regular Fedora so that you don’t run into its sticky corners.