frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Darkbloom – Private inference on idle Macs

https://darkbloom.dev
145•twapi•3h ago•75 comments

FSF trying to contact Google about spammer sending 10k+ mails from Gmail account

https://daedal.io/@thomzane/116410863009847575
101•pabs3•3h ago•47 comments

IPv6 traffic crosses the 50% mark

https://www.google.com/intl/en/ipv6/statistics.html?yzh=28197
37•Aaronmacaron•19h ago•13 comments

Stop Using Ollama

https://sleepingrobots.com/dreams/stop-using-ollama/
153•Zetaphor•3h ago•31 comments

RedSun: System user access on Win 11/10 and Server with the April 2026 Update

https://github.com/Nightmare-Eclipse/RedSun
54•airhangerf15•3h ago•10 comments

RamAIn (YC W26) Is Hiring

https://www.ycombinator.com/companies/ramain/jobs/bwtwd9W-founding-gtm-operations-lead
1•svee•8m ago

The paper computer

https://jsomers.net/blog/the-paper-computer
112•jsomers•3d ago•23 comments

Moving a large-scale metrics pipeline from StatsD to OpenTelemetry / Prometheus

https://medium.com/airbnb-engineering/building-a-high-volume-metrics-pipeline-with-opentelemetry-...
25•jmarbach•2h ago•6 comments

A Look into NaviDial, Japan's Legacy Phone Service

https://www.tokyodev.com/articles/a-look-into-navidial-japan-s-legacy-phone-service
26•pwim•2h ago•3 comments

Cybersecurity looks like proof of work now

https://www.dbreunig.com/2026/04/14/cybersecurity-is-proof-of-work-now.html
363•dbreunig•1d ago•127 comments

Sal Khan's AI revolution hasn't happened yet

https://www.chalkbeat.org/2026/04/09/sal-khan-reflects-on-ai-in-schools-and-khanmigo/
42•the-mitr•2h ago•43 comments

ChatGPT for Excel

https://chatgpt.com/apps/spreadsheets/
178•armcat•9h ago•126 comments

Fast and Easy Levenshtein distance using a Trie

https://stevehanov.ca/blog/fast-and-easy-levenshtein-distance-using-a-trie
32•sebg•3d ago•2 comments

Introduction to spherical harmonics for graphics programmers

https://gpfault.net/posts/sph.html
79•luu•2d ago•7 comments

Too much discussion of the XOR swap trick

https://heather.cafe/posts/too_much_xor_swap_trick/
21•CJefferson•2d ago•6 comments

I made a terminal pager

https://theleo.zone/posts/pager/
117•speckx•8h ago•26 comments

Cal.com is going closed source

https://cal.com/blog/cal-com-goes-closed-source-why
282•Benjamin_Dobell•15h ago•202 comments

North American English Dialects

https://aschmann.net/AmEng/
13•skogstokig•3h ago•1 comments

Google broke its promise to me – now ICE has my data

https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data
1360•Brajeshwar•13h ago•583 comments

Rewriting a 20-year-old Python library

https://www.b-list.org/weblog/2026/mar/23/20-year-library/
6•PaulHoule•4d ago•0 comments

Show HN: Libretto – Making AI browser automations deterministic

https://github.com/saffron-health/libretto
93•muchael•15h ago•33 comments

Retrofitting JIT Compilers into C Interpreters

https://tratt.net/laurie/blog/2026/retrofitting_jit_compilers_into_c_interpreters.html
72•ltratt•19h ago•17 comments

The buns in McDonald's Japan's burger photos are all slightly askew

https://www.mcdonalds.co.jp/en/menu/burger/
369•bckygldstn•9h ago•185 comments

Stealth signals are bypassing Iran’s internet blackout

https://spectrum.ieee.org/iran-internet-blackout-satellite-tv
86•WaitWaitWha•4h ago•26 comments

PiCore - Raspberry Pi Port of Tiny Core Linux

http://tinycorelinux.net/5.x/armv6/releases/README
103•gregsadetsky•11h ago•12 comments

Agent - Native Mac OS X coding ide/harness

https://github.com/macOS26/Agent
39•jv22222•6h ago•9 comments

Live Nation illegally monopolized ticketing market, jury finds

https://www.bloomberg.com/news/articles/2026-04-15/live-nation-illegally-monopolized-ticketing-ma...
505•Alex_Bond•12h ago•146 comments

US v. Heppner (S.D.N.Y. 2026) no attorney-client privilege for AI chats [pdf]

https://fingfx.thomsonreuters.com/gfx/legaldocs/xmvjyjekkpr/Rakoff%20-%20order%20-%20AI.pdf
120•1vuio0pswjnm7•17h ago•94 comments

CRISPR takes important step toward silencing Down syndrome’s extra chromosome

https://medicalxpress.com/news/2026-04-crispr-bold-silencing-syndrome-extra.html
132•amichail•14h ago•73 comments

Show HN: Hiraeth – AWS Emulator

https://github.com/SethPyle376/hiraeth
19•ozarkerD•4h ago•5 comments
Open in hackernews

Internet Protocol Version 8 (IPv8)

https://www.ietf.org/archive/id/draft-thain-ipv8-00.html
94•EvanZhouDev•2h ago

Comments

wg0•1h ago
Seems to be very censorship friendly protocol from grounds up.
sourcegrift•1h ago
why cant they do an ipv5 with 64 bits of address soace for us humans?
SwellJoe•1h ago
Sounds like this is exactly that. Too bad they didn't do that first, and we've had a couple decades of failing to widely adopt IPv6 because it's too complicated and confusing.

"1.7. Backward Compatibility and Transition

IPv4 is a proper subset of IPv8:

IPv8 address with r.r.r.r = 0.0.0.0 = IPv4 address Processed by standard IPv4 rules No modification to IPv4 device required No modification to IPv4 application required No modification to IPv4 internal network required

IPv8 does not require dual-stack operation. There is no flag day. 8to4 tunnelling enables IPv8 islands separated by IPv4- only transit networks to communicate immediately. CF naturally incentivises IPv4 transit ASNs to upgrade by measuring higher latency on 8to4 paths -- an automatic economic signal without any mandate."

sourcegrift•1h ago
How can we adopt this 30 years back!?
SkiFire13•1h ago
IPv6 doesn't require modifications to IPv4 devices, applications, networks etc etc either. You just cannot reach IPv6 networks and devices from them, and the same applies to IPv8. 8to4 is nothing innovative because 6to4 already exists. In the end this proposal has all the disadvantages of IPv6 with less advantages.
stingraycharles•1h ago
Did you read the proposal? It proposes 64 bit address space.
repelsteeltje•23m ago
* Censorship friendly, and

* Surveillance friendly.

What more do you want?!

19skitsch•1h ago
Interesting… Feels like a beautifully designed network for a world where operators trust each other more than they actually do
absynth•1h ago
It probably has age verification on every packet.
kube-system•1h ago
Yeah but they failed to adjust for age drift that may occur during the round trip latency of the packet. Unfortunately at intergalactic scale this error can be significant
Hamuko•51m ago
Can I skip age verification by using UDP?
rocqua•1h ago
I hate to be this dismissive, but it feels like an academic with a paternalistic streak looked deeply at how the Internet works, saw lots of different protocols and weird design decisions, and decided: this is not coherent enough. Then he figured, I'll make all the decisions now, that way it'll be coherent. And let's give every subnet a centralised source of trust and management. That'll make the design so much cleaner!

By which I mean to insinuate there's a lot of nuance and learned lessons in the current situation that this design seems not to learn from. Even though it did learn some lessons, I don't think this passes 'Chestertons fence'

tptacek•1h ago
Obvious reminder that anybody can publish an Internet-Draft.
otterley•1h ago
Also, who is the author? He seems to have appeared from nowhere, like Satoshi Nakamoto. Maybe it’s just Claude posing as a network engineer.
wmf•1h ago
I think you would have to be an outsider to come up with this proposal because it challenges many sacred cows of the IETF establishment. It has no chance of being taken seriously and I personally disagree with a bunch of the decisions but it's entertaining to ponder what kind of mindset would produce this.
Ekaros•53m ago
Insider would understand that there is non-existing chance of any new IP protocol being even considered or taking off. And thus any effort spend on it would be complete waste. Best you can do is work on some addition or backwards compatible new functionality.
albinn•1h ago
One of the main (vocal) issues people seem to have with IPv6 is that the addresses are hard to remember. But having eight different three digit numbers (r.r.r.r.n.n.n.n) does not seem any easier unfortunately.
sschueller•1h ago
I though the whole concept in IPv6 of remembering addresses is that you don't. That is IPv4 thinking...
PhilipRoman•1h ago
I see this point a lot but it never really made sense to me. What exactly does IPv6 bring to the table that makes it unnecessary to remember IP addresses? Especially for anything more advanced than just looking up a hostname.
jeroenhd•1h ago
IPv6 addresses can be plenty memorable. Mine starts with 2a10:3781:xxxx, and the rest of the address is whatever I want it to be. About as recognizable as my IPv4 address.

If I wanted to memorize the addresses for some reason (maybe I broke DNS or something?), I'd just start numbering devices at 1 and keep going up.

transcriptase•1h ago
I’ll take 1.1.1.1.1.1.1.1 over the bastard child of a mac address and bitlocker recovery key any day of the week.
albinn•1h ago
Sure, but remember your prefix 187.231.91.67.135.47.0.0/16
isatty•1h ago
Not sure about what point you are making but that legit more readable than ipv6
fredoralive•50m ago
I hearby propose an IPv6.1. The only change is the written form goes from:

2001:db8::ff00:42:8329

to

128.1.13.184..255.0.0.66.131.41

By doing this, I have changed IPv6 from the strange unwanted alien thing everyone hates, to the new wonder protocol that "just adds more dots" that everyone wants.

I await my FIFA Peace Prize.

SkiFire13•1h ago
And if you want the same address space as IPv6 you need to remember 16 digits. Having them written in decimal won't help you with that anyway.
chromacity•1h ago
I guess I was right to wait out IPv6...

But more seriously, it gives me a pause when we try to bake more complex, application-centric logic into foundational protocols. The list of assigned IPv4 and TCP option numbers is a graveyard of tech experiments, but at least we had the sense to separate them from the main protocol. Baking JSON web tokens and OAuth into IP seems kinda crazy from that point of view. Is this what we want to commit to for the next 40 years?

I kinda wish that IPv6 just used this ("IPv8") addressing scheme and left everything else the same, though. I think the expectation that IPv6 should entail an architectural rethink for existing networks really slowed us down. Fun fact: at this point, IPv6 is 30 years old, we're still under 50%, and growth is visibly tapering off.

FpUser•1h ago
How do we secure internet to the point it does not work anymore. Well except government and big corporate sites
_ache_•1h ago
> IPv8 does not require dual-stack operation.

The whole thing isn't a joke because of this. Technically, it's IPv4++ and that about it.

> Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens

What ?!

I'm not sure it's the path I want to follow.

jojobas•1h ago
Double checked the publication date, it's not April 1st.
Induane•1h ago
I thought it was a joke but someone is serious.

This is one of the worst things I have ever heard of proposal wise.

The worst. I can't even. Literally.

linohh•1h ago
Probably someone had an adderal fueled night with an LLM, that's just completely mad.
timokoesters•1h ago
This document is an Internet-Draft (I-D). Anyone may submit an I-D to the IETF. This I-D is not endorsed by the IETF and has no formal standing in the IETF standards process.

https://datatracker.ietf.org/doc/draft-thain-ipv8/

stingraycharles•1h ago
Yes, and assuming it will not become popular, this will expire / not renew in 6 months.

It’s also worth noting that the author is affiliated with a company based in Bermuda. So it doesn’t feel like it comes from a legitimate institute. For all i know this was vibe-written by an AI in an afternoon.

sleepychu•59m ago
I must be missing something, why aren't their legitimate institutes based in Bermuda?
kennywinker•46m ago
I believe Bermuda is a tax shelter country, which means people and companies register there to hide identity and income from the nations they live and do business in. Because of that, the vast majority of businesses registered in bermuda are not legitimate institutions - they are shell companies defrauding their home nations.
speedping•1h ago
I'm working on my IPv9 proposal as we speak. It has an LLM validating the contents of every packet. Gotta stay ahead of the curve.
QuercusMax•1h ago
I've got a spec for ipv11. Why? Because it's one more than 10.
lamasery•1h ago
Can’t you just make ten… one larger?
fredoralive•36m ago
I've got a spec for IPv2. Because of advances in carrier grade NAT, we can reduce the address field from 32 bits to 16, making amazing savings somehow.
pmontra•1h ago
> East-west security -- traffic between devices within a network -- is enforced by ACL8 zone isolation. Devices communicate only with their designated service gateway. The service gateway communicates only with the designated cloud service. Lateral movement between devices or zones is architecturally prevented by the absence of any permitted route to any other destination.

I must be missing something or misinterpreting that section because if there is no "lateral movement" how do people in an office print a file, access a network drive, connect to the Exchange server? And those are only the most naive scenarios.

dijit•1h ago
By using a cloud provider, obviously.

Local networks are too dangerous to be trusted.

If its not going through Azure you shouldn’t be allowed to connect to your peer devices.

(/s. if that is needed).

ptx•1h ago
Presumably they pay cloud vendors for cloud printing, cloud storage and cloud groupware, so to send something on the local network they simply send it to the cloud vendor and then download it again. That's what people in our office do. Very helpful for the cloud vendor's profitability.
magicalhippo•1h ago
IPv8 does not require dual-stack operation. There is no flag day. 8to4 tunnelling enables IPv8 islands separated by IPv4- only transit networks to communicate immediately.

How is this different from IPv6? We've had 6to4 for ages, the problem is the other direction: how does a IPv4 host initiate a connection to a IPv8 host?

Existing IPv4 applications use the standard BSD socket API with AF_INET and sockaddr_in. The IPv8 compatibility layer intercepts socket calls transparently -- the application has zero IPv8 awareness.

Except many IPv4 applications use the addresses of the source or that they bind to in some form. If it's secretly an IPv8 behind their back that'll break.

wmf•1h ago
how does a IPv4 host initiate a connection to a IPv8 host?

If you give up on P2P it just doesn't. All servers have IPv4 and NAT64 (or whatever they call it) handles v6-only clients.

criticalfault•52m ago
does ipv6 require Dual Stack Operation?
LeoPanthera•1h ago
This is not a serious proposal and we should not treat it as such. And I apologise in advance for the length of this comment.

"IPv4 is a proper subset of IPv8. No existing device, application, or network requires modification. 100% backward compatible."

This cannot be true. Section 5.1 states that IPv8 uses version number 8 in the IP header Version field and the header is 8 octets longer than IPv4's. Any existing IPv4 router, switch ASIC, NIC, host stack, or firewall that sees a Version=8 packet will fail to parse it (most will drop it). Backward compatibility is logically impossible when the wire format is different.

The spec simultaneously demands sweeping new machinery everywhere: new socket API (AF_INET8), new DNS record type (A8), new ARP (ARP8), new ICMP (ICMPv8), new BGP/OSPF/IS-IS, mandatory certified NIC firmware with hardware rate limits, mandatory Zone Servers, mandatory OAuth2 on switch ports, mandatory persistent TCP/443 to the Zone Server from every end device, and a new IANA version-number assignment. "No modification required" is contradicted on nearly every page.

IP version 8 is already historically assigned (it was PIP, later folded into the IPv6 effort). The draft's IANA request ignores this.

The ASN model conflates identity with location. ASNs are organizational identifiers assigned by RIRs, turning them into the 32-bit routing prefix means an organization cannot change providers, multihome with provider-assigned space, or use PI space the way networks do today. Every organization that wants public IPv8 connectivity must now hold an ASN - roughly a 1000x increase in ASN allocation.

The /16 minimum injectable prefix rule eliminates essentially all of today's BGP traffic engineering and most multihoming patterns.

Cross-AS Cost Factor (CF) requires every AS on Earth to trust the metrics injected by every other AS, including a "economic policy" component. BGP is policy-based precisely because ASes do not trust each other's metrics, this has been understood since the 1990s.

The Zone Server kitchen sink (DNS + DHCP + NTP + OAuth + telemetry + ACL + NAT + WHOIS validation + PVRST root) concentrates a dozen unrelated functions into one box on one hardcoded address (.253/.254). This is an operational and security anti-pattern.

PVRST is mandated. PVRST is a Cisco-proprietary spanning tree variant, mandating a vendor-specific protocol in a Standards-Track draft is a non-starter for IETF.

The companion drafts (WHOIS8, NetLog8, Update8, WiFi8, Zone Server, RINE, routing protocols) are all by the same author, none have working-group review, and the core draft depends on all of them to function.

quotemstr•1h ago
I was waiting for the proposal to describe the header field where the sender would indicate which of the four simultaneous days in one 24-hour rotation of the earth he inhabited.
jubilanti•31m ago
This has to have been at least researched via an LLM if not written by it. The form looks right but it is absurd. It angers me to think about how many people wasted their time and brainpower trying to understand this in the spirit of RFC good faith.
jiggawatts•14m ago
I hope your wrote that critique with an LLM[1], because the proposal is clearly not worth reading.

Having said that... China once proposed their IP version to create a locked-down domestic Internet. You have to wonder about the OAuth requirement in this IPv8 proposal. Maybe someone fleeced a dictator somewhere out of their money by promising to get a new secure Internet protocol standardised for them!

[1] With what prompt!? I like the terse output! Do share...

PaulKeeble•1h ago
In many regards IPv6 was a change that went too far and didn't go far enough all at the same time, although slowly but surely it is being adopted. Something like this had a better chance at adoption precisely for how little it changed things. The most radical part is the merging of all services into one central blob and I think that is going to be the part most people take exception too especially oauth. It doesn't solve fundamental issues like roaming with mobile devices, something that now is really important to get rid of a lot of complexity that has built up.
chewbacha•1h ago
My immediate first thought is if the XKCD standards comic

https://xkcd.com/927/

Retr0id•1h ago
Don't forget the equally serious IPv7 https://www.ietf.org/archive/id/draft-ipv7-2025-00.html
Lammy•1h ago
Relevant Lain: https://lain.wiki/wiki/Protocol_7
flomo•1h ago
Lots of fishhooks in there, so lets see how this goes. (some are pretty obscure)
zadikian•1h ago
I get making it a superset of v4, but what's up with the oauth stuff?
compounding_it•1h ago
The solution to the solution to solve a problem is to create a new problem.
usui•1h ago
> Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens served from a local cache. Every service a device requires is delivered in a single DHCP8 lease response.

Isn't it 2 weeks late for April Fools'?

zythyx•1h ago
I'm not going to pretend I know all about IP routing and networking. I understand enough of it to have a home server all appropriately set up with IPv4.

But what makes this quote a problem? I mean, it seems a bit excessive, but I don't understand why...

bnjms•1h ago
Just a gut check but it feels ugly to put auth in an L3 proposal.
Alifatisk•1h ago
I feel the same, I guess using JWT is the joke here?
vasachi•1h ago
IP is what, four layers of protocols lower than OAUTH?
fivetimestwo•1h ago
Is this AGI ?
imoverclocked•1h ago
> IPv8 also resolves IPv4 address exhaustion. Each Autonomous System Number (ASN) holder receives 4,294,967,296 host addresses. The global routing table is structurally bounded at one entry per ASN

Yes, let's conflate routing and addressing while throwing out decades of IPv6 implementation and design. (/sarcasm)

RobotToaster•1h ago
There's already an ipv8 https://www.rfc-editor.org/rfc/rfc1621

There's also at least three ipv9s, only one of which was a joke https://en.wikipedia.org/wiki/List_of_IP_version_numbers

zerof1l•24m ago
Either a joke or vibe-coded. Whole thing is nonsense.