Hacker News
@hackernewslive
24.9K
subscribers
218K
links
Download Telegram
Join
Hacker News
24.9K subscribers
Hacker News
More Than 30 States Sue Google over 'Extravagant' Fees in Google Play Store
Article
,
Comments
14
👍
93%
1
👎
7%
Hacker News
Sri Lanka’s ancient, almost lost martial art
Article
,
Comments
Atlas Obscura
Capturing Sri Lanka’s Ancient, Almost Lost Martial Art
Photographer Reza Akram spent seven years documenting angampora, an indigenous fighting style banned by British colonizers.
7
👍
88%
1
👎
13%
Hacker News
81% of Robinhood revenue comes from payment for order flow
Article
,
Comments
WSJ
Robinhood’s Debut Is Clouded by SEC Scrutiny of Payment for Order Flow
The online brokerage said the practice provided 81% of its first-quarter revenue and a ban on it would hurt its business.
2
👍
33%
4
👎
67%
Hacker News
Manual for a popular facial recognition tool shows how much the software tracks
Article
,
Comments
themarkup.org
This Manual for a Popular Facial Recognition Tool Shows Just How Much the Software Tracks People – The Markup
One school using the software saw that a student’s face was captured more than 1,000 times during the week
6
👍
100%
0
👎
0%
Hacker News
Apple camera design from iPhone 6S Plus to the 12 Pro Max (SAMPLE) [pdf]
Article
,
Comments
1
👍
50%
1
👎
50%
Hacker News
Difftastic: Syntax-aware structured diff tool
Article
,
Comments
GitHub
GitHub - Wilfred/difftastic: a structural diff that understands syntax
🟥
🟩
a structural diff that understands syntax
🟥
🟩
. Contribute to Wilfred/difftastic development by creating an account on GitHub.
👍
👎
Hacker News
BGP in a Nutshell
Article
,
Comments
Bodunhu
BGP in a Nutshell
Border Gateway Protocol (BGP) protocol has a very simple purpose: choose the fastest and the most efficient route to deliver a message from one autonomous system (AS) to another. In layman’s term, BGP is the GPS for the internet. Many contents here are…
4
👍
100%
0
👎
0%
Hacker News
China’s gene giant harvests data from millions of women worldwide
Article
,
Comments
Reuters
China’s gene giant harvests data from millions of pregnant women
A prenatal test used worldwide sends gene data of pregnant women to the company that developed it with China's military. The U.S. sees a security risk.
5
👍
50%
5
👎
50%
Hacker News
How big should a microservice be? (2013)
Article
,
Comments
👍
👎
Hacker News
Compiling rust is NP-hard
Article
,
Comments
compilercrim.es
Compiling Rust is NP-hard
...though it's not the flagship borrow checking that's at fault. What I
noticed, and would like to share with you today, is that the exhaustiveness
checking performed by the Rust compiler on match patterns is a superset of the
SAT problem.
2
👍
100%
0
👎
0%
Hacker News
Show HN: A simple lazy Python Calculation Engine (with spreadsheet demo)
Article
,
Comments
GitHub
GitHub - bsdz/calcengine: Simple Python Calculation Engine
Simple Python Calculation Engine. Contribute to bsdz/calcengine development by creating an account on GitHub.
1
👍
100%
0
👎
0%
Hacker News
Juul, The e-cigarette company, bought an entire issue of a scholarly journal
Article
,
Comments
The American Prospect
Juul: Taking Academic Corruption to a New Level
The e-cigarette company bought an entire issue of a scholarly journal, with all the articles written by authors on its payroll, to ‘prove’ that its product has a public benefit.
2
👍
18%
9
👎
82%
Hacker News
China urges its people to struggle. Some say no
Article
,
Comments
The Economist
China urges its people to struggle. Some say no
A new term for opting out of the rat race has become popular, and controversial
8
👍
73%
3
👎
27%
Hacker News
Measuring security risks in open source software
Article
,
Comments
Google Online Security Blog
Measuring Security Risks in Open Source Software: Scorecards Launches V2
Posted by Kim Lewandowski, Azeem Shaikh, Laurent Simon, Google Open Source Security Team Contributors to the Scorecards project , an automat...
1
👍
100%
0
👎
0%
Hacker News
PfSense CE 2.5.2 Released
Article
,
Comments
ServeTheHome
pfSense CE 2.5.2 Released with Updates
pfSense CE 2.5.2 brings updated hardware support and fixes as well as new dynamic DNS provider support and experimental Wireguard as an add-on
1
👍
50%
1
👎
50%
Hacker News
Networking I/O with Virtual Threads – Under the hood
Article
,
Comments
inside.java
Networking I/O with Virtual Threads - Under the hood
In this article we’ll take a look at how the Java platform’s Networking APIs work under the hood when called on virtual threads. The details are largely an artifact of the implementation and not necessary to know when writing code atop, but it is st…
0
👍
0%
1
👎
100%
Hacker News
A work-in-progress Magit clone for Neovim
Article
,
Comments
GitHub
GitHub - NeogitOrg/neogit: An interactive and powerful Git interface for Neovim, inspired by Magit
An interactive and powerful Git interface for Neovim, inspired by Magit - NeogitOrg/neogit
0
👍
0%
2
👎
100%
Hacker News
Let's build a simple interpreter for APL, part 2 (2020)
Article
,
Comments
Mathspp
Let's build a simple interpreter for APL - part 2
Today is the day! Today is the day we take our APL programs and interpret them, so that something like ÷ 1 2 3 -⍨ 1.1 2.2 3.3 can output 10 5 3.33333333.
0
👍
0%
1
👎
100%
Hacker News
Waxing lyrical: taking ear wax seriously
Article
,
Comments
Postgraduate Medical Journal
Waxing lyrical: taking ear wax seriously
Some medical conditions carry prestige and others do not.1 Diseases with high prestige attract celebrity patronage and awareness campaigns. Those with lower prestige excite little media interest and doctors may see them as trivial or banal. Among such conditions…
2
👍
50%
2
👎
50%
Hacker News
US-Canada heatwave 'virtually impossible' without warming
Article
,
Comments
BBC News
Climate change: US-Canada heatwave 'virtually impossible' without warming
Without global warming, the searing heat seen in the western US and Canada "just doesn't occur," say scientists.
2
👍
14%
12
👎
86%
Hacker News
Understanding REvil: The Ransomware Gang Behind the Kaseya Attack
Article
,
Comments
Unit 42
Understanding REvil: REvil Threat Actors May Have Returned (Updated)
Ransomware cases worked by Unit 42 consultants in the first six months of 2021 reveal insights into the preferred tactics of REvil threat actors.
1
👍
50%
1
👎
50%
TWeb.init({scrollToPost:'hackernewslive/103794'});