Hacker News
@hackernewslive
24.9K
subscribers
218K
links
Download Telegram
Join
Hacker News
24.9K subscribers
Hacker News
Facebook can pursue malware lawsuit against Israel's NSO Group -US appeals court
Article
,
Comments
Reuters
Facebook can pursue malware lawsuit against Israel's NSO Group -US appeals court
A U.S. appeals court said Facebook can pursue a lawsuit accusing Israel's NSO Group of exploiting a bug in its WhatsApp messaging app to install malware allowing the surveillance of 1,400 people, including journalists, human rights activists and dissidents.
👍
👎
Hacker News
Show HN: Tamagui – React design systems optimized for native and web
Article
,
Comments
Tamagui
React style library and UI kit that unifies React Native and React web
👍
👎
Hacker News
Europe must ban Bitcoin mining to hit the 1.5C Paris climate goal, says Sweden
Article
,
Comments
euronews
Ban Bitcoin mining to save the environment, say Swedish authorities
Environment and finance regulators in the Nordic country say crypto mining's electricity usage is putting the climate at risk.
👍
👎
Hacker News
GoDaddy Breach Widens to TsoHost, Media Temple, 123Reg, Domain Factory and More
Article
,
Comments
Wordfence
GoDaddy Breach Widens to tsoHost, Media Temple, 123Reg, Domain Factory, Heart Internet, and Host Europe
Yesterday GoDaddy disclosed a massive data breach impacting over 1.2 Million customers. Today, we received confirmation from GoDaddy that multiple brands that resell GoDaddy Managed WordPress were impacted. The brands impacted include: tsoHost Media Temple…
👍
👎
Hacker News
Sonic: A fast JSON serializing and deserializing library
Article
,
Comments
GitHub
GitHub - bytedance/sonic: A blazingly fast JSON serializing & deserializing library
A blazingly fast JSON serializing & deserializing library - bytedance/sonic
👍
👎
Hacker News
Our fundraising learning post-YC
Article
,
Comments
wasp-lang.dev
Our fundraising learnings - 250+ meetings in 98 days to the oversubscribed round | Wasp
Wasp fundraise chart
👍
👎
Hacker News
Ask HN: How best to prepare for Python interviews starting in 3 months?
Article,
Comments
👍
👎
Hacker News
The New Ten-Factor Authentication Processes
Article
,
Comments
McSweeney's Internet Tendency
The New Ten-Factor Authentication Processes for University Faculty
Dear Faculty, Beginning next semester, we will be moving from two-factor to ten-factor authentication requirements for accessing the university’s d...
👍
👎
Hacker News
The curious tale of a Nintendo UK Hotliner during the console war era
Article
,
Comments
Nintendo Life
Feature: Nintendo Hotliner Life 1990–93: Manning The Phones During The Console Wars
The curious tale of a Nintendo UK Hotliner
👍
👎
Hacker News
New emails released in the McDonald’s ice cream machine lawsuit
Article
,
Comments
WIRED
The McDonald’s Ice Cream Machine Hacking Saga Has a New Twist
The cold war between a startup and a soft-serve machine manufacturer is heating up, thanks to a newly released trove of internal emails.
👍
👎
Hacker News
My Favorite Math Problem
Article
,
Comments
👍
👎
Hacker News
Processing and P5 got newbies into coding
Article
,
Comments
Medium
How Processing And P5 Got Newbies Into Coding
What the creators of Processing — now 20 years old — did right
👍
👎
Hacker News
Ask HN: Why drive users away from the login button?
Article,
Comments
👍
👎
Hacker News
Tree Sitter and the Complications of Parsing Languages
Article
,
Comments
👍
👎
Hacker News
Scaling Carbon Capture
Article
,
Comments
Casey Handmer's blog
Scaling Carbon Capture
This blog is a follow up to So You Want To Start A Carbon Capture Company. In the last five months, the cadence of new entrants in this space, as well as new climate-focused funds, has only increas…
👍
👎
Hacker News
Condition Handling in the Lisp Language Family (2001)
Article
,
Comments
👍
👎
Hacker News
Neuro Evolution of Augmented Topologies
Article
,
Comments
fev.al
Evolving An Ai To Play Snake, Using Neuro Evolution Of Augmented Topologies
Ever since I learned about evolutive algorithms, I’ve been fascinated by them. This class of algorithms use concepts from evolution, such as diversity and se...
👍
👎
Hacker News
How the Rosetta Stone yielded its secrets
Article
,
Comments
The New Yorker
How the Rosetta Stone Yielded Its Secrets
The quest to decode hieroglyphic writing.
👍
👎
Hacker News
IPv6-only subnets and EC2 instances
Article
,
Comments
Amazon
Introducing IPv6-only subnets and EC2 instances | Amazon Web Services
In June 2021, we announced our continued commitment and innovation towards the enablement of IPv6 on AWS. Today, we take a monumental step forward with the ability to create an IPv6-only architecture on AWS. With this launch, Amazon Virtual Private Cloud…
👍
1
👍
👎
Hacker News
Peritext: A CRDT for Rich-Text Collaboration
Article
,
Comments
Inkandswitch
Peritext: A CRDT for Rich-Text Collaboration
Collaboration on rich text is hard to model with plain-text approaches. We review the challenges and how to construct a CRDT for rich text.
👍
👎
Hacker News
I wish systemd logged information about the source of “transactions”
Article
,
Comments
👍
👎
TWeb.init({scrollToPost:'hackernewslive/113835'});