Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
perching_aix's favorites
login
submissions
|
comments
1.
Patterns for Defensive Programming in Rust
(
corrode.dev
)
304 points
by
PaulHoule
1 day ago
|
78 comments
2.
How elites could shape mass preferences as AI reduces persuasion costs
(
arxiv.org
)
690 points
by
50kIters
2 days ago
|
653 comments
3.
Stacked Diffs with git rebase —onto
(
dineshpandiyan.com
)
137 points
by
flexdinesh
5 days ago
|
164 comments
4.
Contextualization Machines
(
stochasm.blog
)
26 points
by
jxmorris12
5 days ago
|
3 comments
5.
Why WinQuake exists and how it works
(
fabiensanglard.net
)
152 points
by
wicket
2 days ago
|
51 comments
6.
Programming peaked
(
functional.computer
)
215 points
by
Antibabelic
2 days ago
|
207 comments
7.
Quad9 DOH HTTP/1.1 Retirement, December 15, 2025
(
quad9.net
)
102 points
by
pickledoyster
3 days ago
|
61 comments
8.
Counter Galois Onion: Improved encryption for Tor circuit traffic
(
torproject.org
)
103 points
by
wrayjustin
10 days ago
|
31 comments
9.
The Copenhagen Trap: How the West made passivity the only safe strategy
(
kunnas.com
)
44 points
by
ekns
6 days ago
|
35 comments
10.
The CRDT Dictionary: A Field Guide to Conflict-Free Replicated Data Types
(
iankduncan.com
)
220 points
by
birdculture
7 days ago
|
36 comments
11.
A new bridge links the math of infinity to computer science
(
quantamagazine.org
)
255 points
by
digital55
10 days ago
|
158 comments
12.
Unpowered SSDs slowly lose data
(
xda-developers.com
)
769 points
by
amichail
11 days ago
|
329 comments
13.
NSA and IETF, part 3: Dodging the issues at hand
(
cr.yp.to
)
316 points
by
upofadown
12 days ago
|
229 comments
14.
Passing the Torch – My Last Root DNSSEC KSK Ceremony as Crypto Officer 4
(
seastrom.com
)
72 points
by
greyface-
12 days ago
|
22 comments
15.
Shaders: How to draw high fidelity graphics with just x and y coordinates
(
makingsoftware.com
)
411 points
by
Garbage
13 days ago
|
89 comments
16.
Signal knows who you're talking to (2023)
(
sanesecurityguy.com
)
114 points
by
kekqqq
13 days ago
|
155 comments
17.
New Proofs Probe Soap-Film Singularities
(
quantamagazine.org
)
41 points
by
pseudolus
23 days ago
|
3 comments
18.
Towards Interplanetary QUIC Traffic
(
ochagavia.nl
)
106 points
by
wofo
18 days ago
|
26 comments
19.
How Quake.exe got its TCP/IP stack
(
fabiensanglard.net
)
528 points
by
billiob
18 days ago
|
150 comments
20.
Compiling Ruby to machine language
(
patshaughnessy.net
)
287 points
by
todsacerdoti
18 days ago
|
52 comments
21.
How when AWS was down, we were not
(
authress.io
)
203 points
by
mooreds
19 days ago
|
74 comments
22.
When did people favor composition over inheritance?
(
sicpers.info
)
230 points
by
ingve
29 days ago
|
209 comments
23.
SSL Configuration Generator
(
ssl-config.mozilla.org
)
269 points
by
smartmic
21 days ago
|
80 comments
24.
Spec-Driven Development: The Waterfall Strikes Back
(
marmelab.com
)
225 points
by
vinhnx
21 days ago
|
191 comments
25.
Reproducing the AWS Outage Race Condition with a Model Checker
(
wyounas.github.io
)
144 points
by
simplegeek
33 days ago
|
50 comments
26.
When models manipulate manifolds: The geometry of a counting task
(
transformer-circuits.pub
)
98 points
by
vinhnx
38 days ago
|
17 comments
27.
Language models are injective and hence invertible
(
arxiv.org
)
231 points
by
mazsa
37 days ago
|
148 comments
28.
Keeping the Internet fast and secure: introducing Merkle Tree Certificates
(
cloudflare.com
)
215 points
by
tatersolid
38 days ago
|
92 comments
29.
Why JPEG XL ignoring bit depth is genius (and why AVIF can't pull it off)
(
fractionalxperience.com
)
102 points
by
Bogdanp
40 days ago
|
65 comments
30.
How programs get run: ELF binaries (2015)
(
lwn.net
)
141 points
by
st_goliath
41 days ago
|
11 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: