News Nug
Time to start de-Appling

Published: 2025-11-10 | Origin: Hacker News

The author discusses the impact of de-Googling and de-Appling on their life, noting a missed meeting due to not checking their Google calendar. They explain that Apple is set to withdraw its Advanced Data Protection (ADP) feature from the UK due to legal pressures from the Home Office, specifically under the Investigatory Powers Act. Users who had previously enabled ADP will have to disable it manually or risk losing their iCloud accounts. The author emphasizes the importance of removing critical data from i

Open source has a growing problem with LLM generated issues

Published: 2025-11-10 | Origin: Hacker News

The content discusses concerns regarding feedback and contributions, particularly focusing on pull requests and bug reports that appear to be generated by large language models (LLMs). The author emphasizes the importance of evaluating LLM-generated contributions separately, suggesting that all such issues should be closed as spam due to their potentially misleading nature. They advocate that any submitted code must be accompanied by an explanation in the submitter's own words, asserting that LLM-generated code does not meet the necessary requirements for contribution, including legal considerations related to

Show HN: DroidDock – A sleek macOS app for browsing Android device files via ADB

Published: 2025-11-10 | Origin: Hacker News

DroidDock is a free and open-source macOS application designed for browsing and managing Android device files via ADB. The app, compatible with macOS version 10.13 and above, allows users to connect and manage multiple Android devices simultaneously with automatic detection. Key features include an intuitive interface for navigating the Android filesystem, drag-and-drop functionality for transferring files between devices, real-time storage monitoring, and a built-in search feature. It also offers a visually appealing dark theme and automatic update notifications.

Why TypeScript’s “strict: true” isn’t enough. Missing compiler flags for production code

Published: 2025-11-09 | Origin: /r/programming

Failed to fetch content - HTTP Error - SSL_connect returned=1 errno=0 peeraddr=52.1.147.205:443 state=error: certificate verify failed (unable to get local issuer certificate)

What do noise functions sound like?

Published: 2025-11-09 | Origin: /r/programming

Abigail Adegbiji is developing a voxel game engine that requires procedurally generated terrain, which involves sampling noise functions for height values. She explains the basics of different types of noise, starting with white noise, characterized by completely random values, resulting in a harsh, staticky sound when played. In contrast, brown noise, derived from Brownian motion, uses a random walk process that connects consecutive samples, producing a smoother and softer sound with an emphasis on lower frequencies. However, neither white nor

Ask HN: What Are You Working On? (Nov 2025)

Published: 2025-11-09 | Origin: Hacker News

1. **Sixty Book Club**: Participants read sixty self-chosen books a year (five per month) without forced reading. The group meets twice a month in a salon-style format. It features bespoke software that includes a shared graph for highlights and annotations, an IRC chat for member interactions, and a collective bookshelf. There is a limit of six members. 2. **Tiled Words**: A free, web-based game inspired by tile placement board games and crosswords. Players rotate and

The OWASP Top 10:2025 is out! We have new data and new risks, but the same goal: more secure software

Published: 2025-11-09 | Origin: /r/programming

The 8th installment of the OWASP Top Ten introduces two new categories and one consolidation for 2025, emphasizing a focus on root causes over symptoms. The update is informed by community data and insights gathered from a survey, which helps address gaps in the existing data. This approach acknowledges that while past data is insightful, it doesn't necessarily reflect current vulnerabilities or emerging risks, as addressing these can take significant time. Changes from the previous version include a broader data collection method that allows tracking the prevalence of

Writing your own BEAM

Published: 2025-11-09 | Origin: Hacker News

The blog post summarizes a speaker's experience preparing for a talk at Code BEAM Europe 2025, focusing on their exploration of the BEAM virtual machine, which supports languages like Erlang, Elixir, and Gleam. The author expresses fascination with BEAM's features, such as process spawning, message passing, and supervision trees, and attempts to create a simplified implementation (MVP) of BEAM from first principles. They clarify that their approach may differ from official implementations, as they haven't

Drilling down on Uncle Sam's proposed TP-Link ban

Published: 2025-11-09 | Origin: Hacker News

The U.S. government is reportedly moving towards a ban on the sale of wireless routers and networking equipment from TP-Link Systems, which holds a significant market share among home users and small businesses. This potential ban is believed to stem more from concerns about TP-Link’s connections to China than from concrete technical threats. Various federal agencies, including the Department of Commerce, have expressed concerns about the risks posed by TP-Link products, which handle sensitive American data and could be subject to Chinese government influence. TP-Link Systems

How to Give Constructive Feedback with Confidence as an Engineering Leader

Published: 2025-11-09 | Origin: /r/programming

This week's newsletter is sponsored by Cerbos and focuses on the importance of securing MCP servers in AI architectures through a "Zero Trust" approach. An eBook titled “Zero Trust for AI: Securing MCP Servers” discusses how these servers, vital for AI, pose new risks to data governance that traditional security measures do not mitigate. The eBook covers the integration of MCP servers into risk management frameworks, the shortcomings of role-based access in dynamic AI environments, real incidents highlighting these risks, and a recommended

Customizing ed(2): Syntax Highlighting and rlwrap Heresy

Published: 2025-11-09 | Origin: /r/programming

The content discusses customizations made to the text editor ed(1), emphasizing the author's desire for more advanced features beyond basic configurations. Despite ed(1)'s limitations, the author has implemented two key operations for Lisp editing—expression wrapping and "slurping"—to enhance usability, particularly for Lisp programming. The text also highlights the use of Rlwrap, which enhances command-line interfaces with additional features like filters and keyboard macros, crucial for the author's editing enhancements. The author mentions creating visual

Marble Fountain

Published: 2025-11-09 | Origin: Hacker News

The author, who began working at Formlabs in September 2023, is excited about procedural generation and its application in 3D printing. They aimed to create a complex art piece called "Marble Fountain." The initial design involved randomly placed points and a spline, but the author felt limited and wanted to incorporate more features, leading them to develop a path solver. The challenge was to maximize printer motion within the volume and the initial condition of the algorithms significantly influenced the structure's shape. The solver

Montana becomes first state to enshrine 'right to compute' into law

Published: 2025-11-09 | Origin: Hacker News

Montana has become the first U.S. state to legislate protections for its citizens' rights to access computational tools and artificial intelligence technologies with the signing of the Montana Right to Compute Act (MRTCA) by Governor Greg Gianforte. This law affirms residents' rights to own and operate computational resources, aligning with state constitutional protections for property and free expression. Proponents, including bill sponsor Senator Daniel Zolnikov, argue that it advances digital freedoms in an AI-driven world. While

Think in math, write in code (2019)

Published: 2025-11-09 | Origin: Hacker News

The article discusses the passion programmers have for programming languages, highlighting how these languages often become part of their identities and provoke debates over technical and aesthetic merits. However, it argues that programming languages are primarily tools for instructing machines, not for expressing complex thoughts. They are formal systems with inherent limitations, designed to make human-computer interaction manageable. In contrast, mathematics has historically served as a more flexible medium for expressing ideas, though many people find it intimidating due to its symbols and memorization requirements. The

A Lost Tape of Unix Fourth Edition Has Been Rediscovered After 50+ Years

Published: 2025-11-09 | Origin: /r/programming

A forgotten cardboard box in the Kahlert School of Computing at the University of Utah contained a reel of 9-track magnetic tape labeled “UNIX Original From Bell Labs V4.” Discovered by Professor Robert Ricci, this tape may hold the long-lost Fourth Edition of Unix, dating back to around 1973. If verified, it would be a significant artifact from the early days of computing, marking a pivotal moment when Unix was rewritten in the C programming language, allowing it to operate

Git Monorepo vs Multi-repo vs Submodules vs subtrees : Explained

Published: 2025-11-09 | Origin: /r/programming

The content discusses various strategies for organizing code repositories as projects scale. It highlights three main approaches: 1. **Monorepo**: A single large repository that houses all project components, including back-end, front-end, libraries, and deployment scripts. This allows multiple teams to collaborate within the same repository. 2. **Multiple Repositories**: Some teams prefer splitting their code into smaller, separate repositories. 3. **Git Submodules/Subtrees**: A method to link separate repositories. The

Dissecting the syscall Instruction: Kernel Entry and Exit Mechanisms.

Published: 2025-11-09 | Origin: /r/programming

The content discusses the intricate process that occurs when a system call, such as `read()`, is invoked in a computing environment. It explains how this transition involves a privilege level shift from user space to kernel space, illustrating the complexity and speed required for these operations on production servers. Historically, older methods of making system calls (like `int 0x80`) were inefficient, costing significant CPU cycles and leading to performance issues, particularly for high-frequency tasks such as networking or disk I/O

Spring Batch Concepts Tutorial to handle large-scale data processing with ease using Spring: Defining Jobs, Steps, Chunk processing, flow control, and workflows etc.

Published: 2025-11-09 | Origin: /r/programming

The content discusses the Spring Batch module within the Spring Framework, designed for processing large volumes of data through batch jobs. It highlights the need for effective transactional control and failure recovery mechanisms due to the complexity of handling substantial data in enterprise applications. Spring Batch provides reusable functions for job processing, including features such as logging, transaction management, job statistics, and resource management, all optimized for performance. To get started with Spring Batch, users should have experience in Java, knowledge of the Spring Framework, and an

Reverse engineering Codex CLI to get GPT-5-Codex-Mini to draw me a pelican

Published: 2025-11-09 | Origin: Hacker News

On November 9, 2025, OpenAI released a new model called GPT-5-Codex-Mini, which is a compact, cost-effective version of GPT-5-Codex. It is currently accessible only through the Codex CLI tool and a VS Code extension, with API access expected soon. The author attempted to reverse-engineer the Codex CLI to directly prompt the new model. While aware that OpenAI does not intend for direct access, they noted that the Codex

Boring Company fined nearly $500K after it dumped drilling fluids into manholes

Published: 2025-11-09 | Origin: Hacker News

Boring Company, Elon Musk's tunneling venture, has been fined nearly $500,000 by the Clark County Water Reclamation District for improperly dumping drilling fluids into manholes in Las Vegas, which caused significant damage to county infrastructure. The violation notice states that despite directives from inspectors to halt the dumping, Boring employees continued the activity, only pretending to comply. This disregard led to the need for cleanup of 12 cubic yards of waste from a sewage treatment facility. The discharged fluids may contain toxic