News Nug
Do Not Turn Child Protection into Internet Access Control

Published: 2026-03-21 | Origin: Hacker News

Age verification has evolved from a tool used primarily by adult websites to a widespread requirement across various digital services, including social media, messaging, gaming, and search platforms, particularly in regions like Europe, the USA, and Australia. While the primary motivation is to protect children from harmful content and manipulative practices, the implications of age verification extend beyond child safety. It represents a shift towards permissioned access, where users must prove their identity to access services, thereby altering the default open-access nature of the internet

Tinybox – Offline AI device 120B parameters

Published: 2026-03-21 | Origin: Hacker News

The content discusses tinygrad, a rapidly growing neural network framework known for its simplicity, which reduces complex networks to three operation types (OpTypes). It encourages readers to explore the code to understand how conventional operations like convolutions (CONVs) and matrix multiplications (MATMULs) are implemented. Additionally, it mentions the sale of a computer called the tinybox, available in red, green, and soon in a new color called exa.

BIO – The Bao I/O Co-Processor

Published: 2026-03-21 | Origin: Hacker News

The update discusses the BIO, an I/O co-processor in the Baochip-1x, drawing parallels with the Raspberry Pi's Programmable Input/Output (PIO). It outlines the purpose of I/O co-processors, which is to offload tasks from the main CPU, reducing unpredictability in response times and minimizing jitter. The BIO architecture is derived from the Raspberry Pi PIO, consisting of four processors with nine instructions and 32 instruction memory locations, enabling flexible and cycle-accurate

Some things just take time

Published: 2026-03-21 | Origin: Hacker News

The content discusses the value of time and patience in growth, using trees as a metaphor for things that require years to mature, such as old properties, experiences, and relationships. It contrasts this with contemporary obsessions with instant gratification and speed, especially in the context of software development and startups. While rapid iteration and deployment can be beneficial, certain processes, like compliance, require a more measured approach. The text warns that a push towards automation and eliminating friction can be detrimental in scenarios where human involvement is essential

FFmpeg 101 (2024)

Published: 2026-03-21 | Origin: Hacker News

The content provides a high-level overview of using FFmpeg, a suite of tools and libraries designed for handling various audio and video formats. FFmpeg allows users to encode, decode, transcode, and stream multimedia content. A fundamental operation is demuxing a multimedia stream from a file or network, which separates it into audio and video streams, followed by decoding these into raw data. The demuxing and decoding process relies on the libavformat library, which utilizes structures like AVFormatContext and

Linux Applications Programming by Example: The Fundamental APIs (2nd Edition)

Published: 2026-03-20 | Origin: Hacker News

The content emphasizes the importance of user feedback and encourages readers to consult the documentation for available qualifiers. It provides information about the repository for "Linux Application Development By Example - The Fundamental APIs" by Arnold Robbins, including copyright details. The Documents directory contains relevant documents, including the author's license, and errata will be recorded in "Documents/errata.txt." The repository also includes example programs corresponding to the book's chapters. Users can report any errors or issues by opening an issue. The last update was

Ghostling

Published: 2026-03-20 | Origin: Hacker News

Ghostling is a minimal demo project showcasing a basic terminal functionality built on the libghostty C API within a single file. It employs Raylib for windowing and rendering but is designed as a single-threaded application, highlighting the adaptability of libghostty for various contexts, despite not being a fully-featured terminal suitable for everyday use. Libghostty is an embeddable library that offers both C and Zig APIs for terminal emulation, with Ghostling utilizing libghostty-vt,

We rewrote our Rust WASM parser in TypeScript and it got faster

Published: 2026-03-20 | Origin: Hacker News

The article discusses the rewriting of the Rust WASM parser used for the openui-lang, a language that converts a custom DSL into a React component tree. Initially, the parser was built in Rust and compiled to WASM for efficiency in the browser. However, it was found that the overhead from data transfer between JavaScript and WASM, particularly during serialization and deserialization processes, was causing performance bottlenecks. The team experimented with a method to return a JavaScript object directly from WASM

OpenCode – Open source AI coding agent

Published: 2026-03-20 | Origin: Hacker News

OpenCode is an open-source tool that assists users in writing code in various environments like terminals and IDEs. It supports multiple AI models from different providers, including Claude, GPT, and Gemini, and has gained significant popularity with over 120,000 GitHub stars, 800 contributors, and more than 10,000 commits, serving over 5 million developers monthly. OpenCode prioritizes user privacy by not storing any code or context data. Additionally, Zen offers a curated selection of AI models

A Japanese glossary of chopsticks faux pas

Published: 2026-03-20 | Origin: Hacker News

In Japan, there are specific etiquette rules, known as kiraibashi, governing the use of chopsticks that range from impolite behaviors to serious taboos. Key points include: - Raising chopsticks above mouth level is considered improper. - Cleaning chopsticks in liquids like soup is frowned upon. - Passing food between chopsticks is a serious taboo, as it relates to cremation customs. - Holding out a bowl for more food while still using chopsticks is inappropriate. - Continuously dipping chop

Boomloom: Think with your hands

Published: 2026-03-20 | Origin: Hacker News

The Boss loom is designed for intuitive, hands-on learning in weaving, making it accessible for beginners and experienced weavers alike. It features a top bar that separates warp threads as you turn a knob, simplifying plain weave and enabling various patterns without complex steps. With five different bars, it allows for endless design variations, making creative exploration effortless. Compact and ideal for homes, studios, and classrooms, the loom is easy to set up, and promotes a welcoming environment for all skill levels. Users can sample

Molly Guard

Published: 2026-03-20 | Origin: Hacker News

The term "molly guard" in computing refers to a protective cover that prevents accidental activation of important buttons, named after an incident involving a young girl named Molly who pressed a significant button in a datacenter. Molly guards can be found in both hardware (like recessed buttons and plastic ridges) and software (such as confirmation dialogs and modifier keys). The concept also includes "reverse molly guards," which are features that automatically execute actions if no user input is detected for a certain period. The author

Tin Can, a 'landline' for kids

Published: 2026-03-20 | Origin: Hacker News

Alison Bennett, a Los Angeles mom, is trying to avoid buying her 8-year-old daughter a cellphone by opting for retro alternatives. She has provided her daughter with an MP3 player for music, rented DVDs for films, and even subscribes to the Los Angeles Times for printed news. Recently, she purchased three $75 Tin Can "landline" phones—one for her daughter and two for friends. The Tin Can phone, which operates on home WiFi, offers parental controls that limit

France's aircraft carrier located in real time by Le Monde through fitness app

Published: 2026-03-20 | Origin: Hacker News

Failed to fetch content - HTTP Status - 402

Pompeii's battle scars linked to an ancient 'machine gun'

Published: 2026-03-20 | Origin: Hacker News

Failed to fetch content - HTTP Status - 400

Has anyone else noticed their AI tool usage patterns feel uncomfortably like behavioral addiction loops?

Published: 2026-03-20 | Origin: /r/programming

The content discusses six behavioral mechanisms from gambling research that apply to work with AI. It highlights how prompts in AI can produce unpredictable results, resembling the experience of gambling—creating a psychological compulsion to keep engaging. The phenomenon of "almost working" code is noted to be more motivating than outright failures, leading developers to spend excessive time troubleshooting. It also emphasizes the risks of becoming absorbed in work, often at the expense of sleep, meals, and relationships. Additionally, the content points out that many workers

I'm building Alcove Congress: local-first semantic search over congressional and legislative records with ADA Title II accessibility built in. Happy to demo. The tools are built and running.

Published: 2026-03-20 | Origin: /r/programming

The content informs users that JavaScript is disabled in their browser and prompts them to enable it or switch to a supported browser to continue using x.com. It also provides links to the Help Center and mentions legal documents such as the Terms of Service, Privacy Policy, Cookie Policy, and Ads info, along with a copyright notice for X Corp © 2026.

Microservices and the First Law of Distributed Objects

Published: 2026-03-20 | Origin: /r/programming

The content discusses the concept of API design in the context of microservices and the author's prior work on distributed object design. It references the "First Law of Distributed Object Design," which states "don't distribute your objects." The author notes that while there has been a resurgence of interest in microservices, this approach may seem contrary to the aforementioned law. The text explains that the term "distributed objects" was popular in the late 1990s and early 2000s and involved designing objects that

ArXiv Declares Independence from Cornell

Published: 2026-03-20 | Origin: Hacker News

Failed to fetch content - HTTP Status - 403

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Published: 2026-03-20 | Origin: Hacker News

The content discusses custom security solutions designed to address specific challenges faced in security roles, emphasizing support throughout various stages of security management, including building, testing, and hardening. The author, Nyxgeek, shares insights from 2026 about two recent Azure Entra ID sign-in log bypasses, highlighting their significance for security logging that administrators depend on to detect intrusions. The piece focuses on methods to retrieve valid authentication tokens without leaving a trace in the sign-in logs, a serious concern given