News Nug
Fuck up my site – Turn any website into beautiful chaos

Published: 2025-08-28 | Origin: Hacker News

This tool is designed for parody and entertainment, applying visual chaos effects to websites temporarily. It does not store or transmit personal information. Users are strongly advised not to enter sensitive data like passwords or credit card details, as the proxied sites are not secure. Banking, financial, healthcare, and government sites are blocked for safety reasons. Users should acknowledge the tool's comedic purpose and report any issues on Twitter.

Ruby AI: Introducing Tidewave Web & Interview with José Valim

Published: 2025-08-28 | Origin: /r/ruby

In an interview with Matt Solt, José Valim, the creator of Elixir, Livebook, and Devise, discusses the launch of Tidewave Web, a new browser-based coding agent designed for Ruby on Rails and Phoenix. Tidewave aims to enhance the coding experience by operating directly alongside web applications, providing full access to UI state, database, logs, and code context, which reduces the need for back-and-forth communication with AI coding assistants. Key features include shared page context, deep

Some thoughts on LLMs and Software Development

Published: 2025-08-28 | Origin: /r/programming

The author is taking a break from managing a website and reflects on the current state of large language models (LLMs) and artificial intelligence (AI) in software development. They note that early surveys on AI's impact often overlook how people use LLMs, primarily as advanced auto-complete tools, whereas more effective usage involves direct interaction with source code. The author expresses concern that these surveys could mislead people by not considering different workflows. The future of programming is uncertain, with questions arising about the

My startup banking story (2023)

Published: 2025-08-28 | Origin: Hacker News

The narrator, a recent college graduate and new entrepreneur in San Francisco, initially underestimates the significance of choosing a bank. Believing all banks operate similarly, he opens a business account at a local Chase branch, funded by a personal loan. Six months later, after successfully raising a seed round of approximately $1 million, the funds are wired to his Chase account. He receives an unexpected call from Alex, the banker who helped him open the account, checking in on him after noticing the large deposit

Writing Mac and iOS Apps Shouldn’t Be So Difficult

Published: 2025-08-28 | Origin: /r/programming

The author reflects on their experience working at UserLand Software in the ’90s and early 2000s, particularly on a Mac app called UserLand Frontier, founded by Dave Winer. Frontier was a scripting system and a hash-table-oriented database that played a significant role in early blogging and podcasting. The app featured a user interface (UI) that allowed users to create and edit menus and commands, which would run scripts without requiring a restart, enabling seamless iteration and rapid development. The author

Making Minecraft Spherical

Published: 2025-08-28 | Origin: Hacker News

Failed to generate summary

Developers use AI more, but they trust it much less

Published: 2025-08-28 | Origin: /r/programming

In the latest issue of The Trends, key developments in software development and AI adoption are highlighted. A Stack Overflow survey reveals that while 84% of developers are using AI—up from 76% in 2024—trust in AI has declined, with only 33% believing in its accuracy, down from 43%. This paradox is linked to productivity issues caused by AI-generated code that is "almost right," which can be more detrimental than broken code. In another finding, large language models

Ask HN: The government of my country blocked VPN access. What should I use?

Published: 2025-08-28 | Origin: Hacker News

To successfully use a VPN in regions with censorship, it's essential to obtain reliable VPN software and configurations. Specialized providers often distribute their VPNs through unconventional methods to avoid blocking. Popular options include S3, and some partner with local organizations to ensure effective delivery in censored areas. Using an obfuscation layer, like Obfs4proxy or Shapeshifter, can help disguise VPN traffic. These tools can effectively mask the VPN handshake and make the traffic appear benign, although they are not foolproof

The Koka programming language

Published: 2025-08-28 | Origin: /r/programming

The article discusses Koka, an experimental functional programming language developed by Microsoft Research, which enhances traditional type systems with an effect system to monitor the side effects of programs. This feature aims to prevent mismatches between intended and actual program behavior. Although Koka has been under development since 2012 and has reached reasonable stability with the recent release of version 3.0 in January 2024, it currently lacks significant programs written in it. The language has inspired research papers focused on implementing its functionalities efficiently

Anything can be a message queue if you use it wrongly enough

Published: 2025-08-28 | Origin: /r/programming

The article, published on June 4, 2023, is satirical and presents a humorous critique of "Managed NAT Gateway," a cloud service that incurs significant costs for startups due to egress traffic fees. The author argues that, while many businesses accept these costs as part of doing business, they don't realize the potential for significantly reducing their cloud spending. The piece suggests using a Tailscale exit node with a public IP address as an alternative that could lower egress costs by up to

Is MCP a Security Nightmare? A look into MCP Authorization

Published: 2025-08-28 | Origin: /r/programming

The content discusses the security aspects of the Model Context Protocol (MCP) and its use of modern OAuth2 workflows to enhance security and authorization for AI applications. MCP allows Large Language Models (LLMs) to act on behalf of users, potentially accessing sensitive resources. It emphasizes a "human in the loop" principle, though it cautions that users often overlook the details of the agreements they accept. Vulnerabilities exist, such as prompt injections that could lead to unauthorized access or malicious actions if exploited by

What brain surgery taught me about the fragile gift of consciousness

Published: 2025-08-28 | Origin: Hacker News

The author reflects on a profound silence experienced with his wife the night before his brain surgery, highlighting the deep connection and awareness of the moment. Faced with the possibility of terminal illness following the discovery of a cerebellar lesion, the author feels an unexpected absence of fear, instead experiencing heightened consciousness and appreciation for life. As he sits in their living room, he savors the details around him and the presence of his wife and their sleeping daughter. This stillness allows him to fully embrace the present

Thoughts on Vibe Coding from a 40-year veteran

Published: 2025-08-28 | Origin: /r/programming

The article discusses the concept of "vibe coding," where developers use AI assistants to handle the writing, refactoring, and debugging of code. The author, a seasoned developer with 40 years of experience, explores this idea by spending two weeks co-developing a Python software project with the aid of AI coding tools. The project involves implementing AI search algorithms and serves as a hands-on test to evaluate the effectiveness of AI in coding. The author reflects on their experiences, insights, and feelings about

Group Borrowing: Zero-Cost Memory Safety with Fewer Restrictions

Published: 2025-08-28 | Origin: /r/programming

The blog discusses the ongoing challenges in achieving memory safety, highlighting the limitations of current popular memory-safe languages, which tend to prioritize either speed or flexibility but not both. The author expresses excitement about emerging approaches in the field, particularly the work of Nick Smith from the Mojo community. Smith is exploring a method to implement zero-overhead mutable aliasing in a borrow checker without relying on traditional memory management techniques like reference counting or garbage collection. The author believes this could be a significant advancement and aims to explain Smith

Chebyshev Kolmogorov Arnold Networks Beat MLPs on Nonlinear functions

Published: 2025-08-28 | Origin: /r/programming

The content outlines a series of research paper implementations focused on advanced machine learning techniques, particularly regarding diffusion models and Chebyshev KANs (Kolmogorov-Arnold Networks). 1. **Implementation Series**: It invites readers to transition from merely reading academic papers to coding implementations, with a series divided into parts. 2. **Chebyshev KANs**: The current focus is on Chebyshev KANs, revealing that they outperform traditional MLPs (Multi-L

Sci-Hub has been blocked in India

Published: 2025-08-28 | Origin: Hacker News

Three major publishing corporations—Elsevier, Wiley, and the American Chemical Society—have banded together to block access to Sci-Hub and Sci-Net for users in India. A New Delhi court has complied with their request, ordering telecom companies to block these sites within three days, which means that Indian students and researchers will now have to use tools to circumvent this censorship to access original academic content. This coalition has been targeting free access to scientific literature in India since 2020, when they first took

The Deletion of Docker.io/Bitnami

Published: 2025-08-28 | Origin: Hacker News

The Bitnami team has postponed the deletion of the Bitnami public catalog on Docker Hub until September 29th to provide users more time to adjust to the changes. In the lead-up to the deletion, they will conduct a series of brownouts where 10 container images will be temporarily unavailable for 24 hours. Affected applications will be announced on the day of each brownout. Since August 28th, no new Bitnami container images or Helm charts have been published in OCI

Canaries in the Coal Mine? Recent Employment Effects of AI [pdf]

Published: 2025-08-28 | Origin: Hacker News

The provided content appears to be a fragment of a PDF file, specifically the file structure detailing the objects and stream used within the PDF. This excerpt includes information such as the identification of various objects, their types, lengths, and references, along with a compressed data stream. The content suggests that it is part of a larger PDF document since it references other objects and contains encoded data. However, the actual readable content from the PDF is not present in this fragment and is truncated. Therefore, a meaningful summary

Bookmarks.txt is a concept of keeping URLs in plain text files

Published: 2025-08-28 | Origin: Hacker News

The content discusses the concept of "bookmarks.txt," which is a method for storing URLs in plain text files, with each URL on a separate line and optional titles separated by a space. It highlights the flexibility of using any program for managing these URLs and mentions a script in the repository that can list or add new URLs. The project is open to contributions for bug fixes only, as new features are currently not accepted due to potential long-term maintenance concerns. Users are encouraged to submit any feature requests as

Altered states of consciousness induced by breathwork accompanied by music

Published: 2025-08-28 | Origin: Hacker News

PLOS ONE offers a straightforward and efficient route to publish research in a high-quality journal, ensuring a fair peer review process and a wide readership suitable for diverse topics. The platform encourages researchers to submit their work and provides access to articles within various PLOS Subject Areas. The content also highlights contributions from multiple authors affiliated with institutions in the UK, Japan, the Netherlands, and the USA, detailing their specific roles in the research process.