News Nug
What the windsurf sale means for the AI coding ecosystem

Published: 2025-08-09 | Origin: Hacker News

The founders of WindSurf experienced a remarkable journey, transforming their company into one of the fastest-growing SaaS businesses, reaching $82 million in annual recurring revenue (ARR) within eight months and attracting enterprise clients like Nvidia and Palantir. However, they sold the company to Cognition for $250 million—essentially valuing the business at $150 million excluding cash—just days after a failed $3 billion acquisition by OpenAI. Notably, on the same day OpenAI walked away,

Efrit: A native elisp coding agent running in Emacs

Published: 2025-08-08 | Origin: Hacker News

The content discusses Efrit, a sophisticated AI coding assistant designed for Emacs that utilizes native Elisp programming. It emphasizes the importance of user feedback and offers a seamless integration through various interfaces for different tasks. Users can clone the repository, configure their API key, and test the setup within Emacs. Efrit features conversational continuity, allowing users to refine and modify previous work easily. The tool is built on the principle of Elisp-centricity, enabling direct access to Emacs' evaluation capabilities for enhanced

Jim Lovell, Apollo 13 commander, has died

Published: 2025-08-08 | Origin: Hacker News

Acting NASA Administrator Sean Duffy issued a statement on the passing of Apollo astronaut Jim Lovell, who died at the age of 97 on August 7 in Lake Forest, Illinois. Duffy expressed condolences to Lovell's family, highlighting his inspirational life and contributions to NASA. Lovell played a significant role in pioneering Gemini missions and the Apollo program, notably as the Command Module Pilot for Apollo 8 and the commander of Apollo 13, showcasing his strength and innovation during critical missions. He

I want everything local – Building my offline AI workspace

Published: 2025-08-08 | Origin: Hacker News

A friend expressed a desire for a fully local setup, devoid of cloud services and remote code execution. This prompted a discussion on creating a system that combines a Large Language Model (LLM) for chatting, Docker for code execution isolation, and a browser interface for usability. The goal was to execute tasks requiring privacy, like photo or video editing, entirely locally, without exposing data to platforms like OpenAI or Google. The development process, primarily conducted on Apple Silicon, aimed to create a native Mac application

GitHub - isene/openai: A terminal interface for OpenAI

Published: 2025-08-08 | Origin: /r/ruby

The content discusses a modern terminal interface for OpenAI's API, highlighting version 2.1, which includes features such as chat window scrolling, enhanced user experience, and improved conversation management. It mentions that this version maintains compatibility with previous command-line usage while offering a new Text User Interface (TUI). Users are instructed to edit their configuration file and obtain their API key from OpenAI's platform. The project is in the public domain, allowing for modification and distribution. The interface is built using rc

All known 49-year-old Apple-1 computer

Published: 2025-08-08 | Origin: Hacker News

The Apple-1 Registry is a non-profit website dedicated to the preservation and information sharing about the original Apple-1 computer. It provides detailed insights into the components of the Apple-1 mainboard and the extensive effort—over a thousand hours—invested in gathering information, contacting owners, and maintaining the complex website and database. The site promotes sharing and encourages visitors to link to it on social media or their websites. It emphasizes data privacy by not using cookies or ads and is hosted in the EU

HTTP/1.1 must die: the desync endgame

Published: 2025-08-08 | Origin: /r/programming

The Burp Suite's web vulnerability scanner highlights the critical issues inherent in the HTTP/1.1 protocol, which is insecure and exposes millions of websites to risks, despite six years of attempted mitigations. A recent paper discusses new classes of HTTP desynchronization attacks that can compromise user credentials on a large scale, demonstrated through case studies affecting major platforms like Akamai, Cloudflare, and Netlify. The author presents an open-source toolkit for detecting parser discrepancies and vulnerabilities, which has helped earn over

You don't really need monads

Published: 2025-08-08 | Origin: /r/programming

The piece discusses the overrated nature of monads in programming, particularly within functional programming contexts. It begins by acknowledging a common understanding of monads and their components through definitions and examples, specifically using the Maybe monad as an illustration. The author critiques the notion that monads do not compose, clarifying that while monads of the same type can be composed, achieving this requires specific templates to maintain coherence. This complexity often leads to the use of monad transformers. The overall message is a cautious

The how and why of GitHub to Codeberg

Published: 2025-08-08 | Origin: /r/programming

The content outlines the process for migrating static websites from GitHub Pages to Codeberg using statichost.eu for reliable hosting. It emphasizes that Codeberg Pages is not recommended for critical uptime. Key steps include creating a personal access token for authentication if two-factor authentication (2FA) is enabled, which involves setting permissions for repository access. Once the migration is complete, the site will be live at a designated URL. For automatic updates, users need to set up a webhook that triggers updates on statich

PEP 802 – Display Syntax for the Empty Set

Published: 2025-08-08 | Origin: /r/programming

The authors propose a new notation, {/}, for representing the empty set in Python, modeled after the mathematical symbol '∅'. This notation addresses the absence of a dedicated syntax for the empty set, which contrasts with existing notations for empty tuples, lists, and dictionaries. Currently, sets are the only built-in collection type without a specific empty collection representation, which can confuse beginners, especially those with a scientific or mathematical background. The proposal highlights the advantages of using {/}, such as avoiding name look

Zero-day flaws in authentication, identity, authorization in HashiCorp Vault

Published: 2025-08-08 | Origin: /r/programming

Cyata will be present at Black Hat USA 2025, Booth 6316, and invites attendees to book meetings. In a recent study, Cyata's team, led by engineer Yarden Porat, assessed HashiCorp Vault—an essential tool for managing credentials and security tokens. During this investigation, they discovered nine previously unknown zero-day vulnerabilities, which were responsibly disclosed and patched in collaboration with HashiCorp. These vulnerabilities include mechanisms that bypass security lockouts, evade policy checks, enable

HTTP is not simple

Published: 2025-08-08 | Origin: /r/programming

The author argues against the common perception that HTTP is a simple protocol, drawing on nearly three decades of experience with client-side code and involvement in the development of HTTP specifications. While HTTP/1 may seem straightforward due to its readable text format and simple use cases, the author believes the underlying mechanics are quite complex. Although tools like curl and browsers make it easy to interact with HTTP, the protocol's intricacies—such as its line-based structure and header limitations—complicate things. Additionally, the newer

Keep API work local: Why offline-first beats cloud-based tools

Published: 2025-08-08 | Origin: /r/programming

The content discusses the challenges and risks associated with relying on cloud-based tools for API development, such as issues with server outages, outdated documentation, and data vulnerability. Key problems include dependence on internet connectivity, fragmented workflows due to switching between multiple tools, potential vendor lock-in from proprietary tools, and inefficiencies when cloud-hosted API docs don't align with live endpoints. To counter these issues, the piece advocates for an offline-first approach to API workflows, emphasizing the benefits of using local files. This method

Tor: How a military project became a lifeline for privacy

Published: 2025-08-08 | Origin: Hacker News

The writer reflects on their experience during a train journey in the UK, where they encounter poor Wi-Fi and turn to the Tor Browser for online access. While Tor is often associated with the Dark Web, it is a legitimate tool funded partly by the U.S. government, enabling users, especially in restrictive regimes, to access the Internet anonymously. Tor works by encrypting and routing user signals through a global network of servers, making it challenging for governments to trace online activity. The article highlights the importance of

Getting good results from Claude Code

Published: 2025-08-08 | Origin: Hacker News

The author is currently seeking employment and invites connections via their LinkedIn profile as they explore ways for interim support. Over recent months, they have been working with an LLM programming agent called Claude Code, which has significantly increased their productivity, allowing them to complete around 12 programming projects that they wouldn't have attempted otherwise due to time constraints. While they acknowledge their ongoing journey to become more proficient with Claude Code and the need to review extensive documentation, they emphasize that one doesn’t need to be an expert to

Ultrathin business card runs a fluid simulation

Published: 2025-08-08 | Origin: Hacker News

The content discusses a project repository for a flip-card business card that utilizes a fluid-implicit-particle (FLIP) simulation. It emphasizes the importance of user feedback and provides links to documentation and project inspirations. Key components include: - PCB design files located in the "kicad-pcb" folder. - A fluid simulation logic crate in the "fluid_sim_crate" folder, based on work by Matthias Müller. - Notable challenges, such as implementing a rechargeable battery using a design from

60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign

Published: 2025-08-08 | Origin: /r/ruby

Failed to fetch content - HTTP Status - 403

Learn C by Building Projects – From FizzBuzz to Neural Networks!

Published: 2025-08-08 | Origin: /r/programming

The content describes a repository of small C projects aimed at helping users practice and understand core C programming concepts. Each project focuses on a specific area, such as graphics or algorithms, and is categorized by difficulty level. The repository is a work in progress, with new projects being added over time. Users are encouraged to provide feedback, suggest ideas, or report bugs through issues or pull requests.

FreeBSD Scheduling on Hybrid CPUs

Published: 2025-08-08 | Origin: Hacker News

Intel has introduced hybrid CPUs for the amd64 architecture, starting with Lakefield and more broadly with Alder Lake (Gen12), which feature both Performance (P) and Efficiency (E) cores. In contrast, ARM launched its big.LITTLE architecture in 2011, evolving it into DynamIQ, allowing for better flexibility in task management through clustered core configurations. Selecting cores for thread execution based on their distinct performance and efficiency involves optimization and is guided by user-defined policies. Tools like cpuset(1

The enduring puzzle of static electricity

Published: 2025-08-08 | Origin: Hacker News

Failed to fetch content - HTTP Status - 403