News Nug
Developers use AI more, but they trust it much less

Published: 2025-08-28 | Origin: /r/programming

In the latest issue of The Trends, key developments in software development and AI adoption are highlighted. A Stack Overflow survey reveals that while 84% of developers are using AI—up from 76% in 2024—trust in AI has declined, with only 33% believing in its accuracy, down from 43%. This paradox is linked to productivity issues caused by AI-generated code that is "almost right," which can be more detrimental than broken code. In another finding, large language models

Ask HN: The government of my country blocked VPN access. What should I use?

Published: 2025-08-28 | Origin: Hacker News

To successfully use a VPN in regions with censorship, it's essential to obtain reliable VPN software and configurations. Specialized providers often distribute their VPNs through unconventional methods to avoid blocking. Popular options include S3, and some partner with local organizations to ensure effective delivery in censored areas. Using an obfuscation layer, like Obfs4proxy or Shapeshifter, can help disguise VPN traffic. These tools can effectively mask the VPN handshake and make the traffic appear benign, although they are not foolproof

The Koka programming language

Published: 2025-08-28 | Origin: /r/programming

The article discusses Koka, an experimental functional programming language developed by Microsoft Research, which enhances traditional type systems with an effect system to monitor the side effects of programs. This feature aims to prevent mismatches between intended and actual program behavior. Although Koka has been under development since 2012 and has reached reasonable stability with the recent release of version 3.0 in January 2024, it currently lacks significant programs written in it. The language has inspired research papers focused on implementing its functionalities efficiently

Anything can be a message queue if you use it wrongly enough

Published: 2025-08-28 | Origin: /r/programming

The article, published on June 4, 2023, is satirical and presents a humorous critique of "Managed NAT Gateway," a cloud service that incurs significant costs for startups due to egress traffic fees. The author argues that, while many businesses accept these costs as part of doing business, they don't realize the potential for significantly reducing their cloud spending. The piece suggests using a Tailscale exit node with a public IP address as an alternative that could lower egress costs by up to

Is MCP a Security Nightmare? A look into MCP Authorization

Published: 2025-08-28 | Origin: /r/programming

The content discusses the security aspects of the Model Context Protocol (MCP) and its use of modern OAuth2 workflows to enhance security and authorization for AI applications. MCP allows Large Language Models (LLMs) to act on behalf of users, potentially accessing sensitive resources. It emphasizes a "human in the loop" principle, though it cautions that users often overlook the details of the agreements they accept. Vulnerabilities exist, such as prompt injections that could lead to unauthorized access or malicious actions if exploited by

What brain surgery taught me about the fragile gift of consciousness

Published: 2025-08-28 | Origin: Hacker News

The author reflects on a profound silence experienced with his wife the night before his brain surgery, highlighting the deep connection and awareness of the moment. Faced with the possibility of terminal illness following the discovery of a cerebellar lesion, the author feels an unexpected absence of fear, instead experiencing heightened consciousness and appreciation for life. As he sits in their living room, he savors the details around him and the presence of his wife and their sleeping daughter. This stillness allows him to fully embrace the present

Thoughts on Vibe Coding from a 40-year veteran

Published: 2025-08-28 | Origin: /r/programming

The article discusses the concept of "vibe coding," where developers use AI assistants to handle the writing, refactoring, and debugging of code. The author, a seasoned developer with 40 years of experience, explores this idea by spending two weeks co-developing a Python software project with the aid of AI coding tools. The project involves implementing AI search algorithms and serves as a hands-on test to evaluate the effectiveness of AI in coding. The author reflects on their experiences, insights, and feelings about

Group Borrowing: Zero-Cost Memory Safety with Fewer Restrictions

Published: 2025-08-28 | Origin: /r/programming

The blog discusses the ongoing challenges in achieving memory safety, highlighting the limitations of current popular memory-safe languages, which tend to prioritize either speed or flexibility but not both. The author expresses excitement about emerging approaches in the field, particularly the work of Nick Smith from the Mojo community. Smith is exploring a method to implement zero-overhead mutable aliasing in a borrow checker without relying on traditional memory management techniques like reference counting or garbage collection. The author believes this could be a significant advancement and aims to explain Smith

Chebyshev Kolmogorov Arnold Networks Beat MLPs on Nonlinear functions

Published: 2025-08-28 | Origin: /r/programming

The content outlines a series of research paper implementations focused on advanced machine learning techniques, particularly regarding diffusion models and Chebyshev KANs (Kolmogorov-Arnold Networks). 1. **Implementation Series**: It invites readers to transition from merely reading academic papers to coding implementations, with a series divided into parts. 2. **Chebyshev KANs**: The current focus is on Chebyshev KANs, revealing that they outperform traditional MLPs (Multi-L

Sci-Hub has been blocked in India

Published: 2025-08-28 | Origin: Hacker News

Three major publishing corporations—Elsevier, Wiley, and the American Chemical Society—have banded together to block access to Sci-Hub and Sci-Net for users in India. A New Delhi court has complied with their request, ordering telecom companies to block these sites within three days, which means that Indian students and researchers will now have to use tools to circumvent this censorship to access original academic content. This coalition has been targeting free access to scientific literature in India since 2020, when they first took

The Deletion of Docker.io/Bitnami

Published: 2025-08-28 | Origin: Hacker News

The Bitnami team has postponed the deletion of the Bitnami public catalog on Docker Hub until September 29th to provide users more time to adjust to the changes. In the lead-up to the deletion, they will conduct a series of brownouts where 10 container images will be temporarily unavailable for 24 hours. Affected applications will be announced on the day of each brownout. Since August 28th, no new Bitnami container images or Helm charts have been published in OCI

Canaries in the Coal Mine? Recent Employment Effects of AI [pdf]

Published: 2025-08-28 | Origin: Hacker News

The provided content appears to be a fragment of a PDF file, specifically the file structure detailing the objects and stream used within the PDF. This excerpt includes information such as the identification of various objects, their types, lengths, and references, along with a compressed data stream. The content suggests that it is part of a larger PDF document since it references other objects and contains encoded data. However, the actual readable content from the PDF is not present in this fragment and is truncated. Therefore, a meaningful summary

Bookmarks.txt is a concept of keeping URLs in plain text files

Published: 2025-08-28 | Origin: Hacker News

The content discusses the concept of "bookmarks.txt," which is a method for storing URLs in plain text files, with each URL on a separate line and optional titles separated by a space. It highlights the flexibility of using any program for managing these URLs and mentions a script in the repository that can list or add new URLs. The project is open to contributions for bug fixes only, as new features are currently not accepted due to potential long-term maintenance concerns. Users are encouraged to submit any feature requests as

Altered states of consciousness induced by breathwork accompanied by music

Published: 2025-08-28 | Origin: Hacker News

PLOS ONE offers a straightforward and efficient route to publish research in a high-quality journal, ensuring a fair peer review process and a wide readership suitable for diverse topics. The platform encourages researchers to submit their work and provides access to articles within various PLOS Subject Areas. The content also highlights contributions from multiple authors affiliated with institutions in the UK, Japan, the Netherlands, and the USA, detailing their specific roles in the research process.

Token Ruby #4 | Weekly curated newsletter for all things AI and Ruby

Published: 2025-08-27 | Origin: /r/ruby

The latest issue of Token Ruby, launched at SF Ruby's recent meetup, includes a blog recap. The author discusses using Cursor's BugBot, highlighting its effectiveness in aiding the first round of pull request reviews, particularly enjoying the interaction between AI and human developers on GitHub. Additionally, they praise Copilot Money for its clean design and simplicity in budget management. A humorous note concludes with a pun about RSpec failing a test due to "high expectations." The newsletter aims to support the Ruby and AI

Yamanot.es: A music box of train station melodies from the JR Yamanote Line

Published: 2025-08-27 | Origin: Hacker News

Sure, please provide the content you would like me to summarize.

We Built It, Then We Freed It: Telemetry Harbor Goes Open Source

Published: 2025-08-27 | Origin: /r/programming

Telemetry Harbor is being open-sourced as a high-performance, self-hostable ingest stack built on Go, TimescaleDB, Redis, and Grafana. It is production-ready and allows users to manage their own data. The decision to open-source the platform comes after a successful transition from Python to Go, which improved performance by tenfold and eliminated system crashes. The developers aim to build trust through transparency, enable organizations to comply with data sensitivity requirements, and foster a stronger community in the fragmented telemetry space

shared_ptr<T>: the (not always) atomic reference counted smart pointer

Published: 2025-08-27 | Origin: /r/programming

The write-up discusses the "behavioral analysis" of `shared_ptr<T>` in GNU's libstdc++, a smart pointer that manages shared references to a single underlying pointer by tracking the reference count. This ensures the pointer is only freed when the last reference is destructed, making it particularly useful in multi-threaded applications due to its atomic reference count tracking. The author contrasts the performance of a Rust implementation of an immutable Red-Black tree insertion with that of C++, noting that the Rust version

State of the art for reducing executable size with heavily optimized program

Published: 2025-08-27 | Origin: /r/programming

The author is seeking advice on reducing the size of an ARM64 executable without lowering optimization levels due to performance constraints. They are already using techniques like Profile-Guided Optimization (PGO) and Inter-Procedural Call (IPC) to minimize executable size. They inquire about features such as machine outlining and machine splitting to further optimize size and whether these are enabled by default. The text details the author's findings from profiling tools like bloaty, which indicate that the text section is the largest part of

Malicious versions of Nx and some supporting plugins were published

Published: 2025-08-27 | Origin: /r/programming

The document discusses a serious security incident involving malicious versions of the nx package and related plugins that were published to npm. These versions contained harmful code that could scan users' file systems, collect credentials, and upload them to GitHub under the users' accounts. The problematic versions were removed from npm at multiple times (10:44 PM EDT and 6:20 AM EDT). The vulnerability originated from an insecure workflow that allowed for the injection of executable code. Although the workflow was reverted shortly after the team