Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Apple’s Secure Enclave Processor (SEP) Firmware Decrypted
(
hackaday.com
)
51 points
by
wonderous
1 hour ago
|
hide
|
2 comments
2.
Carp, a compiled Lisp with type inference and a borrow checker
(
veitheller.de
)
85 points
by
eriksvedang
3 hours ago
|
hide
|
36 comments
3.
VNC, RDP and SSH Over HTML5
(
apache.org
)
37 points
by
WhyNotHugo
1 hour ago
|
hide
|
11 comments
4.
My unusual hobby
(
stephanboyer.com
)
535 points
by
curryhoward
12 hours ago
|
hide
|
117 comments
5.
Half-Life and Team Fortress Networking
(
gamasutra.com
)
101 points
by
setra
7 hours ago
|
hide
|
21 comments
6.
Matcha: Mobile apps in Go
(
gomatcha.io
)
48 points
by
ingve
4 hours ago
|
hide
|
2 comments
7.
Apple Krackers Guide (1985) [pdf]
(
uni-stuttgart.de
)
51 points
by
Tomte
8 hours ago
|
hide
|
1 comment
8.
Practical Unix Manuals: mdoc
(
bsd.lv
)
118 points
by
beefhash
13 hours ago
|
hide
|
20 comments
9.
Simpson's Paradox and the Hot Hand in Basketball (1995)
(
fermatslibrary.com
)
21 points
by
micaeloliveira
6 hours ago
|
hide
|
10 comments
10.
Guide to avoiding vulnerabilities in programming languages [pdf]
(
open-std.org
)
51 points
by
ingve
10 hours ago
|
hide
|
4 comments
11.
Cloudflare Reports Massive Slowdown in Network Level DDoS Attacks
(
cloudflare.com
)
26 points
by
IcyApril
2 hours ago
|
hide
|
1 comment
12.
Reprogramming a $13 consumer wifi-enabled outlet
(
rluckom.github.io
)
101 points
by
zipfle
6 hours ago
|
hide
|
18 comments
13.
Inside the Revolution at Etsy
(
nytimes.com
)
78 points
by
e15ctr0n
9 hours ago
|
hide
|
44 comments
14.
A Callout: Parts for an Iron Lung
(
hackaday.com
)
52 points
by
JJLongusa
6 hours ago
|
hide
|
22 comments
15.
A minimalist guide to tmux
(
medium.com
)
146 points
by
peterxjang
8 hours ago
|
hide
|
54 comments
16.
Security Guidelines for Congressional Campaigns
(
techsolidarity.org
)
81 points
by
stablemap
7 hours ago
|
hide
|
64 comments
17.
Segwit2x Bugs Explained
(
bitcointechtalk.com
)
177 points
by
jwildeboer
13 hours ago
|
hide
|
78 comments
18.
How does one get the system to actually use the IPv6 Temporary Addresses?
(
microsoft.com
)
52 points
by
the8472
6 hours ago
|
hide
|
27 comments
19.
Syntia: Synthesizing the Semantics of Obfuscated Code
(
usenix.org
)
13 points
by
ingve
10 hours ago
|
hide
|
discuss
20.
Driving for Uber and Lyft
(
mrmoneymustache.com
)
146 points
by
sus_007
3 hours ago
|
hide
|
85 comments
21.
Terrain rendering in fewer than 20 lines of code
(
github.com
)
711 points
by
blaze33
1 day ago
|
hide
|
85 comments
22.
New in Datasette: filters, foreign keys and search
(
simonwillison.net
)
24 points
by
simonw
5 hours ago
|
hide
|
2 comments
23.
Linked List Problems (2002) [pdf]
(
stanford.edu
)
208 points
by
starschema
21 hours ago
|
hide
|
86 comments
24.
Ask HN: CS papers for software architecture and design?
411 points
by
avrmav
15 hours ago
|
hide
|
75 comments
25.
Ciao, Chrome: Firefox Quantum Is the Browser Built for 2017
(
wired.com
)
354 points
by
bpierre
10 hours ago
|
hide
|
241 comments
26.
SSH vs. OpenVPN for Tunneling
(
backslasher.net
)
307 points
by
setra
1 day ago
|
hide
|
101 comments
27.
Introducing Remembear, new password manager
(
remembear.com
)
82 points
by
anuragsoni
9 hours ago
|
hide
|
70 comments
28.
“I fell down a bit of a ruins research rabbit-hole”
(
twitter.com
)
495 points
by
caio1982
1 day ago
|
hide
|
40 comments
29.
Hacker News Tokyo Community Meetup
(
hntokyo.doorkeeper.jp
)
107 points
by
jason_tko
18 hours ago
|
hide
|
36 comments
30.
A growing number of young Americans are leaving desk jobs to farm
(
washingtonpost.com
)
512 points
by
blueatlas
1 day ago
|
hide
|
368 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: