Feed aggregator

Show HN: "Is This Tech Dead?" A snarky autopsy engine for programming tools

Hacker News - Sun, 04/20/2025 - 9:07pm

Hi HN,

I made isthistechdead.com — a site that performs digital autopsies on programming languages, frameworks, and tech tools.

We assign each one a Deaditude Score based on actual public data from: •GitHub: stars, forks, commits, last rites •Stack Overflow: unanswered questions and silence •Google Jobs: open listings or lack thereof •Reddit / Hacker News / YouTube: community pulse, or the lack of one •StackShare: whether it’s still on the tech resume of doom

We also do things like: •Track historical decay trends •Let users “Press F to Pay Respects” (yes, there’s a counter) and my supabase bill is exploding •Auto-generate Open Graph images for viral sharing •Publish a monthly tech obituary newsletter (now limited to 100 subscribers, cause I'm cheap)

This project started as a joke. Then I spent a week building a weighted scoring system, tuning signal ratios, and writing data ingestion scripts like a mad epidemiologist of software rot.

Tech stack: •Next.js (fully ISR with very few dynamic components) •Supabase for data storage & APIs •Python for crawling & metrics •Github for the cron (although I'm cron it manually now) •Tailwind + Framer Motion •And lots of caffeine and regret

It’s satire. But the data’s real. Would love your feedback on: •The scoring logic •What data sources I missed •And which beloved framework you want me to offend next

Cheers,

Comments URL: https://news.ycombinator.com/item?id=43747733

Points: 1

# Comments: 0

Categories: Hacker News

[video] I Built a Bot Army That Scams Scammers

Hacker News - Sun, 04/20/2025 - 9:05pm

Article URL: https://youtu.be/ZDpo_o7dR8c

Comments URL: https://news.ycombinator.com/item?id=43747728

Points: 1

# Comments: 1

Categories: Hacker News

Ask HN: How to limit AI coding tools access to the file system?

Hacker News - Sun, 04/20/2025 - 8:44pm

Hello HN, is there a way to prevent AI coding tools like Cursor and Claude Code from having access to the whole file system, and limit them to the project directory?

I am asking as someone who works for many clients and on their own projects on the same computer and who is still hesitating to install these tools.

Comments URL: https://news.ycombinator.com/item?id=43747661

Points: 1

# Comments: 1

Categories: Hacker News

Rare and Banned Indonesian Books

Hacker News - Sun, 04/20/2025 - 8:38pm

Article URL: https://langka.vercel.app/

Comments URL: https://news.ycombinator.com/item?id=43747647

Points: 3

# Comments: 0

Categories: Hacker News

Follow the Hackers (2024)

Hacker News - Sun, 04/20/2025 - 8:37pm
Categories: Hacker News

Did DOGE “breach” Americans’ data? (Lock and Code S06E08)

Malware Bytes Security - Sun, 04/20/2025 - 8:34pm

This week on the Lock and Code podcast…

If you don’t know about the newly created US Department of Government Efficiency (DOGE), there’s a strong chance they already know about you.

Created on January 20 by US President Donald Trump through Executive Order, DOGE’s broad mandate is “modernizing Federal technology and software to maximize governmental efficiency and productivity.”

To fulfill its mission, though, DOGE has taken great interest in Americans’ data.

On February 1, DOGE team members without the necessary security clearances accessed classified information belonging to the US Agency for International Development. On February 17, multiple outlets reported that DOGE sought access to IRS data that includes names, addresses, social security numbers, income, net worth, bank information for direct deposits, and bankruptcy history. The next day, the commissioner of the Social Security Administration stepped down after DOGE requested access to information stored there, too, which includes records of lifetime wages and earnings, social security and bank account numbers, the type and amount of benefits individuals received, citizenship status, and disability and medical information. And last month, one US resident filed a data breach notification report with his state’s Attorney General alleging that his data was breached by DOGE and the man behind it, Elon Musk.

In speaking with the news outlet Databreaches.net, the man, Kevin Couture, said:

“I filed the report with my state Attorney General against Elon Musk stating my privacy rights were violated as my Social Security Number, banking info was compromised by accessing government systems and downloading the info without my consent or knowledge. What other information did he gather on me or others? This is wrong and illegal. I have no idea who has my information now.”

Today on the Lock and Code podcast with host David Ruiz, we speak with Sydney Saubestre, senior policy analyst at New America’s Open Technology Institute, about what data DOGE has accessed, why the government department is claiming it requires that access, and whether or not it is fair to call some of this access a “data breach.”

“[DOGE] haven’t been able to articulate why they want access to some of these data files other than broad ‘waste, fraud, and abuse.’ That, ethically, to me, points to it being a data breach.”

Tune in today to listen to the full conversation.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)

Listen up—Malwarebytes doesn’t just talk cybersecurity, we provide it.

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Categories: Malware Bytes

Did DOGE “breach” Americans’ data? (Lock and Code S06E08)

Malware Bytes Security - Sun, 04/20/2025 - 8:34pm

This week on the Lock and Code podcast…

If you don’t know about the newly created US Department of Government Efficiency (DOGE), there’s a strong chance they already know about you.

Created on January 20 by US President Donald Trump through Executive Order, DOGE’s broad mandate is “modernizing Federal technology and software to maximize governmental efficiency and productivity.”

To fulfill its mission, though, DOGE has taken great interest in Americans’ data.

On February 1, DOGE team members without the necessary security clearances accessed classified information belonging to the US Agency for International Development. On February 17, multiple outlets reported that DOGE sought access to IRS data that includes names, addresses, social security numbers, income, net worth, bank information for direct deposits, and bankruptcy history. The next day, the commissioner of the Social Security Administration stepped down after DOGE requested access to information stored there, too, which includes records of lifetime wages and earnings, social security and bank account numbers, the type and amount of benefits individuals received, citizenship status, and disability and medical information. And last month, one US resident filed a data breach notification report with his state’s Attorney General alleging that his data was breached by DOGE and the man behind it, Elon Musk.

In speaking with the news outlet Databreaches.net, the man, Kevin Couture, said:

“I filed the report with my state Attorney General against Elon Musk stating my privacy rights were violated as my Social Security Number, banking info was compromised by accessing government systems and downloading the info without my consent or knowledge. What other information did he gather on me or others? This is wrong and illegal. I have no idea who has my information now.”

Today on the Lock and Code podcast with host David Ruiz, we speak with Sydney Saubestre, senior policy analyst at New America’s Open Technology Institute, about what data DOGE has accessed, why the government department is claiming it requires that access, and whether or not it is fair to call some of this access a “data breach.”

“[DOGE] haven’t been able to articulate why they want access to some of these data files other than broad ‘waste, fraud, and abuse.’ That, ethically, to me, points to it being a data breach.”

Tune in today to listen to the full conversation.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)

Listen up—Malwarebytes doesn’t just talk cybersecurity, we provide it.

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Categories: Malware Bytes

Show HN: Comparelists.org – Instantly Compare Two Lists, Find Differences

Hacker News - Sun, 04/20/2025 - 8:25pm

Hey HN,

I got tired of manually comparing two lists (think: emails, product SKUs, code, whatever) and built CompareLists.org to make it painless.

You just paste your two lists, hit compare, and instantly see what’s unique to each list, what matches, and any duplicates. It handles thousands of lines, works right in your browser (no data leaves your device), and you can export results as CSV/TXT/JSON. There are options for case sensitivity, whitespace, and more.

It’s free and there’s no signup. I’d love for you to try it out and let me know what you think—or if there’s a feature you wish it had. Feedback (and bug reports) super welcome!

Thanks!

Comments URL: https://news.ycombinator.com/item?id=43747580

Points: 1

# Comments: 0

Categories: Hacker News

Pages