Feed aggregator
Ask HN: Do you have to be really smart just to understand how to play my game?
My game, DropZap World, is intended to be a novel but casual game for people who like Tetris and/or Candy Crush.
But it seems some people are overwhelmed by it.
What should I do?
P.S. It has been released recently: https://apps.apple.com/app/id1072858930
Brief intro:
DropZap World is a falling block game with lasers, mirrors, splitters, color matching, and many levels.
Gameplay
* When a circle lands, it fires lasers of its color in eight directions.
* These lasers damage or destroy objects of the same color.
* You pass a level when you destroy all the squares.
Of course, there’s more to it than that — as you’ll see when you play.
Comments URL: https://news.ycombinator.com/item?id=44298368
Points: 1
# Comments: 0
Pipelined State Machine Corruption
Article URL: https://flak.tedunangst.com/post/pipelined-state-machine-corruption
Comments URL: https://news.ycombinator.com/item?id=44298360
Points: 1
# Comments: 0
Will OpenAI Train on You Data with Codex CLI and Custom Provider?
Article URL: https://github.com/openai/codex/issues/1322
Comments URL: https://news.ycombinator.com/item?id=44298357
Points: 2
# Comments: 0
Ruby vs. Java, which wins? (2011)
Article URL: https://ask.metafilter.com/192158/Ruby-vs-Java-which-wins
Comments URL: https://news.ycombinator.com/item?id=44298352
Points: 1
# Comments: 0
President now profits immensely from crypto sector he once said seems like scam
Article URL: https://www.theguardian.com/us-news/2025/jun/17/trump-crypto-memecoin-corruption
Comments URL: https://news.ycombinator.com/item?id=44298346
Points: 1
# Comments: 0
Best Internet Providers in Connecticut
What Are All the Laid-Off Programmers Going to Do?
Article URL: https://medium.com/predict/what-are-all-the-laid-off-programmers-going-to-do-39d175ae1abf
Comments URL: https://news.ycombinator.com/item?id=44298339
Points: 1
# Comments: 0
The space between
Article URL: https://notes.neatnik.net/2025/06/the-space-between
Comments URL: https://news.ycombinator.com/item?id=44298330
Points: 1
# Comments: 0
Hack the Planet: 90s Hacker Culture vs. Today's AI Devs
Article URL: https://gizvault.com/archives/hack-the-planet
Comments URL: https://news.ycombinator.com/item?id=44298327
Points: 5
# Comments: 0
Taxation and Migration by the Super-rich [pdf]
Article URL: https://arunadvani.com/papers/AdvaniBurgherrSummers2025_TaxationAndMigrationByTheSuperRich.pdf
Comments URL: https://news.ycombinator.com/item?id=44298302
Points: 1
# Comments: 0
PostmarketOS – The Linux distribution for mobile devices
Article URL: https://postmarketos.org/
Comments URL: https://news.ycombinator.com/item?id=44298288
Points: 3
# Comments: 0
Firefox is dead to me – and I'm not the only one who is fed up
Article URL: https://www.theregister.com/2025/06/17/opinion_column_firefox/
Comments URL: https://news.ycombinator.com/item?id=44298286
Points: 3
# Comments: 2
AI-Driven Documentation in Construction: Today and Tomorrow
US Insurance Industry Warned of Scattered Spider Attacks
Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector.
The post US Insurance Industry Warned of Scattered Spider Attacks appeared first on SecurityWeek.
AI Obituary Pirates Are Exploiting Our Grief. I Tracked One Down to Find Out Why
Getty Images Has One of the Best AI Image Generator Set-Ups I've Tested
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2023-0386 Linux Kernel Improper Ownership Management Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on June 17, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-168-01 Siemens Mendix Studio Pro
- ICSA-25-168-02 LS Electric GMWin 4
- ICSA-25-168-04 Fuji Electric Smart Editor
- ICSA-25-168-05 Dover Fueling Solutions ProGauge MagLink LX Consoles
- ICSA-24-347-10 Siemens SENTRON Powercenter 1000 (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.