Feed aggregator
Mimetic Theory
Article URL: https://en.wikipedia.org/wiki/Mimetic_theory
Comments URL: https://news.ycombinator.com/item?id=43487869
Points: 1
# Comments: 0
Stamp fanatic professor stole 3k items from Scotland's national archive
Arguments Against Static Typing
Article URL: https://developer.porn/posts/arguments-against-static-typing/
Comments URL: https://news.ycombinator.com/item?id=43487861
Points: 2
# Comments: 0
Ask HN: How Do You Deploy?
If you're just starting, are a YC startup or similar, where and how do you deploy/ship your apps?
Say, you have your github, you've setup some pipelines for CI (or not ;), but how about deployment?
You'll need some storage, maybe a db of some sort and some compute or serverless.
You do AWS lambda, beanstalk, eks/aks/etc, raw vm, api gateway use railway or heroku on your own?
Or you hire devops or a product engineer with some cloud exp to handle this?
No right or wrong answers here :-) I appreciate all input!
Comments URL: https://news.ycombinator.com/item?id=43487843
Points: 1
# Comments: 0
Commandments of Reproducible Builds
Article URL: https://reproducible-builds.org/docs/commandments/
Comments URL: https://news.ycombinator.com/item?id=43487820
Points: 1
# Comments: 0
Diary of Boring Things
Article URL: https://the418.substack.com/p/diary-of-boring-things
Comments URL: https://news.ycombinator.com/item?id=43487805
Points: 1
# Comments: 0
So, will Framework make a printer? [video]
Article URL: https://www.youtube.com/watch?v=os_fHy1mB_M
Comments URL: https://news.ycombinator.com/item?id=43487786
Points: 1
# Comments: 1
Show HN: My Digital Zettelkasten That Connects Data Engineering and Much More
I'm sharing my public Second Brain - a digital Zettelkasten that connects my knowledge across Data Engineering, Personal Knowledge Management, Programming, Productivity, and philosophical topics like Digital Minimalism.
Built with Obsidian and published using Quartz/GoHugo, this knowledge vault contains interconnected notes that I've crafted, curated, and connected over years. I've developed a streamlined publishing workflow where I simply add #publish to any note I want to make public, then run make deploy through a custom Rust script that's 30x faster than my original Python implementation.
The entire system works with plain Markdown files, preserves Wikilinks, and allows me to write from any device while maintaining a consistent publishing flow. The interactive graph visualization reveals unexpected connections between technical and philosophical concepts.
Browse through over 1,000 notes covering all sorts of ideas/essays: brain.ssp.sh
Find more about the whole process of publishing on: https://www.ssp.sh/brain/public-second-brain-with-quartz
Comments URL: https://news.ycombinator.com/item?id=43487728
Points: 3
# Comments: 0
Zorin OS 17.3 is Here
Article URL: https://blog.zorin.com/2025/03/26/zorin-os-17.3-is-here/
Comments URL: https://news.ycombinator.com/item?id=43487701
Points: 3
# Comments: 0
A beautiful loop: An active inference theory of consciousness
Article URL: https://osf.io/preprints/psyarxiv/daf5n_v2
Comments URL: https://news.ycombinator.com/item?id=43487699
Points: 1
# Comments: 1
Monocypher 4: The Clean Break
Article URL: https://loup-vaillant.fr/articles/monocypher-4
Comments URL: https://news.ycombinator.com/item?id=43487698
Points: 1
# Comments: 0
Kazakhstan to create national digital archive
Article URL: https://el.kz/en/kazakhstan-to-create-national-digital-archive_400016650/
Comments URL: https://news.ycombinator.com/item?id=43487669
Points: 3
# Comments: 0
Bubble Paper Airplane
Article URL: https://makezine.com/projects/toy-inventors-notebook-bubble-plane/
Comments URL: https://news.ycombinator.com/item?id=43487335
Points: 1
# Comments: 0
Airbus announces missile-slinging drone for air defense
Article URL: https://www.defensenews.com/global/europe/2025/03/26/airbus-announces-missile-slinging-drone-for-air-defense/
Comments URL: https://news.ycombinator.com/item?id=43487317
Points: 1
# Comments: 0
Writing a Linux Debugger
Article URL: https://blog.tartanllama.xyz/writing-a-linux-debugger-setup/
Comments URL: https://news.ycombinator.com/item?id=43487298
Points: 1
# Comments: 0
Security expert Troy Hunt hit by phishing attack
Internet security expert and educator Troy Hunt disclosed this week that he had been hit by one of the oldest—and most proven—scams in the online world: A phishing attack.
Through an automated attack disguised as a notice from Hunt’s chosen newsletter provider Mailchimp, scammers stole roughly 16,000 records belonging to current and past subscribers of Hunt’s blog. As such, readers should be the lookout for any scams or phishing attempts in the coming weeks.
“I’m enormously frustrated with myself for having fallen for this, and I apologise to anyone on that list,” Hunt wrote.
But Hunt’s immediate disclosure of the attack should be commended. By publishing a transparent blog that detailed the phish just 34 minutes after falling for it, Hunt used himself as the strongest example yet that online scams can hit anyone, and that, while shame and embarrassment are common, no one should ever feel alone in their experience.
What happened?On March 25, Hunt received a malicious email disguised as a legitimate notice from the company Mailchimp, which he uses to email his blog entries to subscribed readers. The email claimed that Mailchimp was temporarily cutting service to Hunt because his blog had allegedly received a spam complaint.
“Your account has been flagged due to a spam complaint, and as a result, you are temporarily unable to send emails until this issue is resolved,” the email read. To fix the issue, Hunt was asked to sign into his Mailchimp account.
The phishing email was convincingly designed, and it threatened consequences if its recipient failed to act. But, as Hunt said, “I’ve received a gazillion similar phishes before that I’ve identified early,” so another simple factor was at play: Timing.
“You know when you’re really jet lagged and really tired and the cogs in your head are just moving that little bit too slow?” Hunt wrote. “That’s me right now, and the penny has just dropped that a Mailchimp phish has grabbed my credentials, logged into my account and exported the mailing list for this blog.”
Hunt also noticed that, when he tried to log into his Mailchimp account by following the phishing email’s link, his password manager did not auto-fill his account details.
While a password manager’s refusal to auto-fill credentials on a website can indicate that the website itself might be illegitimate, it’s far from a guaranteed red flag. As Hunt said, “there are so many services where you’ve registered on one domain (and that address is stored in 1Password), then you legitimately log on to a different domain.”
In the phishing attack, the scammers stole about 16,000 records belonging to people who had both subscribed and unsubscribed to Hunt’s blog. This is because Mailchimp preserves data of users who unsubscribe, a storage practice that Hunt is currently investigating with the company. Of the 16,000 records, 7,535 email addresses were of readers who unsubscribed. All breach victims are being notified over time, Hunt said.
The stolen records included email addresses, subscription statuses, and IP addresses, along with latitude and longitude data, which, as Hunt later learned, “do not pinpoint the location of the subscriber.”
After recognizing his mistake, Hunt changed his password, reached out to Mailchimp to help delete the scammer’s API key, and then verified that the website he was directed to in the phishing attack had been taken offline.
And, importantly, as the owner of the website Have I Been Pwned (HIBP), which helps people search whether they’ve been involved in a data breach, Hunt had one more data breach to add to the website’s collection: His own.
“When I have conversations with breached companies, my messaging is crystal clear: be transparent and expeditious in your reporting of the incident and prioritise communicating with your customers,” Hunt said. “Me doing anything less than that would be hypocritical, including how I then handle the data from the breach, namely adding it to HIBP.”
Best practiceResponsible data breach disclosures are so rare that they deserve some news coverage, and Malwarebytes is happy to see that Hunt used himself as an example during a stressful and difficult incident. Phishing attacks are common because they’re effective, and that includes against new device owners users, longtime web users, and literal security experts.
For readers impacted in the attack, stay mindful for any phishing attempts that might hit your inbox, using your Have I Been Pwned subscription as a lure. There is no shame in falling for a scam, but it’s better to avoid one before it even happens.
No Man's Sky's newest update adds bones and fossils beneath the Earth
Article URL: https://www.polygon.com/news/546691/no-mans-sky-relics-update
Comments URL: https://news.ycombinator.com/item?id=43487285
Points: 1
# Comments: 0
Humans in Africa's wet tropical forests 150 thousand years ago
Article URL: https://www.nature.com/articles/s41586-025-08613-y
Comments URL: https://news.ycombinator.com/item?id=43487277
Points: 1
# Comments: 0