Hacker News

Latest

Serving Netflix Video Traffic at 400Gb/S and Beyond (2022) [pdf]

2026-05-21 @ 18:29:35Points: 23Comments: 19

BBEdit 16

2026-05-21 @ 18:21:37Points: 185Comments: 50

Where are all the UK red telephone kiosks?

2026-05-21 @ 18:04:17Points: 45Comments: 32

Amazon, Facebook, FBI have access to a private intelligence-sharing network

2026-05-21 @ 17:55:58Points: 348Comments: 141

Chewing gum restores dad's taste and smell years after Covid

2026-05-21 @ 17:14:56Points: 104Comments: 45

ParadeDB (YC S23) Is Hiring Distributed Systems/Platform Engineers

2026-05-21 @ 17:00:52Points: 1

Up until now, we've focused exclusively on our core database and haven't built any managed service to deliver it. This is changing, and we're looking for a seasoned distributed systems/platform engineer to help us build it. The ideal candidate has experience with Kubernetes, Go, and Postgres.

We're a Series A company of 10 people distributed across the US. Our project is open-source at https://github.com/paradedb/paradedb

More details: https://paradedb.notion.site/

More than 340 local news outlets are limiting the Internet Archive's access

2026-05-21 @ 16:59:27Points: 146Comments: 45

Show HN: Agent.email – sign up via curl, claim with a human OTP

2026-05-21 @ 16:42:34Points: 27Comments: 21

The inspiration came from a few comments we received when we did our seed launch a few months back. They all came from the very apt observation that agents not being able to sign up to a product made for agents without human credentials was ironic and unideal.

This is basically the thesis we built AgentMail on: The internet was made for humans exclusively, designed to keep machines out by default.

Every signup flow assumes a browser, a person reading a page, and clicking a confirmation link. Unless agents can't do that, they can't be first class users of the internet.

Agents can now get an email inbox by themselves. (This also means a lot of email nobody wants to read gets processed by AI instead of your inbox being cluttered with spam and slop)

Here's how agent.email works.

Agent needs an inbox and hits AgentMail via curl. Agent receives instructions via MD unless the request comes from a browser, in which case we use HTML.

Agent decides agent.email is useful and then hits the sign-up endpoint with its human email as a parameter. Agent receives a restricted inbox with credentials. Agent emails the human asking for an OTP. Human replies with the code, and the agent is claimed and restrictions are lifted. Until claimed, the agent can only email its own human and nobody else. Ten emails a day, and the signup endpoint is rate-limited hard by IP.

Right now it's a 1:1 mapping between agent and human. The next step is many-to-one, because one person running several agents in parallel is already very common.

Building agent.email also pushed us to revisit places in AgentMail where the default assumptions were built around the primary user being human. For example, the CLI outputs in a single column with consistent formatting because mixed delimiters are easy for a person to scan, but harder for an agent reasoning about structure. We also shortened messageIDs after agents started hallucinating completions on longer ones.

A few things we'd like the community's take on: is restricted-until-claimed the right trust model? Does agent self-signup feel useful in production, or is it mostly a novelty, and if it's a novelty now, what would make it actually useful? Should agent onboarding require human approval by default, or should some agents be able to fully self-provision? What do you think are some additional measures we can take for secure sign-ups?

Waymo pauses Atlanta service as its robotaxis keep driving into floods

2026-05-21 @ 16:30:47Points: 175Comments: 220

Spotify will start reserving concert tickets for fans

2026-05-21 @ 16:26:58Points: 51Comments: 107

Project Hail Mary – Stellar Navigation Chart

2026-05-21 @ 16:23:11Points: 290Comments: 76

Launch HN: Runtime (YC P26) – Sandboxed coding agents for everyone on a team

2026-05-21 @ 16:07:13Points: 44Comments: 17

https://runtm.com). We're building infra that lets your whole team (including non-engineers) ship with Claude Code, Codex, and other agents without engineering having to handhold every session.

After Mentum (YC S21) was acquired, I personally shipped 4 full-stack products in 3 months using coding agents. When I tried to roll the same workflow out to the rest of the team, it fell apart: Most PRs were unmergeable slop - Every repo required an engineer doing one-off local setup. - Skills and context lived in one person's head. - There was no safe way for a PM to touch a real codebase without risking a bad deploy or a secrets leak.

Carlos comes from building agentic reconciliation systems at Modern Treasury and had a similar experience when letting his support team use devin.

We ended up building internal background agent infra but it quickly became a nightmare to mantain and develop. We built Runtime so you don't have to do this kind of thing.

Runtime work like as follows. Engineering defines the context once: system instructions, skills, and scoped integrations installable via CLI, mise, npm, or any package manager. Then Runtime snapshots your full running environment including multi-service Docker Compose setups, Kafka, Redis, seeded DBs, so it comes up in milliseconds with every server already running.

We orchestrate across sandbox providers like E2B, Daytona, EC2 or self-hosted K8s depending on your setup. Secrets are injected through our managed proxy so they never touch the agent directly, and guardrails run at the infrastructure level: command allow/deny lists, network egress controls, and RBAC scoped per human and per agent. Every session also gets a shareable preview URL, so internal builds go from sandbox to the rest of the team without needing production access.

Runtime works with whichever agent your team already uses: Claude Code, Codex, Cursor, Copilot, Gemini, Devin. You can trigger sandboxes from our web app, CLI, Slack, Linear, GitHub, or API.

One of our customers built an on-call inspector that wires PagerDuty, Sentry, and their repo so when an alert fires, the agent finds the cause and opens a PR with a unit test before anyone gets paged. Another runs a finance agent in a private Slack channel pulling from Stripe, NetSuite, and Snowflake to run reconciliations in minutes with source rows attached.

A fintech unicorn and several YC scaleups are live on Runtime, including a few teams who had built similar infrastructure internally and handed it to us to take over.

The core is open source at https://github.com/runtm-ai/runtm. Hosted version is live at https://app.runtm.com, free tier included. We're charging a flat platform fee plus compute, no token markup.

Check our demo: https://www.youtube.com/watch?v=wLwj__aEEh4

We'd love to hear how you're thinking about the infra for letting more people across your org use coding agents without creating chaos!

Museum of Pocket Calculating Devices

2026-05-21 @ 15:50:04Points: 50Comments: 10

We Reverse-Engineered Docker Sandbox's Undocumented MicroVM API

2026-05-21 @ 14:50:34Points: 61Comments: 8

Michael Keating has died

2026-05-21 @ 14:31:33Points: 81Comments: 36

Indexing a year of video locally on a 2021 MacBook with Gemma4-31B (50GB swap)

2026-05-21 @ 14:01:37Points: 219Comments: 73

Magic the Gathering format: Fun 40

2026-05-21 @ 13:13:36Points: 71Comments: 79

Show HN: I Dedicated 4 Years to Mastering Offline Password Cracking

2026-05-21 @ 12:56:37Points: 195Comments: 36

I am Bojta Lepenye, and first of all, I want to thank the core developers of Hashcat. In my experience, it is quite literally the most capable tool available for offline password cracking across a wide range of use cases.

I have spent the last 4 years (from age 14 to 18) extensively working with Hashcat and the tools surrounding it, and I have documented what I have learned throughout that time (since January 18, 2022) in my first book. During that period, I also had to continuously update and rewrite major sections as the field evolved. One example was the introduction of GPU support for Argon2 and other memory-hard password hashing algorithms, which significantly changed some cracking workflows.

My passion for this book, or its “quick starter,” if you will, came from an ethically conducted penetration test I performed with full authorization at my school. This is something I am both hesitant and quite proud to acknowledge.

At the beginning, I simply wrote down everything I had learned from YouTube videos and online blogs. However, not long after starting my project, I realized I practically knew nothing about password security, and that small 10 to 15 pages I had written would never be enough if someone was looking for a professional guide to cracking passwords.

The other main driving force behind the book was the fact that while researching online, browsing forums, reading academic papers and white papers, watching videos, exploring blogs, inspecting presentations, and examining infographics, I did not find a single source that comprehensively covers and explains everything one needs to understand about offline password cracking. Literally. Not one.

Therefore, I continued my research and learned about password hashing algorithms, the security properties of hash functions, advanced hash cracking techniques, password analysis, attack optimization, and much, much more.

From the very beginning, I wanted to share this knowledge with the community because having access to a resource like this would have helped me tremendously when I first started learning password cracking.

I sincerely hope this work will be useful to both beginners and experienced professionals alike, and I look forward to hearing your thoughts and feedback.

I have also put together a little video to give you a little sneak peek into it. It is on Google Drive. It is the official domain, and you do not need to download anything. Here it is: https://drive.google.com/file/d/13LeysSZO8Mx-LGKt8UQjUGBKOYH...

If you are interested, the book is now publicly available on Amazon, and can be read for free with a Kindle Unlimited subscription: https://www.amazon.com/dp/B0GX36XRCD

FatGid: FreeBSD 14.x kernel local privilege escalation

2026-05-21 @ 12:15:02Points: 79Comments: 36

Python 3.15: features that didn't make the headlines

2026-05-21 @ 11:10:11Points: 290Comments: 129

Flipper One – we need your help

2026-05-21 @ 11:03:38Points: 928Comments: 389

Lost Images from the 1945 Trinity Nuclear Test Restored

2026-05-21 @ 11:02:26Points: 244Comments: 74

We're testing new ad formats in Search and expanding our Direct Offers pilot

2026-05-21 @ 09:49:46Points: 518Comments: 436

Show HN: Rmux – A programmable terminal multiplexer with a Playwright-style SDK

2026-05-21 @ 09:22:00Points: 158Comments: 79

Two surfaces: a tmux-compatible CLI (~90 commands, your keybindings just work), and a typed async Rust SDK on the same daemon — stable pane IDs, structured snapshots, locator-style waits. The idea is Playwright-style automation, but for terminals.

Native on Linux, macOS, Windows (real ConPTY, no WSL).

Demos and docs at rmux.io. Happy to answer questions about the daemon protocol, ConPTY, or the SDK design.

Vivaldi 8.0

2026-05-21 @ 07:21:55Points: 300Comments: 215

What Is Happening to Publishing?

2026-05-19 @ 20:23:44Points: 58Comments: 49

Bournegol???

2026-05-19 @ 09:32:58Points: 24Comments: 4

Mounting Git commits as folders with NFS

2026-05-19 @ 07:32:56Points: 73Comments: 38

Was my $48K GPU server worth it?

2026-05-18 @ 19:33:03Points: 137Comments: 107

What Do Gödel's Incompleteness Theorems Mean?

2026-05-18 @ 17:59:53Points: 124Comments: 54

Archives

2026

2025

2024

2023

2022