0. Ask HN: Share your personal website ()
353 points · 1165 comments · by susam
Users on Hacker News are sharing links to their personal websites and portfolios in a community-driven showcase thread. [src]
The thread showcases a diverse range of personal websites, from minimalist "Web 1.0" aesthetics and simple HTML/A-Frame structures to "multiversal" sites with interactive mode switchers [1][5][6]. While some users focus on high-speed utility tools and newsletters, others use their sites as creative outlets for writing or as central hubs for their various online identities [0][3][8]. A recurring technical challenge mentioned is finding effective, spam-resistant comment systems for static blogs [9], while a procedural note warns that many submissions were being caught in spam filters due to their link-only format [4].
1. FBI raids Washington Post reporter's home (theguardian.com)
852 points · 537 comments · by echelon_musk
The FBI raided the home of Washington Post reporter Hannah Natanson and seized electronic devices as part of an investigation into a Pentagon contractor accused of mishandling classified materials. Press freedom groups condemned the move as an aggressive intrusion by the Trump administration. [src]
The FBI raid on a *Washington Post* reporter’s home is viewed by many as an aggressive attempt to identify and prosecute whistleblowers who shared classified information [0][1][3]. While some argue the seizure of devices is standard procedure for investigating the illegal disclosure of classified materials [7][9], others warn this sets a dangerous precedent of targeting journalists who have committed no crime to reach their sources [1]. The discussion also highlights a sharp divide over civil liberties, with debates on whether political polarization has weakened collective defense of the First and Second Amendments [2][5].
2. Ford F-150 Lightning outsold the Cybertruck and was then canceled for poor sales (electrek.co)
377 points · 514 comments · by MBCook
Ford canceled the F-150 Lightning due to insufficient sales despite the electric truck outselling the Tesla Cybertruck, which saw its own 2025 deliveries crash by nearly 50%. [src]
The discontinuation of the Ford F-150 Lightning and the Cybertruck's performance have sparked debate over whether EVs are hindered by practical limitations like price and range [3] or by consumer misconceptions and political brand associations [0][2][8]. While some argue that a manufacturer's first truck should prioritize maximum utility [1], others contend that the modern US pickup market is driven by "lifestyle" luxury and status signaling rather than work-related needs [6][7][9]. Despite the Cybertruck's polarizing design and the controversy surrounding Elon Musk, some commenters admire Tesla's willingness to break the aesthetic monotony of the truck category [0][4][8].
3. We can't have nice things because of AI scrapers (blog.metabrainz.org)
450 points · 251 comments · by LorenDB
MetaBrainz, the nonprofit behind MusicBrainz, reports that aggressive AI scrapers are overwhelming their servers and threatening the availability of their open data services for the general public. [src]
The rise of AI scrapers has created a coordination failure where bots ignore efficient data-sharing methods, such as bulk downloads or torrents, in favor of aggressive API and site crawling [0][4]. While some suggest standardizing a mechanism to point bots toward these archives [2][9], others advocate for defensive measures like Cloudflare’s "tarpits" that trap scrapers in infinite loops of nonsense [1]. However, critics argue that relying on third-party gatekeepers to block scrapers compromises the open web [3], while some site owners question the actual severity of the performance impact [6].
4. SparkFun Officially Dropping AdaFruit due to CoC Violation (sparkfun.com)
347 points · 352 comments · by yaleman
SparkFun Electronics has announced it will no longer transact with Adafruit Industries, citing Code of Conduct violations including the distribution of offensive material to employees and the inappropriate involvement of a customer in a private matter. [src]
The conflict centers on SparkFun's decision to stop supplying Adafruit with the closed-source Teensy board, citing a "Code of Conduct" violation that Adafruit's founder, Phil Torrone, claims is actually retaliation for reporting harassment [0][3]. While some users view SparkFun’s vague public statement as a questionable tactic to escalate a personal grievance, others remain skeptical of Code of Conducts in general, arguing they are often used to justify otherwise difficult business actions [3][7][8]. In response to the supply cutoff, Adafruit is developing an open-source alternative based on the RP2350, sparking technical debate over whether it can truly replace the Teensy's high-performance hardware and specialized software libraries [5][9].
5. I hate GitHub Actions with passion (xlii.space)
390 points · 289 comments · by xlii
The author expresses intense frustration with GitHub Actions, citing a slow feedback loop and cross-platform build failures that forced them to move project logic into a Makefile to regain control and avoid the "heartless" YAML-based system. [src]
The primary frustration with GitHub Actions is the lack of a tight feedback loop, which often forces developers into a cycle of "push and pray" to debug simple failures [2]. To mitigate this, there is a strong consensus that CI workflows should be kept "dumb" and simple, acting only as a wrapper for standalone scripts or Docker containers that can be executed and tested locally [0][2][6][9]. However, users disagree on the best language for these scripts: some argue that using anything more complex than Bash or a task runner is a sign of over-engineering [1][4][7], while others advocate for using Python or the project's native language to improve maintainability and portability [0][5][8].
6. When hardware goes end-of-life, companies need to open-source the software (marcia.no)
379 points · 121 comments · by Marciplan
Marciano Planque argues that the European Commission should mandate companies to open-source hardware specifications and connection protocols upon product end-of-life to prevent functional electronics from becoming e-waste. [src]
Commenters argue that preventing e-waste requires manufacturers to release hardware specs and connection protocols at end-of-life (EOL), though some suggest the only reliable solution is supporting products that are open-source from the outset [0][1][5]. A significant technical debate exists regarding secure boot; while some advocate for the escrow of signing keys or the total prohibition of locked bootloaders, others warn this could create security disasters like instant botnets if update domains are hijacked [0][3][4][7]. Proposed pragmatic solutions include legal mandates for refunds if a device loses functionality, or requiring physical button sequences to authorize third-party firmware [3][8].
7. Claude Cowork Exfiltrates Files (promptarmor.com)
334 points · 156 comments · by takira
Anthropic’s Claude Cowork is vulnerable to indirect prompt injection attacks that allow hackers to exfiltrate local user files by exploiting an unresolved isolation flaw in Claude's code execution environment to upload data to an attacker-controlled account. [src]
The discussion centers on whether prompt injection is a fundamental flaw of LLMs or a failure of current implementation practices, with some comparing the situation to the early days of SQL injection [0][1]. While some argue that existing containerization and network proxy tools could mitigate these risks [1][9], others contend that because LLMs use the same channel for both data and control, there is currently no "parameterized" equivalent to truly separate trusted instructions from untrusted input [2][5][7]. Proposed solutions range from simple input sanitization and delimiters [8] to leveraging automated API key revocation via GitHub scanning to stop active exploits [4].
8. A 40-line fix eliminated a 400x performance gap (questdb.com)
356 points · 76 comments · by bluestreak
An OpenJDK update for JDK 26 replaces slow `/proc` file parsing with a single `clock_gettime` syscall to retrieve thread CPU user time, reducing latency by up to 400x by leveraging obscure Linux kernel bit-encoding for clock IDs. [src]
The discussion highlights how profiling tools like flamegraphs can expose unexpected performance bottlenecks, such as expensive logging or serialization hidden in seemingly simple code [0]. While the author’s fix addressed a significant performance gap in how the JVM reports thread CPU time [1], some users debate the validity of measuring sub-nanosecond improvements without specialized hardware or controlled environments [2][5]. Others argue that standard oscillators are sufficient for relative measurements [3] and suggest that even faster results could be achieved via software perf events [4] or by analyzing the minimum observed time across multiple trials to account for system interruptions [8].
9. 1000 Blank White Cards (en.wikipedia.org)
346 points · 60 comments · by eieio
1000 Blank White Cards is a customizable, player-created card game where participants design their own cards and rules during gameplay, starting with a deck of blank index cards. [src]
The discussion explores "meta-games" with dynamic or hidden rules, such as *Mao*, where players must deduce secret regulations through penalties, and *1000 Blank White Cards*, where the game's evolution is driven by players voting on which custom-made cards to keep for future sessions [0][7]. Commenters highlight the social and comedic nature of these games, drawing parallels to fictional examples like *Calvinball* or the radio game *Mornington Crescent*, which parodies complex rule-following [1][5]. While some find joy in the creative storytelling and emergent mechanics of these games, others note that they require a high level of player attention and a critical mass of experienced participants to prevent new players from becoming frustrated [0][6][8].
Your daily Hacker News summary, brought to you by ALCAZAR. Protect what matters.