What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0
0
0
0
0
0
0
1

The word audio dates only to 1934. The word video dates to 1935, and was modeled on the word audio.

It makes sense that neither word existed 100 years ago, but both are so ubiquitous now that it feels weird to think that both of those concepts were invented in recent history.

0
0
0
1

Ported some in-request HTML munging from beautifulsoup (+ lxml) to selectolax (lexbor), and saved over 150ms!

Maybe beautifulsoup has had its day... Even JustHTML was about on-par with bs4 + lxml, and that's pure Python.

github.com/rushter/selectolax

0
0

God bless our brave neighbors in Minnesota.

If Anyone Can Pull Off a General Strike, It’s Minnesotans

The massive outpouring of support for Friday’s day of action against ICE builds on long-term organizing that residents of the North Star State have tended to for a long time.

newrepublic.com/article/205318

0
1
0

facebook.com/share/p/1DaRqLriV

(《おわびとおしらせ》
大雪の被害にあわれたみなさまにお見舞い申し上げます。22日付の日刊紙は、記録的大雪のため一部の地域で新聞輸送を断念しました。読者のみなさまにおわび申し上げます。22日付の紙面PDFを掲載いたします。


jcp.or.jp/akahata/』

頑張れ!赤旗

0
0
1

is getting its first formal update path since 2018. I wrote about why this matters, how this leads to some strange and funny power dynamics, and about who actually participate

connectedplaces.online/reports

0
0
1

RE: mastodon.social/@fediverserepo

It does feel like has been frozen in amber, maybe this will help. I'm hoping developers get involved or its very hard to see how things will change.

Especially the Live Online Account Portability stuff which just has from the get go.

0
1
0
0
0

While working on , I noticed something about how handles object access. When a remote server requests a followers-only post or DM with a valid HTTP Signatures (draft-cavage) from an authorized actor, Misskey still returns 404 instead of the content. It seems Misskey only checks the visibility field (public/home) without verifying the signature at all.

takes a different approach—when is enabled, it validates the HTTP Signatures and returns the content if the requesting actor has permission. I think it would be beneficial if Misskey could adopt a similar mechanism, since it would better respect the access control semantics that ActivityPub intends. Has anyone else run into this, or are there specific reasons Misskey handles it this way?

0
0

@lcamtuflcamtuf :verified: :verified: :verified: Nice, and I found your updated illustrations in the radio article too.

I find I go back and forth on the "paper" background of the illustration.[1] It is nice to have a delineation of the figure area but the fill sometimes gives me the feeling of a different paper taped inside a notebook.

[1] Here is a 'corner' on my display where the paper effect background is shown:

What appears to be a corner of a piece of paper on white background.
0

While working on , I noticed something about how handles object access. When a remote server requests a followers-only post or DM with a valid HTTP Signatures (draft-cavage) from an authorized actor, Misskey still returns 404 instead of the content. It seems Misskey only checks the visibility field (public/home) without verifying the signature at all.

takes a different approach—when is enabled, it validates the HTTP Signatures and returns the content if the requesting actor has permission. I think it would be beneficial if Misskey could adopt a similar mechanism, since it would better respect the access control semantics that ActivityPub intends. Has anyone else run into this, or are there specific reasons Misskey handles it this way?

0

While working on , I noticed something about how handles object access. When a remote server requests a followers-only post or DM with a valid HTTP Signatures (draft-cavage) from an authorized actor, Misskey still returns 404 instead of the content. It seems Misskey only checks the visibility field (public/home) without verifying the signature at all.

takes a different approach—when is enabled, it validates the HTTP Signatures and returns the content if the requesting actor has permission. I think it would be beneficial if Misskey could adopt a similar mechanism, since it would better respect the access control semantics that ActivityPub intends. Has anyone else run into this, or are there specific reasons Misskey handles it this way?

0
1
0
0

In his 2025 talk, "From Blue Screens to Orange Crabs" Mark Russinovich shared how Rust is being adopted across large, established platforms at Microsoft Azure — from security improvements to real integration challenges. Revisit this memorable moment here:
youtube.com/watch?v=uDtMuS7BExE

0
0
0

While working on , I noticed something about how handles object access. When a remote server requests a followers-only post or DM with a valid HTTP Signatures (draft-cavage) from an authorized actor, Misskey still returns 404 instead of the content. It seems Misskey only checks the visibility field (public/home) without verifying the signature at all.

takes a different approach—when is enabled, it validates the HTTP Signatures and returns the content if the requesting actor has permission. I think it would be beneficial if Misskey could adopt a similar mechanism, since it would better respect the access control semantics that ActivityPub intends. Has anyone else run into this, or are there specific reasons Misskey handles it this way?

0

julian shared the below article:

Snapshot of the load ap.space sees from AI crawlers

julian @julian@activitypub.space

<p>Can you guess when I turned Anubis back on?</p> <ul> <li>Grey line (left-hand; y-axis) tracks page views</li> <li>Blue line (right-hand; y-axis) tracks unique users</li> </ul> <p><img src="https://activitypub.space/assets/uploads/files/1769183491489-6fef34a9-80f9-4b9f-b266-212a31f486cb-image.png" alt="6fef34a9-80f9-4b9f-b266-212a31f486cb-image.png" /></p> <p>You can even see the spike in traffic that brought down the site hard enough that I got my butt in gear to tune Anubis and turn it back on.</p> <p>Based on the numbers here, there is a thirteen-fold decrease in activity (or a ~92% drop in traffic), all identified by Anubis as bots and blocked.</p>

Read more →
0
0
0

soir (tonight 🇬🇧 )

City hunter || Kiyomi Suzuki - give me your love tonight

It's gettin' late now
I'm wide awake now
A lover's moon on the rise
I'm feelin' restless
A little breathless
Will you be comin' tonight ?

youtube.com/watch?v=bm2A207GxP

0

Snapshot of the load ap.space sees from AI crawlers

julian @julian@activitypub.space

<p>Can you guess when I turned Anubis back on?</p> <ul> <li>Grey line (left-hand; y-axis) tracks page views</li> <li>Blue line (right-hand; y-axis) tracks unique users</li> </ul> <p><img src="https://activitypub.space/assets/uploads/files/1769183491489-6fef34a9-80f9-4b9f-b266-212a31f486cb-image.png" alt="6fef34a9-80f9-4b9f-b266-212a31f486cb-image.png" /></p> <p>You can even see the spike in traffic that brought down the site hard enough that I got my butt in gear to tune Anubis and turn it back on.</p> <p>Based on the numbers here, there is a thirteen-fold decrease in activity (or a ~92% drop in traffic), all identified by Anubis as bots and blocked.</p>

Read more →
0
0
0

2/

To handle public-key cryptography safely, often a user should be able to have multiple public-keys.

For example, a user might have a different public-key on each device, rather than sharing public-keys.

A user might delegate to a 3rd party — and there may be a delegated versus non-delegated public-key distinction.

Key-rotation is also often necessary for safety reasons.

Etc.

...

3/

All that requires that a Fediverse user can have multiple public-keys specified for them.

...

Although w3id.org/security/v1 seems to allow for multiple public-keys —

I wonder how much Fediverse software could actually handle multiple public-keys (rather than just one)?

(And, don't just assume one public-key?)

How mucg Fediverse software could handle public-keys changing over time?

Etc?

0

2/

To handle public-key cryptography safely, often a user should be able to have multiple public-keys.

For example, a user might have a different public-key on each device, rather than sharing public-keys.

A user might delegate to a 3rd party — and there may be a delegated versus non-delegated public-key distinction.

Key-rotation is also often necessary for safety reasons.

Etc.

...

0

1/

One way ActivityPub can be extended is — through JSON-LD namespaces.

For example, many Fediverse servers use the following JSON-LD namespace to specify cryptographic public-key(s) for the user.

w3id.org/security/v1

(This particular namespace is an HTTPS URL.)

...

But, does extant Fediverse software support cryptographic public-key(s) well?

...

0
0
0
0
0
0
0
0