What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0
0

TAKE ACTION: No tech for ICE!

Today we're launching an action aimed at 🇨🇦 company Hootsuite 🦉, a registered B corp required by its certification to respect human rights... and a company actively seeking a billion dollar "social listening" contract with ICE.

If you want to tell them to tear those contracts up and permanently guarantee they will never provide their tools to ICE or DHS, take 30 seconds to speak up here!

openmedia.org/NoTech4ICE

Tell Hootsuite: No tech for ICE!
0
0
0
0
0
0

Hardware design should be SAFER!

Memory-safe software languages changed the world and allowed to us to build massively larger systems. At their heart, memory-safe languages eliminate a category of bugs that pointer-manipulating programs suffer from.

Hardware design needs its own safe programming models but instead of memory, the problem is time! Synchronous hardware design needs to deal with a clock signal which creates discrete time steps. Every hardware module needs to think about how time affects its own logic and everything it communicates with. Getting it wrong leads to all sorts of logical bugs: reading meaningless values and using resources that are unavailable.

Our work on Filament (filamentHDL.com) defined a criteria for safe hardware description languages (HDLs) and showed that you can enforce it using a type system and introduce no overheads. Safe HDLs have become an interesting area of research and this year's ASPLOS features two papers exploring different threads:

- Lilac (arxiv.org/abs/2401.02570): Builds upon Filament applies its safety guarantees to parameterized designs. A cool outcome of this work was to show that, in addition to helping with verification, safe HDLs enable the design of fundamentally new abstractions!
- Anvil (arxiv.org/abs/2503.19447): Explores how Filament's verification abstractions can be applied to a higher-level, message-passing HDL and enforce safety properties!

I'm really excited to see where this line of work goes and what we can build with it! If you're around at ASPLOS and interested in this kind of work, come say hi and go watch the talks!!

0
0
0
0
0
0

It looks like Swift 6.3 will be getting a new `anyAppleOS` platform name for use in availability annotations (experimental, for now). Eventually, this will allow:

@⁠available(anyAppleOS 26.0, *)

instead of:

@⁠available(iOS 26.0, macOS 26.0, tvOS 26.0, watchOS 26.0, visionOS 26.0, *)

github.com/swiftlang/swift/pul

0
0

“My name is Alex Vindman, and I have made the decision to run for the United States Senate in Florida.

Over two decades ago, I swore an oath to protect this country when I joined the U.S. Army.  

I honored that oath in 2019 by blowing the whistle on Donald Trump’s corrupt phone call with Ukraine, an act that led to Trump’s first impeachment and cost me my military career.”

av-4fl.com/l/ZTqa22

0
0
0
0
0
0

📡 We’re spending the week in Brussels, with @NGICommons present day by day.

:europe: Listening, sharing, and connecting around open source, public digital infrastructure, and the future of the digital commons in Europe. These spaces matter. Because collaboration, is how sustainable digital ecosystems grow.

More info here: commons.ngi.eu/2026/01/27/ngi-

@openfutureOpen Future Foundation @OpenForumEurope @martelinnovate @cnrsCNRS 🌍 @linuxfoundationThe Linux Foundation @EC_NGINext Generation Internet

Let's meet in Brussels this week: for the EU Open Source Week and at Fosdem
0
0

32 People Died in ICE Custody in 2025, as Killings Spark Outrage

“Of those who died in custody last year include Geraldo Lunas Campos, whose death in has been ruled a homicide.

Also Wael Tarabishi, who died of a rare genetic disease thirty days after his father, Wael’s primary caregiver, was detained by ICE after a routine check-in at an immigration facility in Dallas.”

people.com/deaths-ice-custody-

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1

It was interesting to read up on the AI assisted code review at lesswrong.com/posts/7aJwgbMEiK

For context: I'm personally responsible for at least 29 curl CVEs. Out of the recent 6 CVEs mentioned in the blog post I found two. This gives me some perspective, I think.

I do not utilise AI tools in my vulnerability research. I am also fiercely critical of harmful proliferation of AI. This is due to the unsustainable way it is currently pushed, and use of as marketing ploy and gimmick rather than producing measurable benefit to users. This leads to negative impacts on economy, education & learning, not to mention impacts to nature due to wasteful use of energy.

This doesn't mean I am against AI. I have written by own AI tooling (fully local RAG with support for arbitrary number of models running on local nodes, implemented in python). I found the usefulness of such tool to be limited at best. It is somewhat useful in mass analysis of large document bases, but the level of analysis is superficial at best. These AI models are after all just language models, and do not have any true understanding or intelligence.

And here is the gist of it: The current tools are not intelligent. Understanding this limitation is the key of successful deployment and utilisation of AI tools. The tools can be useful in certain tasks, but they do not replace true intelligence.

The AI tooling AISLE are developing certainly is one of the better uses of AI, and definitely surpasses all my personal dabbling around it. It is clear that the tool does find vulnerabilities. The key question is how much hallucinations and false positives it produces: If the tool generates thousands of FPs and the true findings are hidden among them this limits the value and usefulness of the tool (of course it doesn't entirely negate it, many tools produce false positives). In short: The quality of the findings is key, and poor signal-to-noise ratio is highly undesirable.

Either way, I think there is a future for AI tools and they definitely will be helpful in vulnerability research.

I personally will keep exercising my wetware for this work, however.

0
0
0
0
0
0
0
1
0
0
0
0
0
0

Just uploaded my bachelor's thesis to GitHub!

In it, I detail how I created a bootstrap chain for @nixos_orgNixOS which builds the whole system from a small hand-auditable binary seed.

Read the thesis: nzbr.github.io/nixos-full-sour
Check out the code: github.com/nzbr/nixos-full-sou
My post on the NixOS discourse: discourse.nixos.org/t/a-full-s

0
0
0
0
0
0

I'm dead against the proposed new housing development near us but the group formed in opposition to it is so full of flag-shaggers, illiterates, reactionaries and general numpties that I'm actually coming around to the idea that some new neighbours might be a good thing.

0
0
0
0
0