What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0

Hello, Fediverse 👋

I'm Sophie. I run a digital ops consultancy from the south of France, working with purpose-led businesses.

I'm in the process of leaving Instagram, Facebook and LinkedIn. I got tired of building on platforms that sell our data, gut safety systems to please politicians, and treat people as products.

Still figuring it all out. Would love to connect.

Illustration in warm sand, ochre and teal tones. A woman stands at the water's edge, looking out towards rolling hills and winding paths ahead. Textured, painterly style.
0
37
0
0
0
0
9
1
0
9
1
0
26
0
0
0
8
0
0
0
0
5
0
0
0
2
0
0
0
0

The CEO of Persona responded to this post, saying they wanted to clarify about the identity verification process. They said:

"The only subprocessors (8) used are: AWS, Confluent, DBT, ElasticSearch, GCP, MongoDB, Sigma Computing, and Snowflake

All biometric personal data is deleted immediately after processing.

All other personal data processed is automatically deleted within 30 days. Data is retained during this period to help users troubleshoot.

No personal data processed is used for AI/model training. Data is explicitly used to confirm your identity.

The subprocessors used do NOT include Anthropic, Groqcloud, or OpenAI. The referenced subprocessor list is the superset of subprocessors used across all customers which is unfortunately misleading - we are updating our documentation to make this clearer going forward (thank you for helping us realize this). Our customers select which products are used which determines which subprocessors are used."

@briankrebs and if you believe this from a company where the executives hide from the public, explicitly authoritarian goals of irreversibly identifying everyone online, and direct ties to outspoken Nazis and fascists through funding?

Then all you need to do is pay the $5000 processing fee in Visa gift cards, and I can transfer you $500M USD from the Euorpean lottery tomorrow.

0
0

RE: mastodon.social/@grrlscientist

this is the kind of meme that pisses me off for it’s lack of one huge piece of evidence: DAT

today's is about the historic FEBRUARY 12 2026 in :
peoplesdispatch.org/2026/02/20

❝ 300 million workers just shut down India.

The largest strike in human history, and most of the Western media barely whispered it. That silence is complicity in Modi’s war on workers’ rights.

India’s general strike is the future that the billionaires and ruling class fears most ❞ 🧵…

0
0

It’s all well and good to be worried about centralized social media when it’s owned by fascists and there are troops on the streets and peaceful protesters are being kidnapped and killed and we’re about to strike Iran, but next time, can we listen to the people sounding the alarm a little earlier?

0
4
0
0
1
0
1
0
0
0
0
0
8
0

Seriously, I don't think most Americans have put together that natalism, "naturalism," anti-science, anti-medicine, anti-vax, pedophilia, misogyny, queerphobia, eugenics, racism, anti-immigrant xenophobia, anti-woke, anti-DEI, and disempowering labor through automation and "AI" are all interlocking parts of modern fascist ideology.

0
8
0

universities in the 1980s: writing the majority of internet standard RFCs and their implementations

universities now: moving away from Microsoft cloud is really hard okay? 🥺

0
19
1
0
0
0
2
0
0
0
0
0
0
0
0
0
13
0
0

다들 초등학교 이야기를 좋아하시는군요 저는 이 이야기를 좋아합니다... 옛날 묘지를 밀고 지은 학교가 많아서 학교 괴담이 많다지만 실제로는 아이들의 양기에 귀신들이 나올 수가 없다는 와귀신이다 진짜 귀신이에여 왜 죽었어요 몇살이에여 이름 뭐에여 근데요 왜요 어디 살아요 그 옷 뭐애여 왜 얼굴이 허얘요 우리 엄마는 나는 어쩌고 질문 백 만 개

0

Brazil’s data protection authority (ANPD) became autonomous in 2022 and was further strengthened in 2025 as a full regulatory agency.

This signals growing enforcement maturity under LGPD, clearer regulatory authority, and long-term governance stability.

For companies operating in Brazil, privacy compliance is shifting from emerging requirement to strategic expectation.

0

@Em0nM4stodonEm :official_verified: Remember these cowards for years told you that it was too costly & complex to follow laws to keep you safe.

Tech bros when the law protects consumers: "It's too hard, there's nothing we can do"

Tech bros when the law wants them to narc to fascists: "We must comply right away, so tomorrow we're globally rolling out our new Buttverify system, our new ai agent that crawls up your anus and takes a picture to send to your country's Customs agency."

0

We should see this as a rule: if your company needs to do things that were illegal before the Reagan administration to make the books work, then what you actually make is financial chicanery and your company is totally unsustainable.

cosocial.ca/@mhoye/11610929958

0
0
0

I'm reclaiming "hypothesis to theory" to convey my confidence instead of "theory to law".

"Law" has a lot of weight to the term that we simply don't get in life, even for well tested phenomenons that have a lot of "facts" behind them.

Most "facts" are proffered as solid and fixed—when most of them have a bit of squish to them.

The world and our observations of them are very likely, probably what we think they are. But we might be wrong.

Theory conveys that better than law.

0
0
0
0
0
사용 빈도가 높은 쪽으로 새로 설계를 했습니다. 그런데.... 어차피 돈이 없어서 상상속의 장비입니다. 네, 상상속의 장비를 이렇게 성실하게 그림으로 그렸어요.
使用頻度が高い方に新たに設計しました。ところが…どうせお金がないので想像上の装備です。ええ、想像上の装備をこんなに真面目に絵に描きました。​:meow_uwucry:
0
0

Street Art Utopia shared the below article:

When Trees Become Art (14 Photos)

STREET ART UTOPIA @streetartutopia@streetartutopia.com

We often think of art as something that hangs on a gallery wall or gets painted on a concrete building. But what happens when artists use the deep roots, towering trunks, and living leaves of the forest as their medium? From monumental wooden sculptures in Mexico to carved tree trunks in Ghana, here are 14 incredible examples of nature and human creativity joining forces. 🌿 1. Come Into Light — Daniel Popper in Tulum, Mexico 🇲🇽 A monumental wooden figure with intricate carved […]

Read more →
0

@evanEvan Prodromou @steveSteve Bate

Another issue: Unclear protocol layers.

> I am not a fan of the idea that is a message-passing system; it's a read-write API.

I'm not sure what a "read-write API" is, really. It 's a fuzzy term, whereas message based systems have well-defined architecture patterns and a body of IT knowledge and practice to apply them in robust communication systems. A 'Message API' has a generic, consistent interface.

The overarching goal of AS/AP should be empowerment of the Solution developer so they can directly focus on building use cases for their application or business domain. They should not have to think about any of the intrinsics of the protocol, like particular GETs and POSTs used to model protocol capabilities in the HTTP transport layer.

Solution design then involves:

0. Model the domain
1. Data modeling, msg formats + validation
2. Define actor msg exchange patterns
3. Document design
--
4. Improve these steps. Add native protocol + tool support over time.

0