What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

1
0
0
0
1
0
0
0
2
0
0
0
0

Claude Codeを使って既存OSSのクリーンルーム実装的なことを行った場合の、悩ましい問題色々についての記事。

Can coding agents relicense open source through a “clean room” implementation of code? simonwillison.net/2026/Mar/5/c

文末で参照されている"AI And The Ship of Theseus"(AIとテセウスの船)という考察も興味深い。

"コード生成コストがこれほどまで低下し、テストスイートだけから再実装が可能になった場合、ソフトウェアの未来はどうなるのでしょうか? "

0
0
0
2

A69 : « On fait le travail de la préfecture » : des habitants expulsent des machines de l’

Ce n’est pas une scène que l’on a l’habitude de voir dans le feuilleton de l’A69. À environ 11 h 30, vendredi 6 mars, une pelleteuse et plusieurs camions-bennes ont été escortés hors du chantier de l’A69 par une quinzaine d’habitants de Teulat, dans le Tarn, et des alentours. reporterre.net/On-fait-le-trav

Vendredi 6 mars 2026, sur une parcelle illégalement utilisée pour les travaux de l'A69.
0
0
0
0
0
1
0
0

several years ago, despite decades of use, i finally ditched vim and attempted to fully clamber aboard the emacs bandwagon

i never got good at emacs but i do enjoy using it instead of vim for typing thing into computer now

and hey guess who just caught the slopware brainworms? that's right i just learned vim is vibecoded. ha ha! pointing and laughing is better than sinking deeper into despair! lulz

thank you past me for excellent life choices in this very narrow regard, what a smart guy

0
0
0
2
0

Here's the thing about Proton Mail:

With Proton Mail, the content of your email is fully end-to-end encrypted and inaccessible to service providers IF (and only if) you are communicating with another Proton Mail account, or you have set up a PGP key exchange otherwise.

The metadata of your email, however, isn't end-to-end encrypted. It is accessible in plain text to Proton. This includes:

  • Your payment information
  • The subject line of your emails
  • Your IP address(es), which can reveal your location
  • The email addresses you have communicated with
  • The time you have sent and received emails

If Proton is legally forced to provide this information to law enforcement, they will. They have to.

If your threat model makes it that it's dangerous for you when this metadata is shared, you need to use another, more private, method of communication.

0
0
0
0

to me this says that there is still actual value in programming education. so maybe me making a course in this climate isn't such a bad idea. on the other hand, it's hard to tell if the market agrees. the siren song of not understanding anything you do is loud as ever. would anyone pay to learn?

0
0
0

conversely, if the codebase is kept in a good state (simple data flow, good constraints at boundaries), claude can make way better progress within it and introduces less incidental complexity with each change. the problem is, if you don't know what "good" looks like, you won't be able to maintain it

0
0
0
0
0
0
1
0
0

Android 相比普通 Linux 發行版就是各廠商自己變成發行版維護者,大部分都維護的跟屎一樣,沒有拿錢的 Debian 或 Arch 都維護的比較好,搞得碎片化嚴重要用虛擬化框架來執行新應用程式。一隻手機只提供七年的軟體支援還洋洋得意當賣點,要不要看看哪個發行版說自己壽命只有七年的?幸好我大部分時間都用電腦,手機消費者就是又盤又賤哪

0
0
0
3
0
0
0
0