What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0

Now that the reviews are out (I don’t have one but am considering a pink one as a pure thin client) I think the only MacBook Neo most people should get is the base config. At $600 ($500 for students), that seems fair and it makes the right trade-offs. 🧵

0

RE: w3c.social/@tag/11620586429725

We would like to congratulate @LukewLuke on being appointed by the W3C TAG as an Associate! The Associate program (tag.w3.org/associates/) was launched a little over a year ago with the goal of helping to extend the TAG's ability to review and influence work.

0
0
0
0

Very curious if others have memories of a service in the 80's called Portal. I recall using it in a few ways, one of which was UseNet and UUCP access. The host in this context was cup.portal.com (Cupertino, perhaps?) and appears in historical posts as "sun!portal!cup.portal.com!"

I'm also seeking history on "tronsbox", a host I used to relay for my Amiga-based, dial-up UUCP node: "uunet!tronsbox!alpine!"

Please relay to more relevant hashtags, too!

0
1
0
0

Legal vs. Legitimate, good article by @hongminhee洪 民憙 (Hong Minhee) :nonbinary:

> Whatever courts eventually decide about AI reimplementation, the question we need to answer first is not a legal one. It is a social one. Do those who take from the commons owe something back? I think they do. That judgment does not require a verdict

"Can the commons expect something back from those who extract value?" is a key question of Social experience design. The answer forms one of 3 core principles: The Mindfulness principle.

No. You can't expect *anything* back. That philosophical insight is crucial to organizing a healthy commons that's able to retain its value and evolve.

Paint any principles and values on a flag but as long as the battle is scattered farmers holding feeble Copyright Law pitchforks against a vast drone army, its no use. Know thy enemy helps too. It's not proprietary code or corporations. It's hypercapitalism: The Rules of Battle.

writings.hongminhee.org/2026/0

news.ycombinator.com/item?id=4

coding.social/blog/reimagine-s

0
0
0
10
0
0
0
0

PBX サービスの1つである 03plus が市外局番の電話番号の取得の為 [1] 、サーバーの設置(正確にはルーター)の協力を有償で求めています。
協力には少なくとも、下記の内容を満たす必要があります。

- いわいる光コンセントが既に設置されている
- 光コンセントがない場合工事が可能である
- ハードウェア(RTX 840 ルーター程度)を設置する物理的スペースがある
- 03plus が市外局番の取得を検討している地域である

気になる人は連絡してみてください。
03plus.net/

1 : 市外局番の電話番号を取得するには物理地域に回線が設置されている必要がある

0
0
0
0
0
0
0
0
0
0

I’ve had some questions about why a few of my Fediverse related projects are down.

Some of my Fediverse projects were developed just by me. While with others I worked with others — with friends.

Some of those friends live in cities that are having bombs dropped on them right now.

We split up our server management (including the costs). Some I managed and paid for. Some a friend did.

The ones he did are down.

0

I’ve had some questions about why a few of my Fediverse related projects are down.

Some of my Fediverse projects were developed just by me. While with others I worked with others — with friends.

Some of those friends live in cities that are having bombs dropped on them right now.

We split up our server management (including the costs). Some I managed and paid for. Some a friend did.

The ones he did are down.

0
0

독일 총리 "탈원전 잘못됐지만 되돌릴 수 없다"
베를린 김계연 특파원: 프리드리히 메르츠 독일 총리는 10일(현지시간) 독일의 탈원전 정책이 잘못됐지만 되돌릴 수 없다고 말했다.
yna.co.kr/view/AKR202603110019

0
0
0

Okay cool, we’ve been trialling a EU hoster to move away from DigitalOcean eventually, and found one that had a really nice ARM VPS offering that is now just sold out with support saying they don’t know when they will be in stock again and they don’t even know how they can be made available again at all.

I was gonna commit to possibly spending quite a bit there, but without confidence in scale-out planning, that’s not gonna happen.

Thanks for nothing “AI”-bubble 😡

0
0
0
0
0
5
0
0
0
1

RE: mastodon.social/@MastodonEngin

There is a lot happening on the project right now, especially in the lead up to 4.6. We're also now part of the Social Web Working Group at the W3C. As usual, many moving parts to coordinate. I'm always excited to see the team's progress as we pull together our monthly update for the community.

0

독일 총리 "탈원전 잘못됐지만 되돌릴 수 없다"
베를린 김계연 특파원: 프리드리히 메르츠 독일 총리는 10일(현지시간) 독일의 탈원전 정책이 잘못됐지만 되돌릴 수 없다고 말했다.
yna.co.kr/view/AKR202603110019

0
0
0

Shitpost projects, where someone takes an objectively terrible idea and puts way too much effort into executing it well, don't hit the same when we're all drowning in slop.

Did they put any effort into it? Do they realize it was a terrible idea?

Impossible to tell.

Poe's law comes for us all.

0
0
0

Random thought.

If public libraries didn't already exist, capitalism wouldn't let you invent it. Can you imagine how many billions Jeff Bezos would plough into fighting the idea, destroying any politician who dared to back it?

Support your local library.

0
24
0
0

New, by me: How AI Assistants are Moving the Security Goalposts

AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.

Read more (and boost please!):

krebsonsecurity.com/2026/03/ho

a graphic and concept called the "lethal trifecta” by Simon Willison, co-creator of the Django Web framework. The lethal trifecta holds that if your system has access to private data, exposure to untrusted content, and a way to communicate externally, then it’s vulnerable to private data being stolen.This image shows three boxes of different colors: access to data, ability to externally communicate, and exposure to untrusted content.
0
6
0
1