Published on November 24, 2025 at 15:29 CET (UTC+1)
NSA and IETF, part 3: Dodging the issues at hand (109 points by upofadown)
This article is part of a series criticizing the IETF's process for standardizing post-quantum cryptography (PQC). It accuses the NSA of exerting undue influence and the IETF of dodging critical issues, censoring dissent, and corrupting the standardization process to potentially weaken cryptographic standards. The author suggests this could enable surreptitious surveillance.
Show HN: Cynthia – Reliably play MIDI music files – MIT / Portable / Windows (14 points by blaiz2025)
Cynthia is a portable, MIT-licensed application for Windows that reliably plays MIDI music files. It supports playback from folders or ".m3u" playlists and offers features like adjustable speed, volume control, and a large, clickable progress bar for easy navigation. The tool includes 25 sample MIDIs and provides various play modes and real-time readouts for device status and data rates.
Shai-Hulud Returns: Over 300 NPM Packages Infected (377 points by mrdosija)
This article details a significant software supply chain attack dubbed "Shai-Hulud," where over 300 malicious packages were uploaded to the NPM registry. These packages were designed to steal sensitive data from developers' environments, highlighting a persistent and sophisticated threat to open-source ecosystems that leverages typo-squatting and social engineering.
I built an faster Notion in Rust (54 points by PaulHoule)
The author describes building "Outcrop," a knowledge base application in Rust, positioned as a faster and simpler alternative to Notion and Confluence. The motivation came from experiencing an effective internal system at Stripe and recognizing a market opportunity as competitors pivot or sunset products. The focus is on speed, simplicity, and team-owned spaces with integrated search.
Slicing Is All You Need: Towards a Universal One-Sided Distributed MatMul (46 points by matt_d)
This computer science paper introduces a universal, one-sided algorithm for distributed matrix multiplication. It uses a "slicing" technique based on index arithmetic to support all combinations of data partitionings (1D, 2D, etc.) and replication factors without requiring costly data redistribution. This aims to simplify and optimize a foundational operation for large-scale scientific computing and AI workloads.
Fran Sans – font inspired by San Francisco light rail displays (1004 points by ChrisArchitect)
This essay introduces "Fran Sans," a display font inspired by the unique LCD destination displays on San Francisco's Muni light rail vehicles. The author explores the typographic design, which is built on a 3x5 grid of geometric modules, giving it a mechanical yet charmingly imperfect character. The piece contextualizes the font within the eclectic visual landscape of the Bay Area's numerous transit agencies.
RuBee (279 points by Sniffnoy)
This blog post explores RuBee, an obscure wireless networking protocol used in specialized applications like detecting cell phones in secure US Department of Energy facilities. The author details the protocol's unusual characteristics, its niche market, and the history of its creator, framing it as a fascinating example of a non-mainstream, highly specialized communication technology.
Fast Lua runtime written in Rust (3 points by akagusu)
Astra is a new, high-performance Lua runtime environment written in Rust. It is designed for building fast and fault-tolerant servers, leveraging Rust's efficiency and an async, multi-threaded runtime. It can be used as a standalone binary for web servers or as a general-purpose, embeddable Lua interpreter, aiming to combine ease of use with high performance.
We stopped roadmap work for a week and fixed bugs (97 points by lalitmaganti)
The author describes their engineering org's "fixit week," where all roadmap work was paused for a week to focus on fixing small bugs and improving developer productivity. The initiative resulted in 189 fixes, fostered team engagement through a simple points and leaderboard system, and provided a satisfying break from regular feature development to address long-standing minor issues.
Disney Lost Roger Rabbit (298 points by leephillips)
This article explains how author Gary K. Wolf used "Termination of Transfer" provisions in US copyright law to reclaim the rights to "Who Censored Roger Rabbit?" from Disney. It frames this legal mechanism as a crucial tool for creators, allowing them to escape unfavorable or stagnant licensing deals and regain control over their popular works after a 35-40 year period.
Trend: Computational Foundation is Paramount.
Trend: The Security of the AI Supply Chain is Critical.
Trend: Performance is Shifting to the Systems Level.
Trend: The Intersection of AI, Policy, and Security is Intensifying.
Trend: Developer Productivity and Tooling as a Competitive Edge.
Trend: Data Provenance and IP Management Gaining Importance.
Analysis generated by deepseek-reasoner