Hacker News
24K subscribers
117K links
Top stories from https://news.ycombinator.com (with 100+ score)
Contribute to the development here: https://github.com/phil-r/hackernewsbot
Also check https://t.me/designer_news

Contacts: @philr
Download Telegram
Inheritance was invented as a performance hack (2021) (❄️ Score: 150+ in 2 days)

Link: https://readhacker.news/s/6tZUK
Comments: https://readhacker.news/c/6tZUK
Ask HN: What are good high information density UIs (screenshots, apps, sites) (🔥 Score: 161+ in 3 hours)

Link: https://readhacker.news/c/6u8W6

Just yesterday I tried to find examples of good high information density UIs... and seems to be an impossible task.
Search engines are full to the brim with vague articles repeating each other's talking points, and exception being this blog post by Matthew Ström: https://matthewstrom.com/writing/ui-density/
Image search is no better, with largely irrelevant results.
In the age when everything is spaced out and zoned out gray on gray, what are your go-to examples of UIs that pack a lot of info?
High tariffs become 'real' with our first $36K bill (🔥 Score: 179+ in 42 minutes)

Link: https://readhacker.news/s/6u9Bf
Comments: https://readhacker.news/c/6u9Bf
Reservoir Sampling (🔥 Score: 151+ in 3 hours)

Link: https://readhacker.news/s/6u9Ld
Comments: https://readhacker.news/c/6u9Ld
Show HN: Using eBPF to see through encryption without a proxy (Score: 151+ in 4 hours)

Link: https://readhacker.news/s/6u9GG
Comments: https://readhacker.news/c/6u9GG

Hi HN, I'm Tyler Flint, one of the creators of qtap.
For a while now, my team and I at Qpoint.io have been grappling with the challenge of understanding what's actually happening inside the encrypted traffic leaving our production systems. Modern apps rely heavily on third-party APIs (think payment processors, data providers, etc.), but once TLS kicks in, figuring out exactly what data is being sent, identifying PII exposure, or debugging integration issues becomes incredibly difficult without resorting to complex and often brittle solutions.
Traditional approaches like forward proxies require terminating TLS (MITM), managing certificates, and often introduce performance bottlenecks or single points of failure. Network firewalls usually operate at L3/L4 and lack payload visibility. We felt there had to be a better way.
That's why we built qtap. It's a lightweight agent that uses eBPF to tap into network traffic at the kernel level. The key idea is to hook into common TLS libraries (like OpenSSL) before encryption and after decryption. This gives us deep visibility into the actual request/response payloads of HTTPS/TLS traffic without needing to terminate the connection or manage certs. Because it leverages eBPF, the performance impact is minimal compared to traditional methods.
With qtap, we can now see exactly which external services our apps are talking to, inspect the payloads for debugging or security auditing (e.g., spotting accidental PII leaks), monitor API performance/errors for third-party dependencies, and get a much clearer picture of our egress traffic patterns.
We've found this approach really powerful for improving reliability and security posture. We've packaged qtap as a Linux Binary, Docker container, and Helm chart for deployment.
This is still evolving, but we're excited about the potential of using eBPF for this kind of deep, yet non-intrusive, visibility.
We'd love to get the HN community's feedback:
    Do you face similar challenges monitoring encrypted egress traffic?
What are your thoughts on using eBPF for this compared to other methods?
Any suggestions or potential use cases we haven't considered?

Happy to answer any questions!
Progress toward fusion energy gain as measured against the Lawson criteria (Score: 153+ in 9 hours)

Link: https://readhacker.news/s/6u9sK
Comments: https://readhacker.news/c/6u9sK