Microservices are a tax your startup probably can't afford (🔥 Score: 157+ in 3 hours)
Link: https://readhacker.news/s/6u8YW
Comments: https://readhacker.news/c/6u8YW
Link: https://readhacker.news/s/6u8YW
Comments: https://readhacker.news/c/6u8YW
nexo blog
Microservices Are a Tax Your Startup Probably Can’t Afford
Why splitting your codebase too early can quietly destroy your team’s velocity — and what to do instead.
In a startup, your survival depends on how quickly you can iterate, ship features, and deliver value to end-users. This is where the foundational architecture…
In a startup, your survival depends on how quickly you can iterate, ship features, and deliver value to end-users. This is where the foundational architecture…
High tariffs become 'real' with our first $36K bill (🔥 Score: 179+ in 42 minutes)
Link: https://readhacker.news/s/6u9Bf
Comments: https://readhacker.news/c/6u9Bf
Link: https://readhacker.news/s/6u9Bf
Comments: https://readhacker.news/c/6u9Bf
How to harden GitHub Actions (❄️ Score: 150+ in 2 days)
Link: https://readhacker.news/s/6tZ7Q
Comments: https://readhacker.news/c/6tZ7Q
Link: https://readhacker.news/s/6tZ7Q
Comments: https://readhacker.news/c/6tZ7Q
wiz.io
Hardening GitHub Actions: Lessons from Recent Attacks | Wiz Blog
Build resilient GitHub Actions workflows with insights from real attacks, missteps to avoid, and security tips GitHub’s docs don’t fully cover.
First American pope elected and will be known as Pope Leo XIV (🔥 Score: 169+ in 1 hour)
Link: https://readhacker.news/s/6u9C2
Comments: https://readhacker.news/c/6u9C2
Link: https://readhacker.news/s/6u9C2
Comments: https://readhacker.news/c/6u9C2
CNN
Live updates: Conclave elects Cardinal Robert Prevost to be Pope | CNN
Cardinal Robert Prevost of the United States has been selected as the next pope, the first American pontiff in history. Follow here for the latest.
Void: Open-source Cursor alternative (🔥 Score: 152+ in 1 hour)
Link: https://readhacker.news/s/6u9Dg
Comments: https://readhacker.news/c/6u9Dg
https://voideditor.com/download-beta
Link: https://readhacker.news/s/6u9Dg
Comments: https://readhacker.news/c/6u9Dg
https://voideditor.com/download-beta
GitHub
GitHub - voideditor/void
Contribute to voideditor/void development by creating an account on GitHub.
How Obama’s BlackBerry got secured (2013) (❄️ Score: 150+ in 3 days)
Link: https://readhacker.news/s/6tWrL
Comments: https://readhacker.news/c/6tWrL
Link: https://readhacker.news/s/6tWrL
Comments: https://readhacker.news/c/6tWrL
www.electrospaces.net
How Obama's BlackBerry got secured
A weblog about Signals Intelligence, Communications Security and top level telecommunications equipment
Chicago native Cardinal Prevost elected pope, takes name Leo XIV (🔥 Score: 168+ in 1 hour)
Link: https://readhacker.news/s/6u9TQ
Comments: https://readhacker.news/c/6u9TQ
Link: https://readhacker.news/s/6u9TQ
Comments: https://readhacker.news/c/6u9TQ
Catholic Review
Chicago native Cardinal Prevost elected pope, takes name Leo XIV
Cardinal Robert F. Prevost, the Chicago-born prefect of the Dicastery for Bishops under Pope Francis, was elected the 267th pope May 8 and took the name Pope Leo XIV.
From: Steve Jobs. "Great idea, thank you." (🔥 Score: 171+ in 59 minutes)
Link: https://readhacker.news/s/6uadn
Comments: https://readhacker.news/c/6uadn
Link: https://readhacker.news/s/6uadn
Comments: https://readhacker.news/c/6uadn
blog.hayman.net
From: Steve Jobs. "Great idea, thank you."
The one email I ever got from Steve Jobs, and it said …
Reservoir Sampling (🔥 Score: 151+ in 3 hours)
Link: https://readhacker.news/s/6u9Ld
Comments: https://readhacker.news/c/6u9Ld
Link: https://readhacker.news/s/6u9Ld
Comments: https://readhacker.news/c/6u9Ld
Ghost students are creating problems for California colleges (Score: 150+ in 1 day)
Link: https://readhacker.news/s/6u6ia
Comments: https://readhacker.news/c/6u6ia
Link: https://readhacker.news/s/6u6ia
Comments: https://readhacker.news/c/6u6ia
SFGATE
Ghost students are creating an 'agonizing' problem for Calif. colleges
California community colleges said a technology is creating an "agonizing" problem.
Show HN: Using eBPF to see through encryption without a proxy (Score: 151+ in 4 hours)
Link: https://readhacker.news/s/6u9GG
Comments: https://readhacker.news/c/6u9GG
Hi HN, I'm Tyler Flint, one of the creators of qtap.
For a while now, my team and I at Qpoint.io have been grappling with the challenge of understanding what's actually happening inside the encrypted traffic leaving our production systems. Modern apps rely heavily on third-party APIs (think payment processors, data providers, etc.), but once TLS kicks in, figuring out exactly what data is being sent, identifying PII exposure, or debugging integration issues becomes incredibly difficult without resorting to complex and often brittle solutions.
Traditional approaches like forward proxies require terminating TLS (MITM), managing certificates, and often introduce performance bottlenecks or single points of failure. Network firewalls usually operate at L3/L4 and lack payload visibility. We felt there had to be a better way.
That's why we built qtap. It's a lightweight agent that uses eBPF to tap into network traffic at the kernel level. The key idea is to hook into common TLS libraries (like OpenSSL) before encryption and after decryption. This gives us deep visibility into the actual request/response payloads of HTTPS/TLS traffic without needing to terminate the connection or manage certs. Because it leverages eBPF, the performance impact is minimal compared to traditional methods.
With qtap, we can now see exactly which external services our apps are talking to, inspect the payloads for debugging or security auditing (e.g., spotting accidental PII leaks), monitor API performance/errors for third-party dependencies, and get a much clearer picture of our egress traffic patterns.
We've found this approach really powerful for improving reliability and security posture. We've packaged qtap as a Linux Binary, Docker container, and Helm chart for deployment.
This is still evolving, but we're excited about the potential of using eBPF for this kind of deep, yet non-intrusive, visibility.
We'd love to get the HN community's feedback:
Happy to answer any questions!
Link: https://readhacker.news/s/6u9GG
Comments: https://readhacker.news/c/6u9GG
Hi HN, I'm Tyler Flint, one of the creators of qtap.
For a while now, my team and I at Qpoint.io have been grappling with the challenge of understanding what's actually happening inside the encrypted traffic leaving our production systems. Modern apps rely heavily on third-party APIs (think payment processors, data providers, etc.), but once TLS kicks in, figuring out exactly what data is being sent, identifying PII exposure, or debugging integration issues becomes incredibly difficult without resorting to complex and often brittle solutions.
Traditional approaches like forward proxies require terminating TLS (MITM), managing certificates, and often introduce performance bottlenecks or single points of failure. Network firewalls usually operate at L3/L4 and lack payload visibility. We felt there had to be a better way.
That's why we built qtap. It's a lightweight agent that uses eBPF to tap into network traffic at the kernel level. The key idea is to hook into common TLS libraries (like OpenSSL) before encryption and after decryption. This gives us deep visibility into the actual request/response payloads of HTTPS/TLS traffic without needing to terminate the connection or manage certs. Because it leverages eBPF, the performance impact is minimal compared to traditional methods.
With qtap, we can now see exactly which external services our apps are talking to, inspect the payloads for debugging or security auditing (e.g., spotting accidental PII leaks), monitor API performance/errors for third-party dependencies, and get a much clearer picture of our egress traffic patterns.
We've found this approach really powerful for improving reliability and security posture. We've packaged qtap as a Linux Binary, Docker container, and Helm chart for deployment.
This is still evolving, but we're excited about the potential of using eBPF for this kind of deep, yet non-intrusive, visibility.
We'd love to get the HN community's feedback:
Do you face similar challenges monitoring encrypted egress traffic?
What are your thoughts on using eBPF for this compared to other methods?
Any suggestions or potential use cases we haven't considered?
Happy to answer any questions!
GitHub
GitHub - qpoint-io/qtap: Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections…
Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes. - qpoint-io/qtap
How three years at McKinsey shaped my second startup (❄️ Score: 150+ in 4 days)
Link: https://readhacker.news/s/6tUtn
Comments: https://readhacker.news/c/6tUtn
Link: https://readhacker.news/s/6tUtn
Comments: https://readhacker.news/c/6tUtn
Zac Townsend
Know Your Enemy: How Three Years at McKinsey Shaped My Second Startup
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you...
Notes on rolling out Cursor and Claude Code (Score: 150+ in 8 hours)
Link: https://readhacker.news/s/6u9D4
Comments: https://readhacker.news/c/6u9D4
Link: https://readhacker.news/s/6u9D4
Comments: https://readhacker.news/c/6u9D4
Substack
Nobody Codes Here Anymore
Notes on rolling out Cursor and Claude Code
Progress toward fusion energy gain as measured against the Lawson criteria (Score: 153+ in 9 hours)
Link: https://readhacker.news/s/6u9sK
Comments: https://readhacker.news/c/6u9sK
Link: https://readhacker.news/s/6u9sK
Comments: https://readhacker.news/c/6u9sK
When Abandoned Mines Collapse (❄️ Score: 150+ in 2 days)
Link: https://readhacker.news/s/6u3n7
Comments: https://readhacker.news/c/6u3n7
Link: https://readhacker.news/s/6u3n7
Comments: https://readhacker.news/c/6u3n7
Practical Engineering
When Abandoned Mines Collapse — Practical Engineering
[Note that this article is a transcript of the video embedded above.] In December of 2024, a huge sinkhole opened up on I-80 near Wharton, New Jersey, creating massive traffic delays as crews worked to figure out what happened and get it fixed. Since then…
LegoGPT: Generating Physically Stable and Buildable Lego (🔥 Score: 150+ in 3 hours)
Link: https://readhacker.news/s/6ubxM
Comments: https://readhacker.news/c/6ubxM
Link: https://readhacker.news/s/6ubxM
Comments: https://readhacker.news/c/6ubxM
A flat pricing subscription for Claude Code (Score: 151+ in 10 hours)
Link: https://readhacker.news/s/6uaKt
Comments: https://readhacker.news/c/6uaKt
Link: https://readhacker.news/s/6uaKt
Comments: https://readhacker.news/c/6uaKt
Starlink User Terminal Teardown (Score: 155+ in 6 hours)
Link: https://readhacker.news/s/6ubpW
Comments: https://readhacker.news/c/6ubpW
Link: https://readhacker.news/s/6ubpW
Comments: https://readhacker.news/c/6ubpW
DARKNAVY
A First Glimpse of the Starlink User Ternimal
I think the human race has no future if it doesn’t go to space. —— Stephen Hawking
Starlink is a low Earth orbit (LEO) satellite internet service provided by SpaceX. Users connect to near-Earth orbit satellites through a user terminal, which then connects…
Starlink is a low Earth orbit (LEO) satellite internet service provided by SpaceX. Users connect to near-Earth orbit satellites through a user terminal, which then connects…
A cycle-accurate IBM PC emulator in your web browser (❄️ Score: 150+ in 4 days)
Link: https://readhacker.news/s/6tUUr
Comments: https://readhacker.news/c/6tUUr
Link: https://readhacker.news/s/6tUUr
Comments: https://readhacker.news/c/6tUUr
MartyPC
MartyPC Web Edition
An IBM PC/XT emulator written in Rust - Now compiled for the web!
Doge software engineer's computer infected by info-stealing malware (🔥 Score: 150+ in 3 hours)
Link: https://readhacker.news/s/6ubKn
Comments: https://readhacker.news/c/6ubKn
Link: https://readhacker.news/s/6ubKn
Comments: https://readhacker.news/c/6ubKn
Ars Technica
DOGE software engineer’s computer infected by info-stealing malware
The presence of credentials in leaked “stealer logs” indicates his device was infected.