hngrok
Top Archive
Login

2026/05/13

  1. I moved my digital stack to Europe from monokai.com
    908 by monokai_nl 16h ago | | |

    Article: 21 min

    The author discusses their experience in migrating their digital infrastructure to Europe for reasons related to digital sovereignty and data control. They share the process of replacing various services with European alternatives, focusing on analytics, email, password management, compute, object storage, backups, transactional emails, error tracking, AI API integration, CDN, payments, code assistance, and version control.

    By migrating to European services, the author demonstrates a commitment to digital sovereignty and data control, potentially inspiring others in the tech industry to consider similar moves for their own infrastructure.
    • Migrated services to European alternatives for better control over data and compliance with GDPR
    • Challenges in maintaining self-hosted infrastructure, such as maintenance overhead and limitations on custom domains
    • Comparison of European providers like Proton Mail, Scaleway, and Bugsink against US-based services
    • Considerations for transactional email services, including deliverability, pricing, and feature sets
    • Switching AI API integrations to Mistral and Claude Code due to alignment with personal views on data sovereignty
    • Continued use of Cloudflare for CDN needs despite its non-European origin

    Discussion (540): 1 hr 54 min

    The discussion revolves around concerns over political instability and distrust in US companies leading to a shift towards moving data and services away from the US to Europe. Key themes include the importance of data sovereignty, the exploration of alternatives like self-hosting or using EU-based providers, and the impact of events such as Trump's administration on international business decisions. The conversation also touches on trade-offs between self-hosting and cloud services, with a focus on control over data and infrastructure.

    • Self-hosting or using EU-based providers is becoming more popular for better control over data and infrastructure.
    Counterarguments:
    • Some argue that self-hosting can be more expensive and complex than using cloud providers, suggesting a balance between cost and control is needed.
    Cloud Computing ,Digital Infrastructure
  2. Leaving GitHub for Forgejo from jorijn.com
    553 by jorijn 15h ago | | |

    Article: 33 min

    The article discusses the author's decision to leave GitHub for Forgejo, citing issues such as outages, AI integration, jurisdictional risks, and lack of control over data training. The author also details their self-hosted setup on code.jorijn.com using Forgejo v15 LTS with a focus on security measures like KVM isolation, gVisor, weekly rebuilds, and scope-bound runner tokens.

    By leaving GitHub for Forgejo, the author highlights concerns about data control and jurisdictional risks that could influence other developers' decisions regarding cloud service providers. The institutional pattern of national governments choosing open-source alternatives may also have broader implications.
    • GitHub is now a unit of Microsoft's CoreAI division, affecting its autonomy
    • Outages are attributed to AI-driven load growth
    • Copilot training data default has been flipped to opt-in for AI training by default
    • US jurisdictional risks under FISA 702 and CLOUD Act are unresolved
    • EU data residency provides comfort but not a fix for these risks
    • Forgejo was chosen over GitLab due to its full open-source nature, no open-core split, and alignment with the Dutch government's digital autonomy requirements
    Quality:
    The article provides a detailed analysis of the decision-making process and technical setup, maintaining an objective tone.

    Discussion (289): 1 hr 8 min

    The discussion revolves around concerns about centralization, privacy, security, and ethics related to AI training on open-source code hosted on platforms like GitHub. Developers are exploring decentralized alternatives such as Forgejo, Gitea, Radicle, Tangled, and Codeberg for better control over data and processes. The debate highlights the desire for a more ethical internet infrastructure that supports free software.

    • Decentralization is seen as an ideal to counteract the perceived negative aspects of centralized platforms like GitHub.
    Counterarguments:
    • Some argue that decentralization may lead to new forms of centralization or increased complexity without clear benefits.
    • Others question whether alternatives can match the convenience and features offered by centralized platforms like GitHub.
    Software Development Cloud Computing, DevOps, Security
  3. Setting up a free *.city.state.us locality domain (2025) from fredchan.org
    530 by speckx 13h ago | | |

    Article: 11 min

    This guide explains how to obtain a free *.city.state.us domain in the US by registering with a delegated registrar and acquiring nameservers from Amazon Lightsail. It includes steps for choosing a locality domain, acquiring nameservers, filling out the registration form, sending it to the registrar, and setting up DNS records.

    • US citizens or permanent residents can register
    • Domains are associated with specific locations
    • Registration requires providing personal information
    • Amazon Lightsail provides free nameservers
    • WHOIS requests do not reveal your address
    Quality:
    The article provides clear, step-by-step instructions with relevant technical details and avoids sensationalism.

    Discussion (165): 26 min

    The comment thread discusses the various uses and implications of local domain names, including their benefits for branding and organization, as well as concerns about registration procedures, compatibility issues with services, and privacy. Participants share personal experiences and insights on using different types of locality domains, such as those related to cities within states or educational institutions.

    • Local domain names are useful for various purposes
    • There is a concern about the risks and annoyances associated with using certain types of local domain names
    Counterarguments:
    • The hierarchical nature of geographical domains can be confusing and complex, but it also has its advantages in terms of branding and organization.
    Internet Domain Names
  4. Kickstarter is forced to ban adult content by payment processors from kotaku.com
    361 by stalfosknight 13h ago | | |

    Article: 4 min

    Kickstarter updates its Mature Content guidelines to prohibit certain forms of adult content, possibly due to pressure from payment processor Stripe.

    NSFW content creators may face restrictions on platforms, potentially affecting funding and visibility of adult-oriented projects.
    • Updated guidelines prohibit violent, derogatory, and sexually photo-realistic content.
    • Specific restrictions include implied sex acts, MILF/DILF content, and nudity.
    • Stripe may be influencing the change due to company ownership by Peter Thiel and Elon Musk.
    Quality:
    The article provides factual information without expressing a clear opinion.

    Discussion (257): 56 min

    The comment thread discusses various opinions on why payment processors are banning adult content, with a focus on high chargeback rates and lobbying efforts from religious groups. There is also debate around the potential for alternative payment methods like cryptocurrency to bypass these bans.

    • Religious groups, specifically evangelical Christians, are lobbying for the ban of adult content.
    Counterarguments:
    • Cryptocurrency could be an alternative to traditional payment methods for handling transactions involving adult content.
    Internet News, Technology
  5. Starship V3 from spacex.com
    312 by fprog 1d ago | | |

    Article:

    The article provides advice on how to prevent malware infections when using personal or shared networks.

    • Run an anti-virus scan on personal devices
    • Ask network administrators to check for misconfigured or infected devices

    Discussion (549): 1 hr 52 min

    The comment thread discusses SpaceX's Starship V3 launch, focusing on its potential applications in space-based data centers. Opinions vary regarding the feasibility and practicality of such infrastructure, with concerns about costs, energy usage, and environmental impact raised. Elon Musk's influence on SpaceX is acknowledged as positive by some, while others criticize his personal values and business practices. The thread also touches on the broader implications for space exploration, AI integration, and economic considerations.

    • Space-based data centers are feasible and practical
    Counterarguments:
    • Space-based data centers are not economically viable compared to terrestrial options.
    • Elon Musk's personal values and business practices may undermine his credibility.
    Cybersecurity Internet Safety, Malware Prevention
  6. Deterministic Fully-Static Whole-Binary Translation Without Heuristics from arxiv.org
    289 by matt_d 1d ago | | |

    Article: 2 min

    Elevator is a new binary translator that statically translates x86-64 executables to AArch64 without relying on heuristics, providing deterministic translations for all possible byte interpretations.

    This technology could significantly enhance the security and reliability of software deployment, especially in critical systems where runtime errors are unacceptable.
    • Elevates first binary translator without heuristics or runtime fallbacks.
    • Handles code-versus-data decoding errors statically.
    • Generates separate control flow paths for all interpretations of every byte.
    • Uses a high-level description of the source ISA to compose code tiles.
    • Produces complete, self-contained binaries with no runtime component in the trusted code base.
    • Achieves performance on par with or better than QEMU's user-mode JIT emulation.

    Discussion (65): 13 min

    The discussion revolves around a paper proposing an innovative solution for binary translation, focusing on handling code and data ambiguities. Participants acknowledge its limitations, such as not supporting self-modifying or JIT-compiled code, but also highlight potential performance benefits compared to existing solutions like QEMU's user-mode JIT emulation.

    • The paper's solution sidesteps code-versus-data determination through superset disassembly.
    Counterarguments:
    • Self-modifying code is generally considered a bad practice in modern development due to its negative impact on performance and security.
    • The system's space expansion of 50x might be a cache disaster for some applications.
    Computer Science Software Development, Computer Vision
  7. Princeton mandates proctoring for in-person exams, upending 133 year precedent from dailyprincetonian.com
    287 by bookofjoe 8h ago | | |

    Article: 15 min

    Princeton University has decided to mandate proctoring for all in-person exams starting July 1st, marking a significant change from its 1893-established honor system. The decision was made after months of deliberation due to concerns over academic integrity violations and the increasing use of AI tools by students.

    • In-person examinations at Princeton will be proctored starting July 1, reversing the honor system established in 1893.
    • The proposal was passed by the faculty with one opposing vote after months of deliberation and approval from various committees.
    • Proctors will observe but not interfere during exams, documenting any suspected Honor Code violations for the student-run Honor Committee to investigate.
    Quality:
    The article provides a balanced view of the decision and its implications, citing various sources.

    Discussion (401): 1 hr 25 min

    The discussion revolves around the prevalence of cheating at Princeton University and the potential reasons behind it. Survey data indicates a significant number of students admit to cheating or know of honor code violations that go unreported, suggesting issues with academic integrity. The conversation also touches on societal trends, such as declining trust and the role of technology in facilitating cheating.

    • Cheating is a widespread issue at Princeton, with many students admitting to cheating or knowing of honor code violations.
    • The effectiveness of the honor code system in preventing cheating has been questioned.
    Counterarguments:
    • Some argue that the high stakes of college admissions and career prospects have led students to cheat as a means to succeed.
    Education Higher Education
  8. Open Source Resistance: keep OSS alive on company time from ossresistance.com
    251 by mikemcquaid 13h ago | | |

    Article: 13 min

    The article presents the 'Open Source Resistance' manifesto advocating for treating open-source (OS) maintenance as part of regular work time in companies, without needing permission or paperwork. It argues against the current practice where OS maintainers have to request time off or donations for their work, and suggests that maintaining dependencies is already infrastructure work on the commons.

    • OS maintenance should be treated as part of regular work time.
    • No need to ask permission or paperwork for OS contributions.
    • Maintainers should not have to rely on donations or personal time for their work.
    Quality:
    The article presents a clear argument with supporting evidence and acknowledges the potential legal implications.

    Discussion (79): 21 min

    The discussion revolves around the idea of open source maintainers taking work time to contribute to projects they benefit from, with opinions on whether employers should expect such contributions. The conversation also delves into legal complexities surrounding intellectual property rights in the context of open source and employee contracts.

    • Maintainers inside companies should take work time to maintain open source projects they benefit from.
    • Employers may not allow or expect employees to contribute to open source projects during their work hours without permission.
    Counterarguments:
    • It's sad that we're at the point where everything has to be hyperbolic
    • This doesn't apply to every state. In California you have the California Labor Code Section 2870 which prohibits employers from stealing workers IP.
    • Employers just write stuff in their employement contracts. They'll write everything they possibly can, to cover asses in every possible direction.
    Open Source Software Development, Business Practices
  9. Dutch suicide prevention website shares data with tech companies without consent from nltimes.nl
    243 by giuliomagnifico 15h ago | | |

    Article: 4 min

    The Dutch suicide prevention hotline 113 was found to share visitor data with tech companies like Google and Microsoft without consent, potentially violating GDPR rules.

    , as it raises concerns about data privacy and trust in mental health services.
    • 113 Zelfmoordpreventie shared visitor data with third parties without consent.
    • Sensitive information like location, browser details, and device usage was collected.
    • Google and Microsoft received the data even if users did not give explicit consent via cookies.
    • The Dutch suicide prevention foundation likely violated GDPR by sharing medical personal data.
    • Stichting 113 temporarily suspended all measurement tools to prevent further data sharing.
    Quality:
    The article provides factual information without expressing any personal opinions.

    Discussion (183): 44 min

    The comment thread discusses concerns over the privacy implications of a suicide prevention hotline website using analytics tools like Google Analytics. Participants debate the ethics and effectiveness of such practices, with some advocating for better solutions to address suicidality without compromising user privacy.

    • The website's use of analytics tools violates privacy and ethical standards.
    • Organizations often prioritize convenience over user privacy and ethics.
    Counterarguments:
    • The suicide prevention hotline helps save lives and can be a crucial resource for individuals in crisis.
    • Some argue that the use of analytics tools is standard practice within certain industries, despite potential privacy risks.
    Health GDPR, suicide prevention, Stichting 113, ethical hacker, Hackedemia.nl, Google, Microsoft, cookies, personal data, medical data, General Data Protection Regulation
  10. The Emacsification of Software from sockpuppet.org
    234 by rdslw 21h ago | | |

    Article: 17 min

    The article discusses the author's experience with finding a suitable Markdown viewer application on macOS and their subsequent creation of MDV.app, an Emacs-inspired native application that improves reading experiences for Markdown documents.

    Embracing personal software development and AI-generated code may lead to a proliferation of custom, specialized applications that enhance user experiences but also contribute to the fragmentation of standardization in software development.
    • The author's dissatisfaction with existing Markdown viewers and the desire for a better reading experience
    • The use of AI agents to generate code for the application

    Discussion (162): 53 min

    The discussion revolves around the impact of Large Language Models (LLMs) on personal software creation and customization in computing. Users share experiences and opinions about using tools like Emacs, building custom applications, and the potential future of Markdown viewers. There is a debate on the reliability of AI-generated code and its role in replacing traditional programming practices.

    • LLMs facilitate personal software creation
    Counterarguments:
    • Generated code may lack quality control
    • There's a concern about the reliability of AI-generated software
    Software Development MacOS Applications, Text Editing, User Interface Design
More

About | FAQ | Privacy Policy | Feature Requests | Contact