The best Hacker News stories from Show from the past day
Latest posts:
Show HN: Rental data supplied by tenants in Ireland, searchable by all
I created <a href="https://www.howmuchrent.com" rel="nofollow noreferrer">https://www.howmuchrent.com</a> last Friday to help bring this kind of transparency to Ireland, allowing people to submit their rents. Would love to get any HN feedback on the idea/website.
Show HN: Loopy – share and find and music you love
Hi,<p>I created loopy, a website to share and discover music you love.<p>A former coworker answered an ice breaker question saying his superpower would be to know every language fluently since he travels a lot.<p>Mine would be to hear every song I would fall in love with.<p>I realized that I will die without hearing every song that I will fall in love with. So many of my all-time favorite songs I randomly have heard at a club, coffee shop, traveling, walking by a store, etc.<p>There is a high chance that I would have never heard those songs. Loopy aims to fix this.<p>You can post your all-time favorite songs. If someone else love this song, there is a chance you will too :).<p>Here is my profile: <a href="https://loopy.fm/kyle" rel="nofollow noreferrer">https://loopy.fm/kyle</a><p>Happy listening :)<p>- Kyle
Show HN: Loopy – share and find and music you love
Hi,<p>I created loopy, a website to share and discover music you love.<p>A former coworker answered an ice breaker question saying his superpower would be to know every language fluently since he travels a lot.<p>Mine would be to hear every song I would fall in love with.<p>I realized that I will die without hearing every song that I will fall in love with. So many of my all-time favorite songs I randomly have heard at a club, coffee shop, traveling, walking by a store, etc.<p>There is a high chance that I would have never heard those songs. Loopy aims to fix this.<p>You can post your all-time favorite songs. If someone else love this song, there is a chance you will too :).<p>Here is my profile: <a href="https://loopy.fm/kyle" rel="nofollow noreferrer">https://loopy.fm/kyle</a><p>Happy listening :)<p>- Kyle
Show HN: Loopy – share and find and music you love
Hi,<p>I created loopy, a website to share and discover music you love.<p>A former coworker answered an ice breaker question saying his superpower would be to know every language fluently since he travels a lot.<p>Mine would be to hear every song I would fall in love with.<p>I realized that I will die without hearing every song that I will fall in love with. So many of my all-time favorite songs I randomly have heard at a club, coffee shop, traveling, walking by a store, etc.<p>There is a high chance that I would have never heard those songs. Loopy aims to fix this.<p>You can post your all-time favorite songs. If someone else love this song, there is a chance you will too :).<p>Here is my profile: <a href="https://loopy.fm/kyle" rel="nofollow noreferrer">https://loopy.fm/kyle</a><p>Happy listening :)<p>- Kyle
Show HN: Firefox addon to quarantine a tab to use offline with private data
Introducing QuaranTab: Companion extension to quarantine tabs so you can safely use them offline with private data<p>I find myself wanting to use online format parsers to quickly decode that production JWT or decode a base64 Authorization header but cannot trust these websites to not leak my information. I thought to myself if only I could cut-off network access to this site, use it offline, and then throw away all browsing data. So I created an extension just for that.<p>It uses Firefox contextual identities API (Containers) to isolate browsing data and inter-tab communication. Once the site is fully loaded, I then inject bogus proxy settings for any requests leaving that container to effectively cut-off network access. And once I'm done, I simply delete the Container.<p>Use Cases:<p>* Parse a live JWT token<p>* Convert a Base64 Authorization header<p>* Hash a password<p>* Parse a Protobuf message<p>* Submit my name and birthdate to estimate my date of death<p>Check out the MIT source code on GitHub [1] and install QuaranTab from the Firefox store [2]. If anyone is interested in a discussion, I'd love to chat about:<p>1. Any ideas on how we could implement this in Chromium? Using private window as a "Container"?<p>2. Can you come up with an exploit? I posted a 100usd bug bounty [3] if you find one!<p>3. Is there any way to prove an extension in the store was built from source in GitHub? I am imagining some kind of third-party escrow service managing the Firefox store account and building from specific public git repository.<p>1. <a href="https://github.com/matusfaro/quarantab">https://github.com/matusfaro/quarantab</a><p>2. <a href="https://addons.mozilla.org/en-US/firefox/addon/quarantab/" rel="nofollow noreferrer">https://addons.mozilla.org/en-US/firefox/addon/quarantab/</a><p>3. <a href="https://github.com/matusfaro/quarantab#bug-bounty">https://github.com/matusfaro/quarantab#bug-bounty</a>
Show HN: Firefox addon to quarantine a tab to use offline with private data
Introducing QuaranTab: Companion extension to quarantine tabs so you can safely use them offline with private data<p>I find myself wanting to use online format parsers to quickly decode that production JWT or decode a base64 Authorization header but cannot trust these websites to not leak my information. I thought to myself if only I could cut-off network access to this site, use it offline, and then throw away all browsing data. So I created an extension just for that.<p>It uses Firefox contextual identities API (Containers) to isolate browsing data and inter-tab communication. Once the site is fully loaded, I then inject bogus proxy settings for any requests leaving that container to effectively cut-off network access. And once I'm done, I simply delete the Container.<p>Use Cases:<p>* Parse a live JWT token<p>* Convert a Base64 Authorization header<p>* Hash a password<p>* Parse a Protobuf message<p>* Submit my name and birthdate to estimate my date of death<p>Check out the MIT source code on GitHub [1] and install QuaranTab from the Firefox store [2]. If anyone is interested in a discussion, I'd love to chat about:<p>1. Any ideas on how we could implement this in Chromium? Using private window as a "Container"?<p>2. Can you come up with an exploit? I posted a 100usd bug bounty [3] if you find one!<p>3. Is there any way to prove an extension in the store was built from source in GitHub? I am imagining some kind of third-party escrow service managing the Firefox store account and building from specific public git repository.<p>1. <a href="https://github.com/matusfaro/quarantab">https://github.com/matusfaro/quarantab</a><p>2. <a href="https://addons.mozilla.org/en-US/firefox/addon/quarantab/" rel="nofollow noreferrer">https://addons.mozilla.org/en-US/firefox/addon/quarantab/</a><p>3. <a href="https://github.com/matusfaro/quarantab#bug-bounty">https://github.com/matusfaro/quarantab#bug-bounty</a>
Show HN: Firefox addon to quarantine a tab to use offline with private data
Introducing QuaranTab: Companion extension to quarantine tabs so you can safely use them offline with private data<p>I find myself wanting to use online format parsers to quickly decode that production JWT or decode a base64 Authorization header but cannot trust these websites to not leak my information. I thought to myself if only I could cut-off network access to this site, use it offline, and then throw away all browsing data. So I created an extension just for that.<p>It uses Firefox contextual identities API (Containers) to isolate browsing data and inter-tab communication. Once the site is fully loaded, I then inject bogus proxy settings for any requests leaving that container to effectively cut-off network access. And once I'm done, I simply delete the Container.<p>Use Cases:<p>* Parse a live JWT token<p>* Convert a Base64 Authorization header<p>* Hash a password<p>* Parse a Protobuf message<p>* Submit my name and birthdate to estimate my date of death<p>Check out the MIT source code on GitHub [1] and install QuaranTab from the Firefox store [2]. If anyone is interested in a discussion, I'd love to chat about:<p>1. Any ideas on how we could implement this in Chromium? Using private window as a "Container"?<p>2. Can you come up with an exploit? I posted a 100usd bug bounty [3] if you find one!<p>3. Is there any way to prove an extension in the store was built from source in GitHub? I am imagining some kind of third-party escrow service managing the Firefox store account and building from specific public git repository.<p>1. <a href="https://github.com/matusfaro/quarantab">https://github.com/matusfaro/quarantab</a><p>2. <a href="https://addons.mozilla.org/en-US/firefox/addon/quarantab/" rel="nofollow noreferrer">https://addons.mozilla.org/en-US/firefox/addon/quarantab/</a><p>3. <a href="https://github.com/matusfaro/quarantab#bug-bounty">https://github.com/matusfaro/quarantab#bug-bounty</a>
Develop with Cocoa for Apple devices without using Objective-C
Show HN: Ghidra Plays Mario
I've been exploring new ways of testing Ghidra processor modules. In this repo, I was able to emulate NES ROMs in Ghidra to test its 6502 specification, which resulted in finding and fixing some bugs.<p>Context: Ghidra is used for reverse engineering binary executables, complementing the usual disassembly view with function decompilation. Each supported architecture has a SLEIGH specification, which provides semantics for parsing and emulating instructions, not unlike the dispatch handlers you would find in interpreters written for console emulators.<p>Emulator devs have long had extensive test ROMs for popular consoles, but Ghidra only provides CPU emulation, so it can't run them without additional setup. What I did here is bridge the gap: by modifying a console emulator to instead delegate CPU execution to Ghidra, we can now use these same ROMs to validate Ghidra processor modules.<p>Previously [1], I went with a trace log diffing approach, where any hardware specific behaviour that affected CPU execution was also encoded in trace logs. However, it required writing hardware specific logic, and is still not complete. With the delegation approach, most of this effort is avoided, since it's easier to hook and delegate memory accesses.<p>I plan on continuing research in this space and generalizing my approaches, since it shows potencial for complementing existing test coverage provided by pcodetest. If a simple architecture like 6502 had a few bugs, who knows how many are in more complex architectures! I wasn't able to find similar attempts (outside of diffing and coverage analysis from trace logs), please let me know if I missed something, and any suggestions for improvements.<p>[1]: <a href="https://github.com/nevesnunes/ghidra-tlcs900h#emulation">https://github.com/nevesnunes/ghidra-tlcs900h#emulation</a>
Show HN: Ghidra Plays Mario
I've been exploring new ways of testing Ghidra processor modules. In this repo, I was able to emulate NES ROMs in Ghidra to test its 6502 specification, which resulted in finding and fixing some bugs.<p>Context: Ghidra is used for reverse engineering binary executables, complementing the usual disassembly view with function decompilation. Each supported architecture has a SLEIGH specification, which provides semantics for parsing and emulating instructions, not unlike the dispatch handlers you would find in interpreters written for console emulators.<p>Emulator devs have long had extensive test ROMs for popular consoles, but Ghidra only provides CPU emulation, so it can't run them without additional setup. What I did here is bridge the gap: by modifying a console emulator to instead delegate CPU execution to Ghidra, we can now use these same ROMs to validate Ghidra processor modules.<p>Previously [1], I went with a trace log diffing approach, where any hardware specific behaviour that affected CPU execution was also encoded in trace logs. However, it required writing hardware specific logic, and is still not complete. With the delegation approach, most of this effort is avoided, since it's easier to hook and delegate memory accesses.<p>I plan on continuing research in this space and generalizing my approaches, since it shows potencial for complementing existing test coverage provided by pcodetest. If a simple architecture like 6502 had a few bugs, who knows how many are in more complex architectures! I wasn't able to find similar attempts (outside of diffing and coverage analysis from trace logs), please let me know if I missed something, and any suggestions for improvements.<p>[1]: <a href="https://github.com/nevesnunes/ghidra-tlcs900h#emulation">https://github.com/nevesnunes/ghidra-tlcs900h#emulation</a>
Show HN: Ghidra Plays Mario
I've been exploring new ways of testing Ghidra processor modules. In this repo, I was able to emulate NES ROMs in Ghidra to test its 6502 specification, which resulted in finding and fixing some bugs.<p>Context: Ghidra is used for reverse engineering binary executables, complementing the usual disassembly view with function decompilation. Each supported architecture has a SLEIGH specification, which provides semantics for parsing and emulating instructions, not unlike the dispatch handlers you would find in interpreters written for console emulators.<p>Emulator devs have long had extensive test ROMs for popular consoles, but Ghidra only provides CPU emulation, so it can't run them without additional setup. What I did here is bridge the gap: by modifying a console emulator to instead delegate CPU execution to Ghidra, we can now use these same ROMs to validate Ghidra processor modules.<p>Previously [1], I went with a trace log diffing approach, where any hardware specific behaviour that affected CPU execution was also encoded in trace logs. However, it required writing hardware specific logic, and is still not complete. With the delegation approach, most of this effort is avoided, since it's easier to hook and delegate memory accesses.<p>I plan on continuing research in this space and generalizing my approaches, since it shows potencial for complementing existing test coverage provided by pcodetest. If a simple architecture like 6502 had a few bugs, who knows how many are in more complex architectures! I wasn't able to find similar attempts (outside of diffing and coverage analysis from trace logs), please let me know if I missed something, and any suggestions for improvements.<p>[1]: <a href="https://github.com/nevesnunes/ghidra-tlcs900h#emulation">https://github.com/nevesnunes/ghidra-tlcs900h#emulation</a>
Show HN: Real-Time 3D Gaussian Splatting in WebGL
Show HN: Real-Time 3D Gaussian Splatting in WebGL
Show HN: Real-Time 3D Gaussian Splatting in WebGL
Show HN: Real-Time 3D Gaussian Splatting in WebGL
Show HN: Productonboarding.com – Mobbin for SaaS product onboarding
Hey Hackernews, Eric here!<p>Wanted to share a new website we just built called productonboarding.com (Next.js and RSC). The site has screenshots and videos of product onboarding from companies like Figma, Notion, Framer, and more. It’s sort of like Mobbin for web-based product onboarding.<p>We build a lot of product onboarding at our startup Frigade, and over the last year we’ve put together an internal library of hundreds of product onboarding examples that we refer to all the time with customers. It helps them find and copy patterns that work at other companies so they don’t need to create net new experiences or A/B test their way into the best performing pattern from scratch.<p>Given it's been so useful to us, we decided to open it up to the world. We bought productonboarding.com and have started adding examples from our collection and made them browsable and sortable. We’re planning to add new examples weekly.<p>Hope this is helpful to any of you who are currently thinking through building new onboarding experiences. Would love any ideas and feedback. Thanks!
Show HN: World Engine – Build Worlds Like Brandon Sanderson
Hey HN,<p>After hours of re-watching Brandon’s creative writing BYU lectures[1], we converted his ideas into a framework to rapidly iterate and build sci-fi fantasy worlds.<p>The app is divided into 3 sections:
- World: To create a unique magic system intertwined with distinct physical and cultural phenomena
- Characters: To create character arcs and give them unique traits that evolve over time
- Plot: To weave a series of events in this world following the character arc<p>We are newbie devs, any suggestions on the app improvements and usability would be great!<p>The idea is to capture the essence of Brandon's approach. We can't help but wonder if other 'earned insights' can be converted into similar applications for different use cases outside of fiction.<p>[1] <a href="https://www.youtube.com/watch?v=0cf-qdZ7GbA&list=PLSH_xM-KC3Zv-79sVZTTj-YA6IAqh8qeQ">https://www.youtube.com/watch?v=0cf-qdZ7GbA&list=PLSH_xM-KC3...</a>
Show HN: Erlmacs – a script to update your .emacs file for Erlang development
erlmacs automatically configures and updates your .emacs file with support for the emacs mode that is included with Erlang/OTP. It frees you from having to locate the installation directory of Erlang/OTP and its bundled emacs mode.<p>It is an escript that only depends upon Erlang/OTP and Emacs.<p>Note: There is not much in the way of error checking at this moment, but it does make a backup of your .emacs files before any destructive operations.
New Bézier curves for vector graphics
Show HN: TaleBot – AI-Generated Personalized Bedtime Stories for Kids
Hello HN, I'm excited to share a project my co-founder and I have been working on - TaleBot.<p>What It Does:
TaleBot creates a personalized bedtime story based on parent/caregiver's inputs. You can customize the theme, the challenges (kid-friendly obstacles) the characters face, and even the moral lesson it teaches. Once the story is ready, you'll receive a PDF file, and an AI narrated voiceover of it.<p>Try It Out:
We've made it as barrier-free as possible for you to test. Use the promo code HNFREETALE on our story creation form, and you can get a story written for free, no sign-ups required.<p>Looking forward to your feedback. We value your thoughts and input on our product and idea.