Tuesday, 21 April 2026

New top story on Hacker News: Show HN: VidStudio, a browser based video editor that doesn't upload your files

Show HN: VidStudio, a browser based video editor that doesn't upload your files
8 by kolx | 0 comments on Hacker News.
Hi HN, I built VidStudio, a privacy focused video editor that runs in the browser. I tried to keep it as frictionless as possible, so there are no accounts and no uploads. Everything is persisted on your machine. Some of the features: multi-track timeline, frame accurate seek, MP4 export, audio, video, image, and text tracks, and a WebGL backed canvas where available. It also works on mobile. Under the hood, WebCodecs handles frame decode for timeline playback and scrubbing, which is what makes seeking responsive since decode runs on the hardware decoder when the browser supports it. FFmpeg compiled to WebAssembly handles final encode, format conversion, and anything WebCodecs does not cover. Rendering goes through Pixi.js on a WebGL canvas, with a software fallback when WebGL is not available. Projects live in IndexedDB and the heavy work runs in Web Workers so the UI stays responsive during exports. Happy to answer technical questions about the tradeoffs involved in keeping the whole pipeline client-side. Any feedback welcome. Link: https://ift.tt/ApCDW4a

New top story on Hacker News: A type-safe, realtime collaborative Graph Database in a CRDT

A type-safe, realtime collaborative Graph Database in a CRDT
15 by phpnode | 2 comments on Hacker News.


Sunday, 19 April 2026

New top story on Hacker News: Archive of Byte magazine, starting with issue #1 in 1975

Archive of Byte magazine, starting with issue #1 in 1975
38 by DamnInteresting | 9 comments on Hacker News.


New top story on Hacker News: Ask HN: How did you land your first projects as a solo engineer/consultant?

Ask HN: How did you land your first projects as a solo engineer/consultant?
8 by modelcroissant | 3 comments on Hacker News.
I’ve spent roughly the last decade and some change as a software engineer, and recently decided to start a solo consultancy. I’m focused on helping SMEs sort out the messy back-office parts of the business: spreadsheet glue, brittle internal workflows, poor reporting, awkward integrations, backend/platform problems, and AI workflows that need to do real work rather than just look good in a demo. I’m not really interested in becoming a generic agency. I’d rather work with businesses that already feel operational pain and need someone technical to help untangle it properly. For those of you who’ve made this jump: * how did you get your first real project? * what kind of outreach actually worked? * did your first few clients come from network, content, cold outreach, partnerships, subcontracting, or somewhere else? Also, if anyone knows SMEs or operators dealing with this sort of mess, I’d be glad to chat. As a gesture of goodwill, I’m offering the first 5 clients 10 hours free to help get an initial project moving. You can find me over at https://crescita.cc

Saturday, 18 April 2026

New top story on Hacker News: Flock Condemns False Child Predator Allegations, Yet Calls Critics Terrorists

Flock Condemns False Child Predator Allegations, Yet Calls Critics Terrorists
31 by jhonovich | 10 comments on Hacker News.


New top story on Hacker News: State of Kdenlive

State of Kdenlive
15 by f_r_d | 3 comments on Hacker News.


New top story on Hacker News: Claude Code Opus 4.7 keeps checking on malware

Claude Code Opus 4.7 keeps checking on malware
3 by decide1000 | 0 comments on Hacker News.
So during development, at every task I start, I see a line like this: `Own bug file — not malware.` It seems that it's obsessively checking if it's working on malware production. In another situation where I was working on a parser of a HTML document with JS, it refused because it believed that I was bypassing security measurements. I believe AI has to be supportive in the work that I'm doing. When it's obsessively checking me if I am doing anything wrong or abusing the system, I have the feeling it is controlling me. I understand that we do have guardrails and I also understand that it's very important that people do not abuse this new tech for bad stuff. I pay $200 per month for a max subscription. They already know who I am. Claude knows I work in scraper tech, and it also knows that our clients are the companies we scrape. Now with Opus 4.7, I've had a situation that it refused to continue because I asked to automate the cookie creation with a Chrome extension. In a situation where someone is abusing the system, let's say create malware or hacking stuff with bad intentions. I can imagine there will be some signal system or algorithm that can form an opinion about the intentions that someone has. But now that the AI is limiting me in my work, I feel a little bit disrupted. Who the hell does this system think he is to limit me? Am I going to accept this in the future? That a system will tell me that I cannot continue because I don't have sufficient rights or beliefs that I'm doing anything wrong. I can work fine on the local AI on my Blackwell GPU. But of course, I want to use the latest tech, the latest AI and the best models available. Is this the beginning of a split? Where good people and naughty people make different choices? Am I the bad guy now? Last year I passed 40. I grew up reading, talking about Kevin Mitnick. I was a member of a local computer club. Hacking stuff as a 14-year-old kid who did not have intentions to break anything but to outsmart systems. Is that area gone now? Is the newer generation going to accept that they have to please the AI?

Friday, 17 April 2026

New top story on Hacker News: Show HN: Stage – Putting humans back in control of code review

Show HN: Stage – Putting humans back in control of code review
24 by cpan22 | 15 comments on Hacker News.
Hey HN! We're Charles and Dean, and we're building Stage: a code review tool that guides you through reading a PR step by step, instead of piecing together a giant diff. Here's a demo video: https://ift.tt/vFBrVhX . You can play around with some example PRs here: https://ift.tt/ustyfEz . Teams are moving faster than ever with AI these days, but more and more engineers are merging changes that they don't really understand. The bottleneck isn't writing code anymore, it's reviewing it. We're two engineers who got frustrated with GitHub's UI for code review. As coding agents took off, we saw our PR backlog pile up faster than we could handle. Not only that, the PRs themselves were getting larger and harder to understand, and we found ourselves spending most of our time trying to build a mental model of what a PR was actually doing. We built Stage to make reviewing a PR feel more like reading chapters of a book, not an unorganized set of paragraphs. We use it every day now, not just to review each other's code but also our own, and at this point we can't really imagine going back to the old GitHub UI. What Stage does: when a PR is opened, Stage groups the changes into small, logical "chapters". These chapters get ordered in the way that makes most sense to read. For each chapter, Stage tells you what changed and specific things to double check. Once you review all the chapters, you're done reviewing the PR. You can sign in to Stage with your GitHub account and everything is synced seamlessly (commenting, approving etc.) so it fits into the workflows you're already used to. What we're not building: a code review bot like CodeRabbit or Greptile. These tools are great for catching bugs (and we use them ourselves!) but at the end of the day humans are responsible for what gets shipped. It's clear that reviewing code hasn't scaled the same way that writing did, and they (we!) need better tooling to keep up with the onslaught of AI generated code, which is only going to grow. We've had a lot of fun building this and are excited to take it further. If you're like us and are also tired of using GitHub for reviewing PRs, we'd love for you to try it out and tell us what you think!

New top story on Hacker News: Isaac Asimov: The Last Question

Isaac Asimov: The Last Question
96 by ColinWright | 29 comments on Hacker News.


New top story on Hacker News: How Silicon Valley Is Turning Scientists into Exploited Gig Workers

How Silicon Valley Is Turning Scientists into Exploited Gig Workers
18 by ZunarJ5 | 4 comments on Hacker News.


New top story on Hacker News: How Big Tech wrote secrecy into EU law to hide data centres' environmental toll

How Big Tech wrote secrecy into EU law to hide data centres' environmental toll
13 by cyberlimerence | 0 comments on Hacker News.


Saturday, 11 April 2026

New top story on Hacker News: Artemis II is competency porn

Artemis II is competency porn
20 by jgrodziski | 35 comments on Hacker News.


New top story on Hacker News: Show HN: Pardonned.com – A searchable database of US Pardons

Show HN: Pardonned.com – A searchable database of US Pardons
12 by vidluther | 1 comments on Hacker News.
https://pardonned.com Inspired by the videos of Liz Oyer, I wanted to be able to verify her claims and just look up all the pardons more easily. Tech Stack: Playwright - to sccrape the DOJ website SQLite - local database Astro 6 - Build out a static website from the sqlite db All code is open source and available on Github.

Friday, 10 April 2026

New top story on Hacker News: FBI used iPhone notification data to retrieve deleted Signal messages

FBI used iPhone notification data to retrieve deleted Signal messages
58 by 01-_- | 17 comments on Hacker News.


New top story on Hacker News: France Launches Government Linux Desktop Plan as Windows Exit Begins

France Launches Government Linux Desktop Plan as Windows Exit Begins
220 by embedding-shape | 73 comments on Hacker News.


New top story on Hacker News: Show HN: Keeper – embedded secret store for Go (help me break it)

Show HN: Keeper – embedded secret store for Go (help me break it)
8 by babawere | 0 comments on Hacker News.
Keeper is an embeddable secret store (Argon2id, XChaCha20-Poly1305 by default). Four security levels, audit chains, crash-safe rotation. Vault is overkill for most use cases. This is for when you ge paranoid about env and need encrypted local storage that doesn't suck. No security through obscurity, hence, It's still early, so now's the best time to find weird edge cases, race conditions, memory leaks, crypto misuse, anything that breaks. The README has a full security model breakdown if you want to get adversarial.

Sunday, 5 April 2026