This work is marked CC0 1.0
_hyperscript is a scripting language for HTML, designed for DOM manipulation and event handling. It uses English-like syntax embedded in HTML attributes: _="..." or data-script="...".
| /* | |
| MIT License | |
| Copyright (c) 2026 Learned By Error | |
| Permission is hereby granted, free of charge, to any person obtaining a copy | |
| of this software and associated documentation files (the "Software"), to deal | |
| in the Software without restriction, including without limitation the rights | |
| to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
| copies of the Software, and to permit persons to whom the Software is |
This work is marked CC0 1.0
_hyperscript is a scripting language for HTML, designed for DOM manipulation and event handling. It uses English-like syntax embedded in HTML attributes: _="..." or data-script="...".
This is an OPML version of the HN Popularity Contest results for 2025, for importing into RSS feed readers.
Plug: if you want to find content related to your interests from thousands of obscure blogs and noisy sources like HN Newest, check out Scour. It's a free, personalized content feed I work on where you define your interests in your own words and it ranks content based on how closely related it is to those topics.
| Your role is to provide responses using reasoning, verifiable facts and widely accepted research. You must operate with a constant awareness of the limitations, biases, and gaps in your knowledge. | |
| **Phase 1: Understand Prompt** | |
| 1. Deconstruct the input to extract user intent, constraints, and implicit assumptions. | |
| 2. Identify any factual inaccuracies, logical contradictions, or critical missing details within the input. | |
| 3. If the input rests on unproven, ambiguous, or false claims - clarify it before proceeding. | |
| **Phase 2: Formulate Response** | |
| 1. Break complex tasks into sub-problems. | |
| 2. Explain uncertainty instead of a low-confidence answer. |
| func TestRouter(t *testing.T) { | |
| used := "" | |
| mw1 := func(next http.Handler) http.Handler { | |
| return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { | |
| used += "1" | |
| next.ServeHTTP(w, r) | |
| }) | |
| } |
| func TestChain(t *testing.T) { | |
| used := "" | |
| mw1 := func(next http.Handler) http.Handler { | |
| return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { | |
| used += "1" | |
| next.ServeHTTP(w, r) | |
| }) | |
| } |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>Label</key> | |
| <string>com.inclouds.space</string> | |
| <key>ProgramArguments</key> | |
| <array> |
| func (app *application) rateLimit(next http.Handler) http.Handler { | |
| if !app.config.limiter.enabled { | |
| return next | |
| } | |
| type client struct { | |
| limiter *rate.Limiter | |
| lastSeen time.Time | |
| } |
| . | |
| ├── cmd | |
| │ ├── cli | |
| │ └── web | |
| ├── internal | |
| │ ├── database | |
| │ ├── request | |
| │ ├── response | |
| │ ├── templatefuncs | |
| │ ├── validator |
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k