Hackernews Daily

The Podcast Collective

Google open sources Zero-Knowledge Proof libraries to boost privacy-first digital ID solutions

7/4/2025

Tmux ported from C to Rust by manual translation

Collin Richards spent six months rewriting the entire ~67,000 lines of tmux code from C into Rust, achieving 100% Rust (though still unsafe) code. He initially used C2Rust transpilation but found its output verbose and unmaintainable, leading to hand-porting each function to idiomatic Rust.
Integration with the legacy autotools build system involved careful static linking and FFI management. Challenges included translating C constructs like goto into Rust’s labeled loops, and working around classic foreign function interface bugs such as missing prototypes and struct layout mismatches.
Data structures, including intrusively linked red-black trees, were reimplemented with Rust traits and generics. The yacc-based config parser was replaced with the Rust parser generator lalrpop. Vim macros helped automate repetitive code transformations.
The code remains partially unsafe with occasional segfaults, but future goals include migrating to fully safe Rust. The project exemplifies manual legacy code modernization, revealing tooling limits and deep insights into tmux internals.

Discovery of 3I/ATLAS, third interstellar visitor to Solar System

Astronomers identified 3I/ATLAS as the third known interstellar object passing through the Solar System, detected early by the ATLAS telescope in Chile on July 1, 2025. Traveling at ~60 km/s—faster than previous objects like 'Oumuamua and 2I/Borisov—its trajectory shows minimal solar gravity deflection, confirming an extrasolar origin.
3I/ATLAS will reach perihelion near the Sun in late October 2025, closer to Mars than Earth, complicating ground-based observation at peak brightness. Its size estimates range from a few hundred meters up to about a kilometer, with dust/gas outbursts currently affecting brightness measurements.
The Vera C. Rubin Observatory’s enhanced sensitivity has already discovered thousands of new asteroids, making the detection of multiple interstellar objects annually a likely near-future scenario. This event highlights technological advances opening new frontiers in interstellar object observation.

The Peasant Railgun: a notorious D&D 5e exploit examined

The “Peasant Railgun” exploit imagines lining up 2,280 peasants in contiguous 5-foot squares to pass a wooden pole at increasing speed, theoretically accelerating it to over 1,100 mph and dealing 300d6 damage per round using RAW D&D 5e mechanics. It leverages the Ready action, fall damage, and six-second rounds but ignores real-world physics and player survivability.
The tactic exposes tensions between RAW and RAI interpretations, creative player problem-solving, and game balance considerations. Most Dungeon Masters would disallow it due to implausibility and game disruption, though it remains a popular meme and creative thought experiment. The exploit serves as both a humorous curiosity and a prompt for discussion on rule limits and adjudication.

Netflix deploys AV1 Film Grain Synthesis to optimize streaming

Netflix has globally rolled out AV1 Film Grain Synthesis (FGS), separating film grain from core video by denoising and compressing the clean image, then synthesizing grain during playback via an auto-regressive model and brightness-adaptive scaling. This reduces bitrate by ~66% while preserving visual fidelity and authentic grain textures.
Internal testing shows average bitrate savings of 36% for 1080p+ streams, improved playback stability, reduced buffering, and increased 4K viewing. Viewer feedback reveals debates over the perceptual authenticity of synthetic grain versus organic noise, emphasizing the necessity of side-by-side video comparisons over still images for assessment.
This marks a significant step in video codec innovation, balancing artistic film aesthetics with streaming efficiency at scale.

Google open sources Zero-Knowledge Proof libraries for privacy

Google released open source Zero-Knowledge Proof (ZKP) libraries aimed at facilitating privacy-preserving digital identity and age verification solutions. ZKP enables proving attribute truths (e.g., age over 18) without revealing extraneous personal data, enhancing user privacy and security.
This initiative supports EU regulations like eIDAS and the European Digital Identity Wallet by providing performant, reusable cryptographic building blocks to developers, businesses, and governments. It aligns with privacy-by-design principles and fosters innovation through open source collaboration.
Google’s release invites community engagement to accelerate adoption of privacy-enhancing technologies and reshape digital trust frameworks.


Introducing tmux-rs

The central achievement detailed is the author’s successful port of the entire tmux terminal multiplexer—about 67,000 lines of C code—to a fully compiling, though currently unsafe, Rust codebase. This extensive manual rewrite, prompted by limitations in automatic transpilation, highlights both the feasibility and intricacies of migrating complex, performance-critical systems software from legacy C to Rust. The author’s approach balances direct translation with idiomatic adaptation, and frames the result as a technical exploration rather than a replacement for the original.

A key secondary insight is the multifaceted nature of the migration process, particularly the translation of C constructs like raw pointers, goto, and intrusive data structures into Rust’s paradigms. The build system was carefully reworked to integrate Rust within tmux’s traditional autotools framework, and the config file parser was reimplemented using Rust’s lalrpop crate. This journey uncovered subtle but instructive bugs involving foreign function interfaces and memory layouts—reinforcing the caution needed at such low-level boundaries, where mistakes can be elusive and critical.

Hacker News commenters underscore the effort’s significance for both toolchain evolution and the systems programming community. They highlight the project as an informative signpost on the limits of current C-to-Rust automation, emphasizing that hand-tuned migrations yield more maintainable and trustworthy code than auto-generated output. Discussions also reflect on broader questions: the value of such hobby ports, the nuances of unsafe Rust, and the practical realities of cross-language modernization. The author’s use of classic developer tools, like Vim macros, and honest appraisal of AI coding assistance resonated with readers, offering an authentic look at the craft of software modernization.

Astronomers discover 3I/ATLAS – Third interstellar object to visit Solar System

Astronomers have identified 3I/ATLAS as only the third confirmed interstellar object to enter our Solar System, notable for its extraordinary speed—about 60 km per second—surpassing predecessors like ‘Oumuamua and 2I/Borisov. Discovered early on July 1st by the ATLAS telescope in Chile, 3I/ATLAS is traveling on a hyperbolic trajectory that barely bends under the Sun’s gravity, confirming its origin outside the Solar System. Its rapid approach provides an unprecedented opportunity for extended observation and analysis before it exits the Solar System in early 2026.

Having months to study 3I/ATLAS is significant because the object’s properties, such as its potentially cometary nature and estimated size of a few hundred meters to a kilometer or more, remain challenging to confirm. Its early detection allows astronomers to coordinate observations, even though its closest approach—perihelion—will be nearer to Mars than Earth, and thus less visible from terrestrial observatories at its brightest. The event marks a milestone for new facilities like the Vera C. Rubin Observatory, which demonstrated its capability by discovering thousands of asteroids within hours of operation and is expected to find more interstellar objects in the near future.

Hacker News commenters emphasized the technical triumphs of the discovery, expressing excitement over the detection's timing and the role of improved survey technology. Many highlighted the rarity of such finds and debated the implications for our understanding of the space between stars, reflecting on how new instruments like the Rubin Observatory will accelerate the pace of discovery. There was a sense of anticipation for potential new insights about the composition and origins of interstellar visitors, and lighthearted discussion about how Mars, not Earth, has the best view of this cosmic outsider.

Peasant Railgun

The “Peasant Railgun” stands as a notorious and humorous exploit of Dungeons & Dragons 5th Edition’s rules, proposing that a large chain of peasants can pass a wooden pole down a line at implausible speed, delivering 300d6 damage in a single round by leveraging the mechanics of the Ready action and combat timing. This meme-worthy concept ingeniously applies “rules as written” (RAW), spotlighting the potential disconnects between rigid game systems and real-world plausibility. The thought experiment underscores the creative lengths to which players might go when interpreting tabletop mechanics to the letter.

While the exploit theoretically works within the written rules, the article emphasizes that its impracticality in physical terms—from the endurance required of thousands of peasants to the disregard for momentum and bodily harm—renders it nonviable outside imaginative discourse. The notion functions less as a viable combat tactic and more as a playful challenge to the boundaries of the rule set, exemplifying tension between RAW and “rules as intended” (RAI). The author notes that most Dungeon Masters are likely to disallow such tactics for reasons of balance and realism, though the exploit could fuel a comedic one-shot adventure or narrative twist.

The Hacker News community responded with a mix of amusement and technical scrutiny, with some lauding the exploit’s creative logical extremism while others dissected its mechanical underpinnings and physical impossibility. Commenters debated the latitude for player ingenuity versus DM discretion, sharing jokes about using peasants as artillery and reflecting on the broader clash between fun gameplay and narrative coherence. The consensus supports treating the Peasant Railgun as a clever joke, best enjoyed as a meme or lighthearted side quest rather than a legitimate strategy for everyday play.

AV1@Scale: Film Grain Synthesis, The Awakening

Netflix’s recent global rollout of AV1 Film Grain Synthesis (FGS) represents a significant shift in video streaming technology, tackling the persistent challenge of preserving authentic film texture without inflating bandwidth requirements. The central innovation lies in separating the complex, noisy film grain from core video content, denoising during encoding, then reconstructing and reintegrating the grain in real time via an autoregressive model at playback. This permits high visual fidelity while achieving striking reductions in bitrate, maintaining the depth and nostalgia valued in classic cinema.

Technically, the FGS approach leverages AV1’s advanced grain modeling, applying a piecewise linear scaling to faithfully tune grain intensity across luminance and chroma, ensuring grain appears organic and context-appropriate rather than as generic noise. Netflix’s deployment, spanning hundreds of titles, demonstrates an average 36% bitrate savings for 1080p and higher streams and reduces buffering and playback errors, with viewers gravitating toward higher-resolution offerings on FGS-enabled content. The technology effectively masks otherwise visible compression artifacts, producing a smoother, more cinematic experience even on constrained connections.

Hacker News commenters reflect a split perspective: many highlight that film grain functions as “detail too,” not mere visual noise, masking flaws and enhancing realism, while others remain skeptical of algorithmically synthesized grain, often citing a lack of authenticity or temporal coherence compared to natural emulsion-based grain. There’s consensus that true assessment of FGS demands live video comparisons, not still frames, and debate continues over perceptual quality versus objective technical gains. Despite differing views, consensus emerges that Netflix’s scale and technical achievement set a new industry bar, blending bandwidth efficiency and artistic fidelity in a way that provokes both admiration and continued scrutiny.

Opening up ‘Zero-Knowledge Proof’ technology

Google has open sourced its Zero-Knowledge Proof (ZKP) libraries, delivering privacy-enhancing cryptography tools for verifying digital attributes—such as age or identity—without exposing underlying personal data. This represents a major step toward privacy-centric digital identity, aligning with evolving EU regulations focused on strong authentication and minimal data disclosure, such as the forthcoming European Digital Identity Wallet. The availability of ZKP libraries is set to facilitate compliance and innovation in sectors where secure, privacy-respecting identification is critical.

The released libraries are designed to be efficient and production-ready, enabling developers, businesses, and governments to adopt ZKP in real-world applications. By supporting both technical and regulatory requirements, the initiative aims to empower a broad audience—including researchers seeking robust, open implementations and organizations needing reliable privacy architectures. Google’s approach exemplifies “privacy by design,” shifting verification away from excessive data collection and toward minimal, verifiable proofs, and invites the community to contribute to and extend the codebase on GitHub.

Hacker News community reactions highlight both enthusiasm and skepticism: many praise the move as a substantial advance for user privacy and digital trust, while others question whether such open sourcing by a tech giant is entirely altruistic. The technical discussion frequently centers on the utility of ZKPs for compliance with regulations like eIDAS and the broader shift toward selective data disclosure. Some comments introduce humor around the “knowing nothing, proving everything” paradox at the heart of ZKP, and developers note the practical value of immediate, open access to these cryptographic tools for building next-generation privacy-preserving applications.