Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Hackers Podcasts
Since 2015
…
continue reading
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
…
continue reading
Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
A podcast that recaps some of the top posts on Hacker News every day. This is a third-party project, independent from HN and YC. Text and audio generated using AI, by Wondercraft.ai. Create your own news rundown podcast at app.wondercraft.ai
…
continue reading
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
CNBC's longest-running primetime original series, "American Greed" takes you inside the amazing real-life stories of how some people will do anything for money. The award-winning series is narrated by legendary actor Stacy Keach.
…
continue reading
Join Richie Firth and Chris Skinner as they dive headfirst into the art of decision-making—whether it’s rating the latest TV shows, dissecting bizarre life choices, or tackling the dilemmas their listeners throw their way. No topic is too big, too small, or too ridiculous. Armed with personal experiences, the news of the week, and an inbox full of questionable queries, Richie and Chris promise to leave you ever-so-slightly wiser… or at least Mildly Informed Help the show to continue to rewri ...
…
continue reading
Never leave money on the table. This is your shortcut to upgrading your life, money and travel—all while spending less and saving more. Get tactical moves and deep dives into designing a life you’re excited about. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life and looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk are here to deliver smart strategies you can plug ...
…
continue reading
They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they’re accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be next? And where is the money going? Latest season: Evil Corp. The Russian Evil Corp is accused of being a family crime gang, responsible for stealing ...
…
continue reading
Arvid Kahl talks about starting and bootstrapping businesses, how to build an audience, and how to build in public.
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @[email protected]
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
…
continue reading
Hacker-G Real Life Stories.
…
continue reading
Igalia’s Brian Kardell and Eric Meyer chat about the Web, open standards, open source, healthy software ecosystems, the latest in browser features, and more.
…
continue reading
Your one-stop shop for all Changelog podcasts. Weekly shows about software development, developer culture, open source, building startups, artificial intelligence, shipping code to production, and the people involved. Yes, we focus on the people. Everything else is an implementation detail.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A weekly podcast about the electronics industry. Occasional guests. Lots of laughs.
…
continue reading
Meet Alice – a burnt-out barista who turns to the Dark Web to pay off her student debt. But when cybercrime pulls her deeper than she could have ever imagined, only one question remains: can Alice get out before it’s too late? The Hacker Chronicles Season 2: Digital Nomad. Presented by Tenable. Starring Michael C. Hall as John Doe. And Chloe Taylor as Alice.
…
continue reading
The story of the world's most secret agents...the backups. For the first time in his career, Special Agent Chet Phillips has discovered that he can choose NOT to accept a mission! That means there's no choice but to send in the "B Team": A nervous pencil pusher promoted to the field, a computer hacker working off her sentence, a fading former sitcom star and a recently reassigned White House intern. A full cast comedy audio adventure with a new episode debuting each month!
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Hacked
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Join hosts Chris Hacker and Aaron Knowles as they unlock the gates to The Oblivion Bar Podcast. Dive deep into the realms of comic books, TV, film, anime, and gaming with heated debates, exclusive comic book creator interviews, and a passionate week-in-review that'll teleport you directly into the heart of nerd nirvana. New episodes every Monday. Available on Spotify, Apple Podcasts, YouTube, or wherever you listen to your favorite podcasts. Get ready for an immersive journey into the multiv ...
…
continue reading
Cutting through the complexity of health insurance benefits for employees.
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
DJ, musical producer still 1999, also known as Hacker aka Evgeny Khramkov. Contact me: [email protected] Instagram: https://www.instagram.com/asomproducer
…
continue reading
Future Hacker is an invitation to embark on a journey into the future exploring new paths, new discoveries, new thoughts, and debates that should become reality in 10, 20 and 30 years. Renowned national and international professionals will discuss topics such as Singularity, Immersive Experiences, Artificial Intelligence, Clean Energy, Circular Economy, Genomic Medicine, the Future of Education, Silicon Humanism, Crypto Economy, and several related topics.
…
continue reading
A daily short podcast covering the highlights of Hacker News. You can support the podcast on https://www.patreon.com/orschiro
…
continue reading
Hacker Slacker is a tech news podcast by two college students, Jacob Peddicord and Andre Garivay. We talk about news, productivity, and interview interesting people.
…
continue reading
Hacker History: Explore where it all began, interviews with retro hackers, the pioneers and forefathers of yesteryear. The true old school hackers amongst our societies have an unquenchable thirst for knowledge. We will dive into fascinating stories that made hacker history.
…
continue reading
What are hackers? Cover art photo provided by Andrew Ridley on Unsplash: https://unsplash.com/@aridley88
…
continue reading
1
4 Personality Double Binds: Trapped, Exposed, Invalidated, or Out of Control | Podcast 621
1:11:24
1:11:24
Play later
Play later
Lists
Like
Liked
1:11:24Explore Your Personality: https://PersonalityHacker.com Joel and Antonia explore how the seventh function (trickster) clashes with our core fixations using the FIRM Model. They unpack how this creates double binds for each type, and why it feels so personal, offering a fresh lens on inner tension and growth.…
…
continue reading
1
12.30.25 | Kidnapped by Deutsche Bahn, Google is dead, GOG acquired by co-founder
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00This is a recap of the top 10 posts on Hacker News on Dec 30, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - Kidnapped by Deutsche Bahn (01:35) - Google is dead. Where do we go now? (02:44) - GOG is getting acquired by its original co-founder (03:48) - Karpathy on Programming…
…
continue reading
1
December 29th, 2025 | Kidnapped by Deutsche Bahn
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26This is a recap of the top 10 posts on Hacker News on December 29, 2025. This podcast was generated by wondercraft.ai (00:30): Kidnapped by Deutsche Bahn Original post: https://news.ycombinator.com/item?id=46419970&utm_source=wondercraft_ai (01:52): Google is dead. Where do we go now? Original post: https://news.ycombinator.com/item?id=46425198&utm…
…
continue reading
This show has been flagged as Clean by the host. Haiku: https://www.haiku-os.org/ BeOS: https://en.wikipedia.org/wiki/BeOS Mumble: https://www.mumble.info/ HPR NYE Show: https://hackerpublicradio.org/new_year.html How to Connect to HPR Community Room using Mumble: https://hackerpublicradio.org/mumble-howto Provide feedback on this episode.…
…
continue reading
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be patched. This was one of my favourite interviews this year. Listening to what Brian has learned and understanding how we can use th…
…
continue reading
Este documento sintetiza un análisis del abuso sexual basado en imágenes (IBSA), trazando su evolución desde hackeos dirigidos a celebridades hasta la amenaza actual de los "deepfakes" generados por IA. Las fuentes revelan un cambio significativo en la comprensión y la terminología, alejándose de la etiqueta engañosa "pornografía de venganza" hacia…
…
continue reading
1
Famous Hacker Reveals TRUE Ethical Hacking Stories
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Question? Text our Studio direct. 🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brok…
…
continue reading
1
Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities. Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their l…
…
continue reading
1
From Hacker to Hollywood: Alissa Knight's Journey
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47In this episode of the Security by Default podcast, host Joe Carson engages with cybersecurity expert Alissa Knight, who shares her unique journey into the world of hacking and cybersecurity. They discuss the evolution of hacking, the challenges of API security, and the transformative impact of AI on the industry. Alissa emphasizes the importance o…
…
continue reading
Episode #354 12.13.2025 Ma bell calls it quitsBy Hackers Podcast
…
continue reading
Tim Durham lives in a 30,000-square-foot Shangri La on the outskirts of Indianapolis, has a $6 million yacht and parties with Playboy models. He claims to have made his fortune as a king of the leveraged buyout, with his company Obsidian Enterprises buying stakes in struggling manufacturing companies, turning them around, and flipping them for big …
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro…
…
continue reading
1
12.29.25 | Unprocessed photo example, China's nuclear city in the Gobi Desert, creating custom HTML tags
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30This is a recap of the top 10 posts on Hacker News on Dec 29, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:17) - What an unprocessed photo looks like (01:31) - Growing up in “404 Not Found”: China's nuclear city in the Gobi Desert (02:39) - You can make up HTML tags (03:33) - Sof…
…
continue reading
This is a recap of the top 10 posts on Hacker News on December 28, 2025. This podcast was generated by wondercraft.ai (00:30): Calendar Original post: https://news.ycombinator.com/item?id=46408613&utm_source=wondercraft_ai (01:46): What an unprocessed photo looks like Original post: https://news.ycombinator.com/item?id=46415225&utm_source=wondercra…
…
continue reading
1
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB th…
…
continue reading
This show has been flagged as Clean by the host. With Christmas approaching (and actually gone by the time this is posted), Kevie, Dave and Paul try out a variety of Christmas ales from the UK. Dave opts for St Peters Christmas Ale, Kevie samples Samuel Smith's Winter Welcome Aleand Dave supports his local brewery, Purple Moose, with a mug of Merry…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:04:04
1:04:04
Play later
Play later
Lists
Like
Liked
1:04:04Question? Text our Studio direct. What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is t…
…
continue reading
1
12.28.25 | Floor796, Nvidia's $20B loophole, lost communication to entertainment
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38This is a recap of the top 10 posts on Hacker News on Dec 28, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:17) - Floor796 (01:09) - Nvidia's $20B antitrust loophole (02:19) - How we lost communication to entertainment (03:25) - Replacing JavaScript with Just HTML (04:35) - Calend…
…
continue reading
This is a recap of the top 10 posts on Hacker News on December 27, 2025. This podcast was generated by wondercraft.ai (00:30): Floor796 Original post: https://news.ycombinator.com/item?id=46401612&utm_source=wondercraft_ai (01:55): Nvidia's $20B antitrust loophole Original post: https://news.ycombinator.com/item?id=46403559&utm_source=wondercraft_a…
…
continue reading
These sources examine the non-consensual distribution of intimate images, a form of digital abuse frequently referred to as "revenge porn." The texts explore the severe mental health consequences for survivors, including depression and social isolation, while detailing the evolving legal landscape across various global jurisdictions. Organizations …
…
continue reading
1
Nonconsensual Intimate Images: Unpacking Digital Abuse, Legal Gaps, and the Fight for Justice
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39This document synthesizes an analysis of image-based sexual abuse (IBSA), charting its evolution from targeted celebrity hacks to the current threat of AI-generated “deepfakes.” The sources reveal a significant shift in understanding and terminology, moving away from the misleading label “revenge porn” to more accurate terms like “non-consensual po…
…
continue reading
1
Uruguay Surveillance System: Oversight Failure and Abuse
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00The provided sources examine "El Guardián," a sophisticated telecommunications interception system utilized by the Uruguayan Ministry of the Interior to monitor calls, emails, and social media. While government officials emphasize that the technology is strictly auditable and requires judicial authorization, civil society groups raise concerns rega…
…
continue reading
1
El Guardián ¿controles efectivos contra el abuso?
16:58
16:58
Play later
Play later
Lists
Like
Liked
16:58Las fuentes proporcionadas examinan "El Guardián", un sofisticado sistema de interceptación de telecomunicaciones utilizado por el Ministerio del Interior de Uruguay para monitorear llamadas, correos electrónicos y redes sociales. Si bien los funcionarios gubernamentales enfatizan que la tecnología es estrictamente auditable y requiere autorización…
…
continue reading
1
12.27.25 | uv's speed, Git's issues in package managers, toys with optimal play and clean-up
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45This is a recap of the top 10 posts on Hacker News on Dec 27, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - How uv got so fast (01:36) - Package managers keep using Git as a database, it never works out (02:43) - Toys with the highest play-time and lowest clean-up-time (03:4…
…
continue reading
1
December 26th, 2025 | Rob Pike goes nuclear over GenAI
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10This is a recap of the top 10 posts on Hacker News on December 26, 2025. This podcast was generated by wondercraft.ai (00:30): Rob Pike goes nuclear over GenAI Original post: https://news.ycombinator.com/item?id=46392115&utm_source=wondercraft_ai (01:50): How uv got so fast Original post: https://news.ycombinator.com/item?id=46393992&utm_source=won…
…
continue reading
1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:28:28
1:28:28
Play later
Play later
Lists
Like
Liked
1:28:28Question? Text our Studio direct. If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “…
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
429: The Dead Internet Theory: Are We Building Machines That Only Talk to Other Machines?
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37I spotted a LinkedIn post the other day—obviously AI-generated—with dozens of enthusiastic comments underneath. Every single one also written by AI. Bots responding to bots, a whole conversation with zero humans involved. It was both hilarious and deeply sad. This got me thinking about the dead internet theory and our role as founders in either con…
…
continue reading
1
12.26.25 | Fabrice Bellard's MicroQuickJS released, man stays with family for 45 years, default settings possibly too high
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39This is a recap of the top 10 posts on Hacker News on Dec 26, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:18) - Fabrice Bellard Releases MicroQuickJS (01:28) - We invited a man into our home at Christmas and he stayed with us for 45 years (02:35) - Maybe the default settings are…
…
continue reading
1
December 25th, 2025 | We invited a man into our home at Christmas and he stayed with us for 45 years
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25This is a recap of the top 10 posts on Hacker News on December 25, 2025. This podcast was generated by wondercraft.ai (00:30): We invited a man into our home at Christmas and he stayed with us for 45 years Original post: https://news.ycombinator.com/item?id=46383552&utm_source=wondercraft_ai (01:52): Ruby 4.0.0 Original post: https://news.ycombinat…
…
continue reading
1
The Ransomware Ecosystem: An Encore Holiday Episode
1:15:54
1:15:54
Play later
Play later
Lists
Like
Liked
1:15:54Jim takes a break for some R&R during the holidays and shares his favorite podcast episodes from the year. He acknowledges that some listeners might have heard these episodes already, while others may find them new. The podcast's production is supported by Meter, a company providing integrated networking solutions. Additionally, support from listen…
…
continue reading
An Old West dude ranch tourist attraction run by Stuart Gilligan is threatened by a sinister real estate developer…and Special Agent Chet Phillips is waxing the floor. Written & Directed by J. Michael DeAngelis Starring Chris Klaniecki as Skip Granger Nazli Sarpkaya as Mackenzie McGrath Dave Stanger as Bowden Montcrief Paige Klaniecki as Gloria Kov…
…
continue reading
This show has been flagged as Clean by the host. This brings us to a look at some of Arthur C. Clarke's other stories, The Sands of Mars (1951), The Deep Range (1957), and The Fountains of Paradise (1979). These are just a few of his well-regarded stand-alone novels. Links: https://www.sffworld.com/forum/threads/the-clarke-asimov-treaty.46067/ http…
…
continue reading
1
Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15This story was originally published on HackerNoon at: https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches. Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. Check more stories related…
…
continue reading
1
How Compliance Requirements Shape Modern Software Architecture
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19This story was originally published on HackerNoon at: https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture. GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. Check more stories related to cybersecurity at: https…
…
continue reading
1
12.25.25 | Merry Christmas, Nvidia acquires Groq for $20B, Phoenix is a new X server in Zig
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12This is a recap of the top 10 posts on Hacker News on Dec 25, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - Tell HN: Merry Christmas (01:14) - Nvidia buying AI chip startup Groq for about $20B in cash (02:25) - Phoenix: A modern X server written from scratch in Zig (03:40) -…
…
continue reading
1
December 24th, 2025 | Tell HN: Merry Christmas
14:19
14:19
Play later
Play later
Lists
Like
Liked
14:19This is a recap of the top 10 posts on Hacker News on December 24, 2025. This podcast was generated by wondercraft.ai (00:30): Tell HN: Merry Christmas Original post: https://news.ycombinator.com/item?id=46380168&utm_source=wondercraft_ai (01:51): Unifi Travel Router Original post: https://news.ycombinator.com/item?id=46371135&utm_source=wondercraf…
…
continue reading
This show has been flagged as Clean by the host. I am subscribed to a number of YouTube channels, and I am sharing them with you. Links: https://www.youtube.com/@ProfessorofRock https://www.youtube.com/@ProgAxia https://www.youtube.com/@quill18 https://www.youtube.com/@RachelFlowersMusic https://www.youtube.com/@RadioFreeSkaro https://www.youtube.c…
…
continue reading