Show HN: A 'Choose Your Own Adventure' written in Emacs Org Mode

Hacker News (score: 37)
Found: July 16, 2025
ID: 353

Description

Other
Show HN: A 'Choose Your Own Adventure' written in Emacs Org Mode I authored and developed an interactive children's book about entrepreneurship and money management. The journey started with Twinery, the open-source tool for making interactive fiction, discovered right here on HN. The tool kindled memories of reading CYOA style books when I was a kid, and I thought the format would be awesome for writing a story my kids could follow along, incorporating play money to learn about transactions as they occurred in the story.

Twinery is a fantastic tool, and I used it to layout the story map. I really wanted to write the content of the story in Emacs and Org Mode however. Thankfully, Twinery provided the ability to write custom Story Formats that defined how a story was exported. I wrote a Story Format called Twiorg that would export the Twinery file to an Org file and then a Org export backend (ox-twee) to do the reverse. With these tools, I could go back and forth between Emacs and Twinery for authoring the story.

The project snowballed and I ended up with the book in digital and physical book formats. The Web Book is created using another Org export backend.

Ten Dollar Adventure: https://tendollaradventure.com

Sample the Web Book (one complete storyline/adventure): https://tendollaradventure.com/sample/

I couldn't muster the effort to write a special org export backend for the physical books unfortunately and used a commercial editor to format these.

Twiorg: https://github.com/danishec/twiorg

ox-twee: https://github.com/danishec/ox-twee

Previous HN post on writing the transaction logic using an LLM in Emacs: https://blog.tendollaradventure.com/automating-story-logic-w...

Twinery 2: <https://twinery.org/> and discussion on HN: https://news.ycombinator.com/item?id=32788965

More from Hacker

Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI

Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI A fast SOCKS5 proxy that tunnels your traffic through what looks like normal SMTP email, bypassing Deep Packet Inspection firewalls.<p>How it works: - Client runs a local SOCKS5 proxy (127.0.0.1:1080) - Traffic is sent to server disguised as SMTP (EHLO, STARTTLS, AUTH) - DPI sees legitimate email session, not a VPN&#x2F;proxy<p>Features: - One-liner install on any Linux VPS - Multi-user with per-user secrets and IP whitelists - Auto-generated client packages (just double-click to run) - Auto-reconnect on connection loss - Works with any app that supports SOCKS5<p>Tech: Python&#x2F;asyncio, TLS 1.2+, HMAC-SHA256 auth<p>GitHub: <a href="https:&#x2F;&#x2F;github.com&#x2F;x011&#x2F;smtp-tunnel-proxy" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;x011&#x2F;smtp-tunnel-proxy</a>

Show HN: Yapi – FOSS terminal API client for power users

Show HN: Yapi – FOSS terminal API client for power users I shared a previous version of yapi a few months ago in the comments section of a post talking about the insanity of Postman being &#x27;down&#x27;. yapi has developed into a more mature project since then!<p><a href="https:&#x2F;&#x2F;github.com&#x2F;jamierpond&#x2F;yapi" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jamierpond&#x2F;yapi</a><p>Still very early, but it makes me much more productive vs Postman, Bruno, Insomnia, etc.<p>If youre a nvim&#x2F;tmux culture human, you might like this!

Chat-tails: Throwback terminal chat, built on Tailscale

Chat-tails: Throwback terminal chat, built on Tailscale

Visualize FastAPI endpoints with FastAPI-Voyager

Visualize FastAPI endpoints with FastAPI-Voyager

No other tools from this source yet.