Hardware Attestation as Monopoly Enabler

https://grapheneos.social/system/cache/custom_emojis/images/000/052/296/static/c409a555bed3798b.png
Google and Apple are expanding hardware-based attestation to lock out non-approved devices and OSes, presented as a security feature but actually anti-competitive.

Local AI needs to be the norm

The trend of relying on cloud-hosted AI models for features in applications is creating fragile, invasive, and broken software that invades user privacy and depends on external vendors. Developers should instead use local AI models on-device to transform user-owned data, ensuring faster, private, and trustworthy results without the need for cloud dependencies.

The greatest shot in television: James Burke had one chance to nail this scene (2024)

https://cdn8.openculture.com/2024/10/03224124/The-Greatest-Shot-in-Television-1024x576.jpg
The article discusses James Burke's 1978 TV series "Connections" which explores the evolution of science and technology. A memorable clip from the series shows Burke explaining how a thermos flask can store gases that ignite to launch a rocket.

I'm going back to writing code by hand

https://bear-images.sfo2.cdn.digitaloceanspaces.com/k10s/gpuview.webp
The user built a GPU-aware Kubernetes dashboard called k10s using vibe-coded sessions with Claude, but the project's architecture collapsed due to AI-generated code that lacked constraints and view isolation. The user learned that AI-assisted coding requires explicit architecture design, view isolation, and concurrency rules to prevent complexity and data races, and is rewriting k10s in Rust ...

Running local models on an M4 with 24GB memory

https://jola.dev/images/og-image-2b7872671fc7c11e464dac899d8d3068.png?vsn=d
You've successfully set up a local model on your 24GB Macbook Pro using LM Studio, which runs reasonably well with a 128K context window and enables thinking. This local model, Qwen 3.5 9B (Q4), is useful for research, planning, and basic tasks, but requires more guidance and interaction than SOTA models.

Obsidian plugin was abused to deploy a remote access trojan

https://cyber.netsecops.io/images/bio-images/JasonGomes.jpeg
A highly targeted social engineering campaign is using Obsidian note-taking app to deliver a previously undocumented RAT named PHANTOMPULSE to finance and crypto professionals. The attack relies on tricking users into enabling community plugins, which then executes code to deploy the RAT with advanced capabilities, including Ethereum blockchain-based C2 server address resolution.

An AI coding agent, used to write code, needs to reduce your maintenance costs

https://www.jamesshore.com/images/maintenance-costs/effect-of-maintenance-costs.png
The user warns that relying on AI coding agents for speed boosts without reducing maintenance costs can lead to permanent productivity loss and indenture. To avoid this, AI must decrease maintenance costs in proportion to the speed boost, or else it's a temporary gain for permanent loss.

Incident Report: CVE-2024-YIKES

https://nesbitt.io/images/boxes.png
A security incident occurred due to a compromised dependency in the JavaScript ecosystem, affecting approximately 4.2 million machines. The incident was resolved after a cryptocurrency worm inadvertently patched the malware.

Mythos Finds a Curl Vulnerability

https://daniel.haxx.se/blog/wp-content/uploads/2026/05/jinwon-robot.jpg
The author of curl received a report from Mythos, an AI model, that found five potential security vulnerabilities, but after review, only one was confirmed. The author believes the hype around Mythos was primarily marketing and it didn't find issues significantly better than other AI tools.

Guitar tuner that uses phone accelerometer

Press the phone firmly against the guitar body and pluck a string. Each axis trace shows raw vibration; |a| is the combined magnitude. Pitch is detected from the strongest axis (alias-corrected to the actual string frequency).

7 lines of code, 3 minutes: Implement a programming language (2010)

The lambda calculus is a minimalist, higher-order functional programming language that is equivalent to the Turing machine and can be implemented in various programming languages including JavaScript, Python, and Ruby. It achieves Turing-equivalence through Church encodings and the Y combinator, and its interpreter can be designed using the eval/apply pattern, which scales to much bigger languages.

Show HN: adamsreview – better multi-agent PR reviews for Claude Code

https://opengraph.githubassets.com/d2de031e074d5224418044ab90a9ca2e7b080ee86f07bc77ca57429e613f7cf0/adamjgmiller/adamsreview
The AdamsReview plugin for Claude Code provides a multi-stage code review process with parallel sub-agent detection, validation, and automated fix loops, catching more real bugs and producing fewer false positives. The plugin includes six commands: review, codex-review, add, walkthrough, fix, and promote, with features such as pre-computed auto-fix proposals, batch-acceptance, and granular commits.

Ask HN: What are you working on? (May 2026)

The user is working on multiple projects including a tool to help write statements of work with AI, a puzzle game, a video cloud platform, and a search engine alternative called Uruky. They are also developing a tabletop simulator called Orpheus, a task manager, and vibecoded games, and are seeking feedback and help with their projects.

First tunnel element of the Fehmarnbelt Tunnel immersed

https://www.arup.com/globalassets/images/news/2026/05-may/first-fehmarnbelt-tunnel-element-lowered/fehmarnbelt_tunnel_hero.webp?width=760&quality=80
The Fehmarnbelt Tunnel, set to be the longest immersed tunnel in the world, has successfully immersed its first segment. Engineers from Europe are working together to complete the 18-kilometre tunnel by 2026.

How Fast Does Claude, Acting as a User Space IP Stack, Respond to Pings?

Claude Code developed a command to act as a user space IP stack, responding to pings with a properly formed ICMP echo reply. However, it took 45 seconds for Claude to respond to a ping due to its slow processing speed.

dBase: 1979-2026

https://substackcdn.com/image/fetch/$s_!N8RZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45d4ce5e-adec-4bc7-9d96-de1f51a8706a_479x359.webp
The author shares their experience with trolls and lawyers from various companies including Borland, Corel, and Embarcadero. They discuss the decline of dBase due to lawsuits and predatory practices.

Guy Goma's Accidental BBC Interview Lives on After 20 Years

Please enable JS and disable any ad blocker

Phel v0.36.0 – Lisp on PHP, now with numeric tower and first-class Vars

https://opengraph.githubassets.com/f7f70165fe7222102d7742315d6af814ce4988c264e35eea490990c78c9dffed/phel-lang/phel-lang/releases/tag/v0.36.0
Phel test features include re-running last failed tests and improved BigDecimal functionality. Phel also optimizes REPL boot and improves division and UUID handling.

I returned to AWS and was reminded why I left

The author was a long-time AWS fan but became disillusioned with its complexity, vendor lock-in, and predatory business practices. They left AWS but recently returned for research purposes, only to have their account suspended due to a security breach alert.

Traces Of Humanity

https://storage.ghost.io/c/4d/8b/4d8b74a2-dbea-4038-88bc-6235c04d2bef/content/images/size/w150/2026/01/DO01020850-2-1.jpeg
Author returns after 7 years with new blog focusing on personal struggles between rationality and humanism. They aim to share their experiences and thoughts on balancing individualism and community, freedom and love.

Seeing Birdsong

https://www.lucioarese.net/wp-content/uploads/2025/12/SB-2.jpg
The system bridges art and science to analyze complex animal vocal patterns. It uses spectral descriptors to convert bird voices into dynamic data-rich structures.

Stop MitM on the first SSH connection, on any VPS or cloud provider

A script uses cloud-init to inject a temporary SSH host key, allowing the first connection to a new VM while protecting against attacks. This technique prevents attackers from rerouting traffic or obtaining long-term SSH host keys, making it a secure provider-independent solution.

Ice Cream Blending (1965) [pdf]

Linear programming is used to determine the optimal ice cream blend at the lowest cost. A linear programming model for ice cream production is a mathematical representation of all known factors relevant to the production of the specified blend.

The people preserving the scientific practice of bird banding

https://thenarwhal.ca/wp-content/uploads/2026/04/BAND-PRAZ-CAPTIONED-67-2200x1467.jpg
Bird banding stations in Ontario collect data on migrating birds, promoting conservation and engaging the public in the natural world. However, the US federal budget proposal to eliminate the Ecosystems Mission Area threatens the stability of American bird-banding efforts and Canadian collaborations.

Eight More '8-Bit Era' Microprocessors

https://substackcdn.com/image/fetch/$s_!9Qvf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ded3dc-9ea4-4125-9638-8d7f8f6632ee_1480x1140.jpeg
The article discusses eight lesser-known 8-bit microprocessor designs from the 1970s and early 1980s, including the TMX-1795, Mostek 5065, Intel 8085, Signetics 2650, RCA 1802, Chip Letter, Intersil 6100, and TMS 9900. These designs, although not commercially successful, offer insights into the evolution of microprocessors and the challenges faced by their creators during this era.

The locals don't know

The idea of "doing what the locals do" is often romanticized but may not be accurate, as locals' daily lives can be mundane and uninteresting. Tourists, on the other hand, have the freedom to create their own experiences and enjoy the city in their own way.

Idempotency is easy until the second request is different

https://blog.dochia.dev/logo_4.svg
Idempotency is about preventing duplicate side effects in APIs, not just preventing duplicate writes. It requires a clear opinion on how to handle retries, including recovery ownership, response replay, and downstream deduplication.

Maryland citizens hit with $2B power grid upgrade for out-of-state AI

https://cdn.mos.cms.futurecdn.net/dgDDQskor8eLNcHin58bwH.jpg
Maryland's utility consumers may face a $1.6 billion extra bill over 10 years due to PJM's cost allocation rules. The state argues that its customers should not subsidize grid upgrades for data centers that do not directly benefit Maryland.

Task Paralysis and AI

You're considering ADHD diagnosis due to task struggles and novelty needs, but haven't been officially diagnosed. You use AI tools like Claude to overcome task paralysis, but worry about addiction and the impact on artists.

Walking slower? Your ears, not your knees, might be the problem

Please enable JS and disable any ad blocker