A decentralized peer-to-peer messaging application that operates over Bluetooth

Bitchat is a decentralized messaging app using Bluetooth mesh networks, no internet required. It provides censorship resistance and infrastructure independence.

MTOTP: Wouldn't it be nice if you were the 2FA device?

https://raw.githubusercontent.com/VBranimir/mTOTP/develop/docs/pam_demo.gif
mTOTP is a manual time-based authentication protocol for humans, computed without electronic devices. It uses a secret key, substitution box, and diffusion to generate OTPs for future times with intentional authentication time.

Gaussian Splatting – A$AP Rocky "Helicopter" music video

https://framerusercontent.com/images/9Ahi72p6nVLPpyHfH8SseN8zB0.jpg
A$AP Rocky's music video Helicopter features volumetrically captured human performances rendered as dynamic splats. The team used a 56 camera RGB-D array and Evercoast's system to record over 10 terabytes of raw data, allowing for radical freedom in post-production.

Provide agents with automated feedback

https://banay.me/ox-hugo/plot_0.png
Engineers can increase leverage by delegating tasks to agents with automated feedback, allowing them to work on longer horizon tasks. Building back pressure through tools like type systems, error messages, and UI rendering helps agents identify mistakes and align with tasks.

Dead Internet Theory

https://kudmitry.com/articles/dead-internet-theory/cover.png
The author of an open-source project on HackerNews was accused of using AI-generated code and comments, but their responses seemed suspiciously AI-generated as well. This incident led the author to question the authenticity of online interactions and the prevalence of AI-generated content on the internet.

Flux 2 Klein pure C inference

https://raw.githubusercontent.com/antirez/flux2.c/main/images/woman_with_sunglasses.png
This C library generates images from text prompts using the FLUX.2-klein-4B model, with optional BLAS acceleration and no external dependencies. It can be used for image generation and transformation, with a simple API and automatic memory management.

Show HN: I quit coding years ago. AI brought me back

Compound interest grows money exponentially over time, calculated on both principal and previous interest. Starting early and frequent compounding can significantly increase earnings over decades.

Self Sanitizing Door Handle

https://www.jamesdysonaward.org/Document/bc1e938d-f9d7-470b-9238-5b32f5ce5b1b/whatsapp-image-2019-07-08-at-13908-pm.jpeg?height=200
Self-sanitizing door handle is combining with advanced photocatalytic technology and blacklight technology.The light source activate door handle coating to clean and sterillize. It can minimize the risk of infection by contact and enhance hygiene of the place In 2003, SARS spread out in Hong Kong. It infected thousands and killed hundreds here. People noticed that the importance of public ...

Fil-Qt: A Qt Base build with Fil-C experience

https://git.qt.io/assets/twitter_card-570ddb06edf56a2312253c5872489847a0f385112ddbcd71ccfa1570febab5d2.jpg
GitLab Community Edition

A Social Filesystem

https://overreacted.io/a-social-filesystem/1.png
The AT protocol is a system that allows social apps to store and manage user data as files in a decentralized filesystem, enabling users to switch between apps and maintain control over their data. The protocol uses a combination of domain names, decentralized identifiers, and a registry to create permanent links to user data that survive hosting and handle changes.

AVX-512: First Impressions on Performance and Programmability

https://shihab-shahriar.github.io/assets/img/avx512/image.jpeg
The user explores SIMD paradigm with AVX-512, achieving 4x speedup over scalar code and 2x over auto-vectorized code for K-Means algorithm. They conclude that explicit SIMD is suitable for modern hardware and development workflows, especially with the help of LLMs for code generation.

The Code-Only Agent

https://rijnard.com/assets/og-code-only.png
The Code-Only paradigm simplifies agent design by forcing the agent to produce executable code, making it more trustworthy and repeatable. This approach enforces guarantees and precision, ideal for computable tasks, and blurs the line between prompting and programming an agent.

Show HN: AWS-doctor – A terminal-based AWS health check and cost optimizer in Go

https://raw.githubusercontent.com/elC0mpa/aws-doctor/main/demo/basic.gif
aws-doctor is a Golang tool that diagnoses cost anomalies, detects idle resources, and provides proactive analysis of AWS cloud infrastructure. It automates routine checks to help users understand where money is going and what can be cleaned up.

Gladys West's vital contributions to GPS technology

https://upload.wikimedia.org/wikipedia/commons/thumb/f/f0/181206-F-DT527-087.jpg/250px-181206-F-DT527-087.jpg
Gladys Mae West was an American mathematician who contributed to the development of satellite geodesy models and the Global Positioning System (GPS). She was inducted into the US Air Force Hall of Fame in 2018 and received the Prince Philip Medal in 2021.

Gas Town Decoded

Steve Yegge published "Welcome to Gas Town," an introduction to his AI agent orchestration tool, which was met with mixed reactions due to its scale and new language. A decoder was created to explain the tool's terms, including project, inbox, mayor, worker, fixer, maintenance, and persistent worker agents.

Simulating the Ladybug Clock Puzzle

https://austinhenley.com/blog/images/ladybugclock.png
The ladybug has an equal 9% chance of landing on any hour marker except 12. The average number of moves to visit all 12 numbers is 78.

Astrophotography visibility plotting and planning tool

April 1 marks the first day of the new year. the u.s. president's eu summit is set for june 1 - thursday, july 1 at london bridge, where he'll be speaking about the world cup and the euro 2012 qualifying games, including the gold medal match between britain and greece, which takes place in switzerland, will be

Command-line Tools can be 235x Faster than your Hadoop Cluster (2014)

https://adamdrake.com/static/images/adam_drake_240.jpg
The author compared Hadoop processing to shell commands for data analysis and found shell commands to be significantly faster. Shell commands achieved a speedup of 235 times over Hadoop.

Show HN: Dock – Slack minus the bloat, tax, and 90-day memory loss

This platform offers real-time chat with a focus on deep work, decision tracking, and data security. It provides a simple, ad-free chat experience without AI features, with a free plan available for team history.

Show HN: Beats, a web-based drum machine

https://beats.lasagna.pizza/social.png
A web-based drum machine inspired by Teenage Engineering Pocket Operators. Create, save, and share beats with 16-step sequencing and multiple instruments.

Using proxies to hide secrets from Claude Code

https://formal1.wpenginepowered.com/wp-content/uploads/2026/01/image-300x169.png
Claude Code uses sandbox-exec for OS X users and supports network isolation and proxies to limit access to host. It can perform actions with network access and data, but using proxies and fine-grained permissions can prevent API key exposure.

High-speed train collision in Spain kills at least 39

https://ichef.bbci.co.uk/news/480/cpsprodpb/5490/live/430d8b10-f4be-11f0-a422-4ba8a094a8fa.png.webp
At least 21 people have been killed in a high-speed train crash in southern Spain, with over 30 seriously injured. The incident occurred when a train derailed and collided with another, with the cause still unknown.

Experiments with Kafka's head-of-line blocking (2023)

Kafka's head-of-line blocking causes latency when one consumer is slow, unlike beanstalkd which serves jobs to available consumers. An experiment showed Kafka took double the time to process 100 messages compared to beanstalkd due to head-of-line blocking.

Sins of the Children

https://asteriskmag.com/media/pages/issues/07/sins-of-the-children/6bcb54fe49-1718900298/carl_burton_1.png
A human team on Chelicer 14d discovers giant, mechanical "death-fleas" that destroy their weather station and kill a team member. The team recommends eradicating the creatures, which are threatening their agricultural operations, and their bosses agree, deploying drones to wipe them out.

How to wrangle non-deterministic AI outputs into conventional software? (2025)

To use AI components in structured, deterministic systems, we need to wrangle non-deterministic behavior by characterizing and constraining non-deterministic results, which leads to domain modeling and strategic design. Using a standard classification scheme, such as a published language, can offer advantages like consistency, low ambiguity, and easier integration with external systems, ...

Police Invested Millions in Shadowy Phone-Tracking Software Won't Say How Used

https://www.texasobserver.org/wp-content/uploads/2026/01/Tangles-Vid.gif
Goliad County sheriff Roy Boyd used a discarded receipt and AI-powered surveillance tool Tangles to track a human smuggling suspect, but critics say the tool poses major risks to civil liberties. Tangles allows warrantless device tracking, raising concerns about police abuse and erosion of constitutionally protected rights.

Show HN: Lume 0.2 – Build and Run macOS VMs with unattended setup

https://cua.ai/docs/_next/image?url=%2Fdocs%2F_next%2Fstatic%2Fmedia%2Flume-architecture.f28fc4a4.png&w=3840&q=75
Lume is an open-source VM runtime for macOS and Linux on Apple Silicon, allowing for automation and CI/CD pipelines. It provides a thin layer over Apple's Virtualization Framework for near-native speed and hardware-accelerated virtualization.

Poking holes into bytecode with peephole optimisations

Purple-garden's peephole optimisations merge operators, rewrite redundant operations, and remove instructions to reduce startup time. This single-pass optimisation is a fallback for the previous optimisation pipeline and handles constant binary operations and overflow silently.

ASCII characters are not pixels: a deep dive into ASCII rendering

https://alexharri.com/images/posts/ascii-rendering/cube-logo-zoomed-in.png
The user built an image-to-ASCII renderer that utilizes shape to achieve sharp, high-quality ASCII rendering by picking characters based on their shape and applying contrast enhancement effects. The renderer uses a 6D shape vector to capture the shape of ASCII characters and a directional contrast enhancement technique to eliminate staircasing effects and improve readability.

A free and open-source rootkit for Linux

A researcher created an open-source rootkit called Singularity for Linux systems to help security researchers investigate new detection and evasion techniques. The rootkit hides its presence, processes, files, and network connections, but can be detected by monitoring system calls and kernel activity.