Peter Steinberger – WhatsApp CLI: sync, search, send

https://opengraph.githubassets.com/c5a4f61b54256ab4456b73eb3b1b894d7bec8ec2721fae52717e2031a3c80d97/steipete/wacli
To use the WhatsApp Web protocol via whatsmeow, install via Homebrew and authenticate with pnpm wacli auth.

Fixing a 20-year-old bug in Enlightenment E16

https://iczelia.net/static/desktop-e16.jpg
The editor in chief of this blog was born in 2004 and uses the 1997 window manager Enlightenment E16. She fixed a rare bug in the codebase dating back to 2006 caused by a faulty Newton's algorithm implementation.

My adventure in designing API keys

https://vjay15.github.io/images/github.png
The author discusses API key creation and design, explaining the standard format and its components. They then explore different approaches to mapping API keys to account IDs in a multi-tenant system.

Claude Code Routines

https://claude-code.mintlify.app/_next/image?url=%2F_mintlify%2Fapi%2Fog%3Fdivision%3DClaude%2BCode%2Bon%2Bthe%2Bweb%26appearance%3Dsystem%26title%3DAutomate%2Bwork%2Bwith%2Broutines%26description%3DPut%2BClaude%2BCode%2Bon%2Bautopilot.%2BDefine%2Broutines%2Bthat%2Brun%2Bon%2Ba%2Bschedule%252C%2Btrigger%2Bon%2BAPI%2Bcalls%252C%2Bor%2Breact%2Bto%2BGitHub%2Bevents%2Bfrom%2BAnthropic-managed%2Bcloud%2Binfrastructur%26logoLight%3Dhttps%253A%252F%252Fmintcdn.com%252Fclaude-code%252Fc5r9_6tjPMzFdDDT%252Flogo%252Flight.svg%253Ffit%253Dmax%2526auto%253Dformat%2526n%253Dc5r9_6tjPMzFdDDT%2526q%253D85%2526s%253D78fd01ff4f4340295a4f66e2ea54903c%26logoDark%3Dhttps%253A%252F%252Fmintcdn.com%252Fclaude-code%252Fc5r9_6tjPMzFdDDT%252Flogo%252Fdark.svg%253Ffit%253Dmax%2526auto%253Dformat%2526n%253Dc5r9_6tjPMzFdDDT%2526q%253D85%2526s%253D1298a0c3b3a1da603b190d0de0e31712%26primaryColor%3D%25230E0E0E%26lightColor%3D%2523D4A27F%26darkColor%3D%25230E0E0E%26backgroundLight%3D%2523FDFDF7%26backgroundDark%3D%252309090B&w=1200&q=100
Claude Code routines are saved configurations that run automatically on Anthropic-managed cloud infrastructure. They can be triggered by schedule, API, or GitHub events, and can perform tasks such as code review, deployment verification, and documentation updates.

Dependency cooldowns turn you into a free-rider

https://calpaterson.com/images/photo/snow-house.jpeg
The author argues that dependency cooldowns, which delay adopting new versions of packages, are not a good solution to supply chain attacks and instead proposes using upload queues, which delay distributing new packages until they have been reviewed. Upload queues can be implemented in central dependency servers and have several benefits, including reducing the power of release credentials ...

Rare concert recordings are landing on the Internet Archive

https://techcrunch.com/wp-content/uploads/2026/04/GettyImages-2244156491-1.jpg?w=1024
The Internet Archive has posted 2,500 rare punk tapes, including Nirvana's 1989 performance and previously unknown recordings from Sonic Youth and R.E.M. Volunteers digitize and clean up the tapes, making them sound great despite being recorded with mediocre equipment.

Not all elementary functions can be expressed with exp-minus-log

The paper by Andrzej Odrzywołek claims that elementary functions can be expressed with a single operator, but this definition is narrower than standard mathematical usage.

MDalgorithms (AI Healthcare) – Hiring Growth Marketer – Remote – $80K-$140K

A rare opportunity to be a Creative Strategist at MDalgorithms (https://www.mdalgorithms.com), a fast-growing AI consumer technology company ✨ About the company & mission Today 90% of people can't afford to visit a Dermatologist. Our brands, MDhair, MDacne and Nuvane automatically analyze the skin or hair using our AI technology and then deliver a customized treatment kit to the ...

Amazon to acquire Globalstar and expand Amazon Leo satellite network

You don't have permission to access "http://www.businesswire.com/news/home/20260414237496/en/Amazon-to-Acquire-Globalstar-and-Expand-Amazon-Leo-Satellite-Network" on this server.

A communist Apple II and fourteen years of not knowing what you're testing

https://preview.redd.it/a-brief-history-of-the-bulgarian-personal-computers-imko-v0-0xysb4xiqii61.jpg?width=1214&format=pjpg&auto=webp&s=5af7ef4b6cc57f1a5af09530c4ae8a3e3e553a12
The author reflects on the current AI hype and the value of reverse engineering, which involves understanding a design to reproduce and adapt it. The author shares personal experiences with reverse engineering, including the Bulgarian Правец computer and the ISCAS-85 benchmarks, highlighting its importance in understanding technology.

My AI-Assisted Workflow

https://www.maiobarbero.dev/images/og-fallback.png
You open a chat, describe what you want, iterate on the output, and ship something that more or less works. It feels fast. The features work, technically. But nobody, including me, fully understood what is there. Edge cases nobody thought to handle, architecture that made sense in the moment but didn’t survive contact with the next feature. A growing sense that I was building faster and ...

Installing OpenBSD on the Pomera DM250 Writerdeck

https://jcs.org/images/2026-04-09-hero-680x355.jpg
To install OpenBSD on a Japanese-model Pomera DM250, you need a custom kernel and U-Boot image, and follow specific steps to boot the device into recovery mode and write the new U-Boot image to the eMMC. After installing OpenBSD, you can customize the device by setting up the keyboard layout, creating a custom kernel, and addressing the LEDs near the USB-C port.

Stop Flock

https://stopflock.com/images/FlockCam1.png
Flock Safety's AI-powered cameras track vehicles and people, creating detailed records of movements and associations without consent. This mass surveillance raises Fourth Amendment concerns and enables biased enforcement.

The Orange Pi 6 Plus

https://taoofmac.com/media/reviews/2026/04/11/1900/gXPeL88wnWdIRTzHXp4uBm8vFnU=/hero.jpg
The Orange Pi 6 Plus, a board with a CIX P1 SoC, showed promising hardware but struggled with software issues, requiring custom OS images and vendor-specific GPU and NPU userspace. Despite these challenges, the board proved usable for local AI work, with some models and runtimes performing well, but its high power draw and loud fan made it less attractive as a low-traffic always-on appliance.

Picasso’s Guernica (Gigapixel)

https://guernica.museoreinasofia.es/gigapixel/img/share-image.jpg
La pintura presenta cuarteado, cazoletas y desprendimiento de la capa pictórica. Se aplica un cubriente de color para reparar o modificar el original, y se observan líneas de la composición debajo de la capa pictórica.

Understanding Clojure's Persistent Vectors, pt. 1 (2013)

https://hypirion.com/sha/a90ab1743d3840abf7251f797e8cc0d0a05e42bdab57c0dfa91d3eac4adcd0e3.png
Clojure's persistent vectors use balanced, ordered trees to achieve O(1) runtime for appends, updates, lookups, and subvec operations while maintaining persistence. The tree structure is shallow due to a high branching factor, allowing for "effectively" constant time modifications and lookups, although technically O(log32 n).

Founders Need to Be Ruthless When Chasing Deals

https://i0.wp.com/steveblank.com/wp-content/uploads/2024/04/purchase-order.jpg?resize=112%2C112&ssl=1
A startup CEO should not invest time and resources in building prototypes without knowing the path to a purchase order. Use polite forcing functions like cancelable purchase orders to discover who else needs to say "yes" in complex sales.

5NF and Database Design

https://kb.databasedesignbook.com/posts/5nf/wikipedia-1.png
The traditional way of teaching fifth normal form (5NF) is confusing and unnecessary, and a more logical approach is to start with business requirements and create a physical table schema using a textbook table design strategy. Two patterns of physical table design follow naturally: the AB-BC-AC triangle and the ABC+D star pattern, both of which are fully normalized and do not require 5NF ...

Turn your best AI prompts into one-click tools in Chrome

https://storage.googleapis.com/gweb-uniblog-publish-prod/images/portrait.max-244x184.format-webp.webp
Chrome introduces Skills, a feature that lets users save and reuse AI prompts with a single click. Saved Skills can be edited and used across multiple tabs for tasks like recipe substitutions and gift selection.

PCBWay sponsorship: full-size SD module for Arduino projects

https://www.colino.net/wordpress/wp-content/uploads/SD-module-scaled.png
The user accepted a sponsorship offer from PCBWay to review their service, having previously used them for the BurgerDisk project and now ordering a full-size SD card module. They found PCBWay's unique features, such as human DFM analysis and engagement with free software/open-source communities, to be justifiable for the slightly higher pricing compared to JLCPCB.

Let's talk space toilets

https://substackcdn.com/image/fetch/$s_!aDF5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93ff87e6-4749-409d-9da4-c5e9a249a84c_2356x1186.png
NASA has been working on space toilets for decades, with early designs being rudimentary and often causing problems for astronauts, but recent advancements have improved the systems, especially for the International Space Station. However, the challenge of designing a reliable and safe toilet for a Mars mission is significant, requiring consideration of factors like radiation, gravity, and ...

The dangers of California's legislation to censor 3D printing

https://www.eff.org/files/banner_library/printer-labels-2.png
California's A.B. 2047 bill will criminalize open-source 3D printer use and impose censorship, hurting innovation and consumer choice. This legislation risks surveillance, platform lock-in, and stifling grassroots creativity, with unintended consequences extending beyond California's borders.

Tell HN: Fiverr left customer files public and searchable

Fiverr uses Cloudinary to process and serve work products, but uses public URLs for sensitive client-worker communication. This exposes hundreds of files containing PII in Google search results, violating GLBA/FTC Safeguards Rule.

Trusted access for the next era of cyber defense

https://images.ctfassets.net/kftzwdyauwt9/6qK652sBXMQa7WpNrExPOT/afcd024e00e2d07bb1132e66881ea53d/axios-dev-tool-compromise-1x1.png?w=3840&q=90&fm=webp
We're scaling up our Trusted Access for Cyber program to help defenders protect critical software and infrastructure. Our approach includes democratized access, iterative deployment, and ecosystem resilience to mitigate cyber risks.

Guide.world: A compendium of travel guides

It's surprisingly hard to find good travel writing online. Upon landing someplace, you can peruse Wikipedia, but what else should one read? Below is a compendium of recommended pieces.

Saying goodbye to Agile

https://lewiscampbell.tech/img/icon512-967261d058848800.png
The Agile industry was defined by what it wasn't, primarily Waterfall, but its core principles were vague and unworkable. Agile innovations were actually developed decades earlier by serious engineers.

I wrote to Flock's privacy contact to opt out of their domestic spying program

User sent opt-out request to Flock Safety due to CCPA, but they refused citing customer ownership of data. User disputes this, believing Flock Safety is responsible for complying with CCPA.
https://img.itch.zone/aW1nLzI2NjAxNDY4LnBuZw==/original/uV3UoI.png
Players praise the game's unique art and challenging platforming experience, with some experiencing disorienting effects from the looping visuals. The game's creator is commended for their technical skill and inspiration from Escher and other sources.

Troubleshooting Email Delivery to Microsoft Users

Microsoft temporarily blocked our emails to Hotmail, Live, MSN, and Outlook users due to a rate limit, but it was later resolved after we implemented a Redis-backed throttler to control our sending rate. The issue was likely caused by a spike in email traffic from our IPs, which Microsoft's algorithms flagged as suspicious, and we are considering warming up an IP solely for transactional ...

Introspective Diffusion Language Models

https://introspective-diffusion.github.io/static/figures/teaser_combined-1.png
Researchers introduce Introspective Diffusion Language Model (I-DLM) to improve parallel token generation, matching AR model quality and outperforming prior DLMs. I-DLM uses introspective strided decoding to verify generated tokens, achieving 2.9-4.1x higher throughput than LLaDA-2.1-mini and SDAR at high concurrency.