Hacker News front page now, but the titles are honest

CSS Grid Lanes

https://webkit.org/wp-content/uploads/Grid-Lanes-classic-light.png
Grid Lanes is a new CSS feature that allows for flexible masonry layouts on the web, using grid-template-columns and grid-auto-flow to create a layout that works on all screen sizes. It also introduces a new concept called "tolerance" that lets developers adjust how picky the layout algorithm is when deciding where to place items.

Garage – An S3 object store so reliable you can run it outside datacenters

https://garagehq.deuxfleurs.fr/images/host.png
The project provides software that runs over the Internet across multiple datacenters, allowing deployment everywhere. It received funding from the European Union and NLnet for its development.

Amazon will allow ePub and PDF downloads for DRM-free eBooks

Sorry to interrupt

GotaTun – Mullvad's WireGuard Implementation in Rust

https://mullvad.net/media/uploads/2025/gotatun.png
GotaTun is a fast and efficient WireGuard implementation in Rust, forked from BoringTun, with added features like DAITA and Multihop. It has replaced wireguard-go on Android, resulting in a significant drop in user-perceived crashes and improved user experience.

Noclip.website – A digital museum of video game levels

A digital museum of video game levels

What makes you senior

https://terriblesoftware.org/wp-content/uploads/2025/11/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivzmw0ndc0nji0mtg2mi1pbwfnzs1rewjlahu4ni5qcgc.webp?w=1024
Senior engineers reduce ambiguity to derisk projects and turn vague problems into shippable plans. This core skill makes other skills like architecture and communication more valuable.

LLM Year in Review

https://bear-images.sfo2.cdn.digitaloceanspaces.com/karpathy/unnamed.webp
2025 was a transformative year for LLMs with the emergence of Reinforcement Learning from Verifiable Rewards (RLVR) and the development of new LLM apps and agents. The industry is on the cusp of significant progress with LLMs displaying jagged capabilities, empowering regular people to approach programming, and opening up new possibilities for software development and interaction.
https://www.evilsocket.net/images/2025/tapo/header.jpg
The author reverse engineered a TP-Link Tapo C200 camera's firmware using AI and found several security vulnerabilities, including a private key exposure and integer overflows in the HTTPS server and ONVIF service. The vulnerabilities allow for MitM attacks, remote code execution, and enumeration of nearby WiFi networks, which can be used to determine the camera's location.

8-bit Boléro

https://linusakesson.net/music/bolero/automaton-small.jpg
The creator made a video showcasing a unique musical instrument setup with 9 custom instruments, including NES timpani, using a combination of C64 hardware and clever audio processing. The video and audio were recorded simultaneously, with some sections recreated using an automaton for precise sound capture.

You can now play Grand Theft Auto Vice City in the browser

https://cdn.dos.zone/mp/hubicon_2.png
reVC, an open-source GTA engine, now runs in browsers with stable performance thanks to WebAssembly and modern APIs. This non-commercial project showcases technical capabilities, not the full game, which requires users to provide their own original assets.

TikTok Deal Is the Shittiest Possible Outcome, Making Everything Worse

https://www.techdirt.com/wp-content/uploads/2025/12/techdirt-coin-2-690.png
The Trump TikTok deal has been finalized, allowing a group of Trump allies to gain partial ownership of the company while still maintaining Chinese involvement. This deal makes the concerns about TikTok's privacy and propaganda issues significantly worse.

Getting bitten by Intel's poor naming schemes

https://lorendb.dev/images/opengraph-placeholder.png
User installed Proxmox on an old Dell Precision T3610 and upgraded RAM and storage. They attempted to upgrade the CPU to a newer Xeon E7-8890 v4 but it didn't fit due to different socket variations.

Graphite is joining Cursor

https://cursor.com/marketing-static/blog/og/graphite-og.png
Graphite, a code review platform, has been acquired by Cursor and will continue to operate independently. The acquisition aims to integrate Graphite with Cursor to improve code review and collaboration workflows.

2026 Apple introducing more ads to increase opportunity in search results

https://ads.apple.com/adsdam/app-store/us/en_us/images/apps_og.jpg
Apple Ads will introduce more search results ads in 2026 to increase opportunities for advertisers. Ads will be displayed based on relevance and bids, with a 60% average conversion rate for top search results.

Wall Street ruined the Roomba and then blamed Lina Khan

https://substackcdn.com/image/fetch/$s_!Geyn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01cfcbc-0a64-4d78-97ec-8204cc9e5aab_1019x715.png
iRobot, a robotics company, filed for bankruptcy after being sold to a Chinese company, Shenzhen Picea Robotics, due to pressure from financiers on Wall Street. The deal was blocked by regulators, but the company's collapse highlights the consequences of prioritizing shareholder returns over innovation and national security.

FPGAs Need a New Future

FPGA development is limited by outdated proprietary software, hindering their full potential. Embracing open-source tools could modernize FPGA development and unlock their flexibility and efficiency.

Rust's Block Pattern

The "block pattern" is a Rust idiom that organizes code into a block to improve readability and reduce namespace pollution by encapsulating implementation details. This pattern has several advantages, including clear intent, reduced pollution, and improved idiot-proofing, and can be used to restrict mutability and improve code flow.

The FreeBSD Foundation's Laptop Support and Usability Project

https://opengraph.githubassets.com/51f2802a86d547c9ce0021384ac5d4e71dfcb193b64d54f6abef540eba467235/FreeBSDFoundation/proj-laptop
The FreeBSD Foundation is investing $750,000 to improve laptop support and accessibility through updates to FreeBSD 14.x and documentation. The project will be managed through the Laptop and Desktop Working Group and updates will be shared on GitHub and the FreeBSD Foundation newsletter.

Brown/MIT shooting suspect found dead, officials say

A better zip bomb (2019)

https://www.bamsoftware.com/hacks/zipbomb/giant-steps.jpg
The user is trying to find information about the creator of 42.zip, a zip bomb that expands to 4.5 PB if recursively unzipped, and discusses its construction and optimization. The user also talks about optimizing the compression ratio of the zip bomb, using a custom DEFLATE compressor, and discusses the limits of the zip format and how to surpass them using Zip64.

Show HN: Hacker News, but every headline is hysterical clickbait

Reconstructed Commander Keen 1-3 Source Code

A reconstructed source code for Commander Keen 1-3 has been released, allowing users to compile exact copies of the original executables using specific compilers and assemblers. The source code reveals that the IDLIB.C code was based on The Catacomb and Hovertank, and that the id founders likely used Softdisk's code in their own game without permission.

Prepare for That Stupid World

https://ploum.net/files/prepareworld.png
A Wall Street Journal video featuring a chatbot-run snack vending machine is actually an advertisement for both WSJ and Anthropic. The project is unnecessary and inefficient, normalizing the idea that AI will be everywhere despite its lack of value.

Believe the Checkbook

https://robertgreiner.com/images/checkbook-vs-megaphone.webp
AI companies claim engineering is being automated away but secretly pay millions to acquire human teams that work with AI. They value human judgment over code production, indicating AI is a force multiplier for high-judgment people.

Cursor Acquires Graphite

https://graphite.com/nextImageExportOptimizer/white@2x.86e33a2c-opt-3840.WEBP
Graphite has joined Cursor to create a unified platform for AI-driven code creation, review, and merging. The deal combines Graphite's code review expertise with Cursor's AI capabilities to accelerate software development.

PBS News Hour West to go dark after ASU discontinues contract

https://snworksceo.imgix.net/asp/1ed070eb-4677-483d-b9aa-c523c05f78c5.sized-1000x1000.jpg?w=1000
ASU's Walter Cronkite School of Journalism will end its contract with PBS News Hour West, closing a reporting hub that covered the western US. The decision is reportedly based on ASU's revised priorities, affecting over 20% of News Hour's audience.

Performance Hints

The document discusses general performance tuning principles and techniques for improving software performance, focusing on single-binary context and providing examples in C++ with illustrative source code changes. It emphasizes the importance of considering performance early on and using techniques such as algorithmic improvements, data structure optimization, and profiling tools to achieve ...

Webb observes exoplanet that may have an exotic helium and carbon atmosphere

https://assets.science.nasa.gov/dynamicimage/assets/science/missions/webb/science/2025/12/STScI-01KCA5QVVEN9JXBF8Y9996CMGP.jpg?w=3840&h=2160&fit=clip&crop=faces%2Cfocalpoint
Scientists using NASA's James Webb Space Telescope discovered a rare exoplanet with a helium-and-carbon-dominated atmosphere, unlike any seen before. The Jupiter-mass object orbits a pulsar, a rapidly spinning neutron star, and its unique composition challenges our understanding of how it formed.

Reverse Engineering US Airline's PNR System and Accessing All Reservations

https://alexschapiro.com/assets/images/avelo-security/validcodes.png
A vulnerability was discovered in Avelo Airlines' reservation system, allowing an attacker to access full reservation details, including PII, with a 6-character alphanumeric code and no last name verification. The Avelo team responded quickly and professionally, patched the issue, and maintained clear communication throughout the disclosure process.

Qwen-Image-Layered: transparency and layer aware open diffusion model

https://cdn-avatars.huggingface.co/v1/production/uploads/6039478ab3ecf716b1a5fd4d/_Thy4E7taiSYBLKxEKJbT.jpeg
Qwen-Image-Layered decomposes images into semantically disentangled RGBA layers for independent editing. It surpasses existing approaches in decomposition quality and enables consistent image editing.

Making Google Sans Flex

https://storage.googleapis.com/gd-prod/images/816b1950-d1da-4ea4-9987-86c7b63050cb.0db06b6b53a87fb0.png
Google Sans is a typeface used across Google products, evolving from specific design problems and adapting to user needs. It's now open-source, aiming to create a more unified digital environment and foster a consistent visual language.

Kernighan's Lever

https://linusakesson.net/programming/kernighans-lever/cat.png
The article discusses Kernighan's quote that debugging is twice as hard as writing code, but argues that this is not a reason to avoid clever techniques, as they can actually help improve skills through practice and motivation. The author suggests that writing code that respects the original idea and requires full capability can lead to bugs, but also to a point where the idea is honored and ...

Show HN: Netrinos – A keep it simple Mesh VPN for small teams

https://netrinos.com/cdn/images/og-netrinos-banner.webp
Netrinos creates a secure, private network that seamlessly bypasses firewalls and routers, giving you instant access to your devices from anywhere on the internet.No firewall changes. No port forwarding. No IT department. Encrypted tunnels protect your data while traversing networks, firewalls, and routers as if they don't exist.

AMD officially confirms fresh next-gen Zen 6 CPU details

https://media.overclock3d.net/2025/12/AMD-Ryzen-Next-Gen.jpg
AMD has confirmed new features for its Zen 6 CPU architecture, including AVX512 capabilities and FP16 support. Zen 6 CPUs will have up to 24 cores and increased L3 cache, targeting improved gaming performance.

We ran Anthropic’s interviews through structured LLM analysis

People are using AI despite feeling conflicted about it, with 85.7% experiencing unresolved tensions. They're adopting AI for short-term benefits while worrying about long-term consequences.

Using AI Generated Code Will Make You a Bad Programmer

https://unsolicited-opinions.rudism.com/img/so-effin-ripped.webp
The author argues that relying on AI generated code hinders personal growth and skills as a developer, making one dependent on tools rather than understanding the underlying code.

I have to give Fortnite my passport to use Bluesky

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3b04b59d-7619-423b-99ba-c07450c6012a/Screenshot_2025-12-17_at_11.43.29_AM.png?t=1766077491
Ohio's new age verification law requires websites to block access using age-verification tools, affecting platforms like Bluesky. This law is ineffective, confusing, and can result in censorship of life-saving information, with potential benefits rendered useless by kids finding loopholes.

AI Can Write Your Code. It Can't Do Your Job

https://terriblesoftware.org/wp-content/uploads/2025/12/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiylta0l3vwd2s2mtc5nzyync13awtpbwvkawetaw1hz2uta293ctv0bheuanbn.webp?w=1024
OpenAI and Anthropic are spending billions on acquiring engineering talent, not replacing them, as AI can automate tasks but not the role of a software engineer. The value of engineers lies in their judgment, problem-solving, and decision-making skills, not just coding.

Show HN: I open-sourced my Go and Next B2B SaaS Starter (deploy anywhere, MIT)

https://raw.githubusercontent.com/moasq/production-saas-starter/main/docs/dashboard.png
Roles & Permissions: Granular RBAC system with 3 roles (Member, Manager, Admin) and 7 permission types. Custom Features: Need SAML SSO or complex RAG flows? I'll build them directly into your repo.

Building a Transparent Keyserver

https://assets.buttondown.email/images/d4f72ca6-0ff7-4b1b-8890-1b8f0cbfad90.png
We built a keyserver that uses transparency log technology to keep the operator honest and protect user privacy, and we added features like Verifiable Random Functions and witness cosigners to prevent malicious activity. The keyserver now provides a secure and convenient way to fetch age public keys, and its transparency log can be monitored to ensure the operator is not serving unauthorized keys.

Engineers who dismiss AI

https://terriblesoftware.org/wp-content/uploads/2025/12/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivchgxmzyynzawlwltywdllwt3dnh4owljlmpwzw.webp?w=1024
The author refuses to use AI coding tools due to past experiences and believes they're not good enough. They think engineers who dismiss AI tools are threatened by their own expertise and are falling behind by not trying modern tools.

SMB Direct – SMB3 over RDMA

https://docs.kernel.org/_static/logo.svg
To set up Linux SMB client and server for RDMA, install an RDMA device, a kernel with SMB Direct support, and enable RDMA support in the kernel configuration. Then, set up a KSMBD server and mount the share with the rdma mount option to use SMB Direct.

The scariest boot loader code

The author obtained an HP 9000/720 workstation and worked on porting OpenBSD to the PA-RISC architecture, with the help of Michael Shalayeff and later Matt Fredette who also ported NetBSD to the same architecture. The author eventually succeeded in allowing the OpenBSD boot blocks to display and modify the firmware's console path, enabling the 712 model to run with a serial console.

Making a game on a custom bytecode VM in 7 days and 3kB

https://laurent.le-brun.eu/blog/images/b/d/5/c/1/bd5c14bbe7aada751e18b4b543a35709ace1e107-screenshot-2025-12-16-025758.png
The user created a 3kB shoot 'em up game for a 7-day game jam using a custom bytecode VM and fullscreen pixel shader, combining interests in language tooling, game development, and demoscene-style size constraints. The game's design and bytecode were developed in parallel, allowing for rapid iteration and a fun project that worked better than expected, with the bytecode version being 90 bytes ...

Buteyko Method

The Buteyko method is a breathing technique that aims to regulate breathing and alleviate symptoms of asthma and other respiratory conditions by correcting hyperventilation and encouraging shallower breathing. Its effectiveness is disputed in the medical community due to limited evidence supporting its claims.

Show HN: I Made Loom for Mobile

Demo Scope is a tool for mobile web content demos with face cam and touch indicators, supporting YouTube Live, Twitch, and custom RTMP servers. It offers a free version with limits and a one-time Pro purchase for unlimited use.

Evaluating chain-of-thought monitorability

Researchers study chain-of-thought monitorability in AI systems and introduce a framework to evaluate it. They find that most frontier reasoning models are fairly monitorable, but monitorability can be fragile to changes in training procedure and scaling.

AMD Ryzen 7 5800X3D sells for more than 9800X3D, enthusiasts flock to AM4 DDR4

https://cdn.mos.cms.futurecdn.net/X9PGNCey2xaQuan2Wj7gz.png
The DDR5 memory crisis has caused PC prices to skyrocket, with the Ryzen 7 5800X3D now selling for $500-$800 on eBay. This is more than AMD's latest Ryzen 7 9800X3D and nearly double its original price.

At least $9B billed across 14 Medicaid services in Minnesota may be fraudulent

https://assets3.cbsnewsstatic.com/hub/i/r/2025/12/18/6aaf59db-5792-4ab3-ad41-87dc2fa34ee8/thumbnail/1200x630/4b58905223e66d04c392cec7408b2edc/inx-federal-fraud-indictments-121825-12-17-1410.jpg
A top prosecutor in Minnesota estimated that up to $9 billion in Medicaid fraud may have occurred since 2018. The state's Department of Human Services is working to stop the fraud and prevent future cases.
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/October_AI_Recap_hero_still_1.width-300.format-webp.webp
We filed a lawsuit against SerpApi for circumventing security measures to access copyrighted content in Google search results. This follows industry-standard protocols and other websites' legal action against similar scraping companies.

The New Right-Wing Tech Intelligentsia

https://bayareacurrent.com/content/images/2025/12/image-1.jpg
Tech publications in the Bay Area, such as Kernel and Palladium, reflect a shift in tech culture towards the right, promoting techno-optimism and militaristic nationalism. These publications serve as functional devices for class power, diffusing reactionary ideas into the common sense and influencing the tech world.

Astrophotography Target Planner: Discover Hidden Nebulas

https://astroimagery.com/wp-content/uploads/2025/12/Screenshot-2025-11-22-110231.png
The user built an astrophotography target planner to discover new objects in the night sky, reducing repetition and increasing variety in their images. The planner app, called Astro Target, helps users find hidden gems like NGC 7822 and the Question Mark Nebula by filtering by location, visibility, and focal length.

map::operator[] should be nodiscard

https://raw.githubusercontent.com/Quuxplusone/blog/master/images/pumpkin-toss.jpg
Libc++ is aggressively adding the C++17 [[nodiscard]] attribute to headers, but some functions like unique_ptr::release should be left unmarked due to potential false positives. A borderline case is map::operator[], which should be marked nodiscard to prevent misuse.

Performance Hints

The document discusses general performance tuning principles and techniques for improving software performance, focusing on single-binary context and providing examples in C++ with illustrative source code changes. It emphasizes the importance of considering performance early on and using techniques such as algorithmic improvements, data structure optimization, and profiling tools to achieve ...

A proposed amendment to ban under 16s in the UK from common online services

https://decoded.legal/blog/content/images/decoded.legal_logo.png
The UK's Online Safety Act 2023 amendment aims to prevent under 16s from accessing online services, but its scope is excessively broad, including self-hosted services and everyday online tools. This could lead to a "papers, please" approach, requiring age assurance for all users and significant privacy implications.

Is Firefox Firefucked?

https://cdn.kevquirk.com/og-image.png
User has been using Firefox for over 20 years but is considering switching due to concerns about Mozilla's direction, including increased CEO salary, partnerships with Meta and Google, and features that compromise user privacy. User is testing alternative browsers but is unsure what to switch to.

The Coffee Warehouse

https://www.scopeofwork.net/content/images/2025/06/Dutch-Bros_Square-1.JPG
The author has a love-hate relationship with Starbucks due to high prices, long lines, and the mobile app's interest-free loan feature. However, they appreciate the baristas and the coffee, and find making a Starbucks run helps clear their head.

Show HN: Stickerbox, a kid-safe, AI-powered voice to sticker printer

https://stickerbox.com/cdn/shop/files/stickerbox-landing-gif.gif?v=1762813714&width=3840
The magical creation station that turns ideas into stickers you can color, share, and collect. “Its such a good approach to AI.. It's def a present I'll give” “Its such a good approach to AI.. It's def a present I'll give”

Gamers Are Overwhelmingly Negative About Gen AI in Video Games

https://quanticfoundry.com/wp-content/uploads/2025/12/Video-Game-Retro-Gaming-Isometric-People-Vector-Illustration-AurielAki-min.png
Gamers have a very negative attitude towards Gen AI in video games, with 85% having a below-neutral attitude. Female and non-binary gamers are more negative, while older gamers are more favorable.

Exploring Speculative JIT Compilation for Emacs Lisp with Java

https://kyo.iroiro.party/images/juicemacs-exploring-jit/emacsconf-pre.jpg
The author is working on a Java-based Emacs clone called Juicemacs, which aims to explore concurrency models and JIT compilation for Emacs Lisp, but faces challenges such as supporting various Emacs features and GUI capabilities. The author discusses the performance of Juicemacs compared to nativecomp, a JIT compiler in Emacs, and suggests that nativecomp has potential for improvement with ...

Show HN: Linggen – A local-first memory layer for your AI (Cursor, Zed, Claude)

https://opengraph.githubassets.com/5787796ab42342f31c68391deefd26ab69264c1badd44dae4f826c8597980325/linggen/linggen
Linggen indexes codebases and knowledge for AI understanding, bridging the context gap with persistent memory and cross-project intelligence. It's a local-first, private solution with commercial support for teams and companies.

Pop _OS 24.04's New Scratch-Built Cosmic: Hands-On, with Screenshots

https://fossforce.com/wp-content/uploads/2025/12/PopOS_desktop-700x393.jpg
System76 released Pop!_OS 24.04 LTS with a new Cosmic Epoch 1 desktop environment, replacing Gnome-based version. The distro is based on Ubuntu 24.04 LTS and features rewritten applications in Rust for improved performance and safety.

Show HN: LazyPromise = Observable – Signals

https://opengraph.githubassets.com/d6b396eb83dc418771cf734e36a39f3b08d364b4b4582ab441e0e3ac51d818fa/lazy-promise/lazy-promise
LazyPromise is a primitive that combines the simplicity of Observables with the safety of Promises, allowing for lazy and cancelable operations. It provides a flexible API with features like pipes, error handling, and a failure channel, making it suitable for complex asynchronous operations.

Evolution by natural induction

AI will kill all the lawyers

https://spectator.com/wp-content/uploads/2025/12/lawyers.jpg?w=1108
A senior English barrister, James, warns that AI will destroy the law as we know it, replacing jobs and careers. He believes the profession is arrogant and will struggle to accept its own obsolescence.

XZ Utils Backdoor

https://upload.wikimedia.org/wikipedia/commons/thumb/6/67/XZ_logo_contributed_by_Jia_Tan.png/250px-XZ_logo_contributed_by_Jia_Tan.png
A malicious backdoor was introduced to the Linux build of the xz utility in versions 5.6.0 and 5.6.1 by an account named Jia Tan, allowing remote code execution through OpenSSH. The backdoor was discovered by Andres Freund and patched within hours of disclosure.

Research team digitizes more than 100 years of Canadian infectious disease data

https://news.mcmaster.ca/app/uploads/2025/12/cb-1800-x-1066-15.png
David Earn, a McMaster University professor, uncovered 50 years of Canadian infectious disease reports from 1939-1989, leading to a massive research project and a new database called CANDID. The database contains over a million disease incidence counts dating back to 1903, allowing researchers to study past outbreaks and prepare for future ones.

Ask HN: How are most people converting HEIC to jpg?

You use Automator to convert HEIC photos to JPG on your Mac, but prefer to use command line tools like imagemagick and exiftool on your Linux desktop.

Show HN: Orbit a systems level programming language that compiles .sh to LLVM

https://opengraph.githubassets.com/e60e1e5321260d708c7f1ac348be5194cab6427981a64acbecc57abad1b441e0/SIE-Libraries/orbit
Spaceship is a high-performance systems automation language that replaces legacy shell scripting with a strict syntax, JIT compilation, and direct OS-level syscalls for security. It provides a significant performance improvement over traditional shell scripting languages like Bash.

YouTube Is Degraded

Users are experiencing issues with YouTube including slow playback, freezing, and failure to load videos. Problems persist despite having stable internet connections and some users are paying for ad-free services.

Life, Death and Mowing

https://www.cam.ac.uk/sites/default/files/shorthand/249818/ITvD4PdQrO/assets/7LelGBM5yE/my-mower-for-banner-image_cropped.jpg
British poets like Philip Larkin and Andrew Motion have used lawnmowers in their poetry to explore themes of childhood, masculinity, and mortality. The tradition dates back to 17th-century poet Andrew Marvell, who used mowing with a scythe to comment on the English Civil War.

Litex: Formal math for everyone – set theory examples with Lean comparison

Litex is a formal language based on set theory that offers a more natural way to express mathematical statements, making it easier for users to write and verify math, especially for those without hardcore mathematical training. Litex's design is more intuitive and easier to learn compared to Lean, a popular formal language based on type theory, but it is still a toy language for learning ...

Diary: Val McDermid, Deep Winter

https://substackcdn.com/image/fetch/$s_!m2vm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc872f6df-77b7-4fb7-acb9-84d96ee128c7_1600x1067.heic
The winter solstice marks the turning of the year and the promise of returning light, a concept understood by humans for thousands of years. Prehistoric stone circles in Scotland, such as Clava Cairns, demonstrate this understanding through their alignment and design.