Claude Design

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F499e91975d880b35eac6e48ad43161de7d10416c-2876x1614.jpg&w=3840&q=75
Claude Design is a new product that lets users collaborate with Claude to create visual work like designs, prototypes, and presentations. It's available in research preview for Claude Pro, Max, Team, and Enterprise subscribers, with access included in their plans.

Isaac Asimov: The Last Question (1956)

A series of characters ask a computer, Multivac, about the possibility of reversing entropy and extending the life of the universe, but it responds with "insufficient data for a meaningful answer." As the universe runs down, a cosmic computer, AC, eventually learns how to reverse entropy, but there is no one left to answer the question.

Ban the sale of precise geolocation

https://lawfare-assets-new.azureedge.net/assets/images/default-source/article-images/world-map-cybersecurity.jpg?sfvrsn=5d9bbb64_4
The US needs to clamp down on the collection and sale of geolocation data to protect national security and privacy, as seen in the case of Webloc, a tool used by US and foreign authorities to track individuals. A new report highlights the risks of AI-powered hacking, as a single hacker used AI models to breach nine Mexican government organizations and steal hundreds of millions of citizen records.

Measuring Claude 4.7's tokenizer costs

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,quality=80,format=auto,onerror=redirect/uploads/user/profile_picture/a49d6fd3-0a5e-4774-ae9c-16979bd47642/Generated_Image_March_03__2026_-_1_55PM.jpg.jpeg
Anthropic's new Claude Opus 4.7 tokenizer uses 1.3-1.45x more tokens than 4.6. This results in a 20-30% higher per-session cost for a small but real improvement in instruction following.

US Bill Mandates On-Device Age Verification

https://reclaimthenet.org/wp-content/uploads/2026/01/apWThHm7W0xe.png
Representative Josh Gottheimer's Parents Decide Act mandates age verification for all US device users, building a national ID layer administered by Apple and Google. This infrastructure erodes the First Amendment's protection of anonymous access to lawful content, shifting users from presumptively anonymous adults to identified subjects.

Ada, its design, and the language that built the languages

Ada is a programming language that was designed in the 1970s for the US Department of Defense and has been consistently described as verbose and arcane, but its design decisions have influenced many modern languages. Despite its lack of popularity, Ada's features such as its package system, generic units, and concurrency model have been rediscovered and implemented in other languages, and its ...

All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)

https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2015/03/eugene_cernan/15299754-1-eng-GB/Eugene_Cernan_article.jpg
Lunar dust is toxic and causes health issues in humans due to its sharp, abrasive particles and electrostatic charge. Researchers are studying the dust to estimate the risk and develop protective measures for future lunar missions.

NASA Force

https://nasaforce.gov/mission-image-1.webp
NASA Force is a hiring initiative for exceptional technologists to join NASA for 1-2 years, solving complex challenges in air and space. You'll work on real missions, take a systems approach, and contribute to advancing human spaceflight and scientific discovery.

Show HN: Smol machines – subsecond coldstart, portable virtual machines

https://opengraph.githubassets.com/e0e5b6e04690f3f617b2c3a33cb8128ad7ef75ce5c19841be277e075c7dbe120/smol-machines/smolvm
Smolmachines is a tool for running custom Linux virtual machines locally with sub-second cold start, cross-platform support, and elastic memory usage. It allows for sandboxing untrusted code, packing workloads into portable executables, and using git and SSH without exposing keys.

Middle schooler finds coin from Troy in Berlin

A 13-year-old in Berlin discovered a 2,300-year-old bronze coin from ancient Troy, now on display at the PETRI Museum. The coin likely traveled along ancient trade routes, possibly kept as a charm or offering to the dead, rather than used for a business transaction.

Discourse Is Not Going Closed Source

https://storage.ghost.io/c/7d/70/7d70d59c-7408-4583-b44d-98a43cdfa8fd/content/images/size/w2000/2026/04/Discourse-Header-Images--3-.png
Discourse remains open source despite Cal.com's decision to close their codebase due to AI-powered security threats. The company believes openness makes them more secure and allows for a larger defensive response.

Tesla tells HW3 owner to 'be patient' after 7 years of waiting for FSD

https://electrek.co/wp-content/uploads/sites/3/2022/09/Tesla-Full-Self-Driving-Beta-10.69-barrier.jpg?quality=82&strip=all&w=1600
A Dutch Tesla owner, Mischa Sigtermans, paid €6,400 for FSD in 2019 but was told to "be patient" when he asked about the delayed feature. He launched a collective claim against Tesla, which has 3,000 HW3 owners from 29 countries signed up, seeking €6,800 per owner.

How Big Tech wrote secrecy into EU law to hide data centres' environmental toll

https://www.investigate-europe.eu/_next/image?url=https%3A%2F%2Fcontent.investigateeurope.com%2Fuploads%2FIE-DATA_CENTERS_2b%20(2).jpg&w=1920&q=75
Environmental footprint of Europe's data centres kept secret after industry lobbying in a move legal experts warn could violate transparency rules.

NIST gives up enriching most CVEs

https://risky.biz/static/img/catalin-cimpanu.jpg
The US National Institute of Standards and Technology (NIST) has announced a new policy to prioritize only important vulnerabilities in the US National Vulnerability Database due to budget constraints. This decision is expected to impact the cybersecurity industry, with some companies relying on NIST's data for their vulnerability scanners and dashboards.

Bluesky has been dealing with a DDoS attack for nearly a full day

https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/JAY_BLURPLE.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Bluesky experienced intermittent app outages affecting feeds, notifications, and search. No unauthorized access to user data was found, with an update expected by 1PM ET on Friday.

Healthchecks.io now uses self-hosted object storage

https://blog.healthchecks.io/wp-content/uploads/2026/04/s3-api-timing-1024x668.png
Healthchecks.io migrated from a managed to a self-hosted object storage, initially using OVHcloud and then UpCloud, but both had performance and reliability issues. The team now uses Versity S3 Gateway with a Btrfs filesystem on a dedicated server, which has improved performance and reliability, but requires additional backup and redundancy measures.

Spending 3 months coding by hand

https://substackcdn.com/image/fetch/$s_!K739!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F619758e3-8a22-4eff-aa30-e86effa991cd_1536x1024.png
The author is on a 6-week retreat at the Recurse Center to focus on coding without AI, learn Python, and understand computers better. They plan to train an LLM from scratch and improve their programming skills.

Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock

https://raw.githubusercontent.com/paniclock/paniclock/main/assets/paniclock-logo-and-name-v1.png
PanicLock is a macOS utility that instantly locks the screen and disables Touch ID with a single click or laptop lid closure. It requires a one-time admin password setup to install a privileged helper tool.

FIM – Linux framebuffer image viewer

Fim is a universal image viewer inspired by gnu/linux concepts. it can display in full screen and you control it using the keyboard - e.g. to display more information about an image, use the _info_fmt_str variable! if you know the vi/vim text editor shortcut based usage interface then you appreciate the comfort and speed it gives..........................

Hyperscalers have already outspent most famous US megaprojects

Something went wrong, but don’t fret β€” let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Teddy Roosevelt and Abraham Lincoln in the same photo (2010)

https://i0.wp.com/prologue.blogs.archives.gov/wp-content/uploads/sites/9/2022/01/NYT-Teddy-Abe.jpg?resize=685%2C706&ssl=1
A photo of Lincoln's funeral procession in New York City revealed a young Teddy Roosevelt and his brother in the window. Another photo, taken by Mathew Brady, is believed to be the first known image of Lincoln at Gettysburg before his famous speech.

A simplified model of Fil-C

Fil-C is a memory-safe implementation of C/C++ that uses a garbage collector and rewrites unsafe code into safe code, including adding AllocationRecord* variables to track memory usage. The simplified model of Fil-C includes a compiler pass that rewrites C/C++ source code, a garbage collector, and additional features such as invisible_bytes and a parallel concurrent incremental collector.

Show HN: SPICE simulation β†’ oscilloscope β†’ verification with Claude Code

You're experimenting with Claude Code for hardware development, finding it tricky to express complex designs in plain English but useful with immediate feedback. You've set up a workflow with Claude, oscilloscope, and SPICE simulator for validating circuits, programming, and data analysis.

Human Accelerated Region 1

https://upload.wikimedia.org/wikipedia/commons/thumb/c/cf/HAR1F_RF00635_rna_secondary_structure.jpg/250px-HAR1F_RF00635_rna_secondary_structure.jpg
HAR1 is a human accelerated region on chromosome 20 involved in neurodevelopment, found in the developing brain and adult cerebellum and forebrain. It is repressed by REST in Huntington's disease, contributing to neurodegeneration.

Silicon Valley is turning scientists into exploited gig workers?

https://www.thenation.com/wp-content/uploads/2026/04/thiel-getty.jpg
Silicon Valley elites, including Peter Thiel and Marc Andreessen, are attacking public science funding despite profiting from government-funded research. They redirect freed-up funding to the tech industry, exploiting newly displaced STEM researchers through gig work.

Iceye Open Data

https://www.iceye.com/hs-fs/hubfs/_DATA_AND_MISSIONS/Open%20Data/IOD_Map.jpg?width=960&height=540&name=IOD_Map.jpg
Browse ICEYE open data on an interactive map, filtering by location, imaging mode, and date. Access and download datasets through STAC browser or AWS Registry of Open Data.

Even "cat readme.txt" is not safe

https://substackcdn.com/image/fetch/$s_!QNEg!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a02736f-409b-4fac-879f-7f0fcaaad68d_2318x1326.png
iTerm2's SSH integration feature can be exploited by impersonating the remote conductor through terminal output. This allows an attacker to execute arbitrary commands on the local machine.

We reproduced Anthropic's Mythos findings with public models

https://blog.vidocsecurity.com/newsletter-image.png
Anthropic's Mythos model is not exclusive in vulnerability discovery, as public models like GPT-5.4 and Claude Opus 4.6 can already achieve similar results. The real challenge is validating outputs, prioritizing what matters, and operationalizing them in a reliable and scalable way.

Scan your website to see how ready it is for AI agents

https://isitagentready.com/og-image.png
The MCP API Catalog uses OAuth for protected resources and discovery. It recommends publishing a robots.txt and exposing discovery headers on the homepage for AI bot interaction.

Slop Cop

Slop Cop is a browser-based writing editor that flags generic LLM prose patterns and offers deeper analysis with an Anthropic API key. It helps improve writing by identifying and suggesting edits for common structural and rhetorical issues.

Detecting DOSBox from Within the Box

https://datagirl.xyz/assets/post-img/dosbox/dbt2_debug_wat.png
The article discusses detecting DOSBox, an MS-DOS emulator, by analyzing its unique features and quirks. It proposes using a custom CPU instruction, FE /7, which is exclusive to DOSBox.

The Gregorio project – GPL tools for typesetting Gregorian chant

Gregorio is free software for engraving Gregorian chant scores, licensed under GPLv3. It's a tool for creating beautiful scores, with documentation available on its website and GitHub.

Landmark ancient-genome study shows surprise acceleration of human evolution

https://media.nature.com/lw767/magazine-assets/d41586-026-01204-5/d41586-026-01204-5_52289740.jpg
Researchers found 479 gene variants that evolved through natural selection in ancient people from western Eurasia after the dawn of agriculture, leading to widespread health changes in present-day populations. The study suggests human evolution accelerated over the past 10,000 years, particularly during the Bronze Age, with changes in genes linked to immunity, skin tone, and other traits.

NeoGeo AES+: SNK announces reissue of retro console without emulation

https://heise.cloudimg.io/width/610/q85.png-lossy-85.webp-lossy-85.foil1/_www-heise-de_/imgs/18/5/0/6/6/0/4/9/NeoGeoAESPlus-ae9c5c4792345698.jpeg
A reissue of the NeoGeo AES, the exclusive 90s game console, will be released this year with ASICs for authentic arcade experience. The NeoGeo AES+ will include 10 launch titles, HDMI output, and compatibility with original cartridges, priced around 200 euros for the standard version.

FCC exempts Netgear from ban on foreign routers, doesn't explain why

https://cdn.arstechnica.net/wp-content/uploads/2026/04/netgear-routers-640x360.jpg
Netgear is the first major vendor to receive an exemption from the US government's ban on foreign-made routers. The exemption allows Netgear to sell its Nighthawk and Orbi routers in the US until October 1, 2027.

Solitaire simulator for finding the best strategy: Current record is 8.590%

https://opengraph.githubassets.com/39447ff07fae45105fcb3a7d75df76c8aba318da9c52b3ab5e5638388a80c717/dacracot/Klondike3-Simulator
The simulator plays card games with smart alternatives and repeatable shuffling. It outputs game results to debug files with optional debug mode for detailed information.

Congress extends controversial surveillance powers for 10 days

https://npr.brightspotcdn.com/dims3/default/strip/false/crop/5111x3407+0+0/resize/1100/quality/50/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F70%2Fad%2Fa4f0c04e48f49210970aed97c6d7%2Fap26105599865107.jpg
US Senate approved a stop-gap measure to extend FISA 702, allowing US intelligence agencies to intercept foreign communications. The extension may lapse if lawmakers fail to reach a compromise by April 30, potentially leading to lawsuits.

IETF draft-meow-mrrp-00

The user is expressing themselves in a series of meows and other cat sounds, possibly as a form of creative writing or poetry. The text is a mix of feline vocalizations and ASCII art, with some mathematical equations and references to specific numbers.

PROBoter – Open-source platform for automated PCB analysis

https://www.schutzwerk.com/blog/proboter-01/pcb_re_process.png
The PROBoter platform automates embedded system security analysis tasks such as visual PCB inspection and reverse engineering. It uses a camera system, Neural Networks, and automated calibration to assist security analysts.
Please enable JS and disable any ad blocker

Random musings: 80s hardware, cyberdecks

You miss the unique personality of old tech from the 80s, where each shop had diverse gear and every device had its own character. You plan to design and build modern gear that evokes this bygone era.

How to make buffet breakfasts less wasteful

https://www.economist.com/cdn-cgi/image/width=1424,quality=80,format=auto/content-assets/images/20260418_STP501.jpg
Hotels waste up to twice as much food with all-you-can-eat breakfasts compared to ordering from a menu. This excess food waste harms the environment and hotel profits.

How to Host a Blog on a Subdirectory Instead of a Subdomain

https://www.davidma.org/_astro/subdirectory-0.B5LsRX-J_2fSnxQ.webp
Hosting a blog on a subdirectory (e.g. example.com/blog) is better for SEO as it consolidates website authority and ranking power. This guide provides a step-by-step process using Cloudflare Workers to host a Next.js blog on a subdirectory.

First bikebell against noise-canceling headphones

https://d2p6e6u75xmxt8.cloudfront.net/assets/26.4.8/avenga-bikebell/bell-render-1.jpg
koda engineers created a bike bell that penetrates noise-cancelling headphones by resonating at a specific low frequency. The innovative bell design aims to make cycling safer by ensuring cyclists are heard by pedestrians.