Vercel April 2026 security incident

https://www.bleepstatic.com/content/hl-images/2026/04/19/vercel-header-lg.jpg
Vercel disclosed a security incident after threat actors claimed to have breached its systems and are selling stolen data. The company is investigating and notifying affected customers, advising them to review environment variables and rotate secrets.

5x5 Pixel font for tiny screens

A programmer designed a 5x6 pixel font for low-resolution displays, allowing for compact layouts and easy programming. The font takes up 350 bytes of memory and is suitable for 8-bit microcontrollers.

Stop trying to engineer your way out of listening to people

https://images.unsplash.com/photo-1453738773917-9c3eff1db985?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wxMTc3M3wwfDF8c2VhcmNofDE2fHxsaXN0ZW58ZW58MHx8fHwxNzcwODU1NDg2fDA&ixlib=rb-4.1.0&q=80&w=1200
People avoid doing work by trying to create systems to replace human interaction, but the problem is they're not listening properly to others. To listen effectively, one must understand the complexities of human knowledge and experiences, avoiding assumptions and stereotypes.

Notion leaks email addresses of all editors of any public page

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Vercel says internal systems hit in breach

https://decipher.sc/wp-content/uploads/2025/09/engin-akyurt-A9_IsUtjHm4-unsplash-600x600.jpg
Vercel disclosed a breach of its internal systems affecting a limited subset of customers. The company is investigating with incident response experts and notifying affected customers directly.

Edit store price tags using Flipper Zero

https://raw.githubusercontent.com/i12bp8/TagTinker/main/demo.jpg
TagTinker is a Flipper Zero app for infrared ESL protocol study and controlled experiments on authorized hardware. It's licensed under GPL-3.0 and intended for educational research only.

Changes in the system prompt between Claude Opus 4.6 and 4.7

Anthropic published system prompts for their chat system, with updates from Claude 3 to Opus 4.7, showing changes in child safety, tool usage, and response style. The new prompt includes tools like Claude in Chrome and a tool search mechanism to resolve ambiguities.

The RAM shortage could last years

https://platform.theverge.com/wp-content/uploads/sites/2/2025/02/Terrence-OBrien-headshot-1.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Memory makers will meet only 60 percent of demand by 2027 due to production shortages. New fabrication capacity won't be online until 2027 or 2028, exacerbating the RAM shortage.

The seven programming ur-languages (2022)

The user explains that programming languages can be grouped into seven fundamental "ur-languages" that share common patterns and characteristics, and that learning a language from the same ur-language is easier than learning one from a different ur-language. The user suggests learning a language from the ALGOL family (such as Python or Java), then learning a language from the Prolog family ...

Turtle WoW classic server announces shutdown after Blizzard wins injunction

https://cdn.mos.cms.futurecdn.net/Ba252N3UzmCkmpAK2B5t3j.jpg
Turtle WoW, a popular World of Warcraft private server, is shutting down on May 14 after a cease and desist from Blizzard. The server will close its servers to the final patch and associated social media channels will shut down later this year.

Ask HN: How did you land your first projects as a solo engineer/consultant?

You started a solo consultancy helping SMEs with back-office issues and are looking for advice on getting your first project. You're offering 10 hours free to the first 5 clients to help them get started.

Airline worker arrested after sharing photos of bomb damage in WhatsApp group

https://images.lbc.co.uk/images/806846?crop=16_9&width=660&relax=1&format=webp&signature=mESK8Kwqu6SF495l5tlABdnNplA=
A Dubai airline worker was arrested for sharing bomb damage photos in a private WhatsApp group, charged with publishing information harmful to state interests. He remains in detention, highlighting concerns over Dubai's surveillance operations and access to private communications.

The creative software industry has declared war on Adobe

https://platform.theverge.com/wp-content/uploads/sites/2/chorus/author_profile_images/195820/JESSICA_WEATHERBED.0.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Adobe's Creative Cloud is facing competition from free alternatives like Autograph and Canva, which offer similar design tools at no cost. Industry rivals like Apple and DaVinci Resolve are also undercutting Adobe's pricing with affordable subscription options.

2,100 Swiss municipalities showing which provider handles their official email

https://mxmap.ch/og-image.jpg
Each municipality's official domain is checked via 11 signals from DNS records, SMTP banners, ASN lookups, and a public Microsoft API endpoint, then classified by provider type with confidence scoring. Disclaimer: DNS records indicate mail routing and authorized senders, not necessarily where data is stored.

Swiss authorities want to reduce dependency on Microsoft

https://www.swissinfo.ch/content/wp-content/uploads/sites/13/2026/04/597174916_highres.jpg?ver=ad661a45
Switzerland aims to reduce its dependency on Microsoft products, citing concerns over data security. A feasibility study shows replacing Microsoft with open-source software is possible, with Germany serving as a reference.

A Brief History of Fish Sauce

https://www.legalnomads.com/wp-content/uploads/2016/07/P1066245-1024x766.jpg
Fish sauce has a long history, with ancient Greeks and Romans producing garum and liquamen, while Southeast Asians independently developed nuoc mam and nam pla. The origins of fish sauce are unclear, but it remains a crucial condiment in Southeast Asian cuisine, with various regional variations and uses.

The world in which IPv6 was a good design (2017)

The user attended an IETF meeting to learn about TCP BBR and observed the ongoing debate about IPv6 replacing IPv4, which led them to investigate the history of networking protocols and their complexities. The user discovered that the intertwining of ethernet and IP protocols has resulted in a complicated system, making it difficult to imagine a network without MAC addresses and IP addresses, ...

The Bromine Chokepoint

https://warontherocks.com/wp-content/uploads/2025/06/Cogs-Icon-3.png?v=1773080986
A global semiconductor memory supply chain is vulnerable to a bromine shortage due to Israel's reliance on bromine imports and limited conversion capacity outside the country. A disruption would immediately impact global memory production, affecting consumer devices, military systems, and AI infrastructure.

10 years ago, someone wrote a test for Servo that included an expiry in 2026

https://files.mastodon.social/cache/preview_cards/images/189/770/313/original/823a2203af2fb673.png
Someone wrote a unit test for @servo 10 years ago with a cookie expiry date of April 18, 2026, now the CI is broken. Maintainers suggest using system time or a library like TimeCop to make tests more robust.

In the UK, EVs are cheaper than petrol cars, thanks to Chinese competition

https://electrek.co/wp-content/uploads/sites/3/2023/03/electric-Cab-London-LEVC.jpg?quality=82&strip=all&w=1400
Electric cars are now cheaper to buy in the UK due to lower upfront costs and lower fueling costs. The average EV costs £785 less than the average petrol car, making them a more affordable option.

Modern Rendering Culling Techniques

https://krupitskas.com/modern_graphics_culling_techniques/srtt.png
Culling is a crucial optimization technique in game development that reduces unnecessary work by skipping objects, triangles, or lights that are not visible to the player. Various culling techniques, including distance, frustum, occlusion, and meshlet culling, can be combined and layered to achieve the best results, with the goal of being conservative with correctness and aggressive with wasted work.

Keep Pushing: We Get 10 More Days to Reform Section 702

https://www.eff.org/files/banner_library/NSA-eagle-2_0.png
Lawmakers blocked a reauthorization of Section 702 with no changes, pushing for a 10-day extension to pass real reform. They want probable cause warrants for FBI access to collected information, not just a blanket reauthorization.

SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit [pdf] (2017)

A new type of malware called SPEAKE(a)R can covertly turn headphones, earphones, or simple earbuds connected to a PC into microphones when a standard microphone is not present, muted, taped, or turned off. The malware can record human speech of intelligible quality and eavesdrop from nine meters away, posing a significant cyber security threat.

Windows Server 2025 Runs Better on ARM

https://jasoneckert.github.io/myblog/server-2025-arm64/windows-admin-center-snapdragon.png#center
The author compared Windows Server 2025 on Intel and ARM systems, finding ARM to be faster due to consistent performance and lower latency. ARM's steady execution timing benefits virtualized environments, but Intel's peak performance is still ideal for workloads requiring high throughput.

Show HN: Prompt-to-Excalidraw demo with Gemma 4 E2B in the browser (3.1GB)

Gemma 4 E2B generating Excalidraw diagrams from text prompts, running entirely in desktop Chrome via WebGPU. KV cache compressed 2.4× using TurboQuant's polar+QJL algorithm reimplemented in WGSL compute shaders. Requires Chrome 134+ on desktop — Safari/iOS not supported.

Ex-CEO, ex-CFO of iLearningEngines charged with fraud

Please enable JS and disable any ad blocker

Scientific datasets are riddled with copy-paste errors

https://storage.ghost.io/c/ba/88/ba885ce2-6877-4f70-9886-fcfa8ede8c06/content/images/size/w160/2026/03/IMG_2024_10_10-21_20_05_7290_8C8B8599-1-1-1.JPG
A software detected 18 cases of potential data errors in 600 open-access datasets, with 15 cases posted on PubPeer. The true error rate is likely higher than the estimated 3% due to undetectable errors and less lazy methods of data fabrication.

Clojure: Transducers

Transducers are composable algorithmic transformations that can be used in various processes, including collections, streams, and observables. They compose directly without awareness of input or output sources and can be used to perform operations like filtering, mapping, and reducing.

PM Carney declares U.S. ties now a 'weakness' in address to Canadians

https://www.ctvnews.ca/resizer/v2/https%3A%2F%2Fcloudfront-us-east-1.images.arcpublishing.com%2Fbellmediainc%2F73ADFPGONBALVCYIY27S4YVKM4.jpg?smart=true&auth=2e8c8b7cdedd5ec7dc5159ad28e7f22c4b40fd8b493cdf3acbf646b7e46217c1&width=600
In a direct address to the nation, Prime Minister Mark Carney has reframed Canada's long-standing relationship with the United States as a 'weakness' that must be urgently corrected under the shadow of the Trump presidency.

Notes from the SF peptide scene

https://substackcdn.com/image/fetch/$s_!cqqs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d75b920-be72-4935-9cd3-c051b6053b85_1016x723.png
The author visited the Bay Area and observed a culture of extreme sincerity, where people take everything seriously, including absurd conversations and behaviors. They attended a "spring gay peptide party" where people injected each other with peptides for weight loss and other purposes.

Show HN: Faceoff – A terminal UI for following NHL games

https://www.vincentgregoire.com/faceoff/assets/faceoff_logo.png
This project was inspired by Playball, a similar terminal application for following MLB baseball games. This project is not affiliated with, endorsed by, or in any way officially connected with the National Hockey League (NHL), any of its teams, or any of its affiliates. All NHL logos, trademarks, and data are the property of the NHL and its teams.

The purist's guide to phở in Hanoi

https://substackcdn.com/image/fetch/$s_!uXK3!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14606265-dc3e-4aa7-8769-beca4a8f1f4d_1590x1072.heic
Phở is a traditional Vietnamese dish that originated in Hanoi, made with beef broth, noodles, and various cuts of beef, and its simplicity is what makes it great. A true phở purist understands that the broth is the most important part, and that adding too many condiments or ingredients can ruin the dish, and that the best way to enjoy phở is to let the mystery of its flavor remain.

When moving fast, talking is the first thing to break

Prioritizing speed over communication can lead to faulty designs and system inconsistencies. This approach can create technical debt and hinder future collaboration, ultimately harming the organization.

MuJoCo – Advanced Physics Simulation

https://opengraph.githubassets.com/3862d4830923b4da9e1140a8838b2195538b5189f45aa00d8e4761914d751890/google-deepmind/mujoco
MuJoCo is a physics engine for simulating articulated structures, used in robotics, biomechanics, and machine learning. It has a C API and Python bindings, with interactive visualization and utility functions for physics-related quantities.

Six Levels of Dark Mode (2024)

https://cssence.com/assets/og.jpg
The author discusses six levels of dark mode in CSS, starting with a meta tag that allows browsers to follow user color scheme preferences. They then explore CSS color-scheme declarations, light-dark() color functions, and media queries for maximum customization.

Garbage collection without unsafe code

The safe-gc crate is a garbage collection library for Rust that uses zero unsafe code, providing a safe API for users to consume and manage garbage collected objects. It implements simple mark-and-sweep garbage collection and avoids common garbage collection footguns, such as use-after-free bugs and memory leaks, by using Rust's ownership and borrowing discipline.

Banned by Anthropic?

https://avatars.githubusercontent.com/u/126809856?s=160&v=4
Users experienced Anthropic's safety filter restrictions due to misinterpreted language, including technical terms and metaphors, resulting in lost access, missed deadlines, and financial losses. Users are calling for improved safety filters that understand human context and expression.

MAGA Is Winning Its War Against U.S. Science

https://substackcdn.com/image/fetch/$s_!4PGo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe389830f-7fa3-4cd0-b7d9-5c3528c81a14_1240x492.png
The Trump administration's budget proposal severely cuts research funding and reduces the approval rate of research grants, threatening US scientific research. This anti-science turn is part of a broader Republican hostility to science, driven by disagreements with the scientific consensus on issues like evolution and climate change.

Contact Lens Uses Microfluidics to Monitor and Treat Glaucoma

https://spectrum.ieee.org/media-library/a-contact-lens-sits-on-a-blue-gloved-finger.jpg?id=65561020&width=1200&height=900
Researchers developed a smart contact lens that tracks glaucoma in real time and delivers medicine in response to eye pressure. The electronics-free lens uses microfluidics to sense pressure and release drugs, offering a more comfortable and user-friendly option for glaucoma treatment.

Russia's doping program is run by the same FSB team that poisoned Navalny

https://theins.press/_next/image?url=http%3A%2F%2Fstorage%2Fstorage%2Fcontent_image%2Foriginal%2F69e%2F69e20714e76742.69340186%2FR22jC6S1Ixl4WlzYX1iWcyU6MZPMDrAkEFY0Ka7y.jpg&w=3840&q=100
Dmitry Kovalev, an FSB colonel, has been involved in Russia's doping program and has testified on behalf of Russia in international sports cases. He also works for the FSB's Directorate for the Protection of the Constitutional Order, which is responsible for eliminating political opponents using nerve agents.

A. J. Ayer – ‘What I Saw When I Was Dead’ (1988)

https://hobgobgraphics.wordpress.com/wp-content/uploads/2013/09/alfred_jules_ayer.jpg
Ayer recounts his near-death experience, where he died for four minutes, and upon revival, had vivid memories of a red light and attempting to fix space-time. His experience suggests consciousness may continue after death, but does not necessarily imply a future life.

Uber’s Anthropic AI push hits a wall

https://s.yimg.com/os/en/Benzinga/246d9497cb7440254a59e945355618c2
Uber spent $3.4 billion on AI research and development, exhausting its budget early in 2026 due to rapid adoption and high costs. The company is now testing OpenAI's Codex to expand its AI stack and aims for AI to handle coding and deployment tasks.

CEOs admit AI had no impact on employment or productivity

https://fortune.com/img-assets/wp-content/uploads/2026/02/GettyImages-521488522-e1771352623863.jpg?format=webp&w=1440&q=100
Economists are concerned that AI adoption is not translating to productivity gains, echoing Robert Solow's 1987 observation of the "productivity paradox." Despite firms expecting AI to boost productivity, data shows little impact on employment or productivity.

Swiss AI Initiative (2023)

https://static.wixstatic.com/media/4fb636_e782664481aa46a483f17519eaedf962~mv2.png/v1/fill/w_278,h_278,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/image%20(1).png
The Swiss AI Initiative was launched in December 2023 with 10m GPU hours and 20m CHF grant for AI research. It brings together 800 researchers for frontier AI research on the Alps supercomputer.

Binary GCD

https://en.algorithmica.org/hpc/algorithms/img/euclid.svg
The binary GCD algorithm is a variant of Euclid's algorithm that uses binary shifts, comparisons, and subtractions to find the greatest common divisor of two numbers, which is ~2x faster than the C++ standard library's gcd function. The algorithm's performance can be further optimized by using __builtin_ctz to reduce the number of iterations and by rearranging the assembly code to take ...

Bullshit About Bullshit Machines [pdf]

The author discusses the limitations and potential risks of modern Machine Learning (ML) systems, also known as "AI", which are prone to making up information and lying, despite their impressive capabilities. The author argues that these systems are chaotic, unpredictable, and vulnerable to attacks, and that their widespread deployment could lead to significant changes in various aspects of ...

I wrote a CHIP-8 emulator in my own programming language

https://opengraph.githubassets.com/2cbdba71675eb5affac97af60e080bd10592689dad263ffb519eb1cb267ad12e/navid-m/chip8emu
Chip8 Emulator. Contribute to navid-m/chip8emu development by creating an account on GitHub.

Sudo for Windows (2024)

https://opengraph.githubassets.com/836b2ba61ef706150a9de7dbcc27e9ab68dfab68c717631c0c1b4949688362b1/microsoft/sudo
Sudo for Windows allows users to run elevated commands from unelevated terminal windows on Windows 11 builds 26045 and later. It's a Windows-specific implementation with different elements than the traditional Unix/Linux sudo project.

Got an Old Kindle? It Might Not Work Anymore

https://d34mvw1if3ud0g.cloudfront.net/65282/Amazon-Kindle--2024-_20250418-053045_full.jpeg
Amazon will stop supporting older Kindle and Fire devices released in 2012 or earlier on May 20. Users can upgrade to a new Kindle with a 20% discount and $20 e-book credit until June 20.

Blue Origin's rocket reuse achievement marred by upper stage failure

https://cdn.arstechnica.net/wp-content/uploads/2026/04/GettyImages-2271539021-640x413.jpg
Blue Origin's New Glenn rocket successfully reused a booster but failed to reach its intended orbit due to an upper stage issue. The mission's payload, a cellular broadband satellite, was placed into an inaccurate orbit and will be de-orbited.

Why Zip drives dominated the 90s, then vanished almost overnight

https://static0.xdaimages.com/wordpress/wp-content/uploads/2026/04/zip-drive-and-laptop.jpg?&fit=crop&w=1600&h=900
Zip drives were a popular portable storage format in the 90s with high capacity and speed, but they failed due to frequent failures known as the "click of death". The format eventually lost market presence to CDs and USB flash drives, leading to Iomega's downfall and the eventual removal of its branding from products.

Slava's Monoid Zoo

The user is investigating the word problem in finitely-presented monoids, specifically using the Knuth-Bendix completion algorithm to solve it. They have found a unique two-generator, two-relation monoid with length 10 that cannot be presented by a finite complete rewriting system.

Modern Front end Complexity: essential or accidental?

https://binaryigor.com/assets/images/modern-frontend-complexity/devices-page.b9492c6fdfa70896.png
The complexity of modern web development can be simplified by using HTML Web Components, HTMX, and a templating language to build websites and apps in a way more aligned with how the browser works. This approach reduces the need for complex tooling and JavaScript, making web development simpler and more productive, while still allowing for complex features and user experiences.

Hot-wiring the Lisp machine

https://scheatkode.com/assets/img/heaviest-objects-in-the-universe.png
The user created a static website generator called opd that uses Emacs's Org-mode to generate HTML from Org files without any external dependencies. The generator uses a routing layer to handle different types of content and a two-pass compiler to resolve links and generate URLs, and it has a flexible and composable API that allows users to define custom routes and filters.

Chernobyl's last wedding

https://ichef.bbci.co.uk/news/480/cpsprodpb/6107/live/c3c82100-396c-11f1-879d-1b2f5c3919b8.jpg.webp
Iryna Stetsenko and her fiancé Serhiy Lobanov got married in Pripyat on April 26, 1986, unaware of the nearby Chernobyl nuclear disaster. They were evacuated three days later due to radiation exposure.

High-Fidelity KV Cache Summarization Using Entropy and Low-Rank Reconstruction

https://jchandra.com/images/b4_heatmap.png
Large Language Models face a physical limit in the KV Cache due to linear VRAM usage, necessitating distributed sharding or pruning strategies. A new paradigm, the SRC Pipeline, mathematically summarizes tokens using Information Theory and Linear Algebra, achieving substantial compression without degrading attention mechanism functionality.

Musicians are manufacturing sold-out shows

Please make sure your browser supports JavaScript and cookies and that you are not blocking them from loading. For more information you can review our and .

Matt Mullenweg Overrules Core Committers; Puts Akismet on WP 7's Connector List

https://www.therepository.email/wp-content/uploads/2025/07/300x250px-display-ad.jpg
Matt Mullenweg overruled core committers to register Akismet on WordPress 7.0's Connectors screen. The decision sparked controversy over process and contribution recognition, with Mullenweg defending Automattic's contributions to WordPress.

Some secret management belongs in your HTTP proxy

https://blog.exe.dev/assets/secrets-proxy.svg
Larger organizations use centralized secrets management services to mitigate issues, but smaller ones face pain with agents. A simpler approach is using an HTTP proxy to manage secrets, which can be automated by cloud integrations.

Prefill-as-a-Service:KVCache of Next-Generation Models Could Go Cross-Datacenter

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Researchers developed PrfaaS to improve large-scale LLM serving by offloading long-context prefill to separate clusters and transferring KVCache over Ethernet. This design increases serving throughput by 54% and 32% compared to homogeneous and naive heterogeneous baselines.

Tim Davis – Probabilistic engineering and the 24-7 employee

https://images.squarespace-cdn.com/content/6827a9fa811b26778a4e33b4/1776372027648-U4ZUC5MRH84GF684R0W9/new-art.png?content-type=image%2Fpng
Software is becoming a probabilistic system due to AI advancements, breaking the traditional deterministic code contract. The shift is changing workdays, roles, and organizations, with top teams leveraging agents to ship more and faster, but also creating new challenges and inequalities.

C++26: Reflection, Memory Safety, Contracts, and a New Async Model

https://imgopt.infoq.com//fit-in/218x500/filters:quality(100)/filters:no_upscale()/sponsorship/topic/d58c0af7-ef37-4bcc-b8ff-e8c8ebae3311/HarnessWebinarMay28-RSB-1776245906280.png
C++26 introduces reflection, memory safety enhancements, contracts, and a unified concurrency framework. It simplifies evolution and improves performance, safety, and concurrency with no runtime overhead.
You have a RTX 3080 20 GB with memory issues due to high temperatures, and reparation attempts failed. You're looking for a EU-based repair shop that can fix it, but Krisfix.de no longer accepts 3000 series GPUs.

Hunting a 34 year old pointer bug in EtherSlip

The user was debugging a bug in the EtherSLIP packet driver that caused data corruption when simulating an ARP response, and they found the issue to be a bug in the code that mixed and matched segment and offset registers. The bug was fixed by removing the incorrect move of DS into ES and continuing to use the ARP request buffer as the source of data for the simulated ARP response.

The Work Runs on Different Maps

https://yusufaytas.com/images/2026/04/the-five-maps-behind-execution.jpg
Organizations can appear to be functioning well but actually be stalled due to hidden maps such as expertise, trust, memory, and influence that don't align with the formal org chart. Making these maps visible can reveal the real organization in execution and expose institutional dysfunction, but it can also be politically challenging and uncomfortable for those benefiting from the current ambiguity.

Anatomy of High-Performance Matrix Multiplication (2008) [pdf]

The paper discusses a layered approach to implementing matrix multiplication, focusing on high-performance implementation of inner-kernels and practical algorithms for commonly encountered cases. The approach involves decomposing the general matrix-matrix multiplication into special cases, optimizing the choice of block sizes, and carefully packing matrices to minimize data movement and TLB misses.

Reminder: Enable ZRAM on your Linux system to optimize RAM usage

https://www.cnx-software.com/wp-content/uploads/2026/04/ZRAM-zstd-compression-ram-sticks-720x480.jpg
The user enabled ZRAM on their Ubuntu 24.04 laptop to improve performance without upgrading memory, replacing the older zram-config utility with zram-tools. They also confirmed ZRAM is enabled by default on their Raspberry Pi 5 with 2GB of RAM, and suggested checking ZRAM on other single-board computers.

Plexus P/20 Emulator

To run the emulator, download the hard disk image and wait for the selftest to complete or abort it by typing '!'.

Claude Brain

https://raw.githubusercontent.com/memvid/claude-brain/main/logo.png
User needs help with GitHub plugins setup and code review. They should send their .mv2 file for assistance.

Surely no brand is more hated by web users that Cloudflare

Cloudflare's security measures cause frustration for users when blocking site access, despite being free advertising for developers. Site owners can control how often users see Cloudflare captchas, but users still experience frequent interruptions.

Aliens.gov will be running as a WordPress multisite

This is a multisite, but a site was not found at the requested URL. Please check the URL and domain mapping and try again.

Europe has 'maybe six weeks of jet fuel left'

https://ichef.bbci.co.uk/news/480/cpsprodpb/906c/live/0300a830-398e-11f1-a2bb-f5510bc30f8a.jpg.webp
Europe's jet fuel stocks may last six weeks, with potential flight cancellations if supplies remain blocked. The International Energy Agency warns of shortages if Europe can't replace at least half of its Middle Eastern imports by June.

Critical flaw in Protobuf library enables JavaScript code execution

https://www.bleepstatic.com/content/hl-images/2026/04/17/protobuf.jpg
A critical remote code execution flaw in protobuf.js has been published, allowing attackers to inject arbitrary code via unvalidated schema-derived identifiers. The issue affects versions 8.0.0/7.5.4 and lower, and can be fixed by upgrading to 8.0.1 and 7.5.5.

Show HN: Backlit Keyboard API for Python

https://opengraph.githubassets.com/69933d21dbd14fb92d7c8388704a75adbf1972783feb1a26ec04cdb1247b111a/itsmeadarsh2008/backlit-kbd
A beginner-friendly Python package for controlling keyboard backlight. - itsmeadarsh2008/backlit-kbd

Bipartisan Bill to Tighten Controls on Sensitive Chipmaking Equipment

https://baumgartner.house.gov/wp-content/themes/baumgartner-theme/dist/img/logo.png
Congressman Michael Baumgartner introduced the MATCH Act to strengthen US national security by closing gaps in export controls on semiconductor manufacturing equipment. The bipartisan bill aims to create a level playing field for US and allied toolmakers and prevent China from dominating the semiconductor supply chain.

Gender reassignment significantly increases psychiatric morbidity

https://onlinelibrary.wiley.com/pb-assets/hub-assets/pericles/mobilehublogo-1690978876347.png

Monitor your Pi / OMP sessions

https://opengraph.githubassets.com/a73883fcc3ad3f44045f982923dd78e6e9703a750aa1bf1ff3bdd17f155aacf2/BlackBeltTechnology/pi-agent-dashboard
The pi-agent-dashboard is a web-based dashboard for monitoring and interacting with pi agent sessions from any browser, including mobile, with features like elapsed time tracking, session spawning, and integrated terminal. It can be installed globally or locally, and has a self-contained Electron app for standalone mode, with features like system tray integration, auto-update checker, and ...

Discord Read Receipts Exploit: When, How Often, How Long

https://paul.koeck.dev/writeups/discord.jpg
The user discovered a bug in Discord's link preview feature that allows them to track when and how often a message is read by others, including the time it was visible. They created a proof-of-concept app that exploits this bug, allowing them to track message reads with a high degree of accuracy.

Real-Time Visualization of Human Finger Joint Cavitation (2015)

https://storage.googleapis.com/plos-corpus-prod/10.1371/journal.pone.0119470/1/pone.0119470.g002.PNG_I?X-Goog-Algorithm=GOOG4-RSA-SHA256&X-Goog-Credential=wombat-sa%40plos-prod.iam.gserviceaccount.com%2F20260421%2Fauto%2Fstorage%2Fgoog4_request&X-Goog-Date=20260421T025332Z&X-Goog-Expires=86400&X-Goog-SignedHeaders=host&X-Goog-Signature=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
Joint cracking is associated with cavity inception rather than bubble collapse. Cavity formation occurs due to rapid separation of joint surfaces resulting in vapor cavities that do not collapse instantly.

Context Is Software, Weights Are Hardware

https://www.aravindjayendran.com/writing/context-is-not-learning/opengraph-image?1754fa627168c6a6
The difference between fine-tuning and in-context learning is more fundamental than previously thought, with the latter being a transient weight update that can be mathematically equivalent to one step of gradient descent. Weight modification adds new instructions to the model's architecture, enabling it to perform computations it couldn't before, whereas in-context learning is limited to the ...

NSA using Anthropic's Mythos despite blacklist

https://images.axios.com/1ujwULwMdbF4wPAwKN1n8lQYPsk=/0x316:4210x2684/1920x1080/2026/04/19/1776621364921.jpeg?w=3840
The NSA is using Anthropic's powerful model Mythos Preview despite the Pentagon's feud with the company over security concerns. The government's cybersecurity needs are outweighing the Pentagon's concerns, with Anthropic's tools being used more widely within the department.