Poland is now among the 20 largest economies

https://dims.apnews.com/dims4/default/6b8b4a2/2147483647/strip/true/crop/7357x4905+0+0/resize/599x399!/quality/90/?url=https%3A%2F%2Fassets.apnews.com%2Ffa%2F05%2F138d6fcc5432aa9c736a0de49368%2Ff52b92ef296d44abb1f716d3f83290e4
Poland's economy has grown significantly since 1990, becoming the world's 20th largest with over $1 trillion in annual output. The country's transformation is attributed to a strong institutional framework, EU aid, and a broad consensus on joining the EU.

Google Cloud Fraud Defence is just WEI repackaged

https://privatecaptcha.com/images/blog/2026/google-cloud-fraud-defence/wei-commit.png
Google announced Google Cloud Fraud Defense, a reCAPTCHA update that uses QR codes to verify human presence. However, it relies on Google's device attestation mechanism, which excludes users of privacy-respecting browsers and accumulates attribution data for Google.

Google broke reCAPTCHA for de-googled Android users

https://reclaimthenet.org/wp-content/uploads/2026/05/0MVBtltU3vpy.jpg
Google's new reCAPTCHA system requires Android users to run Google Play Services to prove they're human, excluding de-Googled phones. This move establishes a precedent for accessing basic web content, favoring Google's ecosystem control over user data consent.

A web page that shows you everything the browser told it without asking

https://sinceyouarrived.world/api/og-taken
The page explains how it collects data from the user's device without tracking or logging, using standard JavaScript APIs and techniques like canvas fingerprinting. The data is computed locally and discarded after use, with no cookies or identifiers retained.

David Attenborough's 100th Birthday

https://ichef.bbci.co.uk/news/480/cpsprodpb/2dda/live/f572f960-4acd-11f1-a909-a5874e7743fb.jpg.webp
Sir David Attenborough turns 100, receiving birthday messages from the royal couple and many celebrities. A special concert at the Royal Albert Hall celebrates his life and legacy.

An Introduction to Meshtastic

https://flasher.meshtastic.org/img/devices/thinknode_m1.svg
Meshtastic is a community-driven, open-source project using LoRa radios for long-range off-grid communication. It forms a mesh network allowing multiple users to receive messages, with each device supporting one user at a time.

Ask HN: We just had an actual UUID v4 collision...

Database flagged duplicate UUIDv4 from a record added in 2025. System generated a new UUIDv4 with the same value, sparking confusion about its possibility.

Mojo 1.0 Beta

https://mojolang.org/img/mojo-social-card.png
Mojo is a compiled, statically-typed language that combines Python's syntax, Rust's memory safety, and Zig's metaprogramming for diverse hardware. It natively interoperates with Python and allows for high-performance GPU programming without vendor lock-in.

Cartoon Network Flash Games

The website is blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

ClojureScript Gets Async/Await

ClojureScript has a new release targeting ECMAScript 2016, allowing for enhanced interop. The compiler now emits async JavaScript functions with the ^:async hint.

AI is breaking two vulnerability cultures

A security vulnerability was discovered and shared publicly after an initial attempt at a closed disclosure, highlighting a tension between coordinated and immediate disclosure. AI-assisted vulnerability detection is making long embargoes obsolete and shortening the time to detection.

US Government releases first batch of UAP documents and videos

You don't have permission to access "http://www.war.gov/UFO/" on this server. https://errors.edgesuite.net/18.89c1c917.1778290421.2ecdbac9

Nintendo announces price increases for Nintendo Switch 2

https://www.nintendo.co.jp/img/og_nintendo.png
Nintendo is revising prices of Switch systems and services due to market changes. Price revisions will be implemented in Japan and other regions to ensure product availability.

Tesla is recalling its cheaper Cybertruck because the wheels might fall off

https://platform.theverge.com/wp-content/uploads/sites/2/chorus/author_profile_images/195810/EMMA_ROTH.0.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Tesla is recalling 173 Cybertrucks due to faulty brake rotors that could cause wheels to fall off. The company will replace the rotors, hubs, and lug nuts free of charge.

GPT-5.5 Price Increase: What It Costs

https://openrouter.ai/_next/image?url=%2Fimages%2Fblog%2Fgpt55-cost-analysis.png&w=3840&q=75
We analyzed the cost impact of switching from GPT-5.4 to GPT-5.5, finding a 49-92% cost increase for users. The price increase is mitigated by GPT-5.5 generating 19-34% fewer tokens for longer prompts.

Serving a website on a Raspberry Pi Zero running in RAM

https://btxx.org/public/images/pi-zero.png
The user set up a Raspberry Pi Zero v1.3 running Alpine Linux to serve a micro site to the public internet, using a separate VPS for TLS termination. They used darkhttpd as the web server and configured a backup system using lbu and rsync to ensure persistent changes on reboots.

Apple, Intel have reached preliminary chip-making deal

Please enable JS and disable any ad blocker

Just Use Go

The author argues that Go is a simple and effective language for building web applications, allowing for fast development and deployment with minimal dependencies. Go's simplicity and lack of unnecessary features make it easier to maintain and scale applications.

GeoJSON

GeoJSON supports various geometry types and feature objects with properties. It was standardized by the IETF in 2016 with RFC 7946, replacing the 2008 specification.

Meta Shuts Down End-to-End Encryption for Instagram Messaging

https://i.pcmag.com/imagery/articles/01VCs6SZdta2WftLSUptXTG-1.fit_lim.v1778247916.jpg
Meta is removing end-to-end encryption from Instagram DMs after May 8, 2026, citing low adoption. Users can download impacted data before the change.

You gave me a u32. I gave you root. (io_uring ZCRX freelist LPE)

A Linux kernel vulnerability in io_uring's ZCRX subsystem allows an attacker to write to adjacent slab memory, corrupting a refcount, leading to a heap read, KASLR break, and modprobe_path overwrite. This can be exploited to gain uid=0.

Let’s Encrypt: Stopping Issuance for Potential Incident – Resolved

https://image.status.io/ZsUlrVAwD16p.png
Let's Encrypt has resumed issuance. Due to an issue with the cross-signed certificate from our Generation X root to our new Generation Y root, all issuance has been switched back to our Generation X root certificate. This affects our "tlsserver" and "shortlived" ACME certificate profiles. We have been made aware of a potential incident and are shutting down all issuance.

AWS North Virginia data center outage – recovery to take hours

https://image.cnbcfm.com/api/v1/image/108303191-1778091886705-1778091506-45750881582-hd.jpg?v=1778091888&w=750&h=422&vtcrop=y
Amazon Web Services experienced a thermal issue at a Virginia facility causing operational issues. The outage affected trading platforms like FanDuel and Coinbase, with full recovery expected to take several hours.

PC Engine CPU

The PC Engine's CPU is a custom-designed HuC6280 based on the 65C02, with 8-bit registers and a 7.16 MHz clock speed, making it fast for its time but with limited instruction set capabilities. The CPU has a built-in MMU that expands the physical address space to 21-bit and supports block transfer instructions for bulk copying data, but has limitations such as not being able to respond to ...

GNU IFUNC is the real culprit behind CVE-2024-3094

https://raw.githubusercontent.com/robertdfrench/ifuncd-up/trunk/memes/larry.jpeg
The xz-utils backdoor, a near-miss global cybersecurity attack, was made possible by two longstanding design decisions in critical open source software: linking OpenSSH against SystemD and the existence of GNU IFUNC. GNU IFUNC is a powerful tool for software supply-chain attacks, and its use should be avoided in applications outside of the GNU C Library due to its complexity and potential for ...

Podman rootless containers and the Copy Fail exploit

The user tested the Copy Fail exploit on a rootless container running with Podman and found that it can be used to obtain a root shell, but the blast radius is limited due to user namespaces and Linux capabilities. The user demonstrated various ways to limit the exposure of a compromised container, including dropping capabilities, disabling new privileges, and using a read-only root ...

What we lost the last time code got cheap

https://www.poppastring.com/blog/content/binary/cricket-ball-made-in-india.jpg
The author worked at a startup that outsourced coding to India for cost savings, but this led to comprehension issues due to lack of shared context. Now, AI-generated code is cheap, but understanding it is the new scarce resource.

Hackers breach JDownloader's website to serve malware-laced downloads

JDownloader website was hacked, serving malware to Windows and Linux users for over a day. The team took down the site for investigation and confirmed a limited but serious breach due to an unpatched security bug.

Blaise – A modern self-hosting zero-legacy Object Pascal compiler targeting QBE

https://opengraph.githubassets.com/b9dc1afcdf5877bdf1d1e71ca482621d47e837abdeb7d9196a29c1715074f4d3/graemeg/blaise
Blaise is a modern Object Pascal compiler prioritizing productivity, memory safety, and performance. It features automatic reference counting, unified UTF-8, and a single language mode.

Show HN: Git for AI Agents

https://raw.githubusercontent.com/regent-vcs/re_gent/main/assets/demo.gif
Regent is a version control system for AI agent activity, tracking changes and allowing for rewind and blame functionality. It can be installed via Homebrew or Go and integrates with VS Code for auditing and debugging AI agent actions.

Discord Incident – Resolved

Welcome to Discord's home for real-time and historical data on system performance.

QBE – Compiler Back End

QBE is a compact compiler backend that provides 70% of industrial performance in 10% of code, ideal for language innovation and hobby-scale projects. It supports various architectures and facilitates C integration through the C ABI.

Teaching Claude Why

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2Fd381a934380d3c6035b6c82c1b36068a970a52f2-1920x1080.png&w=3840&q=75
We improved Claude's safety training to reduce agentic misalignment by teaching principles of aligned behavior and using diverse data. Our methods, including the "difficult advice" dataset and document training, achieved significant improvements in alignment generalization.
https://www.techdirt.com/wp-content/uploads/2024/03/ctrl-alt-speech-logo.png
A US court ruled that the government's use of ChatGPT to cancel grants at the National Endowment for the Humanities was unlawful due to arbitrary and capricious decision-making. The court found that the government's actions were driven by an ideological method of classification, targeting grants based on their perceived viewpoint, and constituted a clear First Amendment violation.

How do I deal with memory leaks? (2022)

The text discusses various C++ programming techniques, including using the standard library, avoiding memory management, and designing classes for inheritance and polymorphism. It also covers topics such as virtual functions, pure virtual functions, and preventing derivation of classes for logical reasons, and provides examples and advice for good programming practices.

US will start revoking passports for parents who owe child support

https://dims.apnews.com/dims4/default/10a2cb1/2147483647/strip/true/crop/6562x4375+0+0/resize/599x399!/quality/90/?url=https%3A%2F%2Fassets.apnews.com%2F56%2Fe5%2F7a7ab5e353322482be53a4885874%2F97dcbe46f9d648b782485763b64c0cbc
The US State Department will revoke passports of parents who owe over $2,500 in child support. This affects thousands of people, with the goal of getting them to pay their debts.

UFO Release 1: Presidential Unsealing and Reporting System for UAP Encounters

You don't have permission to access "http://www.war.gov/UFO/" on this server. https://errors.edgesuite.net/18.96c1c917.1778290432.10e1f822

Komai: a fine Matrix chat app you can get to love

https://etke.cc/img/komai/main-view.webp
The team at etke.cc has launched Komai, a desktop-first, native Matrix chat app built on top of nheko, aiming to solve Matrix self-hosting and UX problems. Komai features a Rust-based engine, improved encryption, and a user-friendly design, with plans for ongoing iteration and feedback.

Digging into Drama at the Document Foundation

The Document Foundation revoked membership status from about 30 Collabora employees due to concerns over nonprofit status. TDF claims this was necessary to maintain its status, while others see it as a power grab.

Tesla Model Y Passes NHTSA's New 'Advanced Driver Assistance System' Tests

You don't have permission to access "http://www.nhtsa.gov/press-releases/tesla-model-y-first-vehicle-pass-nhtsa-new-advanced-driver-assistance-system-tests" on this server.

AWS data center outage hits trading on Fanduel, Coinbase

https://image.cnbcfm.com/api/v1/image/108303191-1778091886705-1778091506-45750881582-hd.jpg?v=1778091888&w=750&h=422&vtcrop=y
Amazon Web Services experienced a thermal issue at a Virginia facility causing operational issues. The outage affected trading platforms like FanDuel and Coinbase, with full recovery expected to take several hours.

Non-determinism is an issue with patching CVEs

https://flox.dev/images/blog/cve-hangover.png
The rapid acceleration of AI-driven CVE discovery and the explosion of package CVEs make traditional package management unmanageable, but a system like Flox, built on Nix, can centrally manage environments and detect vulnerabilities with a queryable dependency graph. This approach reduces CVE triage to database lookups and graph comparisons, making it more efficient and scalable than ...

My first in-prod corrupted hard drive problem

https://blog.pavementlink.ch/assets/my_first_corrupted_hard_drive_exp/eventviewer_error.jpg
An ICT engineer at a Swiss biopharma company encountered a server issue due to a bad hard drive sector caused by a SQL patch, which led to data loss and required a data recovery tool to repair the corrupted sectors. The engineer learned valuable lessons about the importance of verifying backups, monitoring database changes, and staying curious when troubleshooting complex technical issues.

New York state set to ban law enforcement, including ICE, from wearing masks

Please enable JS and disable any ad blocker

HantaWatch Real time hantavirus outbreak tracker

The Andes hantavirus is a rare South American virus that spreads through close contact, primarily through respiratory droplets, with a short transmission window of 24 hours. Early hospital treatment with supportive care significantly improves survival chances, with no vaccine available.

Can LLMs model real-world systems in TLA+?

https://www.sigops.org/wp-content/uploads/2026/05/sysmobench-1672x941.jpg
Large Language Models (LLMs) struggle to model complex systems, producing specs that recite textbook protocols rather than actual implementations. They excel in syntax but fail in conformance and invariant phases.

Show HN: GETadb.com – every GET request creates a DB

This is Instant's get-a-db service. To provision credentials, fetch https://www.getadb.com/provision/. Generate a random UUID yourself and use a different UUID each time. The unique URL prevents upstream caches (e.g. WebFetch's 15-minute URL cache) from serving stale credentials.

Agentic Engineering

https://addyosmani.com/assets/images/agentic.jpg
Agentic engineering is a disciplined workflow where humans oversee AI agents that generate code, requiring rigorous testing, review, and documentation. This approach rewards good engineering practices and benefits senior engineers, but requires a strong foundation in software engineering fundamentals.

Compound drivers of Antarctic sea ice loss and Southern Ocean destratification

Antarctic sea ice extent declined after 2015 due to intensified westerlies and upwelling of warm, saline circumpolar deep water. The decline was driven by a combination of factors, including heat transfer from the atmosphere and ocean, and changes in surface freshwater fluxes.

The React2Shell Story

https://lachlan.nz/post-images/r2s/Server%20Actions.png
A professional hacker discovered a critical remote code execution vulnerability, "React2Shell," in the React framework, which affected millions of websites, and reported it to Meta on November 30th 2025. The hacker, fueled by curiosity and frustration, spent days learning about the Flight protocol and eventually found a way to exploit it, leading to the development of the React2Shell exploit chain.

Dirty Frag: Universal Linux LPE

https://raw.githubusercontent.com/V4bel/dirtyfrag/master/assets/tux.png
Dirty Frag is a Linux vulnerability that grants root privileges by chaining two bugs, xfrm-ESP Page-Cache Write and RxRPC Page-Cache Write. It does not require a timing window and has a high success rate, but no patch exists due to broken embargo.

Four stable kernels with partial fixes for Dirty Frag

Greg Kroah-Hartman has announced the release of the 7.0.5, 6.18.28, 6.12.87, and 6.6.138 stable kernels. These kernels contain a partial fix for the Dirty Frag and Copy Fail 2 security flaws. Kroah-Hartman has confirmed that a second patch is required, but it is still in development and has not yet been merged.

Roadside Attraction

https://theoffing.wpenginepowered.com/wp-content/uploads/2026/05/gabriel-tovar-zn64cXlPGKY-unsplash-scaled.jpg
The Marfa Lights Viewing Center is a simple, low-slung structure in the desert that serves as a waiting room for those hoping to see the mysterious Marfa lights. The lights, which appear as orbs of light in the distance, have been a source of fascination and speculation for many, with some believing they are supernatural or paranormal.

When is your birthday? The math behind hash collisions

The math bureau employees initially calculated a low probability of three people sharing the same birthday, but Austrian mathematician Richard von Mises changed the perspective to find a much higher expected value of such events.

Show HN: CADara – I made an open-source in-browser CAD

v0.0.1 unknown