Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Internet Archive Switzerland

https://blog.archive.org/wp-content/uploads/2026/05/IA-Switzerland-logo.png
Internet Archive Switzerland launched as a non-profit foundation in St. Gallen to preserve endangered archives and AI models. It joins a global network of mission-aligned organizations to build a distributed digital library.

Rust but Lisp

https://opengraph.githubassets.com/d0851894ab5c8490a9a5a5be2262b1a2cb159d3e6ba7ca66f6d488a78e89036c/ThatXliner/rust-but-lisp
rlisp is a LISP frontend for Rust that compiles directly to Rust code. It uses s-expressions for syntax and compiles to native Rust with no runtime or GC.

The Serial TTL connector we deserve

https://kohlschuetter.github.io/blog/assets/posts/2026/05/07/serial-ttl-connector/before.jpg
The user proposes using Julet connectors for a more reliable and safe connection to embedded devices' UART TTL pins, instead of using USB-Serial TTL adapters or exposed Dupont wires. Julet connectors come in various sizes and pin counts, and can be easily crimped and connected to create a robust and foolproof setup for serial TTL communication.

I’ve banned query strings

The user doesn't want tracking stuff in URLs and has banned unauthorized query strings on their site. They're testing Caddy's handling of query strings at /no-query-strings.

Show HN: I made a Clojure-like language in Go, boots in 7ms

https://raw.githubusercontent.com/nooga/let-go/main/meta/logo.png
let-go is a Clojure-family language compiler and VM for Go that produces a single ~10MB binary with ~7ms cold start. It supports standalone executables, WASM web apps, and embeds cleanly as a scripting layer for Go programs.

Zed Editor Theme-Builder

https://zed.dev/_next/image?url=%2Fimg%2Ftheme-builder-dark.jpg&w=3840&q=75
Access Zed's theme builder from the desktop and browse available theme extensions. The MeetingScheduler component helps schedule meetings about scheduling meetings.

Local privilege escalation via execve()

FreeBSD-SA-26:13.exec is a security advisory that fixes a local privilege escalation via execve() in all supported versions of FreeBSD. The issue is corrected in stable/15, 14.4-STABLE, and 13.5-STABLE branches.

Making your own programming language is easier than you think (but also harder)

https://lisyarus.github.io/blog/media/making-your-own-programming-language/cover.png
The user is creating a custom programming language called pslang for modding their game, aiming for a low-level, imperative language with a static type system and seamless C interop. The language has a unique syntax, including indentation-based scoping, built-in arrays, and a focus on simplicity and ergonomics, with the goal of making it easy to use for modders.

CPanel's Black Week: 3 New Vulnerabilities Patched After Attack on 44k Servers

https://www.copahost.com/blog/wp-content/uploads/2026/05/9d592da9-48e6-4f09-b972-a73a543c754a.png
cPanel released a second emergency security patch on May 8, 2026, covering three new vulnerabilities: CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. Two of the three vulnerabilities have a CVSS score of 8.8, indicating High severity.

Production engineering when trading billions of dollars a day [video]

Distributing Mac software is increasing my cortisol levels

https://blog.kronis.dev/user/pages/blog/apple-is-increasing-my-cortisol-levels/01-quarantine.jpg
The author is creating a Go utility to manage Claude Code profiles but is frustrated with Apple's developer program requirements, including a yearly subscription and ID verification process that doesn't work well with their MacBook's webcam.

The first microcomputer: The transfluxor-powered Arma Micro Computer from 1962

https://static.righto.com/images/arma-microcomputer/arma_1-w500.png
What would you say is the first microcomputer?1 The Apple I from 1976? The Altair 8800 from 1974? Perhaps the lesser-known Micral N (1973) or Q1 (1972)? How about the Arma Micro Computer from way back in 1962. The Arma Micro Computer was a compact 20-pound transistorized computer, designed for applications in space such as inertial or celestial navigation, steering, radar, or engine control. ...

LLMs corrupt your documents when you delegate

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Large Language Models (LLMs) degrade documents during long workflows, corrupting 25% of content on average. Current LLMs are unreliable delegates, introducing severe errors that silently corrupt documents over time.

A recent experience with ChatGPT 5.5 Pro

A mathematician used ChatGPT 5.5 Pro to improve the upper bound on a problem in additive number theory from exponential to polynomial in time, with the AI producing a result that was almost certainly correct according to a human expert. The mathematician suggests that the era of human mathematicians solving problems independently may be coming to an end, and that the future of mathematics ...

Meta's embrace of A.I. is making its employees miserable

Please enable JS and disable any ad blocker

The hypocrisy of cyberlibertarianism

https://matduggan.com/content/images/2026/05/image.png
The user reflects on the early days of the internet and how the ideology of cyberlibertarianism, which emphasized individual freedom and deregulation, led to the creation of a platform that prioritizes profit over people and has devastating consequences. The user argues that it's time to face the facts that this ideology has failed and that we need to evolve and find a new ethical code to ...

France Moves to Break Encrypted Messaging

https://reclaimthenet.org/wp-content/uploads/2026/01/apWThHm7W0xe.png
France's intelligence delegation recommends breaking WhatsApp, Signal, and Telegram encryption for targeted access to messages. This move is opposed by some lawmakers who fear it could lead to mass surveillance and create vulnerabilities.

EU Parliamentary Research Service calls VPNs "a loophole that needs closing"

https://cyberinsider.com/wp-content/uploads/2026/05/73592.jpg
European regulators warn that VPNs are being used to bypass online age-verification systems, describing it as a loophole that needs closing. Regulators are considering measures to restrict VPN access to adults only, but this could weaken anonymity protections and create new surveillance risks.

I caught the car

The author secured a promotion to Senior Software Engineer after two and a half years, but realized the title didn't bring the expected satisfaction. They now prioritize meaningful work, collaboration, and personal growth over external validation.

Surfel-based global illumination on the web

https://juretriglav.si/assets/surfel-webgpu-gi/leonardo-da-vinci-treatise-on-painting.png
Above is a quick illustration of what we'll be exploring step by step, through a series of interactive visualizations. But before we continue down that path, dear reader, I implore you to make a choice. Of course at first, there was nothing, not even light. Then very shortly after the big boom, maybe a second after, the first particles of light were created. Unfortunately for them, for a ...

Getting arrested in Japan

https://images.squarespace-cdn.com/content/v1/605f04a61395e21d304e636a/068a1a20-0ae4-4cc6-8a76-6bb660ac0e41/Murder+Mile.jpeg
Japan's detention system is strict and designed to wear people down mentally and physically, with rules controlling even the smallest details of daily life, and innocent people can be locked inside for weeks or months while proof of their innocence slowly moves through the system. The system is flawed, and people who are arrested can face prolonged isolation, intense interrogation, and poor ...

Using Claude Code: The unreasonable effectiveness of HTML

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Random tie knots (2014)

PipeDream on the Acorn Archimedes

https://storage.ghost.io/c/19/0d/190dff69-8936-47d7-8b0c-f48a6a36ddb4/content/images/size/w1200/2026/05/title_card_pipedream-1.png
The user explores the RISC OS operating system and PipeDream productivity suite, highlighting their unique features and quirks, including the three-button mouse, drag-and-drop file management, and customizable keyboard shortcuts. Despite the system's elegance and ease of use, the user finds it disorienting and frustrating at times, particularly with the word processing and database functions, ...

Forking the Web

Rodrigo Arias Mallo proposes an alternative to the Web with a simple, short specification to ensure diversity of browsers and low development effort. The goal is to create a standardized, non-ambiguous format for exchanging information among humans.

Mythical Man Month

https://martinfowler.com/mf.jpg
Fred Brooks managed IBM's System/360 in the 1960s and wrote influential book The Mythical Man-Month in 1975. The book emphasizes conceptual integrity in system design, simplicity, and straightforwardness to avoid communication issues and ensure effective work.

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/car.png
The user strongly advises against using WebRTC for voice AI due to its limitations and trade-offs, such as introducing artificial latency and aggressively dropping packets. The user suggests using QUIC instead, which offers better performance and scalability, and provides a detailed explanation of how QUIC can be used for load balancing and connection management.

The ROKR wooden typewriter: a closer look

https://blogger.googleusercontent.com/img/a/AVvXsEiHeIkinWKfFyT_Z8tqC6u4ZxAxIF423ZZFzmX3luPzNGgPTI8_0F6fP71Baq6wRdmAvD7ED04QCRaNki5sfnQwEbIQ4Oy8qmp_lXcIdMv7UJbuGXKc9dnFHj7svXokRKyWB2TElb7VX1K9KfXmwVFYf8ms6f4gFCsowGDHr2_UW_fgp89NImXTMH1Ay_gv=w512-h640
A Chinese model kit company ROKR created a working wooden typewriter that can type in capital letters, with moving keys and a rolling carriage. The typewriter's design was inspired by the Underwood No. 5 and took a year and a half to develop, with a team of designers and engineers working on it.
Clients often add features like chatbots to websites due to fear of looking outdated, not because they're useful. They prioritize appearance over simplicity and usability.