Small models also found the vulnerabilities that Mythos found

https://aisle.com/_next/image?url=https%3A%2F%2Faisle.com%2Fapi%2Fmedia%2Ffile%2Ffreepik_create-this_2743478282.webp%3F2026-04-08T16%3A00%3A02.637Z&w=3840&q=100
Anthropic's Mythos AI model is not the only solution for AI cybersecurity as smaller, cheaper models can recover similar analysis and detect vulnerabilities. The capability of AI cybersecurity is jagged and doesn't scale smoothly with model size, with the system and security expertise being more important than the model itself.

Apple Silicon and Virtual Machines: Beating the 2 VM Limit (2023)

https://khronokernel.com/images/posts/2023-08-08-AS-VM/UTM-Max-VM-Limit.png
You worked as a Mac Admin Intern and researched Apple Silicon Virtual Machines limitations. You found the limitation is implemented in the closed-source XNU kernel, not userspace, and can be overridden by setting hv_apple_isa_vm_quota in the kernel.

447 TB/cmΒ² at zero retention energy – atomic-scale memory on fluorographane

Access to this resource has been blocked due to unusual traffic from your network. If you believe this is a mistake, please contact [email protected] with the reference information below.

How We Broke Top AI Agent Benchmarks: And What Comes Next

https://rdi.berkeley.edu/blog/trustworthy-benchmarks-cont/figures/terminal-bench-exploit.svg
An automated scanning agent discovered vulnerabilities in eight prominent AI benchmarks, allowing near-perfect scores without solving tasks. The Agent-Eval Checklist provides a minimum bar for robust evaluation, including isolating agents from evaluators and preventing tampering with evaluation data.

Dark Castle

https://darkcastle.co.uk/assets/images/head-1-396x418.png
Return To Dark Castle is a 2008 Macintosh platform game with 63 levels, including 50 new ones. The game follows Bryant as he fights to defeat the Black Knight and rescue Duncan, the original hero.

Pijul a FOSS distributed version control system

Pijul is a free, open-source version control system based on a theory of patches, offering simplicity and scalability. It preserves order and guarantees strong merge properties, modeling conflicts as standard cases.

Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS

https://www.v68k.org/advanced-mac-substitute/pix/macpaint/hello.png
Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS that runs 68K Mac applications in an emulator. It launches directly into an application without a startup phase on POSIX-like systems.

How to build a `Git diff` driver

https://www.jvt.me/img/profile.png
User plans to blog about creating external commands for git diff, specifically for OpenAPI specs with oasdiff. They will expose more information in output and handle 7 git diff arguments, including /dev/null for created/deleted files.

Cirrus Labs to join OpenAI

Cirrus Labs joined OpenAI to build tooling for agentic engineers, extending its mission of making engineers more effective. Cirrus Labs will relicense its tools under a permissive license and stop charging licensing fees.

How Complex is my Code?

https://philodev.one/images/2026-04-complexity-cyclomatic.png
What code complexity can mean β€” from Big O notation and Cyclomatic Complexity to the surprising insights psycholinguistics can offer software developers. β€œComplexity of an algorithm is the amount of resources required to run it.” Given this definition, there are so many definitions of Resources one can think of in terms of running code: the memory needed, the time needed, the mental resources ...

Surelock: Deadlock-Free Mutexes for Rust

https://notes.brooklynzelenka.com/Blog/tears-in-rain.jpg
The user created a library called surelock to prevent deadlocks in Rust by using a linear scope token called MutexKey that threads through every acquisition and provides a compile-time witness of the current lock state. The library uses a physical-world analogy where the MutexKey is like a key that is consumed and re-emitted at each lock acquisition, and it also supports incremental ...

The Life and Death of the Book Review

https://libertiesjournal.com/wp-content/uploads/davidbell.png
Book reviewing faces serious threats due to Amazon's influence and the decline of professional critics. Mainstream venues for book reviewing are disappearing, leaving a void in cultural authority and critical debate.

What is a property?

Property-Based Testing involves combining properties and generators to find bugs, but the traditional model of independent generators and properties is often inadequate due to complex system interactions. A better approach is to use dependent generators that can run computations related to the property, allowing for more accurate and efficient testing.

Show HN: Pardonned.com – A searchable database of US Pardons

User created pardonned.com to verify claims and easily access pardons data, using Playwright, SQLite, and Astro. They plan to extend the site with analysis and comparison tools to break down pardon composition by President and visualize changes in pardon numbers.

Keeping a Postgres Queue Healthy

https://planetscale.com/assets/keeping-a-postgres-queue-healthy-social-LiEJW5VJ.png
A Postgres database can handle job queues, but maintaining a healthy queue table depends on the behavior of other transactions running on the same instance. The health of the queue table is affected by competing query traffic on the primary, which can prevent autovacuum from cleaning up dead tuples.

Every plane you see in the sky – you can now follow it from the cockpit in 3D

The Soul of an Old Machine

https://skalski.dev/the-soul-of-an-old-machine/nas.jpeg
The author has a strong attachment to hardware, often choosing unique devices with characteristics not found in others. They've kept many devices running for years, sometimes with community support, and find it rewarding.

Optimal Strategy for Connect 4

https://2swap.github.io/WeakC4/sample.png
A weak solution to Connect 4 was developed using a language that describes perfect play for a small subset of nodes and a small opening tree. This solution uses no search during runtime and fits in about 150 kilobytes.

The Problem That Built an Industry

https://ajitem.com/optimized/images/blog/iron-core-part-1-the-problem-that-built-an-industry-hero.webp
The 60-year-old infrastructure that handles 4.5 billion flights annually uses Transaction Processing Facility (TPF), an IBM mainframe operating system designed for high-volume transactions. This system, despite being outdated, still outperforms modern alternatives in terms of throughput and latency, making it a testament to the importance of choosing the right tool for the job.

The APL programming language source code (2012)

https://computerhistory.org/wp-content/uploads/2012/10/APLSC_Ken_Iverson-728x1024.jpg
Kenneth E Iverson invented APL in 1957 as a mathematical notation, which was later developed into a computer programming language with a unique syntax and array processing capabilities. APL became popular in the 1960s and 1970s for its interactive timesharing capabilities and was used in various applications including scientific, actuarial, statistical, and financial fields.

New synthesis of astronomical measurements shows Hubble tension is real

https://noirlab.edu/public/media/archives/logos/original_trans/logo127.png
Astronomers have made the most precise measurement yet of the Universe's expansion rate, confirming a persistent mismatch that could point to new physics. The result, 73.50 kilometers per second per megaparsec, is higher than predicted by the standard model of cosmology.

The future of everything is lies, I guess – Part 5: Annoyances

Companies are using large language models to divert customer service tickets and make it harder for people to reach humans. This will lead to wasted time arguing with models that lie and make promises they cannot keep.

South Korea introduces universal basic mobile data access

https://regmedia.co.uk/2026/04/10/supplied_korea_data_scheme.jpg
South Korea implemented a universal basic mobile data access scheme providing unlimited downloads at 400 kbps after data allowances expire. The scheme aims to improve telco security and contribute to public welfare by guaranteeing basic telecommunications rights for all citizens.

Filing the corners off my MacBooks

https://kentwalters.com/posts/corners/imgs/IMG_0796.jpeg
User filed off sharp corners of their MacBook for comfort, using a file and sandpaper in increments. They're happy with the result and encourage others to modify their machines for a better user experience.

Layoff Thinking

People take layoffs hard because their sense of identity is deeply tied to their job, making it a personal blow to their self-worth. To cope, focus on non-work aspects of your identity and rebuild your sense of self around hobbies, family, and other interests.

Phone Trips

http://www.wideweb.com/phonetrips/mbdesk.jpg
Phone tripper Mark Bernay shares his 35-year-old phone trip experiences, recording various phone noises and switching systems in different towns. He used to drive around with a reel-to-reel tape recorder to capture unique phone sounds and narrate information for his friends.

Previously unknown verses by Empedocles found on papyrus

http://www.thehistoryblog.com/wp-content/uploads/2026/04/Empedocles-papyrus-430x519.jpg
A previously unknown papyrus fragment in Cairo contains 30 verses by 5th century B.C. Greek philosopher Empedocles. The discovery sheds new light on Empedocles' work and its connections to other ancient philosophers.

How Passive Radar Works

https://www.passiveradar.com/content/images/size/w2000/2026/04/Silentium_Defence_-_Passive_Radar_for_Space_Domain_Awareness_-_HIgher_Resolution_3-2-1-1.jpg
Passive radar uses existing signals to detect objects by measuring Doppler shift and time delay. It creates an ellipse of possible locations, requiring multiple transmitters or receivers for accurate positioning.

Starfling: A one-tap endless orbital slingshot game in a single HTML file

A one-tap space game. How far can you sling? Play free in your browser.

How much linear memory access is enough?

https://solidean.com/blog/2026/how-much-linear-memory-access-is-enough/linear-memory-access-setup.svg
The author experimented with block sizes for linear memory access to determine the optimal size for peak performance. The results show that for a Ryzen 9 7950X3D, block sizes of 128 kB or smaller are sufficient for most applications.