Keep Android Open

https://f-droid.org/assets/fdroid-logo_bfHl7nsLHOUQxzdU8-rGIhn4bAgl6z7k2mA3fWoCyT4=.png
F-Droid users were misled into thinking Google canceled plans to lock down Android, but the plans are still scheduled. F-Droid is raising awareness about the issue with a banner in their app and website.

Meta Deployed AI and It Is Killing Our Agency

https://mojodojo.io/wp-content/uploads/2023/10/Untitled-2.png
A high-value Meta ad customer is experiencing repeated account bans for its employees, despite following standard professional practices and having a long history of advertising on the platform. The customer is seeking a manual onboarding pathway for verified agencies and a human-accessible support channel to resolve the issue.

Turn Dependabot Off

https://assets.buttondown.email/images/e10daca1-9504-4b3e-bbf5-71b3262b55a1.png?w=960&fit=max
The author criticizes Dependabot for generating unnecessary security alerts and recommends using govulncheck and scheduled GitHub Actions to filter out irrelevant alerts.

I found a Vulnerability. They found a Lawyer

https://dixken.de/images/blog/costa-rica.jpg
A diving instructor discovered a critical vulnerability in a major diving insurer's member portal, exposing personal data of students, including minors, due to incrementing numeric user IDs and static default passwords. The organization responded with legal threats and an NDA, rather than gratitude and a plan to notify affected users, highlighting a common issue in the security research ...

The Evolution of x86 SIMD: From SSE to AVX-512

https://imgs.xkcd.com/comics/standards.png
Intel and AMD battled for vector supremacy in x86 SIMD, with Intel's MMX and AMD's 3DNow! being key milestones.

Facebook is cooked

https://pilk.website/3/ai-thirst-traps.png
User logged into Facebook after 8 years and found their feed filled with AI-generated thirst traps and spam, but also some genuine content and memes. They were shocked by the extent of the algorithmic feed's focus on engagement bait and decided to leave the platform.

Ggml.ai joins Hugging Face to ensure the long-term progress of Local AI

https://opengraph.githubassets.com/06ed108b249663f0f9daf27d41234ddb8b0d473703a669fc1fff3728f905f1ce/ggml-org/llama.cpp/discussions/19759
Announcement We are happy to announce that ggml.ai (the founding team of llama.cpp) are joining Hugging Face in order to keep future AI truly open. Georgi and team are joining HF with the goal of s...

CERN rebuilt the original browser from 1989 (2019)

https://worldwideweb.cern.ch/images/www_project.png
WorldWideWeb was developed at CERN in 1990 as the precursor to the modern web. In 2019, developers rebuilt the original browser for its 30th anniversary.
https://cdn.arstechnica.net/wp-content/uploads/2026/02/wikipedia-640x493.jpg
Wikipedia editors have decided to deprecate Archive.today due to its involvement in a DDoS attack and altering archived webpages. Over 695,000 links to Archive.today will be removed and replaced with other archive sites.

What Is OAuth?

https://leaflet.pub/p/did%253Aplc%253A3vdrgzr2zybocs45yfhcr6ur/3mfd2oxx5v22b/opengraph-image?4c8fe174a4beabea
OAuth was designed to allow users to grant access to their accounts without sharing passwords, driven by the need for Twitter to support OpenID in 2006. The core idea of OAuth is simple: send a secret to a trusted delegate with user consent, and the delegate can make subsequent requests on the user's behalf.

Microsoft team creates 'revolutionary' data storage system that lasts millennia

https://media.nature.com/lw767/magazine-assets/d41586-026-00502-2/d41586-026-00502-2_52070006.jpg
Microsoft researchers created a glass-based data storage system that can last at least 10,000 years without degrading. The system uses a high-energy laser to imprint data onto borosilicate glass, which can store 4.8 terabytes per 12-centimeter square.

Index, Count, Offset, Size

https://tigerbeetle.com/blog/img/authors/matklad.webp
The author is discussing the importance of naming conventions in preventing bugs in programming. They propose using "count" for the number of items and "index" for a specific item, with a positive invariant of index < count.

Every company building your AI assistant is now an ad company

https://juno-labs.com/public/juno_logo.png
Companies building AI assistants are now funded by advertising, creating a collision course with always-on devices that see and hear everything. Local on-device inference is the only way to prevent data exploitation, requiring a business model based on hardware and software sales, not data collection.

OpenScan

https://openscan.eu/cdn/shop/files/giant_swallowtail_color.jpg?v=1711449488&width=2000
OpenScan offers affordable, open-source 3D scanners for everyone. Our community-driven project combines photogrammetry with modular hardware to create high-quality 3D models. From hobbyists to professionals, OpenScan empowers users worldwide to explore 3D scanning in various fields. Join us in making 3D scanning accessible and push the boundaries of digital preservation and creation.

Cord: Coordinating Trees of AI Agents

https://www.june.kim/assets/default-icon.png
Current AI models are good at planning and breaking down tasks into subproblems, but existing frameworks require developers to predefine the coordination structure. A new framework, Cord, uses a protocol with five primitives and allows agents to understand and use coordination tools they've never seen before, enabling them to decompose tasks and parallelize work on their own.

Show HN: Mines.fyi – all the mines in the US in a leaflet visualization

Free search across 91,000+ US mines from the MSHA open dataset. Filter by state, commodity, mine type, and operator. Mine locations, production history, and employee data — updated weekly.

Blue light filters don't work – controlling total luminance is a better bet

https://substackcdn.com/image/fetch/$s_!b4Tq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9c91f41-2872-4175-a424-45849a9699a6_1950x1579.webp
Using blue light filters at night may not be effective in improving sleep due to their limited ability to reduce light intake, and other methods such as using dark mode, dimming screen brightness, and increasing daytime light exposure can be more beneficial. Controlling light intake and exposure can help regulate the body's circadian rhythm, and taking the right dose of melatonin supplements ...

Across the US, people are dismantling and destroying Flock surveillance cameras

https://substackcdn.com/image/fetch/$s_!szBv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe4c8e48-8b26-457b-8969-f95db3c9c113_2048x1366.jpeg
Civilians are pushing back against surveillance and data collection by destroying Flock cameras and protesting data center projects, while gig workers demand stolen wages be returned. Resistance to Flock and data centers is widespread, with many cities rejecting contracts and residents taking action against surveillance.

The path to ubiquitous AI (17k tokens/sec)

https://taalas.com/h-content/uploads/2026/02/Taalas-HC1.png
Taalas developed a platform to transform AI models into custom silicon, resulting in faster, cheaper, and lower power hardware. Their first product, a hard-wired Llama 3.1 8B, achieves 10X faster performance, 20X lower cost, and 10X lower power consumption than current state-of-the-art solutions.

Trump's global tariffs struck down by US Supreme Court

https://static.files.bbci.co.uk/core/website/assets/static/news/incident-types/light-mode/analysis.77b314ef10.svg
The Supreme Court ruled against President Trump's ability to impose tariffs, citing Congress's power to do so. This decision represents a rare check on Trump's executive authority.

SwiftForth IDE for Windows, Linux, macOS

https://www.forth.com/wp-content/uploads/2015/01/hello-world-demo.png
SwiftForth is a high-performance development environment for Windows, Linux, and macOS that uses the Forth programming language. It provides a full-featured, interactive IDE with access to native system functions and supports object-oriented programming through the SWOOP package.

Making frontier cybersecurity capabilities available to defenders

https://www-cdn.anthropic.com/images/4zrzovbb/website/802260d34a0653f23fd4944fae43064df367aa44-1000x1000.svg
Claude Code Security scans codebases for security vulnerabilities and suggests patches for human review. It uses AI to detect novel vulnerabilities and reduce the risk of attacks by allowing teams to find and fix issues before they are exploited.

Lil' Fun Langs

https://i.lede.me/?title=Lil%27+Fun+Langs&lede=a+pungent+monad+odor+that+attracts+mathochists&author=taylor.town&date=2026.02.20
The user discusses various small programming languages, including Iota, tinylisp, milliForth, and Fractran, and highlights notable examples of ML-style languages such as Haskell, Elm, and OCaml. They also mention several implementations of functional languages, including Write You a Haskell, Implementing Functional Languages, and The ZINC experiment, showcasing their capability-to-size ratio ...

The true story behind the Toronto mystery tunnel

The website is blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

Show HN: A native macOS client for Hacker News, built with SwiftUI

https://raw.githubusercontent.com/IronsideXXVI/Hacker-News/main/.github/screenshots/article-view.png
Download the latest DMG from the Releases page, open it, and drag the app to Applications. That's it — no Xcode or developer tools needed.

Untapped Way to Learn a Codebase: Build a Visualizer

The author learns an unfamiliar codebase by starting with a bug report, reducing it to a minimal case, and understanding the code involved in the bug. They use visualization to see how the code flows through the system.

Building a model that visualizes strategic golf

https://substackcdn.com/image/fetch/$s_!Cva7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F619aa3d6-6bab-49b4-8a3f-b9737df5b86c_2214x1116.png
The user created a golf simulator to visualize golf course architecture using strokes-to-hole calculations, expanding on Mark Broadie's strokes gained approach. The simulator maps show where holes are difficult or easy, highlighting strategic design features and potential hazards.

Reproducible and traceable configuration for Conan C and C++ package manager

Conan configuration packages provide a simple way to distribute and share configuration across CI and developer machines, ensuring reproducibility and traceability. They can be managed with the same rigor as C++ libraries, using versioning capabilities like version ranges and lockfiles.

Colorado moves age checks from websites to operating systems

https://d1sr9z1pdl3mb7.cloudfront.net/wp-content/uploads/2025/02/14100643/teens-phones-1024x683.jpg
Colorado lawmakers are revisiting online age verification, focusing on how to protect children without burdening adults' rights. A new bill, SB 26-051, shifts responsibility to operating system providers and app developers to verify users' ages.

How to Review an AUR Package

https://bertptrs.nl/assets/2026/security.webp
The Arch Linux team removed malware from the AUR and explained how to review PKGBUILD files to prevent future malicious uploads. Reviewers should check the sources, functions, and scripts in PKGBUILD files to ensure they are trustworthy and follow best practices.