Top stories

remywang about 7 hours ago

Show HN: s@: decentralized social networking over static sites

satproto.org
194 71
mlhpdx about 2 hours ago

WireGuard Is Two Things

The article discusses WireGuard, a modern VPN protocol, highlighting its dual nature as both a simple and complex technology. It explores the protocol's design principles, ease of use, and potential security implications.

proxylity.com
39 9
Summary
Temporal: The 9-year journey to fix time in JavaScript
robpalmer about 16 hours ago

Temporal: The 9-year journey to fix time in JavaScript

The article discusses the Temporal API, a new JavaScript standard that simplifies date and time manipulation. It provides an overview of the Temporal API's features, including its ability to handle time zones, calendars, and various date/time formats.

bloomberg.github.io
618 200
Summary
Tested: How Many Times Can a DVD±RW Be Rewritten? Methodology and Results
giuliomagnifico 4 days ago

Tested: How Many Times Can a DVD±RW Be Rewritten? Methodology and Results

The article investigates the rewritability of DVD±RW discs, examining their lifespan and the number of times they can be rewritten. It provides detailed methodology and results, offering insights into the durability and limitations of this type of optical media.

goughlui.com
111 13
Summary
Making WebAssembly a first-class language on the Web
mikece 1 day ago

Making WebAssembly a first-class language on the Web

The article discusses Mozilla's efforts to make WebAssembly a first-class language on the web, by improving its performance, interoperability, and developer experience, with the goal of enabling a more diverse set of applications on the web.

hacks.mozilla.org
499 171
Summary
2bluesc about 4 hours ago

Iran-backed hackers claim wiper attack on medtech firm Stryker

Iranian-backed hackers claim to have conducted a 'wiper' cyberattack on the medical technology firm Stryker, potentially disrupting its operations. The article discusses the hackers' claims and the potential impact of such attacks on the healthcare industry.

krebsonsecurity.com
109 32
Summary
Many SWE-bench-Passing PRs would not be merged
mustaphah about 10 hours ago

Many SWE-bench-Passing PRs would not be merged

The article discusses how many software engineering benchmarking pull requests that pass tests would not be merged into the main codebase, highlighting the challenges of balancing automated testing and human review in software development.

metr.org
203 80
Summary
aragilar 3 days ago

WebPKI and You

The article discusses the importance of WebPKI (Web Public Key Infrastructure) and its role in securing web communication. It explains the basics of how WebPKI works, the entities involved, and the challenges it faces in maintaining trust and reliability in the modern internet landscape.

blog.brycekerley.net
13 1
Summary
usefulposter about 12 hours ago

Don't post generated/AI-edited comments. HN is for conversation between humans

The article outlines Hacker News' guidelines for submissions, including recommendations for creating high-quality posts, avoiding common pitfalls, and maintaining a constructive community. It emphasizes the importance of sharing interesting and thought-provoking content while adhering to the site's rules and principles.

news.ycombinator.com
3,258 1,234
Summary
I was interviewed by an AI bot for a job
speckx about 13 hours ago

I was interviewed by an AI bot for a job

https://archive.ph/DEwy7

schwarztech.net
242 224
Summary
Show HN: A context-aware permission guard for Claude Code
schipperai about 8 hours ago

Show HN: A context-aware permission guard for Claude Code

We needed something like --dangerously-skip-permissions that doesn’t nuke your untracked files, exfiltrate your keys, or install malware.

Claude Code's permission system is allow-or-deny per tool, but that doesn’t really scale. Deleting some files is fine sometimes. And git checkout is sometimes not fine. Even when you curate permissions, 200 IQ Opus can find a way around it. Maintaining a deny list is a fool's errand.

nah is a PreToolUse hook that classifies every tool call by what it actually does, using a deterministic classifier that runs in milliseconds. It maps commands to action types like filesystem_read, package_run, db_write, git_history_rewrite, and applies policies: allow, context (depends on the target), ask, or block.

Not everything can be classified, so you can optionally escalate ambiguous stuff to an LLM, but that’s not required. Anything unresolved you can approve, and configure the taxonomy so you don’t get asked again.

It works out of the box with sane defaults, no config needed. But you can customize it fully if you want to.

No dependencies, stdlib Python, MIT.

pip install nah && nah install

https://github.com/manuelschipper/nah

github.com
88 34
About memory pressure, lock contention, and Data-oriented Design
vinhnx 4 days ago

About memory pressure, lock contention, and Data-oriented Design

This article explores the concepts of memory pressure, lock contention, and data-oriented design in software development. It provides insights into optimizing system performance by understanding and addressing these fundamental architectural considerations.

mnt.io
34 1
Summary
Datahäxan
akkartik 3 days ago

Datahäxan

This article explores the historical depiction and symbolism of witches, highlighting their representation in art and the complex mix of fear, fascination, and mysticism surrounding them throughout history.

0dd.company
6 0
Summary
The MacBook Neo
etothet about 20 hours ago

The MacBook Neo

https://www.pcmag.com/news/asus-co-ceo-macbook-neo-is-a-shoc...

daringfireball.net
484 798
peyton about 18 hours ago

Entities enabling scientific fraud at scale (2025)

doi.org
283 193
Google closes deal to acquire Wiz
aldarisbm about 16 hours ago

Google closes deal to acquire Wiz

Previously: Google to buy Wiz for $32B - https://news.ycombinator.com/item?id=43398518 - March 2025 (845 comments)

wiz.io
270 166
Summary
Show HN: I built a tool that watches webpages and exposes changes as RSS
vkuprin about 15 hours ago

Show HN: I built a tool that watches webpages and exposes changes as RSS

I built Site Spy after missing a visa appointment slot because a government page changed and I didn’t notice for two weeks.

It watches webpages for changes and shows the result like a diff. The part I think HN might find interesting is that it can monitor a specific element on a page, not just the whole page, and it can expose changes as RSS feeds.

So instead of tracking an entire noisy page, you can watch just a price, a stock status, a headline, or a specific content block. When it changes, you can inspect the diff, browse the snapshot history, or follow the updates in an RSS reader.

It’s a Chrome/Firefox extension plus a web dashboard.

Main features:

- Element picker for tracking a specific part of a page

- Diff view plus full snapshot timeline

- RSS feeds per watch, per tag, or across all watches

- MCP server for Claude, Cursor, and other AI agents

- Browser push, Email, and Telegram notifications

Chrome: https://chromewebstore.google.com/detail/site-spy/jeapcpanag...

Firefox: https://addons.mozilla.org/en-GB/firefox/addon/site-spy/

Docs: https://docs.sitespy.app

I’d especially love feedback on two things:

- Is RSS actually a useful interface for this, or do most people just want direct alerts?

- Does element-level tracking feel meaningfully better than full-page monitoring?

sitespy.app
217 50
Summary
NaOH 3 days ago

What Happens After You Die? (2016)

The article explores the potential scenarios for the end of the world, examining both natural and human-caused catastrophes like climate change, nuclear war, and technological singularity, and discusses the psychological and societal impacts of contemplating such existential threats.

lamag.com
19 10
Summary
BitNet: 100B Param 1-Bit model for local CPUs
redm about 19 hours ago

BitNet: 100B Param 1-Bit model for local CPUs

BitNet is an open-source project by Microsoft that aims to provide a scalable and efficient blockchain network for decentralized applications. The project explores novel consensus mechanisms and optimization techniques to address the performance and scalability challenges of traditional blockchain platforms.

github.com
327 160
Summary
def-pri-pub about 17 hours ago

Faster asin() was hiding in plain sight

The article discusses a technique called 'Faster ASIN' that can improve the performance of certain image processing algorithms. It explains how this method was previously overlooked, despite being a simple and efficient solution that was hiding in plain sight.

16bpp.net
186 103
Summary
WolfOliver 4 days ago

Challenging the Single-Responsibility Principle

The article discusses the 'Keep It Simple, Stupid' (KISS) principle, which emphasizes the importance of simplicity in design and development. It highlights the benefits of keeping things simple, such as improving maintainability, reducing complexity, and enhancing user experience.

kiss-and-solid.com
17 9
Summary
austinbaggio about 8 hours ago

Show HN: Autoresearch@home

autoresearch@home is a collaborative research collective where AI agents share GPU resources to collectively improve a language model. Think SETI@home, but for model training.

How it works: Agents read the current best result, propose a hypothesis, modify train.py, run the experiment on your GPU, and publish results back. When an agent beats the current best validation loss, that becomes the new baseline for every other agent. Agents learn from great runs and failures, since we're using Ensue as the collective memory layer.

This project extends Karpathy's autoresearch by adding the missing coordination layer so agents can actually build on each other's work.

To participate, you need an agent and a GPU. The agent handles everything: cloning the repo, connecting to the collective, picking experiments, running them, publishing results, and asking you to verify you're a real person via email.

Send this prompt to your agent to get started: Read https://github.com/mutable-state-inc/autoresearch-at-home follow the instructions join autoresearch and start contributing.

This whole experiment is to prove that agents work better when they can build off other agents. The timeline is live, so you can watch experiments land in real time.

ensue-network.ai
58 10
Summary
burnt-resistor about 5 hours ago

Urea prices

The article discusses the price of urea, a widely used nitrogen-based fertilizer, and its fluctuations on the global commodity market. It provides an overview of the current urea price, its historical trends, and the factors that influence its supply and demand, such as agricultural production, energy costs, and government policies.

tradingeconomics.com
73 53
Summary
peq42 about 5 hours ago

DHS Contracts Explorer – Hacked data from the Office of Industry Partnership

The article examines the contracts between U.S. Immigration and Customs Enforcement (ICE) and private companies that run immigration detention centers. It highlights the lack of transparency and accountability in these contracts, which can contribute to poor conditions for detainees.

micahflee.github.io
217 40
Summary
Meticulous (YC S21) is hiring to redefine software dev
Gabriel_h about 10 hours ago

Meticulous (YC S21) is hiring to redefine software dev

Meticulous, a software company, is seeking a Lead Product Designer to join their team. The role involves collaborating with cross-functional teams, driving the design vision, and championing user-centric solutions to solve complex problems.

jobs.ashbyhq.com
1 0
Summary
CNN Explainer – Learn Convolutional Neural Network in Your Browser (2020)
vismit2000 4 days ago

CNN Explainer – Learn Convolutional Neural Network in Your Browser (2020)

The article provides an interactive visualization tool that explains the inner workings of Convolutional Neural Networks (CNNs), a widely used deep learning architecture for image recognition tasks. The tool allows users to interactively explore and understand the key components and concepts of CNNs, such as convolution, pooling, and activation functions.

poloclub.github.io
44 2
Summary
5,200 holes carved into a Peruvian mountain left by an ancient economy
defrost 2 days ago

5,200 holes carved into a Peruvian mountain left by an ancient economy

Researchers have discovered over 5,200 mysterious holes in a mountain in Peru, raising questions about their origin and purpose. The article explores various theories, including their potential connection to ancient human activities or natural geological processes.

newatlas.com
117 60
Summary
Show HN: Klaus – OpenClaw on a VM, batteries included
robthompson2018 about 15 hours ago

Show HN: Klaus – OpenClaw on a VM, batteries included

We are Bailey and Robbie and we are working on Klaus (https://klausai.com/): hosted OpenClaw that is secure and powerful out of the box.

Running OpenClaw requires setting up a cloud VM or local container (a pain) or giving OpenClaw root access to your machine (insecure). Many basic integrations (eg Slack, Google Workspace) require you to create your own OAuth app.

We make running OpenClaw simple by giving each user their own EC2 instance, preconfigured with keys for OpenRouter, AgentMail, and Orthogonal. And we have OAuth apps to make it easy to integrate with Slack and Google Workspace.

We are both HN readers (Bailey has been on here for ~10 years) and we know OpenClaw has serious security concerns. We do a lot to make our users’ instances more secure: we run on a private subnet, automatically update the OpenClaw version our users run, and because you’re on our VM by default the only keys you leak if you get hacked belong to us. Connecting your email is still a risk. The best defense I know of is Opus 4.6 for resilience to prompt injection. If you have a better solution, we’d love to hear it!

We learned a lot about infrastructure management in the past month. Kimi K2.5 and Mimimax M2.5 are extremely good at hallucinating new ways to break openclaw.json and otherwise wreaking havoc on an EC2 instance. The week after our launch we spent 20+ hours fixing broken machines by hand.

We wrote a ton of best practices on using OpenClaw on AWS Linux into our users’ AGENTS.md, got really good at un-bricking EC2 machines over SSM, added a command-and-control server to every instance to facilitate hotfixes and migrations, and set up a Klaus instance to answer FAQs on discord.

In addition to all of this, we built ClawBert, our AI SRE for hotfixing OpenClaw instances automatically: https://www.youtube.com/watch?v=v65F6VBXqKY. Clawbert is a Claude Code instance that runs whenever a health check fails or the user triggers it in the UI. It can read that user’s entries in our database and execute commands on the user’s instance. We expose a log of Clawbert’s runs to the user.

We know that setting up OpenClaw is easy for most HN readers, but I promise it is not for most people. Klaus has a long way to go, but it’s still very rewarding to see people who’ve never used Claude Code get their first taste of AI agents.

We charge $19/m for a t4g.small, $49/m for a t4g.medium, and $200/m for a t4g.xlarge and priority support. You get $15 in tokens and $20 in Orthogonal credits one-time.

We want to know what you are building on OpenClaw so we can make sure we support it. We are already working with companies like Orthogonal and Openrouter that are building things to make agents more useful, and we’re sure there are more tools out there we don’t know about. If you’ve built something agents want, please let us know. Comments welcome!

klausai.com
138 75
Summary
takira 1 day ago

Against vibes: When is a generative model useful

The article argues that generative models can be useful in specific applications, but cautions against relying on 'vibes' or intuition when evaluating their efficacy. It emphasizes the importance of rigorous testing and quantitative analysis in determining the appropriate use cases for generative models.

williamjbowman.com
72 10
Summary
Britain is ejecting hereditary nobles from Parliament after 700 years
divbzero about 10 hours ago

Britain is ejecting hereditary nobles from Parliament after 700 years

The UK House of Lords has voted to expel all remaining hereditary peers, marking the end of a centuries-old tradition. This move aims to make the upper chamber more representative and accountable, as the government continues its efforts to reform the House of Lords.

apnews.com
238 237
Summary