Show HN: s@: decentralized social networking over static sites
WireGuard Is Two Things
The article discusses WireGuard, a modern VPN protocol, highlighting its dual nature as both a simple and complex technology. It explores the protocol's design principles, ease of use, and potential security implications.
Temporal: The 9-year journey to fix time in JavaScript
The article discusses the Temporal API, a new JavaScript standard that simplifies date and time manipulation. It provides an overview of the Temporal API's features, including its ability to handle time zones, calendars, and various date/time formats.
Tested: How Many Times Can a DVD±RW Be Rewritten? Methodology and Results
The article investigates the rewritability of DVD±RW discs, examining their lifespan and the number of times they can be rewritten. It provides detailed methodology and results, offering insights into the durability and limitations of this type of optical media.
Making WebAssembly a first-class language on the Web
The article discusses Mozilla's efforts to make WebAssembly a first-class language on the web, by improving its performance, interoperability, and developer experience, with the goal of enabling a more diverse set of applications on the web.
Iran-backed hackers claim wiper attack on medtech firm Stryker
Iranian-backed hackers claim to have conducted a 'wiper' cyberattack on the medical technology firm Stryker, potentially disrupting its operations. The article discusses the hackers' claims and the potential impact of such attacks on the healthcare industry.
Many SWE-bench-Passing PRs would not be merged
The article discusses how many software engineering benchmarking pull requests that pass tests would not be merged into the main codebase, highlighting the challenges of balancing automated testing and human review in software development.
WebPKI and You
The article discusses the importance of WebPKI (Web Public Key Infrastructure) and its role in securing web communication. It explains the basics of how WebPKI works, the entities involved, and the challenges it faces in maintaining trust and reliability in the modern internet landscape.
Don't post generated/AI-edited comments. HN is for conversation between humans
The article outlines Hacker News' guidelines for submissions, including recommendations for creating high-quality posts, avoiding common pitfalls, and maintaining a constructive community. It emphasizes the importance of sharing interesting and thought-provoking content while adhering to the site's rules and principles.
I was interviewed by an AI bot for a job
https://archive.ph/DEwy7
Show HN: A context-aware permission guard for Claude Code
We needed something like --dangerously-skip-permissions that doesn’t nuke your untracked files, exfiltrate your keys, or install malware.
Claude Code's permission system is allow-or-deny per tool, but that doesn’t really scale. Deleting some files is fine sometimes. And git checkout is sometimes not fine. Even when you curate permissions, 200 IQ Opus can find a way around it. Maintaining a deny list is a fool's errand.
nah is a PreToolUse hook that classifies every tool call by what it actually does, using a deterministic classifier that runs in milliseconds. It maps commands to action types like filesystem_read, package_run, db_write, git_history_rewrite, and applies policies: allow, context (depends on the target), ask, or block.
Not everything can be classified, so you can optionally escalate ambiguous stuff to an LLM, but that’s not required. Anything unresolved you can approve, and configure the taxonomy so you don’t get asked again.
It works out of the box with sane defaults, no config needed. But you can customize it fully if you want to.
No dependencies, stdlib Python, MIT.
pip install nah && nah install
https://github.com/manuelschipper/nah
About memory pressure, lock contention, and Data-oriented Design
This article explores the concepts of memory pressure, lock contention, and data-oriented design in software development. It provides insights into optimizing system performance by understanding and addressing these fundamental architectural considerations.
Datahäxan
This article explores the historical depiction and symbolism of witches, highlighting their representation in art and the complex mix of fear, fascination, and mysticism surrounding them throughout history.
The MacBook Neo
https://www.pcmag.com/news/asus-co-ceo-macbook-neo-is-a-shoc...
Entities enabling scientific fraud at scale (2025)
Google closes deal to acquire Wiz
Previously: Google to buy Wiz for $32B - https://news.ycombinator.com/item?id=43398518 - March 2025 (845 comments)
Show HN: I built a tool that watches webpages and exposes changes as RSS
I built Site Spy after missing a visa appointment slot because a government page changed and I didn’t notice for two weeks.
It watches webpages for changes and shows the result like a diff. The part I think HN might find interesting is that it can monitor a specific element on a page, not just the whole page, and it can expose changes as RSS feeds.
So instead of tracking an entire noisy page, you can watch just a price, a stock status, a headline, or a specific content block. When it changes, you can inspect the diff, browse the snapshot history, or follow the updates in an RSS reader.
It’s a Chrome/Firefox extension plus a web dashboard.
Main features:
- Element picker for tracking a specific part of a page
- Diff view plus full snapshot timeline
- RSS feeds per watch, per tag, or across all watches
- MCP server for Claude, Cursor, and other AI agents
- Browser push, Email, and Telegram notifications
Chrome: https://chromewebstore.google.com/detail/site-spy/jeapcpanag...
Firefox: https://addons.mozilla.org/en-GB/firefox/addon/site-spy/
Docs: https://docs.sitespy.app
I’d especially love feedback on two things:
- Is RSS actually a useful interface for this, or do most people just want direct alerts?
- Does element-level tracking feel meaningfully better than full-page monitoring?
What Happens After You Die? (2016)
The article explores the potential scenarios for the end of the world, examining both natural and human-caused catastrophes like climate change, nuclear war, and technological singularity, and discusses the psychological and societal impacts of contemplating such existential threats.
BitNet: 100B Param 1-Bit model for local CPUs
BitNet is an open-source project by Microsoft that aims to provide a scalable and efficient blockchain network for decentralized applications. The project explores novel consensus mechanisms and optimization techniques to address the performance and scalability challenges of traditional blockchain platforms.
Faster asin() was hiding in plain sight
The article discusses a technique called 'Faster ASIN' that can improve the performance of certain image processing algorithms. It explains how this method was previously overlooked, despite being a simple and efficient solution that was hiding in plain sight.
Challenging the Single-Responsibility Principle
The article discusses the 'Keep It Simple, Stupid' (KISS) principle, which emphasizes the importance of simplicity in design and development. It highlights the benefits of keeping things simple, such as improving maintainability, reducing complexity, and enhancing user experience.
Show HN: Autoresearch@home
autoresearch@home is a collaborative research collective where AI agents share GPU resources to collectively improve a language model. Think SETI@home, but for model training.
How it works: Agents read the current best result, propose a hypothesis, modify train.py, run the experiment on your GPU, and publish results back. When an agent beats the current best validation loss, that becomes the new baseline for every other agent. Agents learn from great runs and failures, since we're using Ensue as the collective memory layer.
This project extends Karpathy's autoresearch by adding the missing coordination layer so agents can actually build on each other's work.
To participate, you need an agent and a GPU. The agent handles everything: cloning the repo, connecting to the collective, picking experiments, running them, publishing results, and asking you to verify you're a real person via email.
Send this prompt to your agent to get started: Read https://github.com/mutable-state-inc/autoresearch-at-home follow the instructions join autoresearch and start contributing.
This whole experiment is to prove that agents work better when they can build off other agents. The timeline is live, so you can watch experiments land in real time.
Urea prices
The article discusses the price of urea, a widely used nitrogen-based fertilizer, and its fluctuations on the global commodity market. It provides an overview of the current urea price, its historical trends, and the factors that influence its supply and demand, such as agricultural production, energy costs, and government policies.
DHS Contracts Explorer – Hacked data from the Office of Industry Partnership
The article examines the contracts between U.S. Immigration and Customs Enforcement (ICE) and private companies that run immigration detention centers. It highlights the lack of transparency and accountability in these contracts, which can contribute to poor conditions for detainees.
Meticulous (YC S21) is hiring to redefine software dev
Meticulous, a software company, is seeking a Lead Product Designer to join their team. The role involves collaborating with cross-functional teams, driving the design vision, and championing user-centric solutions to solve complex problems.
CNN Explainer – Learn Convolutional Neural Network in Your Browser (2020)
The article provides an interactive visualization tool that explains the inner workings of Convolutional Neural Networks (CNNs), a widely used deep learning architecture for image recognition tasks. The tool allows users to interactively explore and understand the key components and concepts of CNNs, such as convolution, pooling, and activation functions.
5,200 holes carved into a Peruvian mountain left by an ancient economy
Researchers have discovered over 5,200 mysterious holes in a mountain in Peru, raising questions about their origin and purpose. The article explores various theories, including their potential connection to ancient human activities or natural geological processes.
Show HN: Klaus – OpenClaw on a VM, batteries included
We are Bailey and Robbie and we are working on Klaus (https://klausai.com/): hosted OpenClaw that is secure and powerful out of the box.
Running OpenClaw requires setting up a cloud VM or local container (a pain) or giving OpenClaw root access to your machine (insecure). Many basic integrations (eg Slack, Google Workspace) require you to create your own OAuth app.
We make running OpenClaw simple by giving each user their own EC2 instance, preconfigured with keys for OpenRouter, AgentMail, and Orthogonal. And we have OAuth apps to make it easy to integrate with Slack and Google Workspace.
We are both HN readers (Bailey has been on here for ~10 years) and we know OpenClaw has serious security concerns. We do a lot to make our users’ instances more secure: we run on a private subnet, automatically update the OpenClaw version our users run, and because you’re on our VM by default the only keys you leak if you get hacked belong to us. Connecting your email is still a risk. The best defense I know of is Opus 4.6 for resilience to prompt injection. If you have a better solution, we’d love to hear it!
We learned a lot about infrastructure management in the past month. Kimi K2.5 and Mimimax M2.5 are extremely good at hallucinating new ways to break openclaw.json and otherwise wreaking havoc on an EC2 instance. The week after our launch we spent 20+ hours fixing broken machines by hand.
We wrote a ton of best practices on using OpenClaw on AWS Linux into our users’ AGENTS.md, got really good at un-bricking EC2 machines over SSM, added a command-and-control server to every instance to facilitate hotfixes and migrations, and set up a Klaus instance to answer FAQs on discord.
In addition to all of this, we built ClawBert, our AI SRE for hotfixing OpenClaw instances automatically: https://www.youtube.com/watch?v=v65F6VBXqKY. Clawbert is a Claude Code instance that runs whenever a health check fails or the user triggers it in the UI. It can read that user’s entries in our database and execute commands on the user’s instance. We expose a log of Clawbert’s runs to the user.
We know that setting up OpenClaw is easy for most HN readers, but I promise it is not for most people. Klaus has a long way to go, but it’s still very rewarding to see people who’ve never used Claude Code get their first taste of AI agents.
We charge $19/m for a t4g.small, $49/m for a t4g.medium, and $200/m for a t4g.xlarge and priority support. You get $15 in tokens and $20 in Orthogonal credits one-time.
We want to know what you are building on OpenClaw so we can make sure we support it. We are already working with companies like Orthogonal and Openrouter that are building things to make agents more useful, and we’re sure there are more tools out there we don’t know about. If you’ve built something agents want, please let us know. Comments welcome!
Against vibes: When is a generative model useful
The article argues that generative models can be useful in specific applications, but cautions against relying on 'vibes' or intuition when evaluating their efficacy. It emphasizes the importance of rigorous testing and quantitative analysis in determining the appropriate use cases for generative models.
Britain is ejecting hereditary nobles from Parliament after 700 years
The UK House of Lords has voted to expel all remaining hereditary peers, marking the end of a centuries-old tradition. This move aims to make the upper chamber more representative and accountable, as the government continues its efforts to reform the House of Lords.