Chrome extensions spying on users' browsing data
A research study analyzed 287 popular Chrome extensions, revealing that a significant number contained code that could potentially spy on users' online activities, including accessing sensitive data and sending it to external servers without user consent.
FAA closes airspace around El Paso, Texas, for 10 days, grounding all flights
The FAA temporarily closed airspace around El Paso, Texas due to an unspecified 'national security' incident. The closure affected flights and air traffic in the area, though the reason for the closure has not been publicly disclosed.
Do not apologize for replying late to my email
The article discusses the importance of not apologizing for responding to emails, as it can undermine one's confidence and professionalism. It emphasizes the need to communicate effectively and confidently without unnecessary apologies or self-deprecation.
Communities are not fungible
The article discusses the importance of building meaningful communities, emphasizing that communities are not interchangeable or fungible. It highlights the value of fostering unique, diverse, and authentic communities rather than treating them as easily replaceable assets.
A Cosmic Miracle: A Remarkably Luminous Galaxy at z=14.44 Confirmed with JWST
The article reports the confirmation of a remarkably luminous galaxy at a redshift of z = 14.44 using data from the James Webb Space Telescope (JWST), making it one of the most distant galaxies observed to date, providing insights into the early universe.
Stay Hungry, Stay Foolish (2005)
The article is a commencement speech delivered by Steve Jobs at Stanford University in 2005. In the speech, Jobs shares his personal experiences and encourages the graduates to embrace the principles of 'staying hungry' and 'staying foolish' to lead a fulfilling life.
Railway Global Outage
Railway's status page provides real-time updates on the operational status of their platform, including information on any ongoing incidents or maintenance activities that may affect customers.
Show HN: Renovate – The Kubernetes-Native Way
Hey folks, we built a Kubernetes operator for Renovate and wanted to share it. Instead of running Renovate as a cron job or relying on hosted services, this operator lets you manage it as a native Kubernetes resource with CRDs. You define your repos and config declaratively, and the operator handles scheduling and execution inside your cluster. No external dependencies, no SaaS lock-in, no webhook setup. The whole thing is open source and will stay that way – there's no paid tier or monetization plan behind it, we just needed this ourselves and figured others might too.
Would love to hear feedback or ideas if you give it a try: https://github.com/mogenius/renovate-operator
LLMs Are Good at SQL. We Gave Ours Terabytes of CI Logs
This article explores how large language models (LLMs) can be effectively used for SQL tasks, highlighting their ability to generate complex SQL queries, troubleshoot issues, and explain query results in a human-readable format.
Show HN: Claudit – Claude Code Conversations as Git Notes, Automatically
Uses agent and Git Hooks to automatically create Git Notes on commit, containing the agent conversation that led to that commit. Works if either you or the agent commit.
It's basically the same thing as entire.io just announced that they got $60m investment for. Except I got Claude Code to write it last week, in my spare time, without really paying attention. I certainly didn't read or write any of the code, except for one rubbish joke in the README.
I've got a Claude Code instance working on Gemini CLI support and OpenCode support currently.
The Banality of MAGA Evil
The article examines the 'banality of evil' within the MAGA movement, discussing how ordinary people can participate in and enable harmful ideologies without fully understanding the consequences. It explores the normalization of extremism and the need to confront the underlying forces that drive such dangerous political trends.
Building a semantic search engine in ±250 lines of Python
This article details the construction of a semantic search engine in just 250 lines of Python code. It covers the implementation of a text processing pipeline, vector embedding, and a search engine that can find relevant documents based on user queries.
European nations gear up to ban social media for children
European countries are considering banning or restricting social media access for children, citing concerns over the negative mental health impacts of platforms like Instagram and TikTok, which have been linked to increased anxiety and depression among young users.
Tech workers are frustrated by their companies silence about ICE
The article discusses the growing resistance among tech workers against their companies' involvement with U.S. Immigration and Customs Enforcement (ICE). It highlights the efforts of tech employees to pressure their employers to cut ties with ICE and the broader debate surrounding the ethical responsibilities of tech companies and their employees.
Why capital is fleeing Tech for the Tangible Economy
The article discusses the 'great rotation' in the financial markets, where capital is fleeing from growth and technology stocks and moving towards value and cyclical sectors. This shift is driven by rising interest rates, high inflation, and expectations of a potential economic slowdown.
Deploying Rust to Production Checklist
This article provides a comprehensive checklist for deploying Rust applications in production, covering essential aspects such as error handling, monitoring, security, and more. It offers practical guidance to ensure Rust projects are reliable, scalable, and secure when running in a production environment.
Show HN: Auditi – open-source LLM tracing and evaluation platform
I've been building AI agents at work and the hardest part isn't the prompts or orchestration – it's answering "is this agent actually good?" in production.
Tracing tells you what happened. But I wanted to know how well it happened. So I built Auditi – it captures your LLM traces and spans and automatically evaluates them with LLM-as-a-judge + human annotation workflows.
Two lines to get started:
auditi.init(api_key="...")
auditi.instrument() # monkey-patches OpenAI/Anthropic/Gemini
Every API call is captured with full span trees, token usage, and costs. No code changes to your existing LLM calls.The interesting technical bit: the SDK monkey-patches client.chat.completions.create() at runtime (similar to how OpenTelemetry auto-instruments HTTP libraries). It wraps streaming responses with proxy iterators that accumulate content and extract usage from the final chunk – so even streamed responses get full cost tracking without the user doing anything.
What makes this different from just tracing: - Built-in evaluators – 7 managed LLM judges (hallucination, relevance, correctness, toxicity, etc.) run automatically on every trace - Span-level evaluation – scores each step in a multi-step agent, not just the final output - Human annotation queues – when you need ground truth, not just vibes - Dataset export – annotated traces export as JSONL/CSV/Parquet for fine-tuning
Self-host with docker compose up.
I'd love feedback from anyone running AI agents or LLMs in production. What metrics do you actually look at? How do you decide if an agent response is "good enough"?
GitHub: https://github.com/deduu/auditi
I built Fluxer, a Discord-like chat app
The article describes the process of building Fluxer, a Discord-like chat application. It covers the key technologies and architectural decisions involved in developing the web-based platform, including the use of WebSockets for real-time communication and a React-based frontend.
The Bottleneck: Why Faster Coding Doesn't Speed Up Projects
The article discusses the common misconception that faster coding leads to faster project completion, highlighting that the actual bottleneck is often in the planning, communication, and problem-solving stages rather than the coding itself. It emphasizes the importance of addressing these underlying issues to improve overall project efficiency.
Archive.today: Operator uses users for DDoS attack
The article discusses an incident where an archive service operator used its users' computers to carry out a distributed denial-of-service (DDoS) attack against another website, highlighting the potential risks of web services abusing user resources for malicious purposes.