A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
Today the AI crowd cheers as new models and TPU muscle drop… Meanwhile security headlines sting: a crypto org loses its key, banks scramble after a fintech breach, and prompt injection bites Google… Culture pops as DOOM runs on PCB traces and the EV1 rolls again… Platforms and policy stir heat with Counter‑Strike item chaos and expanded surveillance contracts. Curiosity wins, trust wobbles.
Meta drops SAM 3, one model to rule the pixels
Meta unveils SAM 3, a unified system for detection, segmentation, and tracking across images and video with text and visual prompts. It’s a practical multimodal boost that feels ready for real workflows, not just demos—HN loves the hands‑on playground.
Google's Ironwood TPU promises speed for giant brains
Google touts Ironwood TPU as cloud‑scale compute tuned for the largest AI models, promising speed and efficiency gains. It’s a hardware flex in the compute arms race, with devs eyeing price‑perf and real throughput before declaring victory.
FLUX.2 aims at pros, not party tricks
FLUX.2 pitches pro tools for consistent style and character control across shots, not just flashy one‑offs. With pro and flex tiers and workflow‑friendly features, creators see it as pressure on incumbents like Adobe and a sign that generative AI is growing up.
Onyx open-sources a turbo chat UI for any LLM
Onyx launches an open source chat UI that plugs into any LLM—open weights or proprietary—and adds tooling for retrieval, memory, and extensibility. Builders cheer the control and transparency, hungry for alternatives to closed chat silos.
MoE gets math: LP-based load balancing lands
LPLB applies linear programming to distribute work across Mixture‑of‑Experts models, promising smarter parallelism and fewer hot spots than heuristic balancers. With nods from NVIDIA, the lab vibes are strong—and ops folks want benchmarks.
Sutskever says scaling era ends; research rises
SSI cofounder Ilya Sutskever argues the age of brute scaling is fading as research into generalization, data quality, and RL takes center stage. The crowd nods—compute helps, but smarter training and safety loom large for any road to AGI.
Crypto group loses key, cancels its own election
The IACR halts leadership results after an official loses the encrypted key for Helios ballots, despite a 2‑of‑3 threshold scheme. Painful irony for a cryptology body, and a sobering reminder that key management—not math—often breaks trust.
Prompt poison tricks Antigravity into exfiltration
A crafty prompt injection in a blog lures Antigravity to spin up a malicious browser subagent, leaking IDE credentials and code. The demo rattles devs: agentic AI plus Gemini‑style tools can become side‑channels unless guardrails and scopes are tight.
US banks race after fintech breach and data theft
A cyberattack on SitusAMC triggers a scramble by JPMorgan and lenders to assess data exfiltration. Reports flag encrypting malware and stolen records. Financial cybersecurity anxiety spikes as firms sift impacts and customers ask hard questions.
AI-aided JDBC audit nets $85k in bounties
Researchers use AI and tooling like Hacktron CLI to scan JDBC drivers, uncovering high‑impact bugs across vendors like Databricks and Exasol—earning $85k. The mood: automate the boring parts, catch the ugly parts, and share the playbook.
PSA: Stop pasting passwords into random sites
watchTowr scolds the habit of dumping passwords into sketchy checkers and forms. Even with TLS/SSL, social engineering and lousy hygiene sink defenses. The message lands: you are the attack surface—use password managers, not curiosity.
ZoomInfo CEO blocks critic amid biometric tracking
A researcher documents pre‑consent biometric tracking in ZoomInfo GTM Studio; the CEO reportedly blocks him on social. Privacy alarms ring as users question consent flows and whether behavioral biometrics belong in lead‑gen at all.
DOOM runs on copper traces and an audio jack
A wild DOOM vector renderer builds levels from KiCad footprints and PCB copper, even piping visuals through an audio jack. It’s pure hacker theater: equal parts clever engineering and art, with HN cheering the playful hardware madness.
GM EV1 returns: rescued, driveable again
A rare GM EV1—icon of 1990s electric history—gets restored to driveable status via Electrek Garage. Nostalgia surges as enthusiasts relive a path not taken and connect dots to modern EVs like the Chevy S10 Electric story.
Emacs on Android? Surprisingly good
Running Emacs on Android via F‑Droid proves shockingly usable, from keybindings to packages. Devs grin at a pocket Lisp machine, a reminder that open tools travel well—and mobile workflows don’t have to be walled gardens.
Debian's APT flirts with Rust, sparks debate
A Rust requirement around APT raises questions in Debian land: safety and modern tooling vs. portability and contributor friction. The vibe is familiar—progress meets pragmatism—and users want clear migration paths, not surprises.
A love letter to Linux praises the GNU ethos, the kernel’s design, and the pragmatic joy of picking your stack. It’s not fanboy fare; it’s a case for open systems that respect users and let builders build without permission.
Show HN: Payments without webhooks
Flowglad debuts an open source payment processor with zero webhooks, a single source of truth, and flexible pricing models. Built with Next.js/React, it taps HN’s appetite for simpler billing stacks and fewer moving parts.
A unified model for detection, segmentation, and tracking across images and video—signal boost for multimodal AI tooling and open research; a crowd-pleaser with practical demos.
Google flexes AI hardware with a new TPU pitched for massive models—speed, efficiency, and Cloud-ready muscle as compute wars heat up.
A top crypto org loses access to its own election results—an embarrassing trust failure that spotlights key management risks in real-world governance.
A sweeping expansion of outsourced surveillance, lifting caps and inviting private firms; raises civil liberties alarms and tech policy questions.
A viral maker feat: DOOM rendered with PCB copper traces and audio tricks—joyful hardware art that electrifies the dev community.
A rule change nukes up to $2B of digital item value—spotlighting platform power, opaque terms, and consumer protection gaps in virtual economies.
Pro-grade image generation focused on real workflows and consistency—an enterprise-friendly push that keeps pressure on incumbents.
This retrospective ranks major Windows GUI versions from Windows 1.0 (1985) to Windows 11 (as of 2023) using a 1–10 “Clippy” scale focused on how each interface looks today. The excerpt covers Windows...
A study led by UC Santa Cruz and published in Nature Neuroscience finds that human brain organoids exhibit structured electrical activity before any sensory experience, implying the brain may be preco...
A Raspberry Pi-based NTP server using a GPS PPS reference showed persistent frequency drift despite the high-quality timing input. Extended monitoring with Grafana revealed a strong correlation betwee...
An experienced Unix user reflects on why GNU/Linux remains central to their computing life. Starting in 1996, they found the Unix shell’s composability empowering, leading to daily Linux use once hard...
This article describes how the author canceled a €19.99/month Netflix plan and reallocated the same budget across three practical subscriptions used daily. They selected Zed Pro (~€10) to improve the ...
The article explores modern C++ design through practical evaluation of C++Builder 13, which adds support for C++20 and C++23. It argues that the language’s evolution calls for a fundamental re-underst...
This article compiles historical coverage of U.S. atmospheric nuclear tests at Nevada’s Test Site and how their effects were witnessed in Los Angeles, roughly 240 miles away. From 1951 to 1992, the Un...
A Show HN project presents a new approach to learning Japanese, positioning itself as a direct challenger to Duolingo. The app’s method centers on transforming binge-watching into productive study ses...
This article examines London’s historical Bills of Mortality, weekly printed lists of deaths and causes that originated around 1530 and became regular by the late 16th century. It explains the data pi...
A research team presents a proof-of-concept knitting machine that fabricates solid 3D textiles using a two-dimensional array of independently actuated needles. Unlike traditional knitting and weaving ...
An AI-assisted remake of Google’s cultural classic “Broccoli Man” was produced in a single Saturday, resulting in a 4-minute short that echoes the original’s tone despite typical generative glitches. ...
Meta unveiled Segment Anything Model 3 (SAM 3), a unified vision model that performs detection, segmentation, and tracking across images and video. SAM 3 adds promptable concept segmentation, acceptin...
This article is a hub page from 2011 that compiles a long-running series of posts by a co-creator of Crash Bandicoot about how the game was made. It serves as an organized index, presenting the comple...
This article presents Shimmer, a method and implementation for discovering nearby peers without relying on GPS. Devices form cryptographic fingerprints from environmental signals—such as WiFi SSIDs—us...
A large-scale study of nearly 4,000 brain scans spanning infancy to age 90 maps five distinct epochs of human brain development, separated by turning points near ages 9, 32, 66, and 83. Researchers qu...
Debian’s APT maintainer Julian Andres Klode plans to introduce Rust dependencies and code into APT as early as May 2026, aiming to improve memory safety and testing in areas such as parsing .deb/.ar/....
Kottke.org features an extended interview with classicist Mary Beard, who argues that the common image of Ancient Rome shaped by Hollywood is incomplete or inaccurate. Drawing on Roman sources, she de...
Onyx (YC W24) introduced an open-source chat UI designed to connect with both proprietary and open-weight large language models while offering a full suite of enterprise-ready capabilities. The team p...
The International Association for Cryptologic Research (IACR) canceled its leadership election after a trustee lost a private key share required to decrypt results from the Helios electronic voting sy...
In October 2025, Valve changed a key mechanic in Counter-Strike 2 by expanding the trade up contract, allowing players to convert common items into premium skins such as knives and gloves. This abrupt...
This IEEE Spectrum analysis examines why large-scale software projects continue to fail despite a surge in global IT spending from US $1.7 trillion in 2005 to $5.6 trillion in 2025 (constant dollars)....
A recent Hard Fork interview with Roblox CEO David Baszucki has intensified scrutiny of the company’s approach to child safety. Roblox, which reports 151.5 million monthly users and explicitly targets...
Kagi has officially launched Orion 1.0 for macOS, moving the privacy-focused browser out of beta and aligning it with its iOS and iPadOS counterparts. Orion is built on WebKit—the open-source engine t...
Black Forest Labs unveiled FLUX.2, a new generation of visual intelligence models tailored for production-grade creative workflows. The suite emphasizes consistency across multiple reference images, a...
This article offers an approachable primer on analog signal filtering by focusing on the behavior of a simple RC circuit, rather than beginning with heavy math. It contrasts the conventional Laplace t...
The article guides developers on choosing cryptographic hash functions that will remain secure and practical into the 2030s, comparing SHA-2 (SHA-256/SHA-512), SHA-3 (SHA3-256/SHA3-512), and BLAKE3 us...
Novo Nordisk announced that a two-year study found its drug Ozempic did not slow the progression of Alzheimer’s disease, dialing back earlier hopes for neurological benefits from the popular weight-lo...
Flowglad introduces a stateless, “zero webhooks” billing platform designed to centralize pricing, feature access, and usage metering as a single source of truth. It integrates with existing authentica...
Vercel outlines how it built v0, its first iOS app, to feel at home on the iPhone. After testing numerous stacks and UI patterns with the ambition of Apple Design Award quality, the team chose React N...
The article introduces LPLB, an early research-stage, linear-programming-based load balancer for Mixture-of-Experts (MoE) training that targets dynamic, per-batch workload imbalances within expert-par...
This article argues that while Python is a serviceable option, it is not a great language for many non–deep learning data science tasks. The author encourages using the best tool for the job and ackno...
Following TPAC 2025, the author clarifies naming around a core CSS feature: it’s acceptable to say “CSS Variables” alongside “Custom Properties.” The post cites the official specification title—“CSS C...
The United Nations’ “World Urbanization Prospects 2025,” released on November 18, reports that Jakarta has overtaken Tokyo as the world’s most populous city, with nearly 42 million residents. The repo...
China’s AI drive, long promoted as a new “productive force” capable of stimulating broad economic growth, is facing mounting skepticism from within the country’s media, policy, academic, and scientifi...
This guide explains how to convert an unused Android phone into a basic home web server using postmarketOS. After confirming device support and installing pmbootstrap on a Linux machine, users generat...
The article demonstrates a security risk in Google’s Antigravity, an agentic code editor powered by Gemini. By opening a poisoned integration guide for Oracle ERP’s Payer AI Agents, Antigravity ingest...
This article explores why artificial gravity is fundamental for sustained human presence in space and revisits historical and engineering pathways to achieve it. It summarizes health risks in microgra...
SitusAMC, a New York-based financial technology firm serving more than a thousand commercial and real estate financiers, disclosed a data breach identified on November 12. The company reported that ha...
Bad UX World Cup 2025 concluded with Dalia winning for the “Perfect Date Picker,” a submission that embraces intentionally bad user experience while remaining functionally capable of selecting a date....
diffchecker.dev is introduced as a fast, secure, fully client-side diff checker for text, code, and structured data. It delivers real-time, character-level comparisons to help users spot subtle change...
This study revisits the longstanding question of genetic versus environmental influences on intelligence by focusing on monozygotic twins reared apart (TRA). While historical aggregate research has re...
Unison 1.0 is presented as a significant milestone for the Unison programming language and its ecosystem. The release indicates that the language itself, its distributed runtime, and the developer wor...
Contracting records reviewed by WIRED show ICE has expanded its plan to outsource immigrant location verification to private firms, shifting from a capped $180 million pilot to an uncapped program wit...
The article reports on a 2023 breakthrough by mathematician Anton Bernshteyn that connects descriptive set theory—focused on the structure and properties of complex, often infinite sets—with modern co...
A unique GM EV1, possibly the only unrestricted example in private hands, has been acquired and will be restored to driving condition. Originally built to satisfy California’s ZEV mandate, the EV1 pro...
A developer discovers that the PinePhone’s Quectel EG25-G GPS/LTE modem supports Android Debug Bridge (ADB) access, revealed by an ADB key in dmesg. Using an unlock utility, they issue AT commands to ...
This interview announcement features Ilya Sutskever discussing Safe Superintelligence (SSI) and a strategic shift in AI from scaling to research. The conversation spans model jaggedness, emotions and ...
Wikipedia has completed a two-month effort to unify its mobile and desktop domains, ending redirects from en.wikipedia.org to en.m.wikipedia.org. Historically, the mobile version was delivered via Med...
The write-up details how Hacktron CLI, an AI-assisted auditing tool, was used to examine multiple decompiled JDBC drivers under a tight bug bounty deadline. A custom “JDBC driver pack” of agents targe...
Following a November 25, 2025 LinkedIn demo by ZoomInfo CEO Henry Schuck showcasing GTM Studio, a security researcher analyzed the product’s landing page and reported extensive tracking occurring befo...
This article charts the lifecycle of Labubus, collectible toys that originated from Kasing Lung’s 2015 picture book series and became a global fad. After building momentum through 2024 and early 2025,...
watchTowr Labs warns that organizations are inadvertently exposing large volumes of passwords, secrets, and keys on public websites, risking sensitive environments. The article, part of the “watchTowr...
The article examines how short-term health insurance plans—characterized as “junk insurance”—can appear prominently in Google search through paid ads and search engine optimization. It distinguishes t...
The post examines recurring challenges in how .NET assembles and ships its releases, despite earlier improvements. As the ecosystem grew into numerous inter-dependent repositories—CoreCLR, CoreFX, Cor...
This technical FAQ by Samuel M. Goldwasser provides comprehensive guidance on the repair and troubleshooting of CRT-based computer and video monitors. It begins with explicit reproduction conditions—r...
KiDoom is a playful yet rigorous technical demo that renders the classic DOOM engine inside KiCad’s PCB editor. Using doomgeneric to run real levels and game logic, it converts DOOM’s internal vector ...
The author of Kaneo, a self-hosted open-source kanban board, describes the realities of maintaining an open-source project after the initial release. Early traction came from posting the project on Re...
The article presents a satirical yet structured critique of YouTube’s declining homepage information density. It references a prior statistical analysis that projected only one video would be visible ...
The article reports on an experiment using image generation models to depict a partially eaten burrito. Drawing inspiration from the 2023 horse riding astronaut meme and influenced by a benchmark refe...
Archaeologists from the Budapest History Museum uncovered a remarkably preserved Roman limestone sarcophagus in Óbuda, a district of Budapest that formed part of the ancient settlement of Aquincum on ...
Google’s Ironwood is the seventh-generation Tensor Processing Unit (TPU) built for today’s AI inference and model serving demands. Announced at Cloud Next and now available to Google Cloud customers, ...
Indeed’s annual analysis highlights a pronounced cooling of the U.S. job market since the 2022 boom, with technology hiring weakening more than other sectors. The company’s Tech Job Postings Index, wh...
Marc Brooker, an AWS engineer, examines error handling strategies in large distributed systems, prompted by Cloudflare’s November 18 outage postmortem that flagged a Rust unwrap. He explains that Rust...
Proton has introduced Proton Meet, a video conferencing service focused on privacy through end-to-end encryption. Designed for both personal and professional use, Meet aims to keep conversations confi...
CS234: Reinforcement Learning (Winter 2025) provides a structured introduction to RL, focusing on autonomous decision-making across applications such as robotics, games, consumer modeling, and healthc...
A report cites Fast Technology in describing an incident where a Shanghai company sent an intern to Suzhou for an Nvidia Roadshow. The event included a stamp-collecting raffle open to all attendees, a...
This long-maintained upgrade guide targets classic Mac Pro models (2006–2012), serving as a curated roadmap to authoritative sources rather than a step-by-step manual. Updated continuously for over fo...
This tutorial explains how CSS Subgrid expands the capabilities of CSS Grid by allowing nested elements to participate directly in a parent grid’s layout. Starting from a portfolio mockup, it demonstr...
This article traces the evolution and practice of special effects as applied to Space: 1999, situating the series within the strong tradition of British SFX. It credits Alexander Korda’s initiative to...
This piece explores how Alien’s Nostromo achieved its iconic “used universe” aesthetic. Ridley Scott describes drawing inspiration from 2001: A Space Odyssey and Dark Star, favoring a grounded, indust...
The article explains how CSS Subgrid enhances CSS Grid by allowing nested elements to share the parent grid’s track definitions. Starting from a portfolio layout built with a flat grid, it highlights ...
This guide evaluates running the native Emacs app on Android and explains how to set it up for different needs. It contrasts the mobile experience with desktop, noting smaller screens and reliance on ...
Marble Springs (1993) is a hypertext work credited to author Deena Larsen and illustrated by Kathleen A. Turner-Suarez. Presented by Eastgate Systems in Watertown, Massachusetts, the release includes ...
Bandwidth Saver is a WordPress plugin focused on accelerating image delivery and cutting bandwidth costs by routing images through Cloudflare’s global edge network. Upon activation, it automatically r...
The article explains Crazyhouse, a chess variant where captured pieces switch sides and can be dropped back onto the board, including to give check. Pawns are the exception, as they cannot be dropped ...
BebboSSH v1.40 delivers a complete SSH2 suite for classic Amiga systems (68000 and above), combining an SSH client and server with SFTP and SCP capabilities. The package includes tools for interactive...
The article investigates the widely held belief among ham radio operators that high VSWR on an untuned antenna causes substantial power loss, often described as energy reflecting back down the feed li...
The Java Decompiler (JD) project provides a suite of open-source tools designed to reconstruct Java source code from compiled .class files, targeting Java 5 bytecode and later. JD-GUI offers a standal...