A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
Air travel jolts as Airbus warns A320 computers may corrupt under intense solar radiation... EASA calls for immediate fixes... Meanwhile Europe tightens the privacy screws — the EU Council revives Chat Control, and Switzerland curbs public cloud... Google denies Gmail trains AI with your emails... Linux runs Windows apps with WinApps... Neato vacuums go dark... Rumors swirl on Apple–Intel chips... Builders hack, watchdogs warn, and users brace for impact.
Airbus warns radiation may corrupt A320 flight data
In a stark Alert Operators Transmission, Airbus and EASA say intense solar radiation can corrupt A320 flight‑control computer data. Operators must apply checks and mitigations now. Flyers and techies alike debate software resilience and cosmic rays as safety takes center stage.
Airbus requests urgent mods on 6,000 planes
Following the finding, Airbus requests immediate modifications across thousands of aircraft, warning of potential flight disruptions. The message is clear: software meets space weather, and schedules may suffer while safeguards roll out to keep flight control data clean.
Insiders hint at A320 fly‑by‑wire data hits mid‑flight
Aviation watchers whisper that fly‑by‑wire systems saw mid‑flight data corruption on an A320, possibly affecting ELAC units. Grounding chatter swirls, even as official guidance lands. The mood: uneasy until patches, proofs, and more data calm nerves at 35,000 feet.
Jeep owners get pop‑up ads on in‑car screens
Drivers fume as Stellantis pushes promo pop‑ups to in‑car screens. A Jeep owner confirms the ads; critics call it unsafe and disrespectful. The dashboard isn’t a billboard, they argue, demanding real opt‑outs, fewer distractions, and cars that prioritize drivers over marketing.
Neato vacuums to 'stop working' as cloud shuts
Owners learn their Neato robot vacuums will stop working as the cloud platform winds down under the Vorwerk umbrella. People worry about e‑waste, refunds, and whether smart gadgets should die when servers do. The IoT trust gap widens with every blinking offline light.
EU revives Chat Control despite encryption fears
In closed session, the EU Council revives Chat Control talks on scanning for child abuse, mandating age verification and probing end‑to‑end encryption. Privacy groups warn of mass surveillance; supporters stress safety. Platforms brace for compliance headaches.
Swiss watchdogs curb government use of big cloud
Swiss data protection officers say authorities should avoid international cloud giants without strong end‑to‑end encryption, effectively curbing AWS, Google, and Microsoft 365 for many uses. States weigh sovereignty, costs, and vendor lock‑in against convenience.
Google rebuts claims Gmail trains Gemini on inboxes
Google pushes back after reports claimed Gmail trains Gemini with your emails. The company calls it misleading, while users dissect settings, policies, and trust. Nobody wants their inbox as AI feed without crystal‑clear consent, transparency, and control.
GrapheneOS leaves France, rotates keys
GrapheneOS exits France, decommissions OVH servers, and rotates TLS/DNSSEC keys. The privacy‑centric Android project cites infrastructure moves and security hygiene. Users speculate on regulatory climate, latency, and the steady march toward hardened stacks.
Imgur blocks UK; user tunnels around geo‑wall
After Imgur geo‑blocked the UK, one user re‑routes requests to dodge the wall using Traefik and Pi‑hole hacks. It’s the classic net move: when platforms block, tinkerers tunnel. The cat‑and‑mouse between gatekeepers and DIYers continues, one config at a time.
WinApps makes Windows apps feel native on Linux
WinApps lets Linux users run Windows apps like Microsoft 365 and Adobe as if native across KDE, GNOME, and XFCE. Productivity fans cheer; purists debate the cost of dragging Windows into Linux land. Convenience wins another round.
Moss: a tiny Rust kernel with Linux compatibility
Meet Moss, a Rust kernel with Linux compatibility in ~26k lines. Async core, modular architecture, and binary compatibility make this tiny OS a curiosity with big ambitions. Devs dream about safer kernels; skeptics ask about drivers, ecosystems, and staying power.
Anthropic’s recipe for long‑running AI agents
Anthropic shares how to build sturdier harnesses for long‑running agents using the Claude Agent SDK, with guardrails for reliability and recovery. Builders love the playbook; critics ask when agents stop hallucinating and start delivering dependable results.
NSA/IETF crypto fight heats up over ML‑KEM
The NSA/GCHQ are accused of pushing standards to weaken ECC+PQ toward only PQ in IETF ML‑KEM key‑agreement drafts. Cryptographers light up the debate, mythbusting and demanding transparent, strong choices for post‑quantum security.
Linux gets serious about LE Audio and Auracast
Linux audio geeks celebrate LE Audio and Auracast progress, promising better codecs, lower latency, and broadcast features beyond BR/EDR. Your earbuds get smarter, and venues could beam audio to everyone. The future of Bluetooth on Linux sounds brighter.
Apple–Intel chip rumor stirs silicon strategy talk
Apple and Intel rumor mill spins: potential M‑series work on 18A process. If true, it’s a silicon shake‑up with new timelines and supply bets. Fans want speed boosts; investors want a roadmap; engineers want details beyond whispers.
Safety alert triggers immediate operator actions and potential disruptions across the A320 fleet.
Revives controversial scanning and age checks; pressures end‑to‑end encryption and platform design across Europe.
Sharp move against hyperscalers for public sector use; pushes sovereignty, encryption, and on‑prem alternatives.
Public trust in AI training data faces scrutiny as Google counters claims; users recheck settings and policies.
Major convenience update for Linux users relying on Microsoft 365 and Adobe workflows without dual‑booting.
Cloud shutdown bricks home robots; reignites debate over ownership, e‑waste, and server dependency.
Potential 18A tie‑up hints at supply chain shifts and next‑gen silicon strategy for Macs.
The article outlines how Bluetooth LE Audio, introduced with Bluetooth 5.2, addresses longstanding limitations of classic Bluetooth audio. Traditional profiles such as A2DP and HFP forced trade-offs l...
The article tackles widespread myths about ML-KEM, NIST’s post-quantum key encapsulation mechanism, offering clarifications grounded in the standardization process. It states that ML-KEM was not inven...
Ban-Rays (Ray-BANNED) is a prototype project aiming to detect smart glasses that contain cameras using two complementary methods: optical infrared sensing and network fingerprinting. The optical appro...
This article chronicles a two-year effort to design and 3D print a modular, simple mechanical calculator from scratch. After surveying existing community designs—from straightforward gear calculators ...
GrapheneOS reports it has fully removed active servers from France and is in the process of leaving OVH, citing safety concerns for open-source privacy projects. To safeguard users during this infrast...
The article examines the rapid shift toward autonomous underwater vehicles (UUVs) in naval operations, driven by the need to track submarines and protect vital undersea infrastructure. The UK’s Royal ...
Project Cybersyn was a Chilean initiative (1971–1973) under President Salvador Allende to create a distributed decision support system for national economic management. Architected by British operatio...
This article compares two approaches to running Haskell in Jupyter notebooks: IHaskell and xeus-haskell. IHaskell is a monolithic kernel implemented in Haskell that directly speaks the Jupyter protoco...
Beads is a lightweight, graph-based issue tracker designed to give coding agents durable memory and structured long-term planning. The newly released v0.20.1 replaces sequential issue IDs with short, ...
This article presents a practical approach to enabling communication between a Linux virtual machine and its host using vsock (virtio sockets), which bypasses the need for a TCP/IP stack or network vi...
The article explains why Shor’s quantum algorithm poses a major threat to classical public-key cryptography. It outlines how widely deployed systems—RSA, Diffie‑Hellman, and elliptic‑curve schemes suc...
Moss is a Unix-like kernel written in Rust and AArch64 assembly that targets binary compatibility with Linux userspace. The project emphasizes a modern asynchronous core where non-trivial system calls...
The article details a synthetic Git repository that captures 44 years of Unix evolution, from its 1972 inception as a 5,000-line kernel to a 26-million-line system by 2015. Hosted on GitHub, the 1GB d...
The Council of the European Union has advanced a new negotiating mandate for the Child Sexual Abuse Regulation, reviving elements of the contentious “Chat Control” agenda. While the text removes an ex...
Nari Labs has introduced Dia2, an open-source streaming dialogue text-to-speech model capable of generating audio in real time as text arrives. Designed for conversational use cases, it can be conditi...
Google is disputing viral claims and a Malwarebytes article alleging that Gmail reads users’ emails and attachments to train AI models unless “smart features” are disabled. Speaking to The Verge, Goog...
New research using ancient DNA from cat bones found at archaeological sites across Europe, North Africa, and Anatolia revises the timeline and geography of cat domestication. The study concludes that ...
This article charts the three-thousand-year trajectory of colchicine from a feared poison to a modern, regulated therapy. Derived from the autumn crocus native to Europe, colchicine appears in classic...
TigerBeetle presents a technical case study on revamping its replication routing algorithm and the role of practical generative testing (fuzzing) in validating real-world distributed systems code. Emp...
Switzerland’s Conference of Data Protection Officers (Privatim) has issued a resolution that sharply limits how federal authorities can use international cloud services. For particularly sensitive or ...
A feature explores how black mould discovered within the highly radioactive remains of Chernobyl’s reactor buildings appears to grow toward radiation sources. In 1997, researcher Nelli Zhdanova observ...
Neal Stephenson responds to an Andreessen Horowitz (a16z) reading list that alleges many of his novels “literally” stop mid-sentence. While appreciative of the recognition, he rejects the statement as...
The article outlines Ajax’s journey to build OS Malevich, a new operating system for its security hub that prioritizes simplicity, reliability, and scalability. Beginning with a reassessment of archit...
This whitepaper presents SQLite database files, when structured with a clear schema, as an effective application file format. It enumerates twelve benefits that address practical needs: simplifying de...
An interview with Ilya Sutskever contends that scaling large language models using more compute and data is reaching diminishing returns and that new techniques are needed to address core limitations....
The article presents a petition urging Germany to formally recognize open-source work as civic service (Ehrenamt). It argues that open-source software underpins critical digital infrastructure across ...
The article introduces Spikelog, a lightweight metrics service focused on tracking simple numeric signals over time. Instead of deploying a full observability stack, Spikelog enables developers to POS...
Atuin announced a major architectural update to Atuin Desktop: a redesigned runbook execution engine that makes runbooks persistent, reproducible, and a core automation primitive. The new engine prese...
The Louvre Museum in Paris will increase ticket prices by 45% for most visitors from outside the European Economic Area, setting standard entry at €32 from January 14. Non-EEA visitors traveling in gr...
Utgivarna, the association representing Swedish publishers, has lodged a police report in Sweden against Mark Zuckerberg, founder of Facebook and Meta, over fake advertisements appearing on Facebook. ...
A Hacker News post calls on users to help improve the site’s content by visiting the /newest feed and engaging in early curation. It notes that many strong submissions fail to reach the front page bec...
The article outlines a structured financing for a large-scale data center project involving Beignet Investor LLC, an affiliate of Blue Owl Capital, and Meta Platforms Inc. Beignet will issue $27.30 bi...
The article evaluates the state of NVIDIA’s open-source Linux graphics stack by comparing Nouveau (kernel) plus Mesa’s NVK (Vulkan), Zink (OpenGL-on-Vulkan), and Rusticl (OpenCL) against NVIDIA’s prop...
The article quantifies why focus is difficult to maintain at work by modeling interruption-driven days with three parameters: interruption rate (λ), recovery time (Δ), and minimum meaningful block siz...
The article details a debugging process when emacsclient suddenly failed in a daily workflow. The author relies on a custom shell script (“also”) that uses menupick to select files and then asks a run...
This article explores the rise of prediction markets as influential tools for political forecasting, contrasting them with traditional polling and highlighting their growing scale. It opens with a 202...
Dutch higher education is questioning its dependence on Microsoft after a high-profile incident at the International Criminal Court (ICC), where the chief prosecutor lost access to email. Microsoft at...
This retrospective examines early attempts to quantify the potential impact of COVID-19 and proposes a simple agent-based simulator to make pandemic dynamics intuitive. The author recounts posting ana...
This blog post (Part 2 of a series) alleges improper influence and procedural issues in the IETF’s TLS Working Group over a draft specifying an ML-KEM-only key agreement. The author claims NSA and GCH...
Tyr is an Android application that delivers true peer-to-peer email by leveraging the Yggdrasil network’s encrypted IPv6 overlay. Instead of routing messages through centralized mail servers, Tyr runs...
The article presents a theoretical reframing of computation by renaming Alan Turing’s broad definition as the “Principle of Sufficient Computation,” which asserts that a computer can actuate any event...
Playtiles introduces a pocket-sized, electronic-free mobile gamepad platform designed for Android and iOS, centered on delivering a curated “Season 1” of indie games built with GB Studio. The experien...
This article examines how writing can build resilience by altering brain and nervous system activity. Drawing on psychology and neuroscience, it highlights expressive writing, a technique pioneered by...
The article presents a practical approach to generating 3D meshes from text by first converting textual input into SVG paths. To achieve accurate glyph outlines, the author uses the svg-text-to-path J...
Stellantis has confirmed it is sending in-car marketing notifications to a select group of owners across brands such as Jeep, Ram, and Chrysler. The messages offer a $1,500 loyalty incentive and are d...
Apple may reintroduce Intel into its silicon strategy in a limited capacity, according to supply chain analyst Ming‑Chi Kuo. Kuo says Intel is expected to begin shipping Apple’s lowest‑end M‑series ch...
Nyno 3.0 is an open-source backend focused on workflow-based AGI and automation. It provides a multi-language workflow engine that lets developers implement steps in Python, PHP, JavaScript, and Ruby ...
The article outlines Skald’s approach to building a fully local, open-source Retrieval-Augmented Generation (RAG) system designed for privacy-sensitive use cases. It breaks down the RAG architecture i...
A hobbyist operating system project reached a key milestone: a functional C++ web server running in userspace on a self-built networking stack. The stack covers Ethernet, IP, ARP, UDP, TCP, DHCP, and ...
The article explores how AI-powered typing aids—particularly autocorrect and Apple’s QuickType—affect written communication on smartphones. It details how autocorrect evolved from traditional spellche...
A Show HN announcement introduces an LLM-powered tool aimed at catching mistakes in PCB schematics. The system performs AI-driven electrical design checks by ingesting two core inputs from the hardwar...
This article clarifies the foundational concepts of JSON Schema and the terminology that can make the specification feel complex. It starts with a straightforward example where a schema defines an obj...
This interview, conducted by Alex (veqq) and published on the Lobsters community site, is archived on Susam’s website with an added table of contents. Alex edited and rearranged the interview sections...
A Hacker News community poll asks developers which operating system they primarily use for development, explicitly defining this as the OS where an IDE runs rather than the deployment target. The poll...
ClickHouse offers a large-scale Hacker News dataset comprising 28.74 million posts with 384‑dimension sentence embeddings created using the all‑MiniLM‑L6‑v2 model. Provided as a single Parquet file in...
This article presents a straightforward, solitary version of Rock Paper Scissors designed for moments when someone is alone and offline. The setup requires only a standard six-sided die, which serves ...
The article distills five anti-patterns to avoid when working with large language models (LLMs), based on 15 months of hands-on experience. It first stresses conserving context by avoiding repeated in...
The article describes a practical response to Imgur’s geo-blocking of UK users: a network-level, transparent method to restore access to Imgur-hosted images without installing VPN clients on each devi...
This article outlines a relay-only controller for a hoverboard-style standing carriage, deliberately avoiding semiconductors and adopting an 1884-inspired design language. The system centers on a 3‑ph...
Airloom’s 3D Flight Tracker presents a comprehensive interface for visualizing aircraft in a three-dimensional map environment. Users can search for airports and flights, set a search radius, and view...
This article from Surplus Energy Economics, authored by Tim Morgan, argues that the material economy—defined by the production of goods, services, and infrastructure enabled by energy—has been slowing...
Anthropic’s engineering note tackles the problem of sustaining reliable progress for AI coding agents across multiple context windows. Even with capabilities like compaction in the Claude Agent SDK, a...
The article examines how to generalize the C printf-family into a single, unified implementation. It catalogs the many existing variants and notes that their differences lie in input format handling a...
The article examines a claim that Google Trends showed search spikes for the name Rahmanullah Lakanwal in Washington, D.C., hours before the D.C. National Guardsmen shooting. Reported peaks at 2:24 a....
Airbus has alerted operators of A320-family aircraft that intense solar radiation may corrupt data critical to fly-by-wire flight controls. The manufacturer says it has worked with aviation authoritie...
The article highlights the original ABC programming language, positioned as Python’s most direct predecessor and part of the author’s work from approximately 1983 to 1986. The ABC source code was retr...
A marine biologist recounts a 2024 field encounter with a sperm whale off Dominica to introduce ongoing work decoding whale communication. Sperm whales produce structured social clicks called codas, a...
The article examines why large tech companies sometimes ship poor-quality code despite employing capable engineers. It attributes quality issues to organizational patterns: short engineer tenure, comp...
This article explores a new research effort investigating why 19th-century synthetic emerald-green pigments deteriorate in artworks prized for their vivid color. The degradation can cause cracks, unev...
Airbus has called for immediate software modifications to around 6,000 aircraft after identifying that intense solar radiation can corrupt data essential to flight controls. The UK aviation regulator ...
The article addresses the rise of AI-generated spam in online communities, specifically on Hacker News, and outlines clear user actions to mitigate it. Moderators ask readers to flag suspicious commen...
The article positions potatoes as a nutritionally complete, highly satiating, and affordable food suitable well beyond Thanksgiving. It cites historical evidence from Mikkel Hindhede’s early 20th-cent...
Django 6.0 introduces a built-in background tasks framework, django.tasks, designed to standardize how tasks are defined and queued across different implementations. The framework explicitly excludes ...
Dr Mihai Nica’s 10-minute YouTube video explains how he mathematically proved the optimal strategy for the board game “Guess Who?”, drawing from his 2016 paper. The presentation highlights that while ...
The article evaluates whether the Dolt Workbench—an open-source SQL tool supporting MySQL, Postgres, Dolt, and Doltgres—should remain on Electron or migrate to Tauri. The workbench’s architecture mirr...
A software developer shares a candid account of pausing public writing due to fear of exposing professional knowledge gaps, then choosing to detail them to rebuild fundamentals and support others in s...
This article describes a developer’s experience during a Bitmovin hackathon integrating the FoxESSCloud API to obtain solar generation data. The integration required generating a request signature fro...
The article examines the challenges investors face when attempting to short firms in private markets and unlisted areas of the tech sector. It draws a historical parallel to the efforts surrounding th...
Airbus has disclosed that intense solar radiation may corrupt data crucial to flight controls on certain in-service A320 Family aircraft. Following analysis of a recent incident, the manufacturer iden...
Fabric is a visual, node-based content authoring environment inspired by Apple’s Quartz Composer, designed to deliver an Apple-first experience using Metal. The project provides SDKs for loading a com...
The article explores how triangle angle sums and areas differ across spherical and hyperbolic geometries. On a unit sphere, the interior angles of a triangle exceed π, and the triangle’s area equals t...
Karl Widerquist challenges the prevailing framing of universal basic income (UBI) debates, arguing that common objections—people won’t work and the program is unaffordable—stem from normative beliefs ...
Adventure Voter is a “Choose Your Own Adventure” style presentation tool that lets audiences vote on decision points via their phones, steering the talk in real time. Built in Go, it relies on WebSock...
This perspective paper by Evelina Fedorenko, Steven T. Piantadosi, and Edward A. F. Gibson contends that language in modern humans functions primarily as a tool for communication rather than for thoug...
This article outlines a practical solution for getting Pandoc to respect custom table styles when converting Markdown to Word (.docx). While using a reference.docx template to carry desired formatting...
A new milestone in retrocomputing shows that System 7 and Mac OS 8 can natively boot on Apple’s Mac mini G4, building on prior successes with Mac OS 9.2.2. The achievement relies on preserved, unrelea...
A MathOverflow question, drawing on Gian-Carlo Rota’s observation that mathematicians tend to reuse a small set of techniques, collected 47 answers enumerating widely applicable “tricks” across fields...
Mu is introduced as a membership-based “Micro Network” designed to offer common online services without ads or algorithmic manipulation. The platform emphasizes sustainability through a flat subscript...
The article examines Google’s push toward “vibe coding,” a development approach where users describe desired functionality in natural language and AI produces code. CEO Sundar Pichai says this will ma...
WinApps is a tool that brings Windows applications to GNU/Linux desktops (KDE Plasma, GNOME, XFCE) with native-like integration. It operates by running Windows within a virtual machine managed through...
Vorwerk Group announced it is phasing out the cloud services that support Neato Robotics vacuum products. Neato ceased operations in 2023 but had previously committed to providing five years of cloud ...