A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
A new VS Code clone called SideX chases speed and drops Electron weight, as devs probe how far it can go... Europe backs a sovereign office bet with Euro-Office, pushing schools and states away from US cloud giants... macOS takes a hit with a Recovery Mode browser bug and a 49-day networking glitch that quietly breaks apps... Adobe raises alarm by writing into the system hosts file just to police its own tools... High above, Anthropic locks in huge Google Cloud and Broadcom power deals, turning frontier AI into a game of gigawatts... Down in the trenches, Claude Code stumbles, new AI agent tests show bots still get lost on the web, and fresh memory tools like Hippo try to fix what context windows forget... Tonight we track coding agents that even run from a phone, reshaping how and where work happens.
New VS Code Clone Promises Speed Without Bloat
SideX is a Tauri-based rework of VS Code promising the same extensions and layout with a fraction of the size and more native feel. Devs loved the ambition and the performance pitch, while side‑eyeing the early, half‑broken state and wondering if it can really escape Electron’s shadow.
Europe Pushes 'Sovereign' Office Suite To Escape Giants
Euro-Office, built on ONLYOFFICE and released under AGPL, sells itself as a European, self-hostable alternative to Microsoft 365 and Google Docs. Commenters were surprisingly hopeful, seeing it as a rare serious swing at freeing schools and governments from US cloud lock‑in and random pricing changes.
macOS Recovery Browser Bug Gives Hackers System Access
A researcher found macOS Recovery Mode’s Safari let writes to protected system volumes, meaning a malicious page could sneak in persistent root access even on supposedly locked‑down machines. Security‑minded readers were impressed by the bug hunt and unimpressed that Apple left such a gaping hole in its prized defenses.
macOS Networking Bug Breaks Apps After 49 Days
Another macOS gem: a TCP networking bug in the XNU kernel that silently detonates after exactly 49.7 days, breaking tools like OpenClaw. Engineers grimly joked about mandatory reboot calendars and wondered how many mysterious production glitches were actually this ticking time bomb hiding in the stack.
Adobe Hijacks Hosts File To Check Its Apps
Users discovered Adobe Creative Cloud quietly stuffing odd entries into the hosts file just to detect whether its own software is installed. The move felt invasive and amateurish at once, fueling long‑running resentment about Adobe’s subscription model, bloat, and the feeling that your own machine isn’t really yours anymore.
Anthropic Books Massive Google Cloud For Future AI
Anthropic signed a huge deal with Google and Broadcom for multiple gigawatts of TPU compute starting in 2027. People read this as a clear sign that frontier AI is now a game only trillion‑dollar partners can play, and that future models will be trained on power budgets that rival small countries.
Claude Coding Agent Chokes And Exposes Messy Backend
A rough patch for Claude Code and leaks about its MCP implementation sparked blunt criticism: if these AI tools are so smart, why are their own backends such a mess? Devs used the outage as proof that dogfooding has limits and that shipping reliable infrastructure still beats vibe‑driven “AI‑all‑the‑things” development.
New Test Grades How Well AI Agents Read Websites
The Agent Reading Test benchmark asks coding agents like Claude Code, Cursor and GitHub Copilot to navigate real‑world web docs and then scores them. Folks liked finally having a way to compare agents beyond marketing slides, and it reinforced the feeling that today’s AI assistants still get hopelessly lost in messy documentation.
Hippo Tool Teaches AI What To Remember Or Forget
Hippo offers “biologically inspired” memory for AI agents, deciding what to keep and what to discard across long projects. Builders of agentic IDEs perked up, sick of context windows overflowing with junk. The mood was cautiously excited: everyone knows memory is broken, but nobody believes there’s a magic fix yet.
Run AI Coding Agents On Servers From Your Phone
Onepilot showed a mobile‑first SSH and AI agent IDE that lets you connect to any server from your phone and let bots do dev work. To some, it’s the future of remote ops; to others, it’s a nightmare vision of debugging half‑baked agent changes from a subway seat at 2 a.m.
Age Checks Turn Into Quiet Global Surveillance Network
A detailed report on age verification laws in the US, UK and Brazil argued they effectively mandate biometric ID checks, building a private surveillance infrastructure wrapped in child‑safety branding. Readers saw the investor list and shuddered, recognizing the same crowd that already profits from tracking everything else we do.
Wikipedia Fights Over AI Bots Rewriting Articles
Wikipedia’s clash over the Tom‑Assistant and other AI bots highlighted how generative tools can swamp human editors with bland, error‑prone text. Long‑time contributors fear the site becoming a cleanup crew for bot spam, while others argue that without strict rules, quiet algorithmic editing could rewrite history in slow motion.
Student Booted After Making Social Site For Campus
A student built iitsocial.com for his university, only to get his phone seized, the cops called, and expulsion threats from the dean. The story read like a parody of overreaction: instead of supporting a homegrown network, the institution treated basic web dev like a cybercrime and terrified every would‑be builder watching.
Inside The Maze That Sends Your Text Message Abroad
A deep explainer on SMS delivery pulled back the curtain on aggregators, shady routes, pricing games, and why texts vanish into the void. Developers who thought they were “just calling an API” got a crash course in a messy telecom underworld that feels stuck in the 90s but still powers every login code we get.
Apollo Moon Computer Springs Back To Life On Earth
A restoration project for the Apollo Guidance Computer showed the 1960s hardware being carefully revived, from core memory to ancient logic modules. Watching this museum piece come back to life charmed readers and underscored how the software that once landed humans on the Moon now fits in a toy microcontroller on your desk.
Anthropic quietly signed a monster deal with Google and Broadcom for multiple gigawatts of TPU compute starting 2027, signaling an arms race where only a handful of labs can even afford to train frontier AI models.
SideX, a Tauri-based reimplementation of VS Code, hit HN’s front page by promising the same feel with a fraction of the size and more native performance, tapping straight into dev fatigue with Electron’s heaviness.
Euro-Office, built on ONLYOFFICE under the GNU AGPL, pitched itself as a ‘sovereign’ office suite so governments and companies can escape US cloud lock-in. It hit #1 as devs cheered any serious alternative to Microsoft 365 and Google Workspace.
A deep dive into new age verification laws argued they’re really building biometric ID and surveillance infrastructure, with investors overlapping the usual defense and big-data suspects. HN readers saw it as a privacy nightmare masquerading as child safety.
Claude Code had a rough day, with outages and leaked implementation details that looked rushed and brittle. The community piled on, using it as exhibit A that AI coding tools are still far from reliable production engineering.
A researcher found that macOS Recovery Mode’s Safari let attackers get root-level persistence by writing directly to system partitions, undercutting Apple’s security story and reminding everyone that the ‘safe mode’ isn’t always safe.
The dust-up over the Tom-Assistant AI bot on Wikipedia showed how fast generative AI can overwhelm volunteer communities and policies, foreshadowing a messy future where bots quietly reshape the public record if nobody’s watching.
A 2012 weekend project, cert-depot.com, has been rebuilt and relaunched as a modern self-signed certificate generator. The original service was implemented with Node.js, Express, jQuery, and relied on...
SideX is an early-release, open-source effort to port Visual Studio Code’s architecture to a native shell by replacing Electron with Tauri. The project reports over 5,600 TypeScript files adapted from...
Kenya has become a focal point in a niche but expanding illegal trade in queen ants driven by a global pet hobby. During the rainy season, collectors around Gilgil capture giant African harvester ant ...
This article explores the early evolution of x86 SIMD extensions through the lens of Intel’s MMX technology, emphasizing that the story is driven as much by marketing and corporate politics as by pure...
The article describes an observed shift toward microservices driven by LLM-assisted development. Small services with well-defined request/response boundaries make it safer to let LLMs perform large re...
The Bank of France has completed the withdrawal of its remaining gold held at the Federal Reserve Bank of New York—129 tonnes, around 5% of its reserves—and replaced it with equivalent bars that meet ...
Euro-Office introduces an open-source, web-based office suite aimed at delivering digital sovereignty for collaborative document work. Rather than functioning as a standalone application, it is design...
NIMBY Rails is a real-world map railway management sandbox currently in Early Access. The developers explain that the game’s ambition—removing traditional limits on map size, track complexity, and sch...
The article reports on a language performance evaluation where a fused kernel written in Koru was tested against idiomatic implementations in C, Rust, Zig, SBCL (Common Lisp), and GHC (Haskell) using ...
This update details the seventh hardware revision of “Leako,” a DIY ColecoVision clone focused on making the design buildable and robust for more people. The project transitions from a DC barrel jack ...
The article explains the meaning behind the numbers that appear in Linux man page titles, such as read(2) and sleep(3). Prompted by a code review comment correcting a reference to basename, the author...
The article outlines how age verification laws in Brazil, the United Kingdom, and the United States are fueling adoption of biometric identity verification systems that also function as surveillance i...
Germany continues to store a significant portion of its gold reserves in the United States, with about one‑third—valued around €160 billion—held in the vaults of the Federal Reserve Bank of New York. ...
This article contrasts two eras of U.S. decision making informed by intelligence. It revisits the 2005 conclusion that prewar assessments of Iraq’s WMDs were largely wrong and then examines a later U....
Tiny Corp announced via X that preorders are open for its Exabox hardware, linking directly to a Shopify-hosted product page. In the post, the company notes it had considered raising a funding round t...
This Ask HN post seeks guidance on identifying AI-generated text, specifically when written by large language models (LLMs). The author requests input on both human-based heuristics and computer-drive...
An AR practitioner recounts being brought in during spring 2024 to help deliver an augmented reality bus tour in a Beijing park for a California-based client, framed by the claim of being “ripped off”...
PostHog, a startup from Y Combinator’s W20 batch, is recruiting for a range of positions spanning engineering, product, support, and go-to-market roles. The company describes its platform as a combina...
An investigative account details how OpenAI’s chief scientist, Ilya Sutskever, compiled and circulated confidential memos alleging that CEO Sam Altman misled executives and directors and misrepresente...
The New York Times announced a correction to a headline from a recent article about President Trump’s threats to leave NATO. The original headline misidentified NATO’s full name, referring to it as th...
German authorities have identified the hacker known as “UNKN/UNKNOWN” as 31-year-old Russian Daniil Maksimovich Shchukin, alleging he led the GandCrab and REvil ransomware operations. The BKA attribut...
The article explores how generative AI is reshaping wartime propaganda by making polished, viral content cheap and fast to produce. In March 2026, AI-made videos portraying Donald Trump and Benjamin N...
This opinion piece challenges the industry trend of prioritizing native mobile apps over functional websites. The author describes constant prompts steering users from the browser to app stores and no...
An Iran-based YouTube channel, Akhbar Enfejari (Explosive News), shifted in February from low-traffic political commentary to AI-generated animations styled like Lego movies that criticize the U.S. Th...
Stephen Diehl reviews Sam Hughes’s “There Is No Antimemetics Division,” a science fiction novel built around the notion of antimemes—phenomena that erase themselves from perception and memory, making ...
A developer recounts an assessment of Model Context Protocol (MCP) implementations in AI coding tools, focusing on Claude/Claude Code and Codex/Codex CLI. They claim MCP, described as a straightforwar...
sc‑im (Spreadsheet Calculator Improvised) is a terminal-based spreadsheet that emulates Vim-style interaction on top of ncurses and builds upon the classic ‘sc’. The project announces v0.8.5 (05/21/20...
A content creator, Dallas Little, has launched an AI-generated artist named “Eddie Dalton” whose tracks have rapidly climbed the iTunes charts. Following the release of several AI-made songs—including...
A widely circulated X post claims that an 81-year-old lifelong Los Angeles Dodgers fan, who has maintained a season pass for over five decades, was informed that printed tickets will no longer be prov...
A cryptography engineer announces a shift toward urgent deployment of post‑quantum cryptography, prompted by two recent research papers that substantially reduce the resources needed to break 256‑bit ...
Reducto introduced Deep Extract, an agent-based system for structured data extraction that emphasizes iterative verification and correction. Instead of single-pass parsing—prone to omissions and recon...
The article explains macOS’s keyboard-identification dialog that appears when connecting a new keyboard. Because keyboards typically cannot report exact key positions, macOS asks users to press the ke...
Sky is an experimental programming language that seeks to unify full‑stack development under a single, portable binary by compiling to Go. It borrows Elm’s functional programming strengths—Hindley–Mil...
This brief essay underscores the continuous demands modern connected devices place on users. It lists routine responsibilities—updating, charging, configuring, troubleshooting, managing, and maintaini...
The article describes a technique reportedly used by Adobe’s Creative Cloud on Windows and macOS to let Adobe’s website determine whether Creative Cloud is installed. Upon visiting adobe.com/home, the...
The article introduces GovAuctions, a site designed to simplify access to U.S. government surplus auctions by aggregating listings from major official platforms into a single, clean, searchable interf...
This retrospective reviews an 18-year greytrapping experiment on a self-hosted mail system operated under nxdomain.no/bsdly.net. After starting with a Debian Linux setup, the operator moved edge defen...
This article critiques an approach to AI-assisted software development it calls “vibe coding,” framed around a reported leak of Claude’s source code and subsequent derision of its quality. The author ...
The article examines two dominant approaches to zooming in web interfaces—Prezi’s closed, presentation-focused platform and impress.js’s open-source, step-based presentation framework—and introduces a...
A peer-reviewed study reported in the journal Intelligence examines why some people more accurately gauge others’ intelligence. Conducted by a German team led by Christoph Heine, the research enlisted...
A student at IIT Delhi describes launching iitsocial.com around 1 a.m., a site that scraped data for all IIT Delhi students to auto-create profiles. The platform enabled anonymous accounts, comments, ...
Agent Reading Test is an open benchmark created to evaluate how AI coding agents handle real-world documentation websites. It focuses on common failure modes in web content ingestion—such as truncated...
The article showcases Sinter, an experimental, patent-free video codec created to test one-shot AI agent team workflows using Claude Code. Rather than targeting production readiness, the project explo...
London Centric’s latest weekend update highlights a growing reputational challenge for London driven by viral videos that depict the city as collapsing into crime and disorder. Building on a prior inv...
Ghost Pepper is a free macOS menu bar app that delivers 100% local, hold-to-talk speech-to-text on Apple Silicon devices running macOS 14 or later. Users hold the Control key to record and release to ...
Wikipedia blocked an autonomous AI agent, Tom-Assistant, after it created and edited articles without formal bot approval. The agent, built by Covexent CTO Bryan Jacobs, contributed via the account To...
The article presents the “Calibration Challenge,” a short, free, no‑signup quiz that evaluates how well a person’s confidence aligns with actual correctness. In under two minutes, users answer 10 ques...
The article describes Onepilot, a mobile-first SSH and AI agent IDE that turns an iPhone into a control center for remote development and automation. It offers a unified dashboard where users can see ...
Docking is presented as a Linux-focused dock application built entirely in Python. The project emphasizes practical, everyday usability by aiming to adapt to individual workflows, highlighting speed, ...
Photon documents a reproducible macOS TCP failure caused by a 32‑bit unsigned integer overflow in Apple’s XNU kernel after roughly 49 days, 17 hours of continuous uptime. The overflow freezes the kern...
HackerRank is recruiting for an FDE role as it rolls out a revamped, AI agent–oriented approach to developer hiring. The company states it supports over 2,500 companies and has a platform with more th...
A security researcher details two vulnerabilities in Safari when run within macOS Recovery Mode. The first, rated CVSS 8.5 and affecting macOS Sequoia and older, allows arbitrary file writes to system...
SOM (Simple Object Machine) is introduced as a minimal Smalltalk tailored for teaching and virtual machine research. The article demonstrates a simple language example (a Fibonacci method) and mention...
Tusk is a free, open-source PostgreSQL client offered for both macOS and GNOME/Linux, aimed at developers and database administrators who need schema browsing, table inspection, data manipulation, and...
TTF-DOOM is a compact 3D raycasting engine implemented entirely within a TrueType font’s hinting virtual machine. Unlike prior font-based computation that relied on HarfBuzz’s WebAssembly shaping, TTF...
Two new reports indicate that families in New York City need household incomes exceeding $125,000 to live without government or private assistance in any of the city’s five boroughs. The article highl...
Hippo is a biologically inspired, CLI-based shared memory layer designed to unify and manage memories across AI agents like Claude Code, Codex, Cursor, and OpenClaw. Instead of saving everything, Hipp...
Anos is a hand-written, microkernel-based hobby operating system targeting x86_64 and RISC-V that has reached “toy kernel” maturity. It currently comprises the STAGE3 microkernel, a SYSTEM user-mode s...
This short guidance piece for solo technical founders emphasizes customer discovery and iterative refinement as the foundation for successful product building. It recommends beginning by talking to cu...
This article breaks down what actually happens inside an SMS delivery system after a developer sends a request to an SMS API. It argues that most developers mistakenly equate the API call with message...
Anthropic is expanding its compute footprint through a new agreement with Google and Broadcom to secure multiple gigawatts of next‑generation TPU capacity, expected to begin coming online in 2027. The...
A veteran blogger ended a two-decade relationship with Google AdSense, which he joined in 2005 to better understand online advertising and supplement income. While early results included high-value cl...
Gary Marcus critiques a New York Times article that presented Medvi as a $1.8 billion “AI company,” noting the piece went viral as a triumph for AI-enabled entrepreneurship. Marcus argues the NYT cove...
A developer details porting components of Go’s standard library to C to make a Go-to-C subset practical. After starting with the io package for core I/O abstractions, the work shifted to bytes and str...
Netflix introduced VOID (Video Object and Interaction Deletion), a video inpainting method that removes target objects and their induced physical effects from footage. Built atop CogVideoX and fine-tu...
Solod (“So”) introduces a systems-oriented subset of Go that transpiles directly into readable C11 while eliminating a runtime. The project targets developers who want Go’s syntax, type safety, and to...
The article explains the C++ runtime behavior when a destructor throws, grounding the discussion in RAII and exception handling mechanics. It notes that destructors are integral to resource management...
graph-info, part of the graph-go project, provides zero-config infrastructure visibility by connecting to the Docker daemon to auto-discover services and build an interactive dependency map. It suppor...
Glass Cannon (gcannon) is introduced as a high-performance HTTP/1.1 and WebSocket load generator that leverages Linux’s io_uring for batched asynchronous I/O. It is positioned as the official load gen...
A Judoscale-authored piece questions the clarity of Heroku’s recent strategic shift. On February 6, Heroku announced it was transitioning to a “sustaining engineering” model focused on stability, secu...
This article chronicles the restoration of an Apollo Guidance Computer (AGC) discovered by Jimmie Loocke among scrapped NASA equipment purchased in Texas in 1976. In preparation for the Apollo 11 50th...