A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
Today we track GnuPG arming email with post‑quantum shields... FCC router plans shake home hackers and FOSS fans... Colorado’s SB51 shift spares open source from strict age checks... Framework rolls a new repairable Linux‑ready laptop and tiny 10 GbE USB dongles push fast home networks... OpenAI launches a biosafety bounty for GPT‑5.5 and ships a Privacy Filter that hunts PII in text... DeepSeek‑V4 arrives with instant support in SGLang and Miles, running even on AMD GPUs... An enthusiast plus ChatGPT Pro and GPT‑5.4 claim a new angle on a classic Erdős puzzle... New tools like HATS pit disagreeing AI agents against each other using the Six Thinking Hats method to plan work... The day is full of sharper crypto, louder fights over routers, and more ambitious AI in labs and living rooms.
GnuPG adds future proof post quantum shields
Beloved encryption workhorse GnuPG is finally baking in post‑quantum protection, meaning ordinary email geeks might actually stay safe when tomorrow’s quantum machines arrive. Fans are relieved to see a crusty but vital tool getting serious long‑term upgrades instead of being left behind.
FCC router ban rattles home hackers and tinkerers
The FCC wants only U.S.‑made home routers, which in practice means almost none, and the FOSS world is livid. Projects like OpenWrt see this as a backdoor way to kill hackable hardware and lock people into locked‑down boxes. Folks smell politics, not safety, driving this mess.
Colorado spares open source from age checks
After a loud backlash, Colorado’s SB51 now exempts open source operating systems and apps from strict age‑verification rules. Devs are sighing with relief, seeing proof that noisy, well‑argued pushback can still keep overbroad online safety laws from crushing volunteer‑run software.
Framework pushes Linux friendly laptop refresh harder
Framework’s new Laptop 13 Pro doubles down on repairable design and first‑class Linux support, with fresh Intel chips and gamer‑friendly options. Commenters love seeing a company treat users like adults who swap parts and OSes, not children trapped in sealed, disposable gadgets.
Cheap tiny USB dongles bring ten gigabit speed
New 10 GbE USB adapters based on Realtek chips are cooler, cheaper and smaller than the old bricks, finally making fast home networking less of a rich‑nerd toy. Network geeks are cautiously optimistic, but still side‑eyeing Realtek drivers after years of mixed quality on Linux and BSD.
OpenAI offers cash to find bio AI dangers
OpenAI launched a biosafety bounty for GPT‑5.5, literally paying researchers to uncover ways the model could help with dangerous biology. People see this as both overdue caution and a quiet admission that these systems are already flirting with capabilities no one fully understands.
OpenAI ships model that auto scrubs personal data
With regulators breathing down its neck, OpenAI released an open‑weight Privacy Filter that spots and redacts PII in text. Enterprise folks are hopeful but skeptical, wondering if yet another filter can really keep names, emails and IDs from leaking once the data firehose is turned on.
DeepSeek V4 gets instant open source toolchain
The latest DeepSeek‑V4 model landed with day‑zero support in SGLang and Miles, letting teams run and train it on their own hardware, including AMD GPUs. Hacker circles are thrilled to see open tools keeping pace with frontier labs instead of playing catch‑up months later.
Amateur plus ChatGPT solves long standing Erdős puzzle
An enthusiast armed with ChatGPT Pro and GPT‑5.4 reportedly cracked a classic Erdős problem, using a weird proof strategy no human had suggested. Mathematicians are both impressed and uneasy, debating whether this is collaboration, outsourcing, or the start of AI‑assisted discovery as normal.
AI agents argue with themselves to plan work
A tool called HATS runs a team of disagreeing AI agents using the old Six Thinking Hats idea to stress‑test decisions. Fans like the structure; skeptics see it as just more LLM role‑play with corporate branding. Either way, people clearly want AI that can challenge itself, not just agree.
ENIAC turns eighty and still rewrites computer history
A deep dive on ENIAC’s 80th anniversary revisits how this wartime machine and its often‑erased women programmers shaped modern computing. Readers love the rich storytelling and wince at how many pioneers were sidelined while big brands like IBM later grabbed most of the spotlight.
Browser based Windows desktops ride on WebAssembly
A project called grdpwasm lets you run Windows RDP sessions straight in the browser using Go and WebAssembly. Tinkerers are delighted at the no‑plugin magic, while admins nervously imagine users remoting into who‑knows‑what from any tab they happen to have open at work.
Old BrowserID login system gets fan made reboot
One developer is reviving BrowserID as WKID, a personal identity server for private apps. It’s a love letter to simpler web logins and a side‑eye at today’s Google and Apple‑dominated sign‑in world. Commenters miss those experiments and fear we handed identity to megacorps too fast.
Hacker builds homemade PBX for fun and calls
A telecom fan documents building a home PBX with microcontrollers, reviving childhood dreams of running a tiny phone company. The story oozes nostalgia for copper lines and dialing codes, and the comment section proves nerds still adore overengineered projects that solve absolutely nothing practical.
Mysterious iPhone app keeps reinstalling itself daily
An iPhone owner reports a Headspace app icon quietly reinstalling itself every day, even after deletion, and the thread explodes with theories about iOS bugs, dark patterns and account sync ghosts. Users are clearly tired of phones that feel more haunted by vendors than owned by them.
OpenAI is literally paying researchers to find dangerous biology tricks in GPT‑5.5, signalling both how powerful these models are getting and how nervous labs are about what people might coax them into doing.
OpenAI dropped an open-weight Privacy Filter model that auto-scrubs personal data from text, trying to calm regulators and enterprise buyers who are sick of tools that leak names, addresses and other sensitive bits.
A hobbyist plus ChatGPT reportedly solved an Erdős conjecture that stumped pros for decades, giving both fans and critics fresh ammo in the fight over whether these models are creative partners or just fancy parrots.
The DeepSeek‑V4 frontier model launched with same-day support in open source tools SGLang and Miles, showing how fast the community now expects to run cutting-edge models without waiting for big cloud vendors.
Legendary tool GnuPG is wiring in post‑quantum algorithms, meaning everyday encrypted email and signatures can start preparing for the day future quantum machines chew through today’s math like tissue paper.
Colorado’s age‑check bill now lets open source operating systems and browsers off the legal hook, calming fears that one clumsy law would crush community‑run projects with compliance demands they can’t possibly meet.
The FCC plan to ban new home routers not made in the U.S. has free‑software fans furious, since basically all popular hardware is foreign-built and many run OpenWrt, turning this into a fight over who controls your network.
This piece commemorates the 80th anniversary of ENIAC, recognized as the first general-purpose digital computer, originally built during World War II to speed up ballistic calculations. It highlights ...
Panic, the publisher behind the Playdate handheld, created a mail-in rewards program that offers embroidered patches to players who complete certain games and send a self-addressed stamped envelope. L...
Jeff Geerling evaluates a new class of Realtek RTL8159-based 10 GbE USB 3.2 adapters that promise smaller size, lower heat, and lower cost compared to legacy Thunderbolt 10G solutions. Testing an $80 ...
Stash is introduced as an open-source, MCP-native memory layer designed to give AI agents persistent, cross-session memory. The project positions itself as a model-agnostic, “second brain” that sits b...
Niko McCarty examines why polymerase chain reaction (PCR) has remained close to optimal since modern thermocyclers emerged in 1987. He intended to argue that PCR could be made significantly faster and...
The article reports a mathematical advance in knot theory: a new knot invariant developed by Dror Bar-Natan and Roland van der Veen that combines computational efficiency with strong discriminative po...
This article explains how to build an accurate FPS counter for games and why some common techniques fall short. It clarifies that FPS is an aggregate proxy for performance and should represent recent ...
This article explores how Larry McMurtry, the acclaimed novelist and essayist, engaged with the myths of the American West by blending personal history and cultural critique. It begins with a formativ...
Apple describes the security architecture behind iCloud Keychain escrow and recovery. Escrow records are protected by clusters of hardware security modules (HSMs), each holding keys that encrypt the r...
This essay traces the intersection of wealth, technology, and intellectual history through the Widener family and the legacy of Francis Bacon. Peter Arrell Browne Widener transformed early success in ...
This article explores the rise of the Mughal Empire in the early 16th century, presenting it as a major global development due to the high concentration of the world’s population in East and South Asi...
grdpwasm is an open-source, browser-based Remote Desktop Protocol (RDP) client implemented in Go and compiled to WebAssembly. Because browsers cannot open raw TCP sockets, the project includes a light...
LamBench has released a leaderboard for its Lambda Calculus Benchmark for AI, summarizing how 21 models perform across 120 tasks and ranking them by the number of problems solved. The table reports bo...
An artist documents a personal, nostalgia-driven project to recreate Katsushika Hokusai’s entire 36 Views of Mount Fuji as 1-bit pixel art using vintage Macintosh hardware and software. To preserve au...
Martin Galway has made available the source files for his 1980s Commodore 64 game music with the intention of enabling others to read, analyze, and understand his music player implementations and crea...
This GUI Wonderland installment offers a retrospective on Microsoft’s Windows 2.x in the context of its parallel development with IBM–Microsoft’s OS/2. The article explains that Windows 2.x, like Wind...
Jake Worth proposes a pragmatic code review workflow: when feedback is limited to non‑blocking items—such as nitpicks, suggestions, or questions—reviewers should leave their comments and approve the p...
A peer-reviewed, open-access study in Quaternary Science Reviews presents an anthracological analysis of a large charcoal assemblage from the early Middle Pleistocene Acheulian site of Gesher Benot Ya...
HEALPix (Hierarchical Equal Area isoLatitude Pixelisation) is an algorithm and associated family of map projections designed to partition the 2‑sphere into equal-area pixels with hierarchical refineme...
Physiologist Jørgen Melau explains why sudden immersion in cold water can trigger life-threatening heart rhythms within the first minute. He distinguishes the immediate danger from hypothermia, emphas...
This article examines Discret 11, the analog scrambling system Canal Plus used in 1980s France to control access to its over-the-air broadcasts. After outlining the era’s TV context and Canal Plus’s s...
OpenAI announced a Bio Bug Bounty aimed at stress-testing biosafety safeguards in GPT‑5.5, specifically within the Codex Desktop environment. The program invites researchers with experience in AI red ...
The UK Parliament has approved the Tobacco and Vapes Bill, introducing a generational ban on tobacco sales aimed at creating a smoke-free generation. Once it takes effect in January 2027 following roy...
In “What’s Missing in the ‘Agentic’ Story,” Mark Nottingham critiques the assumption that computers unambiguously act on users’ behalf—a view shaped by the era of local, task-specific computing and re...
Desmond Morris, the English zoologist whose 1967 bestseller The Naked Ape became a landmark in popular science, has died at 98 near Dublin. His death at a hospital in Naas was confirmed by his son. Mo...
All Brains Belong VT has published an introductory clinical guide aimed at primary care clinicians treating Autistic and ADHD adults who present with multiple co-occurring health conditions. The guide...
This research post explores the distinction between model size (parameters) and computation in deep learning, noting that they are often conflated because each parameter typically contributes one oper...
Niri, the scrollable-tiling Wayland compositor, released version 26.04 with a significant UI enhancement: built-in background blur. The release introduces two blur modes—xray (default) and non-xray. X...
F.A.T. Lab and Sy-Lab introduced the Free Universal Construction Kit, a collection of nearly 80 adapter bricks designed to make ten popular construction toy systems interoperable. By enabling parts fr...
Framework has unveiled the Framework Laptop 13 Pro, announced on April 21, 2026, as a comprehensive redesign aimed at solving earlier models’ issues while maintaining the company’s modular, upgradeabl...
This National Diet Library (NDL) Digital Collections entry provides online access to an item titled “北斎模様画譜” (Hokusai Moyo Gafu). The item is presented through a standard NDL item detail interface, wh...
The article examines how suspected Iranian naval mines in the Strait of Hormuz leveraged a strategic chokepoint to constrain U.S. and Israeli naval power and disrupt global oil traffic. According to t...
Desmond Morris, the British zoologist, author, artist, and broadcaster behind the landmark 1967 book The Naked Ape, has died aged 98, his son confirming the death on 20 April. Morris’s book, written i...
A developer recounts reviving an unfinished project by using Claude Code (Opus 4.6) to implement a shim that exposes YouTube Music through the OpenSubsonic API, enabling compatibility with Subsonic-co...
Lute is presented as a standalone runtime that extends the Luau scripting language beyond its traditional sandboxed use within platforms like the Roblox game engine. Positioned similarly to Node.js or...
Kloak is an open-source secret management tool designed for Kubernetes environments that aims to deliver enterprise-grade security with minimal operational complexity. It prevents applications from di...
The article announces “mine,” an integrated development environment tailored for Coalton and Common Lisp. It is offered in two forms: a fully packaged “mine-app” for Windows and macOS that requires no...
HATS is a role-based, multi-agent AI platform designed to improve decision-making through structured disagreement. Inspired by the Six Thinking Hats framework, it assigns six agents to distinct roles ...
The article reports that enhanced geothermal systems (EGS) could dramatically expand U.S. geothermal capacity—potentially up to 150 GW—by creating engineered reservoirs in areas without natural hydrot...
The North American Millets Alliance (NAMA) promotes the wider use of millets across the United States, Canada, Mexico, and neighboring regions by highlighting their agronomic, nutritional, and culinar...
The article explores a distinct startup subculture at Stanford University where venture capital firms actively court freshmen and sophomores, offering mentorship, access, and sometimes substantial “pr...
This article examines how large language models (LLMs) disrupt traditional methods of assessing knowledge work. Historically, organizations have relied on surface-level proxies—such as proper formatti...
Research scientist Nicholas Carlini of Anthropic delivers a 40-minute presentation, “Black-hat LLMs,” as part of the [un]prompted 2026 program. According to the video listing, the talk examines how la...
The article explains why seemingly simple file-opening tasks become complex when a privileged process handles files on behalf of a less privileged one. It outlines how directory traversal (“..”) and s...
A New Republic report chronicles intensifying public backlash against artificial intelligence, illustrated by two violent incidents and new polling. On April 10, a suspect was arrested after a Molotov...
The article examines whether beans can be made less gassy through evidence-based methods rather than folk remedies. It explains that bean-induced flatulence stems from FODMAP oligosaccharides that hum...
A long-time commuter explains why a folding bike—specifically a Brompton purchased through a Ride to Work scheme—has become indispensable for urban travel. After finding London’s bike hire scheme unwi...
This USB cheat sheet consolidates essential facts about USB data and power standards. It maps marketing labels and aliases—such as SuperSpeed and SuperSpeedPlus—across USB 3.0/3.1/3.2 and USB4 to thei...
This OpenBSD “stories” entry explains why kernel programming often faces architecture-specific challenges not seen in userland. It recalls long-standing complications on m88k/88100 systems, where the ...
This article reviews Flickr’s trajectory and value proposition in 2026, positioning the platform as a steady, photography-first alternative to trend-driven social networks. It traces Flickr’s 2004 ori...
A New York Times “Your Money” column by Tara Siegel Bernard recounts a Fidelity Investments customer’s sudden loss of account visibility after a systems glitch. The incident began when Fidelity notifi...
Colorado’s SB51, an age-verification bill, advanced in a House committee after being amended to include a targeted exemption for open-source software. The amendment states that Article 30 does not app...
The article contends that AI agents should be embedded into software through structured, deterministic interfaces rather than treated as chatty collaborators. Drawing on Mark Weiser’s concept of calm ...
OpenAI introduced Privacy Filter, an open‑weight model designed to detect and redact personally identifiable information (PII) in unstructured text. Built for high‑throughput privacy workflows, it run...
The article examines how a simple Threads post about planning a reply years after an initial interaction unexpectedly went viral, propelled by user engagement and platform algorithms. It uses this eve...
A 23-year-old, Liam Price, leveraged OpenAI’s ChatGPT Pro (GPT-5.4 Pro) to produce what appears to be a solution to a 60-year-old conjecture from Paul Erdős concerning “primitive sets,” collections of...
This excerpt from Roger Zelazny’s 1980 fantasy story “The George Business” presents a humorous inversion of the classic dragon-versus-knight scenario. The dragon, Dart, wakes from a prophetic dream of...
A Hacker News user reports an unusual issue: the Headspace app has reappeared on their iPhone 13 Pro each day around 1pm EST for three consecutive days. The user states that Automatic Downloads are di...
A developer is building WKID, a BrowserID-inspired identity provider tailored for personal and family apps. The project responds to a surge in bespoke software enabled by LLMs and aims to avoid repeat...
SGLang and Miles have released day‑0, open‑source support to both serve and train DeepSeek‑V4, introducing a stack tailored to the model’s hybrid sparse‑attention, manifold‑constrained hyper‑connectio...
This visual guide to mahjong covers the essential rules and flow of play. It explains the tile set (136 tiles, with three numbered suits—Characters, Bamboo, and Dots—and honor tiles comprising four Wi...
This article offers a technical critique of the EU’s age verification reference app. It outlines three core concerns: (1) rules permit a non-private fallback to conventional KYC instead of using a pri...
This article details a personal project from 1992–93 to build a home PBX using surplus electronics and microcontrollers. The system supports eight telephone extensions at near telco-standard electrica...
A GitHub repository titled “kodak-pcd0992-statistical-characterization” publishes per-image statistical characterizations of the Kodak image suite using Principal Component Analysis (PCA). For each of...
GnuPG has released version 2.5.19, continuing the 2.5 series focus on enhanced 64‑bit Windows support and integration of Kyber (ML‑KEM/FIPS‑203) for post‑quantum encryption. This update introduces new...
This interview with historian Jon Peterson examines how strategic games evolved from the Indian game chaturanga into chess and then into modern wargames, ultimately influencing the creation of Dungeon...
The article reports that the U.S. Federal Communications Commission has banned the sale of all new home router models not manufactured in the United States, citing national security and consumer safet...
The article examines a persistent open-source licensing issue—self-contradictory licensing and “badgeware”—and explains how the GNU AGPLv3 (and GPLv3-family) solved it. Historically, some vendors dist...