AI Summarized Hacker News

Front-page articles summarized hourly.

Pro-Iran crew turns DDoS into shakedown as Ubuntu.com stays down

Pro-Iran hacktivist group 313 Team is conducting a sustained DDoS against Canonical, knocking Ubuntu.org and many subdomains offline with 503 errors. Users cannot download Ubuntu or log into Canonical accounts; some pages stay up. The group, via Telegram, is threatening extortion and says the attack will continue unless Canonical makes contact. 313 Team has attacked eBay Japan/US and BlueSky recently. Canonical says the web infrastructure is under attack and they're working to restore service; motive for targeting Canonical remains unclear.

HN Comments

An open letter asking NHS England to keep its code open

An open letter asking NHS England to keep its code open, arguing that software paid for with public money should be public and aligned with the UK Government Design Principles and NHS Service Standard. The authors oppose NHS leadership’s move to hide source code, stating open source requires more work but strengthens quality, vulnerability monitoring, and risk containment. They urge NHS England to withdraw the SDLC-8 red line and uphold Service Standard Principle 12: Make new source code open. The page is open for signatures (9 so far) as of May 1, 2026.

HN Comments

Show HN: Loopsy, a way for terminals and AI agents on different machines to talk

Loopsy is an open-source system to control a laptop’s terminal from a phone via a self‑hosted relay (Cloudflare Workers). It includes a laptop daemon, a relay, and a mobile/web client. Setup: install loopsy, deploy the relay, pair a phone, and run the daemon. Architecture: laptop daemon ↔ relay ↔ phone using outbound WebSockets; pair tokens are HMAC‑signed and secrets SHA‑256 hashed at rest. Features: full PTY terminal, voice input, per‑session auto‑approve, LAN agent support via MCP, and a web/mobile app. Security notes warn the relay can read content; self-hosting recommended; Apache-2.0.

HN Comments

Sally McKee, who coined the term "the Memory Wall", has died

Sally A. McKee (1963–2025), computer science professor, died Feb. 12, 2025 in Greenville, after a brief illness. She earned a BS from Yale, MS from Princeton, and PhD from UVA in CS. Her career included DEC, Microsoft, and academia at Oregon Graduate Institute, University of Utah, Cornell, and Chalmers University of Technology. Until 2021 she was Clemson’s C. Tycho Howle Chair in Collaborative Computing Environments and led the Center of Economic Excellence in Collaborative Computing, focusing on cybersecurity. She co-authored the 1994 memory-wall paper and mentored many female CS students. Survived by relatives; donations to Alzheimer's Association. Funeral private.

HN Comments

whohas – Command-line utility for cross-distro, cross-repository package search

whohas is a cross-platform CLI tool that queries multiple Linux and BSD package lists (Arch, Debian, Fedora, Gentoo, Mageia, Mandriva, openSUSE, Slackware, Source Mage, Ubuntu; plus FreeBSD, NetBSD, OpenBSD, Fink, MacPorts, Cygwin) to show which distro has a package and its versions. Written in Perl, aimed at maintainers but useful to users. Outputs URLs for details; can be filtered with grep. Current version focuses on x86; Debian section covers binaries. Bug reports to [email protected]. Related services: Repology, pkgs.org, namecheck.

HN Comments

GhostBox – disposable little machines from the Global Free Tier.

Ghostbox provides disposable, ephemeral dev machines you can SSH into to run builds, expose previews, or host agents—without using your laptop. Install via a CLI or curl script. Machines come from a Global Free Tier of spare compute from various sources, requiring no platform or sysadmin. Borrow, work, and then the machine expires and returns to the cloud. It keeps logs and cleanup centralized, and lets you expose previews without exposing your laptop. Targeted at developers and agents needing temporary, real machines.

HN Comments

A Letter from Dijkstra on APL

Roger K.W. Hui reproduces Edsger W. Dijkstra’s 1982 letter on APL, arguing that a tool’s influence on its users often matters more than ease of use, and that teaching APL benefits from machines rather than pencil‑and‑paper demonstrations. Hui notes Iverson’s notation as a language for thought and its early reception. The article then presents two APL-based formal examples—Ackermann’s function and index‑of on inverted tables—illustrating how APL can express proofs and computations concisely, followed by a notation summary and references.

HN Comments

Advanced Quantization Algorithm for LLMs

AutoRound is a state-of-the-art quantization toolkit for LLMs and VLMs that achieves high accuracy at ultra-low bit widths (2–4 bits) using sign-gradient descent. It offers broad hardware support (CPU/XPU/CUDA) and full compatibility with vLLM, Transformers, and SGLang. It exports to multiple formats (auto_round, auto_awq, autoGPTQ, GGUF) and supports fast mixed-bits/dtypes scheme generation, including an RTN mode for speed. It can quantize 7B models in about 10 minutes on a single GPU, supports 10+ vision-language models, and provides several recipes (auto-round, best, light). Installation is via PyPI with API/CLI usage.

HN Comments

Show HN: Site Mogging

Site Mogging compares kiwifarms.st and 4chan.org, rating kiwifarms.st 3.9/10 and 4chan.org 0.5/10; kiwifarms.st mogged 4chan.org recently. The page shows a verdict and is powered by Cloudflare tech, created by @Jilles.

HN Comments

Our agent found a bug with WireGuard in Google Kubernetes Engine

Lovable confronted user errors during peak sandboxing in Kubernetes. AI-assisted log analysis pinpointed anetd, Google's WireGuard integration in GKE, crashing about 120 times per pod over six days and breaking networking. Root cause: a concurrent map-access panic in Google's integration code; Google patched it after collaboration. A temporary workaround—disable transparent node-to-node encryption—stopped crashes but revealed a second issue: MTU mismatches (1420 vs 1500) across nodes, causing Valkey fragmentation. Rerolling all nodes to a consistent MTU fixed it. Lessons: layered failures, post-change validation, and AI-driven debugging; team notes hiring.

HN Comments

Apple accidentally left Claude.md files Apple Support app

A 403 Forbidden error page, likely served by OpenResty.

HN Comments

Running Adobe's 1991 PostScript Interpreter in the Browser

Shows a 504 Gateway Time-out error from nginx/1.18.0 on Ubuntu, indicating the upstream server timed out.

HN Comments

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber

OpenAI says it will replicate Anthropic’s gatekeeping by limiting access to its cybersecurity toolkit Cyber, rolling out GPT-5.5 Cyber to 'critical cyber defenders' in coming days. Like Mythos, Cyber requires applicants to submit credentials and planned use via OpenAI’s form. Cyber can conduct penetration testing, vulnerability identification and malware reverse engineering to help firms find weaknesses, raising abuse concerns. Critics argued Anthropic’s gatekeeping was fear-based; an unauthorized group reportedly breached Mythos anyway. OpenAI plans broader access by consulting the U.S. government and verifying legitimate cybersecurity credentials, seeking wider safe use of Cyber.

HN Comments

Your Biggest Vulnerability is your Shitty Compensation

An unemployed tech professional describes interviewing for a senior role in public-safety tech where the stated base pay is misleading; the all-inclusive package falls below living wage for a three-adult household. He argues compensation is not just wages but a social contract and protection money that enables workers to live and secure systems; decades of wage stagnation and outsourcing have eroded earnings, fueling a K-shaped economy and burnout among critical technologists. Underpayment jeopardizes security; he calls for higher wages, policy action, and cautions AI-fueled disruptions will worsen the risk.

HN Comments

Git Your Freedom Back: A Beginner's Guide to Sourcehut (2025)

The guide argues for abandoning GitHub in favor of SourceHut (sr.ht), detailing privacy, telemetry, vendor lock-in, and governance concerns with Microsoft-owned GitHub. It compares core features (Pull Requests, Issues, Actions, Pages, Wiki) and shows SourceHut equivalents: Patches, TODOs, Builds, Pages, Man, plus email-based contributions, fast search, no tracking, and minimal friction (you can contribute without an account). It notes SourceHut is open-source, offers tiered pricing, or self-hosting, and aims for feature parity. Encourages trying sr.ht, hosting your own, or contributing patches, with a nod to other forges as alternatives.

HN Comments

How we run iSCSI over the internet

scsipub exposes iSCSI targets on the public internet using Erlang/OTP. It runs Ranch 2.x listeners (TCP 3260, TLS 3261) and one BEAM per session; each session uses a copy-on-write overlay over a base image. The Session GenServer handles security negotiation, parameter negotiation, and full-feature phase; on errors the process dies and the supervisor lets it fail. An ETS registry tracks live sessions; a Janitor cleans overlays. TLS is terminated by Caddy with rotating certs. It fixes IQN/SendTargets quirks, supports multi-LUN and SCSI-3 PR; limits: single region, no iSER, no MPIO yet.

HN Comments

Show HN: WhatCable, a tiny menu bar app for inspecting USB-C cables

WhatCable is a macOS menu bar app that explains, in plain English, exactly what a USB-C cable connected to your Mac can do. It surfaces per-port details like connector type (Thunderbolt/USB4, USB device, charging), charging limits, cable speed (e-marker), PD profiles, and the live negotiated power, plus vendor and transport info. Built with Swift and IOKit, it runs on macOS Sonoma or later and does not use entitlements or daemons. It’s open-source under MIT; buildable from source with notarisation options.

HN Comments

Canonical/Ubuntu have been under DDoS for more than 15h

A Site24x7 StatusPage-like UI with status indicators and switches for timezone and language, a global subscribe option, links to home and incident history, an RSS feed, and a cookie-consent banner stating that cookies are used to store preferences and linking to the privacy policy.

HN Comments

Grok 4.3

Grok 4.3 developer docs hub for REST/gRPC APIs, pricing, rate limits, regional endpoints, debugging, MCP, release notes, and model capabilities (text, images, video, voice). Includes files/collections management, API tools (function calling, web search, code execution, RAG-based Collections Search), authentication, async/WebSocket, migrations, community resources, data/privacy, FAQ, and API console.

HN Comments

Auto Polo

It instructs setting a user-agent and respecting the site's robot policy.

HN Comments

Made by Johno Whitaker using FastHTML