AI Summarized Hacker News

Front-page articles summarized hourly.

Show HN: E2a – Open-source email gateway for AI agents

e2a is an authenticated email gateway for AI agents. It ingests inbound mail with SPF/DKIM checks and signs deliveries with HMAC headers; delivery can be via cloud webhooks or local WebSocket. Outbound mail uses an API to SMTP or upstream SMTP. Features HITL with approval, per-message threading, and a signed delivery contract. CLI and SDKs (TypeScript, Python) plus Docker self-host or hosted at e2a.dev. Security includes replay protection and verifiable webhooks. Supports shared-domain slug provisioning, GDPR data handling, and full API/docs.

HN Comments

Interaction Models

Thinking Machines Lab unveils an interaction model (TML-Interaction) that processes audio, video, and text in continuous real time via time-aligned micro-turns (≈200 ms), removing turn boundaries. It combines an interaction model with a background reasoning model, enabling real-time dialogue, interruptions, backchannels, live translation, and concurrent tool use while maintaining long-horizon planning. It uses encoder-free early fusion, streaming inference, and tight state sharing between models. Benchmarks show competitive intelligence (Audio MultiChallenge) and superior interactivity (FD-bench), though long sessions, latency, safety, and scale remain challenges. They invite community benchmarks and a research preview.

HN Comments

Show HN: OpenGravity – A zero-install, BYOK vanilla JS clone of Antigravity

OpenGravity is a lightweight, BYOK recreation of Google Antigravity’s UI that runs entirely in the browser with pure HTML/CSS/JS. It provides a live xterm.js terminal powered by WebContainer, direct local file-system sync, and a proactive agent that can run shell commands and edit files in real time. The alpha project emphasizes zero installation, in-browser API-key management stored in localStorage, and Gemini API models. It aims to prototype autonomous web development tasks (project initialization, dependencies, builds). Open-source under GPL-3.0; development is paused for the creator’s GCSEs, with planned improvements.

HN Comments

TanStack NPM Packages Compromised

GitHub issue #7383 for TanStack/router flags several npm latest releases as potentially compromised. Opened May 11, 2026 by ashishkurmi, the issue states investigators are actively examining the matter and links to a Step Security blog about a self-spreading supply-chain attack in the npm ecosystem.

HN Comments

The rise and fall of snake oil

The text describes a webpage attempting to establish a secure connection and prompting the user to enable JavaScript, alongside a request ID.

HN Comments

GitLab Announces Workforce Reduction and End of Their CREDIT Values

GitLab's Act 2 announces a transparent restructuring to pursue an agentic AI era, including up to 30% fewer countries, flatter management, and ~60 smaller R&D teams with AI-enabled workflows. It emphasizes machine-scale infrastructure, lifecycle orchestration, a connected data model, and centralized governance—one platform for human, agent-assisted, and agent-autonomous work. Pricing will mix subscriptions with consumption; operating principles are Speed with Quality, Ownership Mindset, and Customer Outcomes. Support and roadmap remain; next roadmap at Transcend June 10; earnings call June 2; separation window ends May 18.

HN Comments

Google says criminal hackers used AI to find a major software flaw

Could not summarize article.

HN Comments

I let AI build a tool to help me figure out what was waking me up at night

AI helped me build a weekend project to identify what wakes me at night in a noisy city. With Home Assistant sensors, two USB mics, a Raspberry Pi, and Garmin sleep data, I record loud events only when at home/in bed, save short clips, and view a multi-track web app (sleep stages, HR/HRV, sensor events, audio) on a home-network PWA. AI aids the build; I still label the sounds. It reveals culprits—door slams, dishes, street traffic—and spurs fixes (acoustic panels, insulation). AI lowers the bar for personal tooling; I share lessons and future ideas.

HN Comments

Red Hot Chili Peppers ink $300M deal with Warner Music to sell catalog

Red Hot Chili Peppers sold the rights to their recorded catalog to Warner Music Group for more than $300 million, via WMG’s Bain Capital joint venture, accounting for roughly half of the JV’s $650 million catalog acquisitions. The band previously sold its publishing catalog to Hipgnosis/Recognition in 2021, and Sony is reportedly pursuing Recognition in a multibillion-dollar deal. Warner’s long-time label relationship and the rising trend of major labels partnering with outside investors underline a hot catalog market.

HN Comments

590k buyers paid $59M for Trump's gold phone, but not one has shipped

Microsoft Edge is reporting a “Too Many Requests” error (HTTP 429).

HN Comments

Linux Terminal Memory Usage

An experimental look at terminal memory footprints across Openbox/X11 and KDE/Wayland. Using smem, Giles compared st, xterm, lxterminal, gnome-terminal, kitten, alacritty, konsole, kitty, ptyxis, rxvt, and foot before and after running commands. Findings: memory usage varies widely; st uses the least; kitty can be the biggest; gnome-terminal performed reasonably; konsole high; rxvt not measured on one machine. Timg support exists in kitty and konsole (foot also supported). Conclusion: consider st (or lxterminal on X11) or foot on Wayland; note st has no scrollback. Update: prefer lxterminal (X11) and foot (Wayland).

HN Comments

UCLA discovers first stroke rehabilitation drug to repair brain damage (2025)

Could not summarize article.

HN Comments

Library for fast mapping of Java records to native memory

TypedMemory is a Java 25 library that maps Java record types to strongly typed off-heap memory using the Foreign Function & Memory (FFM) API. It provides type-safe views over contiguous memory, preserves memory layouts for native interop, and offers a simple API (Arena, Mem<T>, get/set, wrap, reinterpret, bulk ops) to manipulate off-heap data. Supports nested structures and fixed-size arrays; aims to reduce boilerplate while preserving low-level control. The project is experimental; current features include typed allocation, layout derivation, and basic operations, with unions and pointer fields planned.

HN Comments

Counting Fast in Erlang with:counters and:atomics

Counting Fast in Erlang with :atomics and :counters explains two BEAM facilities for counters. :atomics is an off-heap, shared, mutable array of 64-bit integers supporting atomic ops (add_get, exchange, compare_exchange) with sequentially consistent behavior across cells; no owner, GC when last ref gone. :counters is similar but lacks atomic primitives and uses per-scheduler storage, so writes stay local while reads sum across schedulers and are only eventually consistent. Benchmarks show both outperform ETS under contention; :counters shines with many writers. Use atomics for true atomic primitives; counters for high-write, rare-read workloads; ETS still helpful.

HN Comments

The Boston Library Where You Still Can Borrow a Giant Puppet

Could not summarize article.

HN Comments

Microsoft Israel chief leaves amid ethical controversy

Alon Haimovich, Microsoft Israel’s country general manager, is leaving after an internal investigation into alleged unethical and non-transparent use of Azure by the Israeli Ministry of Defense. Governance staff also departed, and Microsoft Israel is now managed from Microsoft France until a permanent GM is appointed. The probe, overseen by Redmond, questioned ministry use of Microsoft systems and broader compliance risks amid Nimbus tensions with Google and Amazon and European privacy rules. The departure coincides with protests and ongoing talks to renew the Defense Ministry contract on a smaller scale.

HN Comments

Bild AI (YC W25) Is Hiring Founding Product Engineers

Could not summarize article.

HN Comments

Can Someone Please Explain Whether Cloudflare Blackmailed Canonical?

Canonical suffered a 20-hour outage starting 30 April 2026 after a targeted DDoS hit crucial update endpoints (security.ubuntu.com and archive.ubuntu.com). The attack was claimed by the Islamic Cyber Resistance in Iraq (313 Team) and involved Beamed, a commercial Cloudflare-bypass service. Beamed’s infrastructure is hosted through Cloudflare; Canonical, a paying Beamed customer, moved the two repo endpoints behind Cloudflare while the rest remained on Canonical’s network. Full restoration occurred by 1 May. No ransom appeared. The piece argues this amounts to blackmail: paying for Beamed’s protection while Cloudflare’s front-end enables attacker revenue.

HN Comments

Students Boo Commencement Speaker After She Calls AI Next Industrial Revolution

At a May 8, 2026 commencement at the University of Central Florida (College of Arts and Humanities and Nicholson School of Communication and Media), Gloria Caulfield, VP of strategic alliances at Tavistock Group, said AI is the “next industrial revolution.” Thousands of humanities graduates booed, with chants of “AI SUCKS!” Caulfield paused and asked to finish.

HN Comments

Should you leave red herrings about yourself online?

For most people, the answer is no: planting red herrings—fake jobs, cities, or life details—rarely defeats data brokers who aggregate public records and leaked data, can hinder recovery, and leaves the real trail intact. The piece distinguishes three ideas: pseudonyms/compartments, broad fake personal facts, and targeted decoys. Broad fabrications are discouraged; pseudonyms and decoys for detection can have value in narrow cases. Data brokers aggregate from many sources; opting out helps but does not erase history. Best practice: threat-model, minimize data, separate identities, avoid cross-linking, use decoys only for alerts, and regularly repeat opt-outs.

HN Comments

Made by Johno Whitaker using FastHTML