AI Summarized Hacker News

Front-page articles summarized hourly.

Born Private: Reserve your child's first email address with Proton

Proton Mail introduces Born Private, letting parents reserve a private first email address for their child to start online with privacy. With 43% of under-18s already having an email and 74% of those using Gmail, children often begin digital life inside ad-supported systems. The reserved inbox stays sealed for up to 15 years—no data, no activity logs, no profiling—and is activated later with a secure voucher. A small donation (from $1) supports the Proton Foundation. Proton emphasizes end-to-end encryption, Switzerland-based privacy protections, and an open-source codebase as safer alternatives to Big Tech.

HN Comments

Supply chain nightmare: How Rust will be attacked and what we can do to mitigate

The article discusses potential supply‑chain attacks on Rust and offers strategies to mitigate the inevitable risks.

HN Comments

Bluesky users are mastering the fine art of blaming everything on "vibe coding"

Bluesky outages spurred a viral backlash blaming 'vibe coding'—AI-assisted, brittle code—despite the outage also affecting other sites. Bluesky’s team, and founder Graber, have publicly touted AI tools (Claude Code) and Attie, a project to let users vibe-code feeds. The article distinguishes between AI-assisted coding by experienced developers with QA and amateurs who rely on AI sloppily. It notes sentiment against AI persists among users, even as AI coding gains traction elsewhere. The takeaway: blaming outages on vibe coding is often unfounded, but debate remains.

HN Comments

US summons bank bosses over cyber risks from Anthropic's latest AI model

US Treasury Secretary Scott Bessent summoned major bank chiefs to Washington to discuss cyber risks from Anthropic’s Claude Mythos AI model. Fed Chair Jerome Powell was reportedly present. Attendees included Goldman Sachs’s David Solomon, Bank of America’s Brian Moynihan, Citigroup’s Jane Fraser, Morgan Stanley’s Ted Pick and Wells Fargo’s Charlie Scharf; Jamie Dimon was invited but could not attend. Anthropic says Mythos has exposed thousands of vulnerabilities and has limited the release to select partners, including Amazon, Apple and Microsoft, plus Cisco, Broadcom and the Linux Foundation. The meeting followed the government’s designation of Anthropic as a supply-chain risk.

HN Comments

Tech job relocation market is recovering. The competition is growing faster

Relocation-focused tech hiring is recovering, but with stiffer competition. Broad signals show tech employment rising (CompTIA: +1.9% in 2026; software +2.6%; data science +3.5%; Indeed: dev postings +2–4% MoM). From the relocation lens, roles rebounded from a thin market to 110+ relocation-friendly openings with visa sponsorship returning. Yet applicant pools have grown faster than openings, making outcomes harder. Success now requires clear specialization, demonstrable work, and a strong digital footprint. Growth remains strongest in backend, ML/data science, and DevOps/infra—yet the feel is compression, not a full rebound.

HN Comments

Deterministic Primality Testing for Limited Bit Width

The article shows a deterministic Miller–Rabin primality test for 32-bit integers by testing bases 2,3,5,7. It provides a C++ implementation with helpers for trailing-zero count and modular exponentiation, and explains why these four bases suffice for 32-bit ranges. It discusses strong pseudoprimes, SPRP bases, and historical work (Miller–Rabin, Agrawal–Kayal–Saxena, Pomerance et al.). It notes that while a naive deterministic MR is reasonably fast for 32-bit numbers, specialized sieve-based tools like primesieve are much faster. Links to OEIS A014233 and related resources are mentioned.

HN Comments

Code is run more than read (2023)

Code is run more than read; code is read more than written. Software should serve users first, with priorities: user > maintainer > author, extended to user > ops > dev, and then biz > user > ops > dev. The piece warns against dysfunctional patterns—unmaintainable code, unusable software, over‑engineering, premature scaling—driven by tech- or profit-centric mindsets. It advocates shipping early to users, simplifying systems, and balancing business realities with user needs to build reliable, valuable software and avoid harming users.

HN Comments

CPU-Z and HWMonitor Compromised

You're blocked by Reddit's network policy. To regain access, log in or create an account, or sign in with developer credentials if using a script/app. Ensure your User-Agent is non-empty, unique, and descriptive; if using an alternate string, revert to default as it may trigger blocks. Review Reddit's Terms of Service. If you believe the block is mistaken or you want easier data access, file a support ticket and include your Reddit account and code 019d77f9-5c69-7318-90a9-71a173d1780b.

HN Comments

The effects of caffeine consumption do not decay with a ~5 hour half-life

Main idea: Caffeine’s effects persist longer than a simple 5-hour half-life because caffeine is mostly metabolized into paraxanthine, which itself blocks adenosine receptors and has a ~3–5 hour half-life. Paraxanthine is the dominant metabolite (>80%), so the effective concentration decays more slowly, broadening the peak and prolonging effects. The author models caffeine → paraxanthine → elimination and suggests paraxanthine as a stimulant with potentially less tolerance buildup and the possibility to take later in the day. Relative potency to caffeine is uncertain but likely ~1.5–2x affinity at A1/A2A; human data sparse. Anecdotes provided; calls for more testing.

HN Comments

Ads in ChatGPT

Could not summarize article.

HN Comments

OpenAI Backs Bill That Would Limit Liability for AI-Enabled Mass Deaths

OpenAI backs Illinois SB 3444, which would shield frontier AI labs from liability for “critical harms” (mass death, serious injuries to 100+ people, or $1B+ property damage) so long as the harm wasn’t intentional and safety reports are published. Frontier model: >$100M compute. The measure aims for uniform standards and federal alignment, signaling a shift from OpenAI’s prior defensive posture. Critics doubt its passage and worry it could weaken accountability amid ongoing state and federal AI-safety debates.

HN Comments

Show HN: Marimo pair – Reactive Python notebooks as environments for agents

marimo-pair lets you drop agents inside running marimo notebook sessions. Prereqs: a running marimo notebook (use --no-token for auto-discovery; MARIMO_TOKEN for server auth), plus bash, curl, and jq. Works with any agent that supports the Agent Skills standard. Install via npx skills add marimo-team/marimo-pair (or upgrade); can also install the Claude Code plugin. Supports auto-updates. FAQ notes that Bash calls may prompt; to avoid prompts, configure absolute paths to scripts in Claude settings. License: Apache-2.0.

HN Comments

White House staff told not to place bets on prediction markets

White House staff were warned not to use insider information to place bets on prediction markets such as Kalshi or Polymarket. An email on March 24 followed reports of officials possibly using non-public information. The White House said there is no evidence of such activity and that federal ethics rules apply. Polymarket faced scrutiny after a large bet on Maduro’s capture before the announcement. Prediction markets, with over $44bn in trades, have prompted regulatory scrutiny; lawmakers have proposed bans on war-related bets amid corruption concerns.

HN Comments

Sorting Performance Rabbit Hole

Jussi Pakkanen details an experiment comparing Pystd's sorting with stdlibc++; using 10M shuffled 64-bit ints, Pystd's stable sort outperformed std::stable_sort (~0.86s). Unstable sort was harder; numerous optimizations (insertion strategies, memmove, shell/radix sort, pivot choices) yielded mixed results and a bug. The turning point was adjusting the introsort insertion-sort threshold from 16 to 32 (later experimenting with 64); 32 proved best balance. In the end, Pystd beat stdlibc++ on the dataset with a best observed 0.754s vs 0.755s, though only once.

HN Comments

FBI used iPhone notification data to retrieve deleted Signal messages

According to 404 Media and trial testimony, the FBI recovered incoming Signal message content from a defendant’s iPhone via Apple’s internal notification storage even after Signal was deleted. Only incoming messages were captured; no outgoing content. The exact method is unclear; it may involve data cached in iPhone notification storage or device backups, and could depend on the iPhone’s state (BFU/AFU) and push-token behavior. Signal or Apple have not commented. The timing coincides with iOS 26.4 changes to notification token validation. Tools exist to extract such data from iOS devices.

HN Comments

Intel 486 CPU announced April 10, 1989

Intel announced the 486 at Comdex on April 10, 1989, costing about $950 in 1,000-unit lots. Initial coverage debated whether the speed gains justified the price, with some predicting end-user prices near $1,000. Production started mid-1989; first PCs appeared by June. The 486 integrated 1.2 million transistors and offered roughly three times the performance of a 386, with speeds up to 60 MHz. Windows 3.0, Word, and Doom helped drive adoption. It remained viable through Windows 95, before yielding to the Pentium II.

HN Comments

Microsoft suspends dev accounts for high-profile open source projects

Could not summarize article.

HN Comments

We're Getting the Wrong Message from Mythos

Daniel Miessler argues Mythos isn’t trained for cybersecurity, but its broad capabilities let it excel in cyber tasks by leveraging general AI. It can chain multiple low/medium vulnerabilities into high/critical exploits—far fewer than 1% of experts can do today. If AI can do that, it will transform all knowledge work—emails, analysis, reports—at 10–1000× productivity and 24/7 availability, for about $100–$1000/hour versus human salaries around $84k/year. The shift will be disruptive but ultimately lead to more human, meaningful work.

HN Comments

Model-Based Testing for Dungeons & Dragons

Using Quint as a formal spec and XState as the runtime, the project scales MBT from a single creature to full combat, modeling 12 classes, 14 conditions, legendary actions/resistance, counterspells, interrupts, and readied spells. The spec is the source of truth for deterministic rules; randomness is supplied by the tester. The MBT bridge fuzzes thousands of traces, verifying spec–runtime convergence and surfacing divergences. First night yielded 1,447 failures (spell-slot initialization); iterative fixes uncovered more bugs. It maintains 62 safety invariants and aims to generalize beyond SRD 5.2.1, with demos and repos linked.

HN Comments

France Launches Government Linux Desktop Plan as Windows Exit Begins

La DINUM organise un séminaire interministériel pour accélérer la souveraineté numérique en réduisant les dépendances extra-européennes. Actions clés: sortie de Windows vers Linux; migration des agents de la CNAM vers des outils du socle numérique (Tchap, Visio, FranceTransfert); transfert de données de santé vers une solution de confiance d’ici fin 2026. Chaque ministère devra formuler d’ici l’automne un plan d’action couvrant postes de travail, outils collaboratifs, antivirus, IA, bases de données, virtualisation et réseau. Le plan vise des coalitions public-privé et une alliance européenne pour des solutions souveraines et interopérables.

HN Comments

Made by Johno Whitaker using FastHTML