AI Summarized Hacker News

Front-page articles summarized hourly.

Generative Pen-Trained Transformer

Revisiting the Generative Pen-trained Transformer (GPenT), Teddy Warner documents building a wall-mounted polargraph plotter and chaining it to a GPT-inspired workflow. The project covers: a kinematic dual-motor belt polargraph with a weighted gondola and a pen actuator; a wooden frame, wiring on an Arduino Mega RAMPS 1.4, and Marlin firmware; calibration and belt-length calculations; a Raspberry Pi-based Plotter Local web UI with optional Home Assistant/MQTT integration; experiments in Sonakinatography and a diffusion-based dcode transformer for gcode; and a Gemini-driven generator that returns JSON commands. Includes BOM and a gallery of plots.

HN Comments

Same Radio, Different Citizens

Technology alone doesn’t determine outcomes; funding and governance do. Using radio as case studies—the BBC’s license-funded public service, American ad-driven radio, and Stalinist Soviet broadcasts—the authors show how economics shapes what gets heard and how citizens are formed. They adapt Marr’s three questions (aim, mechanism, substrate) to institutions, arguing that the sustainability of a given aim is constrained by the funding stack. They propose 'philosopher-builders'—designers who shape incentives, governance, and capital to sustain meaningful aims—and two tests: Transparent Choice and Candid Aim. Applied to frontier AI, the framework urges designing for autonomy rather than engagement-dominated equilibria.

HN Comments

The browser catches homograph attacks, the terminal doesn't

Tirith is a terminal security tool that stops homograph attacks and command-to-shell exploits before they run. It intercepts suspicious URLs, ANSI injections, and pipe-to-shell patterns, with all analysis performed locally (no network calls, telemetry, or command rewriting). Features include per-command checks, paste analysis, URL scoring, byte-diff, and a safe ‘run’ workflow with receipts and explanations (tirith why). It installs via multiple package managers and integrates with shells through a hook (tirith init). It uses a YAML policy (with allowlists, severity overrides, and bypass controls) and operates offline across Linux, macOS, Windows, and more.

HN Comments

Waiting for Postgres 19: Better planner hints with path generation strategies [video]

A YouTube page footer listing links (About, Press, Copyright, Contact, Creators, Advertise, Developers, Terms, Privacy, Safety, How YouTube works, Test new features) and NFL Sunday Ticket, © 2026 Google LLC.

HN Comments

Things Unix can do atomically

An index of atomic UNIX/POSIX primitives to build lock-free, multi-process/thread-safe code. It covers: pathname tricks (rename on the same filesystem, link/unlink, symlink locking, mv -T to swap symlink targets, open with O_CREAT|O_EXCL for task ownership); directory creation with mkdir and O_EXCL; file locking via fcntl(F_SETLK/F_SETLKW) on struct flock; lease/notify features; memory sharing through mmap(MAP_SHARED) and msync; and GCC atomic builtins (__sync_fetch_and_add, __sync_val_compare_and_swap) as full memory barriers. Also notes on NFS, Mac OS X caveats, and invites feedback.

HN Comments

Systems Thinking

The Programmer's Paradox contrasts evolution (fast, incremental, fewer meetings but messy and dependency-laden) with engineering (big upfront design, coordinated, reliable but slower). In large orgs, many independent systems create data, security, and maintenance headaches; consolidating to fewer systems can reduce costs and risk. Evolution ignores dependencies and can derail; engineering enforces design but adds friction and delays. Knowledge gaps hinder upfront design. A balanced path is needed: address key dependencies, keep a long-term design, and refactor as new dependencies emerge. Iteration size matters; frequent cleanup prevents spiraling maintenance.

HN Comments

Unlocking high-performance PostgreSQL with key memory optimizations

An expert guide to boosting PostgreSQL performance through memory tuning, focusing on shared_buffers and work_mem. It explains how reads/writes use shared_buffers as RAM cache between backends and disk, and why the default 128MB is often too small. Size shared_buffers to about 20–25% of RAM (max ~40%), restart required. work_mem is per operation (and per parallel worker), with a 4MB default; tune cautiously. Rules: on <64GB RAM, ~0.25% of total RAM per session; on larger systems, max(162MB, 0.125% RAM + 80MB). Use pg_stat_database cache-hit ratio and EXPLAIN ANALYZE BUFFERS to verify. Start conservative, target high-impact queries; extensions like pg_buffercache help.

HN Comments

India's female workers watching hours of abusive content to train AI

India’s rural and marginalised women form a large share of data-annotation and content-moderation workers for global AI firms. From home offices across Jharkhand and Uttar Pradesh, they watch and label hours of violent, pornographic or abusive content to train machine-learning models. The job leaves many with trauma, nightmares, hypervigilance and emotional numbness—summed up as 'you feel blank.' Pay is low (about £260–£330/month), mental-health support is scarce, and NDAs keep workers isolated from colleagues and families, while internet access ties them to global AI supply chains.

HN Comments

GitHub Actions Is Slowly Killing Your Engineering Team

Ian Duncan argues GitHub Actions harms engineering teams. After testing many CI systems, he says Actions is slow, brittle, and misdesigned: a painful log viewer, bloated YAML with complex expression syntax, a risky marketplace, and rented Microsoft runners you can’t customize. Workflows encourage brittle Bash hacks and opaque caching. Buildkite, by contrast, offers a sane log UI, on‑prem or cloud agents you control, and data‑driven, dynamic pipelines that emit steps via scripts. Actions wins by ease of adoption; Buildkite wins for production teams who want real control.

HN Comments

I reversed Tower of Fantasy's anti-cheat driver: a BYOVD toolkit never loaded

An in-depth look at Tower of Fantasy's anti-cheat kernel driver (HtAntiCheatDriver). The author reveals weak authentication and BYOVD capabilities: IOCTLs allow arbitrary process termination (0x222040, ZwTerminateProcess), protected-process registration (0x222004), and retroactive handle stripping (0x222044). DLL-name checks, PE checksum validation, and a hardcoded magic value are trivial to bypass. The driver isn’t loaded during testing, yet the vulnerabilities enable potential exploitation. References CVE-2025-61155. Discusses implications for HVCI, VMProtect, and kernel-driver security.

HN Comments

Show HN: Calfkit – an SDK to build distributed, event-driven AI agents

Calfkit is a Python SDK to build AI “employees” as event-driven, asynchronous agents composed of independent chat, tool, and routing services that communicate via Kafka. It enables loose coupling, horizontal scalability, durability, and traceability; outputs can stream to downstream systems (CRMs, data warehouses, etc.), and tools can be deployed without touching agent code. Features include distributed agents out of the box, scalable chat/tool/routing nodes, event persistence, high throughput, real-time responses, and universal data flow. Prereqs: Python 3.10+, Docker, OpenAI API key; run a local Kafka broker (calfkit-broker). Apache-2.0.

HN Comments

Show HN: Local task classifier and dispatcher on RTX 3080

Resilient Workflow Sentinel is a local, offline 7B LLM task orchestrator that analyzes urgency, debates assignment, and balances load. It runs on RTX 3080/4090 and includes a Chaos mode. The repo offers a demo with step-by-step local setup: create a Python virtual environment, install requirements, download a local LLM model, start the LLM service (port 8000), start the orchestrator (port 8100), and launch a NiceGUI UI. Windows batch options for setup are included.

HN Comments

C Isn't a Language

Argues that C isn't really a programming language anymore but a universal ABI protocol that all languages must speak. FFI forces languages to expose C-like interfaces, yet C has no defined, portable ABI or type layouts; hundreds of target triples and conventions exist, making interop brittle. People hand-tune bindings or translate headers, because parsing C headers is effectively impossible. Examples include intmax_t and __int128 discrepancies between clang/gcc, and complex symbol-versioning ideas to preserve compatibility. Case studies (MINIDUMP_HANDLE_DATA/descriptor, jmp_buf) show forward/zero-day compatibility pain. The result: C’s dominance distorts cross-language design and is problematic.

HN Comments

Housman's Introductory Lecture

Housman argues that Science-as-utility and Humanities-as-beauty misstate learning’s aim. The true end is knowledge for its own sake, a universal human craving Aristotle notes. Practical science yields only a minimum for life; absolute security is impossible, and happiness lies in pursuing knowledge for its own sake. Classics refine rather than transform character; Milton benefited, Shakespeare less so for lack of classical training. Knowledge is inexhaustible and should be sought from what attracts us, not for extrinsic gain. Arts and Science share the common task of seeking truth.

HN Comments

The RCE that AMD won't fix

An AMD AutoUpdate remote code execution flaw was disclosed: update URLs are stored in app.config, and while the development URL uses HTTPS, the actual executables are served over HTTP, allowing MITM attackers to swap updates. AutoUpdate performs no signature validation and executes downloaded files. AMD deemed the issue out of scope and won’t fix. Timeline: discovered 27/01/2026; reported 05/02/2026; closed as wont fix/out of scope 05/02/2026; blog published 06/02/2026.

HN Comments

Jane Street Blog – What if writing tests was a joyful experience?

Jane Street promotes “expect tests” (snapshot tests) that make test writing feel like a REPL or Jupyter session. Instead of hand-writing asserts, you place blank expect blocks and let the runtime generate diffs to guide fixes. Tests document behavior, catch regressions as diffs, and can cover UI, traces, and state machines by printing plain text or S-expressions. The approach emphasizes readable output, helper printers, and gradual adoption, encouraging engineers to try this snapshot style and rely on editor integrations to insert expected results.

HN Comments

Launching My Side Project as a Solo Dev: The Walkthrough

An indie coder describes turning a Anki Kanji deck into Kanjideck, a Kickstarter-backed physical/digital product. Starting Aug 2024, he built a polished digital deck, prototyped physical cards (JLPT tiers), and learned 3D rendering. He formed a US company via Stripe Atlas to access Kickstarter, opened a Mercury bank account, and used a pricing spreadsheet to model costs. He self-hosted digital infrastructure (Plausible, Listmonk, Grafana) on NixOS. After marketing burnout, he recruited family for video and social content and launched on Kickstarter Jan 27, 2026. Early pledges reached thousands toward a $55k goal, with lessons from Murphy’s Law and persistence.

HN Comments

Animated Knots

Could not summarize article.

HN Comments

Cubans rendered powerless as outages persist and tensions with US escalate

Santa Cruz del Norte, Cuba, faces daily blackouts as aging power plants and fuel shortages bite, even as the Antonio Guiteras thermoelectric plant intermittently revives. Residents cook with coal and firewood, struggle to afford basics, and ration energy amid rising prices and scarce food. The crisis deepens amid deteriorating U.S.-Cuba tensions after Washington’s actions against Venezuela and proposed tariffs on oil, with Mexico promising humanitarian aid. People improvise—lanterns, makeshift grills—and endure while Cuba’s government remains tight-lipped about oil reserves, and citizens cling to hope for relief and a free Cuba.

HN Comments

OpenClaw: When AI Agents Get Full System Access. Security nightmare?

OpenClaw is an open-source, self-hosted AI agent that runs on your hardware, has full system access, and can act via messaging apps. It offers persistent memory, proactive heartbeats, 100+ integrations, and self-extending skills, delivering usable results quickly. But full system access is a major security risk: agents can be manipulated, and prompt injections or tool/dependency attacks can exfiltrate data or corrupt systems. The safe stance is sandboxed operation: isolate the agent in a VM, a restricted Docker container, or a separate device; forbid sensitive data; enable least privilege, confirmations, logging, and audits.

HN Comments

Made by Johno Whitaker using FastHTML