AI Summarized Hacker News

Front-page articles summarized hourly.

New synthesis of astronomical measurements shows Hubble tension is real

An international team (H0DN) reports the most precise direct local Hubble constant to date: H0 = 73.50 ± 0.81 km s⁻¹ Mpc⁻¹ (~1% precision). Using a community-built distance network linking Cepheids, red giants, Type Ia supernovae, and other indicators, with data from CTIO and KPNO, the result reinforces the Hubble tension: local methods give ~73–74, while early-Universe predictions sit at ~67–68. If real, this discrepancy hints at new physics beyond the standard cosmological model (e.g., dark energy, new particles, modified gravity).

HN Comments

The Soul of an Old Machine

A personal essay about attachment to hardware and seeking machines with character and longevity. The author recalls choosing and reviving gear—from an HP nx6310 and an iPod 5th gen with Rockbox to a 2013 MacBook Pro and NixOS—driven by durability, serviceability, and hands-on tinkering. They soldered fixes, replaced batteries, wrestled with drivers, and used the laptop as a focused writer/developer machine. The piece argues for computers built to last and open to modification, highlighting ThinkPads and Framework laptops as the hopeful trend.

HN Comments

The Life and Death of the Book Review

David A. Bell argues the book review, born in the Enlightenment to foster open debate and public access to new knowledge, is in existential decline. He traces critics’ nostalgia, then points to modern threats: faux reviews scandals, Amazon dominance and its ratings shaping perception, celebrity-driven reading culture, and shrinking traditional outlets (The New Republic, The Nation, the Washington Post book section). Major publishers (Penguin Random House) and limited debut reviews. Online outlets help but algorithms limit discovery. The decline mirrors a broader erosion of Enlightenment-era cultural authority.

HN Comments

Metrics SQL: A SQL-based semantic layer for humans and agents

Rill unveils Metrics SQL, a SQL-based semantic layer for metrics (measures) and dimensions that provides a deterministic, secure, and fast source of truth across dashboards, notebooks, APIs, and AI agents. Metrics are defined in YAML with embedded SQL and queried as a single table, with a compiler expanding to OLAP SQL. It supports engines like ClickHouse, DuckDB, Snowflake, and more, with examples such as top countries by revenue and computed dimensions. Access via CLI, HTTP API, or Claude via MCP. Limitations: no joins across metric views, explicit naming required, and HAVING used for measure filters. Future: native engine support.

HN Comments

New synthesis of astronomical measurements shows Hubble tension is real

Una colaboración internacional logró una de las mediciones más precisas de la expansión del Universo local. La H0DN reporta H0 = 73.50 ± 0.81 km s−1 Mpc−1 (~1%); la tensión con las predicciones del Universo temprano (≈67–68) persiste. Usando una red de distancias que combina Cepheids, gigantes rojas, supernovas Ia y galaxias, el estudio integra décadas de observaciones y datos de CTIO y KPNO de NOIRLab. Publicado en Astronomy & Astrophysics (10 abr 2026), su marco abierto sugiere posible nueva física más allá del modelo cosmológico y orienta futuras observaciones.

HN Comments

Pijul a FOSS distributed version control system

Pijul is a free, GPL2 distributed version control system built on a patches theory. It supports commutation: independent changes can be applied in any order without altering results or identifiers, simplifying workflows versus git rebase or hg transplant. It uses channels but keeps history clean as default. Merges preserve line order; conflicts are first-class and solved by a resolution change, after which conflicts don’t recur. It supports partial clones: you can clone only a subset of a repo and push changes back. Pijul bootstraps itself; repo: nest.pijul.com/pijul/pijul.

HN Comments

What Is a Property?

Property-Based Testing (PBT) blends universally quantified properties with generators that produce inputs. In practice, generators and properties aren’t independent: tests often need dependent, valid inputs derived from the system under test. The post walks through a DB example where a generator builds a database with tables and values, eliminating precondition failures by moving checks into generation or returning Maybe. It shows how combining generation with tests (via forAll-style combinators) yields more realistic tests and compares QuickCheck, Hypothesis, and Proptest, arguing for more expressive, bound-aware generators in PBT libraries.

HN Comments

Dark Castle

This page lets you play three classic Dark Castle games on PC via a Mac‑emulation bundle. The downloadable ZIP includes MiniVMac with a Mac Plus ROM and a Mac image containing System 6, Dark Castle and Beyond Dark Castle (Return to Dark Castle is not included). After extracting, drag DCImage onto Mini vMac and boot; press CTRL‑F for full screen; an Easter egg reveals festive graphics on December 25. Titles: Dark Castle (1986) a black‑and‑white quest to defeat the Black Knight; Beyond Dark Castle (1987) sequel; Return to Dark Castle (2008) a larger game with 50+ new levels, orb collection, inventory, and demos. Feedback and donations encouraged.

HN Comments

447 TB/cm² at zero retention energy – atomic-scale memory on fluorographane

Proposes a post-transistor, pre-quantum memory on single-layer fluorographane (CF), where covalent C–F orientation is a binary bit. The C–F inversion barrier (~4.6–4.8 eV) yields negligible thermal/quantum bit-flip at 300 K, enabling non-volatile storage with zero retention energy. A 1 cm^2 sheet stores 447 TB; volumetric nanotape could reach 0.4–9 ZB/cm^3. Outlines a tiered read-write architecture—from scanning-probe Tier1 to near-field infrared Tier2 to dual-face arrays with a central controller—projecting 25 PB/s at full Tier2 scale. A prototype already surpasses existing densities by >5 orders of magnitude. Zenodo publication details DOI 10.5281/zenodo.19513269.

HN Comments

Apple Silicon and Virtual Machines: Beating the 2 VM Limit (2023)

Apple Silicon hosts are limited to two macOS VMs. The author traced the cap to the XNU kernel (hv_vm_*) rather than userspace, finding a VM quota variable hv_apple_isa_vm_quota and boot-args (hypervisor= and hv_apple_isa_vm_quota=) that can override it in development kernels. Release kernels enforce the limit via an AppleInternal SIP check. By building a development Kernel Collection (KDK) and booting with custom boot-args in RecoveryOS, he ran up to 9 macOS VMs using Virtualization.framework (e.g., UTM). Updates revert to stock kernel; tooling could automate KC building; this is unofficial and unsupported.

HN Comments

Layoff Thinking

The post explores why layoffs hurt so deeply because Western culture ties identity to work. When a company lays you off, it feels like losing part of who you are. The author, who sees himself as more than a 'Java developer' and has varied interests (fiction writing, sommelier, game design), argues to re-center identity on non-work parts during unemployment. Grieve the loss, but lean into hobbies, family, and small pleasures; remember you are worth more than your job. The piece draws on personal experience of an involuntary sabbatical.

HN Comments

Show HN: Editing 2000 photos made me build a macOS bulk photo editor

RapidPhoto is a macOS batch photo editor that processes up to 500 images entirely on-device. It offers batch crop/resize, watermarking, and exports in 9 formats (JPEG, PNG, TIFF, HEIC, WebP, AVIF, BMP, GIF, PDF). Features include smart cropping with 15 aspect ratios, professional adjustments, typography-based watermarks, and AI tools (OCR, QR/barcode, face blur, scene classification). It also supports EXIF/IPTC metadata editing and batch renaming. Privacy-first with no cloud uploads. Free tier (10 images); Premium unlocks 500 images and more formats/tools.

HN Comments

One neat trick to end extreme poverty

Could not summarize article.

HN Comments

How We Broke Top AI Agent Benchmarks: And What Comes Next

UC Berkeley researchers show eight leading AI agent benchmarks can be gamed to near-perfect scores without solving tasks. They built an exploit agent that automatically crafts attacks against evaluation pipelines, revealing systemic flaws: no isolation between agent and evaluator; leaked or writable gold data; eval() on untrusted input; prompt injection in LLM judges; weak or buggy scoring. Across benchmarks such as SWE-bench, WebArena, OSWorld, GAIA, Terminal-Bench, FieldWorkArena, and CAR-bench, all are exploitable. They propose the Agent-Eval Checklist and introduce BenchJack, an autonomous vulnerability scanner to test and harden benchmarks before publication, advocating adversarial robustness.

HN Comments

The APL Programming Language Source Code (2012)

Originating as Iverson's notation in the 1950s, APL became a revolutionary array-based language. The article traces its evolution from Iverson’s mathematical notation to the 1966 IBM System/360 implementation (APL\360), the development of interactive timesharing (IVSYS), and the XM6 source-code release for non-commercial use. It explains APL’s core ideas: right-to-left evaluation, automatic creation of vectors/arrays, no variable declarations, and a vast suite of primitives for multidimensional data. It also surveys its terse syntax, notable applications, reception (praise and Dijkstra’s quip), and Iverson’s biography.

HN Comments

Mexican surveillance company Grupo Seguritech watches the U.S. border

Rest of World and Type Investigations reveal Grupo Seguritech, a Mexican surveillance firm that built a vast, AI-powered network (Centinela) tying thousands of cameras, license-plate readers, drones, and other tech across Mexico and into the U.S. It has secured at least 63 government contracts worth over 21.8 billion pesos ($1.27B) since 2012 and operates in 26 Mexican states with subsidiaries in Colombia, Brazil, and the United States. Centinela is used at the U.S.–Mexico border and data is shared with U.S. agencies. Civil-liberties groups warn the scale risks privacy violations; Seguritech frames itself as a Mexican leader expanding regionally.

HN Comments

How to build a `Git diff` driver

Jamie Tanna explains how to build a git diff driver (an external command invoked by git diff), detailing the seven arguments it receives (filename, before/after blob SHAs, and file modes, plus paths for before/after blobs, with /dev/null for creates/deletes). He shows examples like renovate-packagedata-diff and a lightweight OpenAPI diff using oasdiff, including a basic bash driver that outputs a human-readable changelog for added/modified/deleted files. The post notes that textconv can suffice in many cases, and mentions using GIT_PAGER_IN_USE and potential caching with SHA-1 checksums, plus licensing references.

HN Comments

The disturbing white paper Red Hat is trying to erase from the internet

OSnews reports that Red Hat (IBM) is allegedly trying to delete a 2024 white paper, 'Compress the kill cycle with Red Hat Device Edge,' which details using Red Hat tech to accelerate kill chains via AI/ML, near real-time sensor data, and the F2T2EA process to improve targeting and guidance. The piece frames this as morally problematic, critiques the defense tie-in, notes the 404s but that the paper survives on Wayback, and argues Red Hat’s open-source image has been damaged by its corporate, military links. Includes reader commentary.

HN Comments

Every plane you see in the sky – you can now follow it from the cockpit in 3D

Flight Viz cockpit view shows altitude 0 ft, ground speed 0 kts, heading 0°, labeled IN FLIGHT, with an option to exit to the cockpit map.

HN Comments

Rockstar Games Hacked, Hackers Threaten a Massive Data Leak If Not Paid Ransom

ShinyHunters claim they breached Rockstar Games’ cloud data (via Snowflake) using Anodot and threaten to leak a large data set unless paid by April 14. Rockstar confirmed a limited breach of non-material company information from a third party, with no impact on players or operations. The data allegedly includes contracts, financial documents, and marketing plans, not passwords or personal player data. This echoes Rockstar’s 2022 GTA 6 leak, though involving different attackers and data.

HN Comments

Made by Johno Whitaker using FastHTML