AI Summarized Hacker News

Front-page articles summarized hourly.

I'm writing a history of Visual Basic, Chapter 1 is up

EvilGeniusLabs.ca launches Chapter 1 of a long-form Visual Basic history: Origins (1964–1992). Six articles trace the BASIC lineage from Dartmouth through the Microsoft BASIC dynasty to Visual Basic 1.0 (MS-DOS), with the May 1991 VB/Windows launch in the middle. It covers Alan Cooper and Tripod, Project Thunder, and the 1989–1991 marketing, plus the dual VB/Windows and VB/DOS paths. The author aims to focus on the people behind VB, not just executives, and frames the Book as canonical with blog companions. Chapter 2 will cover version-by-version detail; later chapters cover Notable Characters.

HN Comments

Surfel-based global illumination on the web

Jure Triglav explores real-time surfel-based global illumination in the browser using WebGPU. The pipeline converts geometry into surfels (surfelization), builds a grid-based accelerator for surfels, uses a BVH-based ray-intersection for surfels, and a ray-traced integration to accumulate indirect lighting. A guiding system biases sampling toward bright directions, with temporal stability via MSME. A radial depth atlas helps prevent light leaks, and a resolve pass transfers surfel irradiance to pixels. The setup involves 13+ compute passes and demonstrates real-time performance on web, but faces Chrome storage-buffer limits, no hardware ray tracing, and limitations to static diffuse scenes.

HN Comments

The first microcomputer: The transfluxor-powered Arma Micro Computer from 1962

Ken Shirriff reviews the Arma Micro Computer (1962), a 20-pound transistorized, 22-bit serial computer built for spacecraft navigation. Not a true microcomputer by modern standards, it used unusual components (transfluxors) and non-destructive readout ferrite-core memory, storing up to 7,808 program words and 256 data words. It ran at 1 MHz but delivered ~36,000 operations/sec due to serial design, with 120 I/O lines. Built from waferized discrete components for rugged space use, it influenced later Arma machines (Micro C/D) and inertial navigation systems (LTN-51) before Arma's 1982 closure. The term 'microcomputer' is historically fluid.

HN Comments

France Moves to Break Encrypted Messaging

France’s parliamentary intelligence delegation endorsed weakening end-to-end encryption to enable targeted access to messages on WhatsApp, Signal, and Telegram, arguing it would aid justice and security. They acknowledge limited existing tools (RDI) but deem them inadequate and floated ideas like a “ghost participant” to secretly add a state recipient. Critics warn backdoors are unsafe and keys reside on user devices. While some lawmakers seek to protect encryption, others push for legal changes granting broader investigative access, raising concerns about scope creep and civil liberties.

HN Comments

The Serial TTL connector we deserve

The piece argues that bare USB‑TTL serial pins are dangerous and unreliable for hobbyists, due to loose Dupont wires and back‑feeding. It proposes replacing them with Julet (M6/M8) connectors, commonly used in e‑bikes, as a robust, ready‑made TTL interface. The author describes 20 cm Julet pigtails, color‑coded RX/TX/GND, cross‑wired RX/TX with ground on a separate Dupont, and optional 5/6‑pin variants for expansion. He notes 3.3V logic (with 5V off‑shoots) and mentions Micro Q for lower voltages. A cleaner standard, he argues.

HN Comments

Rust but Lisp

rlisp is a transparent s-expression frontend that compiles to Rust with no runtime or GC. It expresses Rust semantics—ownership, borrowing, lifetimes, generics, traits, pattern matching—in Lisp syntax. A Lisp macro system and s-expr mapping translate to Rust constructs (functions, structs, enums, impls, modules, imports). It transpiles Lisp to Rust (.rs) and then to a binary, via commands to compile/build/run. The README provides Lisp-to-Rust examples, explains macros and code generation, and notes MIT license.

HN Comments

Getting Arrested in Japan

403 Forbidden error; access denied. Timestamp: Sat, 09 May 2026 23:16:39 UTC.

HN Comments

The 90 Day disclosure policy is dead

The piece argues the 90-day disclosure window is dead in an AI-enhanced world. AI-enabled researchers and promptable LLMs let multiple reporters uncover bugs fast, and patches can become exploits within minutes. Examples include Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284/43500)—exploited before patches, leaving Linux distros unpatched. Monthly patch cycles can’t keep up. The author urges treating every critical issue as P0 and patching instantly, with defenders using AI in CI/CD: real-time vulnerability management, patch analysis, and dependency scanning.

HN Comments

Show HN: I made a Clojure-like language in Go, boots in 7ms

let-go is Almost Clojure written in Go: a Clojure-like language and VM that compiles to bytecode or WASM and can run as a standalone binary or embedded in Go. It ships ~10MB with ~7ms cold start, offers Go interop, core.async-like channels, HTTP/JSON/Transit, an nREPL, and Babashka pod support. It aims for broad Clojure compatibility (macros, destructuring, transducers, persistent data), but has gaps: refs/STM, some specs, partial BigInt/BigDecimal, and certain range queries. Benchmarks show small footprint and fast startup. Install via Homebrew, prebuilt binaries, or from source; includes examples and a browser REPL.

HN Comments

Random Tie Knots

Could not summarize article.

HN Comments

I Caught the Car

After starting my software career in July 2023, I earned Senior Software Engineer in Jan 2026. My mentor's early success set a tight target, prompting me to chase promotion quickly. Despite luck on a critical project, and manager support, I was denied at first; I regrouped, shipped more work, and was promoted mid-year. The title brought modest pay and no dramatic day-to-day change, and I questioned the need for validation from the org chart. True fulfillment came from solving hard bugs, tutoring, and conference spark. Going forward: meaningful work over titles; Staff can wait.

HN Comments

FreeBSD: Local Privilege Escalation via Execve()

FreeBSD Security Advisory SA-26:13.exec warns of a local privilege escalation in the kernel via execve() caused by an operator-precedence bug that can overflow and overwrite execve() buffers, letting an unprivileged user gain root. No workaround. Fix: upgrade to a patched stable/release or security branch dated after the correction, then reboot. Update options: (1) base system packages on 15.0-RELEASE (amd64/arm64) with pkg upgrade -r FreeBSD-base; (2) binary distributions with freebsd-update; (3) apply and compile a source patch from security.FreeBSD.org. CVE-2026-7270.

HN Comments

Show HN: Create flashcards with Space CLI

Space CLI lets you create, search, and export flashcards from the terminal and pipe data to AI models (Claude, ChatGPT, etc.). It reads a local database with no login or keys; install the Space app first. Commands include deck list, deck stats, card search/show, deck export (CSV/JSON). You can pair with any AI; with a local model nothing leaves your machine. Changes sync across devices via the Space app; full command reference and issues are on GitHub. Open source.

HN Comments

"Dirty Frag" (CVE-2026-43284): The Second Linux Root Exploit in Eight Days

Dirty Frag is a chained Linux kernel privilege escalation combining CVE-2026-43284 and CVE-2026-43500, disclosed May 7, 2026, with a working exploit that yields root via IPsec/ESP memory handling and the kernel page cache. It builds on Copy Fail (CVE-2026-31431); effective on most distributions since 2017. Affected: RHEL/AlmaLinux/Debian/Ubuntu/Fedora/CentOS/CloudLinux/Amazon Linux and other mainstream kernels. Fix: install patched kernels (May 8, 2026) and reboot; interim fix blocks esp4/esp6/rxrpc and clears caches if reboot isn’t possible; verify with uname -r. Patch immediately.

HN Comments

Production engineering when trading billions of dollars a day [video]

Could not summarize article.

HN Comments

Meta's Embrace of A.I. Is Making Its Employees Miserable

References nytimes.com and instructs to enable JavaScript and disable ad blockers.

HN Comments

I’ve banned query strings

Chris Morgan bans unauthorised query strings on chrismorgan.info, arguing URLs with tracking are invasive and can leak via Referer headers. He currently uses none and would only allow known parameters if ever used. He cites past cache-busting ?t= and ?h= as acceptable breaks. The policy is implemented in his Caddyfile. He considered publishing at root or with a trailing ?, but chose a path-based URL to avoid breaking tools, and may reuse /? or /%3F later for query-string work.

HN Comments

Internet Archive Switzerland

Internet Archive Switzerland launches as a Swiss non-profit based in St. Gallen, advancing the founder's Universal Access to All Knowledge by preserving endangered archives globally and capturing the generative AI era. It will operate independently in Switzerland, align with UNESCO’s November 2026 Paris conference on protecting endangered archives, and partner with the University of St. Gallen’s School of Computer Science on the Gen AI Archive to begin archiving AI models. St. Gallen's archival heritage and academia make it ideal. The foundation joins Internet Archive groups in Canada and Europe to build a distributed, resilient digital library.

HN Comments

The ROKR wooden typewriter: a closer look

Review of the ROKR wooden mechanical typewriter kit reveals a functional, fully-typed device (capital letters only), not just a display. Priced around $120, it's built mainly from laser-cut wood with plastic/metal parts, designed to resemble an Underwood-era machine. Development took about a year and a half, led by ROKR designers Yuzhen Wang, Chaorui Guo, Yifan Zhu; with input from ROBOTIME, featuring two versions: Black Gold (Classic) and Magic (Fairy Tale). To fit wood, the team omitted lowercase and the number row; internal mechanisms redesigned and patented. The goal: a hands-on STEAM experience, not a toy.

HN Comments

Apple is increasing my cortisol levels

Author builds a Go utility to manage Claude Code profiles; wants cross-platform release. Mac deployment blocked by quarantine; Apple Developer Program costs deter hobbyists; distribution economics (Itch.io, VAT) make profit unlikely. ID verification requires webcam photos; Mac hardware shortcomings cause repeated failures; iPhone app works but desktop enrollment is slow and inconsistent. Frustration with Apple's ecosystem, pricing, and gatekeeping; prefers cheaper, open approaches and digital-ID tech like SmartID/eParaksts. Despite admiration for hardware, ecosystem friction pushes toward Android/Linux.

HN Comments

Made by Johno Whitaker using FastHTML