AI Summarized Hacker News

Front-page articles summarized hourly.

Recover Apple Keychain

After getting locked out of a work MacBook, macOS recovery reset the password, but the keychain data remained encrypted with the old password, breaking access and syncing. Keychains live at ~/Library/Keychains; the main file is login.keychain-db. The reset created a new login.keychain-db and renamed the old to login_renamed_1.keychain-db. To recover: rm login.keychain-db; mv login_renamed_1.keychain-db login.keychain-db; reopen Keychain Access and enter the old password to unlock and resume syncing.

HN Comments

What Construction at a Train Station Taught Me About Software Engineering

Drawing a parallel between a non-stop train station project and software engineering, the piece argues that engineers measure success by delivering value under constraints, not by lines of code. Key skills include system thinking, clear communication, debugging, time and complexity management, comfort with uncertainty, and learning how to learn. The author stresses balancing progress with minimal disruption—refactoring, migrations, or AI-generated code—while preserving user stability and shipping MVPs. Examples include integrating third‑party services, building a new app store from a marketplace API, and using RFCs/ADR docs to capture decisions. AI is a tool, not a substitute.

HN Comments

Roulette Computers: Hidden Devices That Predict Spins

Roulette Computers promotes hidden devices that predict roulette outcomes by modeling ball and wheel dynamics to identify probable winning numbers. The article asserts these devices are legal in about half of casinos since they do not influence spins, though casinos may ban repeat winners. It describes multiple versions (Basic, Lite, Uber, Remote Uber, Remote Hybrid) with prices from under $1k to $80k and remote-use options for teams. It covers demonstrations, licensing, joining teams, and warnings about scams, stressing that detection avoidance is essential for profit.

HN Comments

Vulnerability Research Is Cooked

AI coding agents will transform vulnerability research by automatically finding exploitable zero-days across codebases, altering exploitation practice and economics. Frontier models will improve in step functions; simply instructing an agent to "find me zero days" will yield high-impact research. The author recalls that vulnerabilities follow inputs through "weird machines" and that a frontier LLM, trained on vast open-source code and bug classes, can pattern-match and reason about exploitability. A workflow like Carlini’s—looping prompts over files to generate vuln reports—produces near-100% success. Regulators and defenders are unprepared; layered defenses may be overwhelmed. The trend is likely irreversible.

HN Comments

We Hid a Free Trip to Switzerland in Our Privacy Policy. Someone Found It

Cape hid an Easter egg in its privacy policy offering a free trip to Switzerland. After about two weeks, a reader found it and won: round-trip flights for two, three nights in a private chalet, a $1,500 meal stipend, a private chef-hosted dinner, and three years of Cape mobile service. The winner took the trip in December 2025. The piece argues the industry’s fine print is often unread, cites FCC fines of $200 million in 2024 for location data selling, and notes Proton’s security collaboration. Cape promotes transparency and urges switching to a clearer policy carrier.

HN Comments

Turning a MacBook into a touchscreen with $1 of hardware (2018)

Anish Athalye and team convert a MacBook into a touchscreen using about $1 of hardware by mounting a small mirror in front of the built-in webcam to view the screen at a sharp angle, capturing finger hover and touch via reflection. A classic computer-vision pipeline detects the finger and touch/hover points, then maps webcam coordinates to screen coordinates with a calibrated homography (robust via RANSAC). Touch is translated into mouse events, enabling existing apps to react to touch. The prototype (~16 hours) is open-source under MIT; future improvements include a higher-res camera and curved mirror.

HN Comments

Fibonacci's Composed Fractions

The article explains Leonardo of Pisa’s Liber Abaci (c. 1200s), which popularized Hindu–Arabic numerals in Italy and introduced a composed (linked) fraction notation for mixed-radix quantities. It details Fibonacci’s notation of a0 plus a sequence of fractions with bases b1,b2,…, and shows arithmetic (multiplication, addition, division, subtraction) by converting to a single fraction or aligning bases, including a TypeScript implementation (FCF) for a0, as, bs. It covers adoption challenges, Abbacus schools, the move toward decimal fractions, and notes the Fibonacci sequence’s origin as an aside.

HN Comments

The Hateful Eight is 85% of S&P 500 Decline

Through March 30, 2026, the S&P 500 is down about 7% YTD, but 85% of the decline comes from the “Hateful Eight”—the Mag 7 plus Oracle (Microsoft, Nvidia, Google/Alphabet, Apple, Amazon, Meta, Tesla, Oracle). They subtract roughly 576 points, while the remaining ~490 stocks add about 100. This concentration shows breadth erosion, with a few mega-caps driving index moves; if AI capex sentiment shifts, the trend could reverse.

HN Comments

William Blake, Remote by the Sea

Philip Hoare chronicles William Blake’s 1800 move to Felpham, where the sea renews his imagination and births a Miltonic, sea-haunted vision. Blake walks the shore with angels and ancient figures, while the sea names his art anew. Hoare then frames Blake amid the era’s industrial crisis—machines, surveillance, and the social costs of progress—through Pandaemonium and critics like Carlyle and Ruskin. Blake’s response is a staunch condemnation of mechanization: a machine is not a man or a work of art, even as his own visions remain inseparable from the sea.

HN Comments

Seeing Like a Spreadsheet

Seeing like a spreadsheet traces how spreadsheets reshaped American business by turning numbers into a language for management. From the control revolution to the rise of finance, the spreadsheet enabled cheap calculation, rapid modeling, and iterative forecasting. VisiCalc (Apple II, 1979) by Bricklin and Frankston sparked the change; Lotus 1-2-3 and then Excel with GUI secured dominance. In finance, spreadsheets powered LBOs and the private-equity boom, recasting firms as bundles of assets, driving outsourcing, quarterly targets, and R&D hollowing. The piece then argues AI will reshape organizations similarly, but warns that quantification may overlook human, irreducible elements.

HN Comments

A sea of sparks: Seeing radioactivity

Atoms are far too small to see, but their energy from decay can produce visible light. The author used ~37 kBq of americium (smoke detector) to emit alpha particles onto a zinc sulfide scintillation screen. In a dark room, very close to the screen, a magnifying glass helps collect the light; the glow resolves into thousands of momentary sparks—each spark from a single atom’s energy (alpha particles carry ~picojoules). Long dark adaptation (often 5–20 minutes) and averted vision aid perception. Alternatives include radium paint or uranium ore; handle with care. A spinthariscope is about $60.

HN Comments

Do your own writing

The article warns against letting AI write for you. Writing should pose questions, deepen understanding, and build trust; outsourcing to LLMs can erode credibility and authenticity. LLMs can aid research, checking work, transcription, recording information, and brainstorming ideas, but only if you’ve thought through the problem first. Use AI to accelerate work and generate ideas, then rely on your own thinking and judgment to maintain quality and trust.

HN Comments

Fedware: Government apps that spy harder than the apps they ban

An exposé on 'Fedware' showing federal government apps surveil users more than civilian apps, embedding trackers, broad permissions, and data-sharing. The White House app includes Huawei tracking, GPS, biometrics, and automatic messaging features; FBI myFBI dashboards contain 4 trackers and AdMob; FEMA weather alerts demand 28 permissions; CBP Passport Control and Mobile Fortify collect facial data; ICE's SmartLINK gathers geolocation, facial and voice data, with unlimited data rights; Venntel and other data brokers feed location data to DHS/FBI/DOD/DEA; IRS-ICE data sharing breached privacy; GAO recommendations largely unimplemented. Overall, these apps feed a surveillance pipeline; use web instead.

HN Comments

The ladder is missing rungs – Engineering Progression When AI Ate the Middle

AI is approaching code-writing mastery, but the real ladder—design, context, and judgment engineers build—has a missing rung. Data from METR, Anthropic, and Faros show AI can speed routine tasks yet erode learning and long-term skills; experienced developers slow down; juniors’ skills atrophy. Incidents at AWS/Amazon reveal that failures arise from lacking institutional memory and misjudged context, not just buggy code. The path forward isn’t just better prompts but treating context as infrastructure: deliberate training, architecture, tests, and supervision to ensure novices grow into capable supervisors of AI.

HN Comments

DigitalOcean Seeks $800M in Funding

Could not summarize article.

HN Comments

Show HN: Coasts – Containerized Hosts for Agents

Coasts (Containerized Hosts) is a CLI tool plus a local UI to run multiple isolated development environments on one machine using a Coastfile; it can boot from an existing docker-compose.yml and supports arbitrary numbers of instances with configurable ports. It remains agnostic to AI providers and runs offline without a hosted service. It requires Rust, Docker, Node.js, and socat (macOS-first). The project includes a web UI (coast-guard), a daemon, CLI, and core libs; provides development workflows, Makefile tasks, and docs. It is MIT-licensed and modular across several crates.

HN Comments

Proactively Parasocial

Landolfi argues that blogging proactively builds parasocial relationships—one-sided connections with people we know of but rarely meet. Drawing on Horton and Wohl, parasocial ties arise from media, language, and storytelling that simulate face-to-face relations. The internet, especially social media, expands this reach via comments, likes, and shares. While such bonds can seem evasive or unhealthy, they can be productive: connecting with authors, heroes, ancestors, and collaborators, and informing his work in tech and business.

HN Comments

"CEO Said a Thing " Journalism

Karl Bode argues that much U.S. journalism has become "CEO said a thing!" reporting: parroting statements from business leaders with little context, correction, or scrutiny, aided by media consolidation. He points to Musk, Altman, Zuckerberg, Tim Sweeney, Gerry Cardinale, and outlets like Business Insider, Fortune, Forbes, which repeat CEO claims (on funding, AI, etc.) without verification. He outlines rules of this practice: never challenge the CEO, ignore historical context, skip expert input, and avoid revisiting truth. He contends it serves wealth accumulation and harms public interest, a problem deepened by mergers and a wealth-driven press.

HN Comments

You are falling behind because you haven't fed the insincerity machine

Christian Heilmann laments social media’s shift from human connection to automation and growth-at-any-cost tactics. He built a career on regular, authentic posting and meaningful discussion, but resents AI writing assistants that imitate voices, write posts and comments, and chase engagement. He urges people to resist being replaced by machines, to stay human and transparent, and to publish for information and insight rather than algorithm-driven interaction. He recalls early, more human practices (like Foursquare) and argues for authentic engagement, even at the expense of reach, acknowledging mental health and responsibility in online discourse.

HN Comments

An NSFW Filter for Marginalia Search

Marginalia Search is adding an NSFW filter focused on API consumers. Since domain-based filtering is incomplete and NSFW content is rare, development uses a fast, single hidden layer neural network trained from scratch, avoiding transformers. After fasttext proved weak due to data skew, the team adopts hand-picked features with disambiguation terms guided by chi-squared scoring, and labels data using open-source LLMs (ollama/qwen3.5) for scalable supervision. On ~3.8k labeled samples, the model hit ~90% accuracy with some false positives; it’s live via API now, with a UI forthcoming.

HN Comments

Made by Johno Whitaker using FastHTML