AI Summarized Hacker News

Front-page articles summarized hourly.

England Runestones

Calls for web crawlers to identify themselves with a user-agent and to follow the site's robots policy, referencing Wikimedia’s policy and a related Phabricator task (T400119).

HN Comments

SQL patterns I use to catch transaction fraud

Six SQL patterns to catch transaction fraud: 1) Velocity — detect short-time bursts per cardholder with sliding windows. 2) Impossible travel — flag implausible moves between timestamps using haversine and speed thresholds. 3) Amount anomalies — catch round-dollar tests and near-threshold amounts. 4) Suspicious merchants — flag spikes for a merchant against its own baseline. 5) Off-hours — flag unusual hours, requiring at least two in an hour to count. 6) Window functions for chained signals — compose rules with LAG and running totals. Use all patterns together for scoring; start with velocity.

HN Comments

NYT and Vaping: How to Lie by Saying Only True Things

The Gwern.net essay critiques a 2022 New York Times piece on teen vaping, arguing that although every sentence is technically true, the article cleverly frames legal nicotine vapes as the cause of EVALI by conflating nicotine and THC vaping and using selective quotation. It links the 2019 nicotine-vaping moral panic to illicit THC products adulterated with vitamin E acetate, examines FDA regulation and the rise of synthetic nicotine, and shows how framing and narrative structure steer readers toward a harmful causal conclusion.

HN Comments

I Bought a “Junk” PSP From Japan

An author buys a cheap PSP-2000 from Japan via Buyee/Mercari, paying AUD 38.43 for a unit described as "untested" junk. Buyee handles payment and forwarding; domestic shipping and a 3-day international leg to Australia make the process quick. The PSP boots on with firmware 5.50 GEN‑D2, a late-2000s custom firmware, and the author opts to leave it as-is. He adds an OSTENT 1400mAh battery and a replacement battery door (~AUD 10 and 4.29), bringing total to ~AUD 62.14 (~USD 43.93). The device works well and offers a practical retro-gaming experience: original hardware with modern convenience.

HN Comments

Ploopy Bean: a trackpoint for every computer

Bean Pointing Stick is a fully assembled, 3D-printed pointing-stick mouse from Ploopy. It uses four Omron D2LS-21 buttons, runs QMK with VIA support, and ships preloaded. Preorder price 69.99 CAD; launch date May 6, 2026. Tiers: Early Access (ships now), Tier A (within 8 weeks), Tier B (within 20 weeks). Includes PCB, 3D-printed parts, USB-C cable optional, screws, magnet, friction pads, nub. Ships via Chit Chats; 30-day returns; 1-year warranty. Firmware upgradable with QMK tools.

HN Comments

I broke AppLovin's mediation cipher protocol

Researchers claim to have broken AppLovin’s mediation cipher and decrypted thousands of requests. They show that each encrypted bid request carries a device fingerprint payload that can deterministically re-identify the same iPhone across apps even when ATT is denied. The cipher uses a per-publisher sdk_key and a universal salt, with a SplitMix64-based keystream and no MAC, enabling tampering and leaking the encryption timestamp. Decrypted envelopes reveal device_info (~50 fields) and signal_data tokens sent to about a dozen ad networks. The api_did sentinel ('Bad Device ID') reoccurs for ATT-denied users, indicating cross-app fingerprinting beyond IDFA controls and raising privacy concerns.

HN Comments

Additive Blending on the Nintendo 64

Dominic Szablewski explains additive blending on the N64. The PSX can simply add sprite colors to the frame buffer, while the N64’s RDP can overflow if writing into 16-bit buffers. The solution: render sprites into a 32-bit RGBA render target, and use the RDP color combiner with fog alpha to draw at 1/8 intensity, enabling true additive blending without wrap. Then convert the 32-bit image to a 16-bit frame buffer on the RSP (about 3.1 ms per frame), preserving memory bandwidth. A GitHub demo: github.com/phoboslab/n64_addblend.

HN Comments

The Bird Eye Was Pushed to an Evolutionary Extreme

Bird retinas are energetically demanding yet largely avascular. Damsgaard and colleagues measured oxygen in zebra finch, pigeon, and chicken retinas and found the inner retina has no oxygen, relying on anaerobic glycolysis. Spatial transcriptomics and glucose-demand analysis showed the pecten oculi—a radiating, vascular structure—likely pumps glucose to the retina, enabling glycolysis and lactate export. Outer retina uses oxygen; the inner retina uses 2.5× more glucose. The retina’s oxygen-free metabolism likely evolved in dinosaurs/birds to support sharp vision and flight, with broader implications for hypoxia tolerance and medicine.

HN Comments

Show HN: Epiq – Distributed Git based issue tracker TUI

Epiq is a terminal-native, Vim-inspired issue tracker that renders ASCII kanban and stores work as an immutable event log synchronized via Git. No SaaS or browser; runs inside any Git repo with local-first, instant edits, and keyboard navigation. State is event-sourced and replayable; collaboration uses Git worktrees without a central service. Features: create, move, filter, close/reopen, sync (manual or automatic). Install: npm i -g epiq; run in repo to start an interactive setup; MCP server enables AI tool interactions.

HN Comments

'No Way to Prevent This,' Says Only Package Manager Where This Regularly Happens

Satirical piece about a devastating npm supply-chain attack that compromised millions of enterprise apps and user data. It mocks the idea that such breaches are unavoidable, citing a sprawling, unvetted 40-level dependency tree as the "price" of modern web apps. While Go and Rust ecosystems report few incidents thanks to robust libraries, npm defends itself, saying there are no effective registry policies or sandbox guardrails, and that the registry runs arbitrary install scripts. The piece closes with a grim note that another breach is inevitable, and developers must remain resilient.

HN Comments

ESP-EEG is an affordable 8-channel biosensing board

Cerelog’s ESP-EEG is an open-source 8-channel biosensing board (EEG/EMG/ECG) powered by TI ADS1299, marketed for cleaner signal with true closed-loop active bias and priced near OpenBCI’s initial offering (less than half the Cyton’s current price). Software support includes a fork of the OpenBCI GUI via Lab Streaming Layer and BrainFlow. Created by ex-SpaceX hardware engineer Simon Hakimian. Licensing: firmware/software MIT; hardware schematics CC-BY-NC-SA (non-commercial). Caveats: USB only for now (no electrical isolation); Bluetooth/WiFi hardware present but firmware not ready; ESP32 platform with onboard LiPo charging and future WiFi streaming.

HN Comments

Spectre Programming Language

Spectre is a low-level, safe systems language with type-level invariants, function pre/postconditions, and default immutability. Contracts are checked at compile time when possible; otherwise runtime checks run under guarded constructs. Memory is manually managed via allocators. It compiles to QBE IR (experimental LLVM/C99 backends) and supports -translate-c to port C code. A Hello, world uses trust for impure IO; safe wrappers avoid trusting. Foreword notes the docs may be out of date.

HN Comments

The main thing about P2P meth is that there's so much of it (2022)

Shifts from ephedrine-based to P2P meth (2009–2012) boosted supply and changed chemistry. P2P synthesis can yield both d- and l-meth, but modern meth is ~95% d-meth; by 2019 l-meth largely disappeared. Impurities arise mainly from the P2P step; lead acetate contamination does not explain schizophrenia. Two main routes: NTS from nitrostyrene and PAA/EtPA to P2P. The bigger story is greater availability, lower prices, and a rise in heavy meth use and overdoses.

HN Comments

Erlang/OTP 29.0

Erlang/OTP 29.0 is a major release with new features and some incompatibilities. Highlights: -unsafe attributes add compiler warnings and xref support for unsafe/undocumented calls; SSH defaults to secure by default (shell/exec disabled; SFTP off). SSL uses mlkem768x25519-sha256 as the default key exchange. io_ansi enables ANSI terminal sequences; ct_doctest tests docs; ignore_xref is handled by xref. Default code path now places the current directory last; no 32‑bit Windows build. New features: native records (experimental), is_integer/3 guard, multi-valued comprehensions with compr_assign. Compiler/JIT improvements and several new default warnings. STDLIB adds rand:shuffle/1 and rand:shuffle_s/2. SSH KEX has fallback for compatibility.

HN Comments

A SQL-Inspired Query Language Designed for Event Sourcing (2025)

EventQL is a SQL-inspired query language designed for event sourcing. It treats event metadata (type, subject, id, time) and payload (data.*) as first-class, enabling index-friendly, subject-scoped queries over event streams. With SQL-like constructs (WHERE, ORDER BY, GROUP BY, TOP/SKIP) and explicit projection via PROJECT INTO, it makes it easy to filter, sort, and reshape results across aggregates. The design emphasizes indexes on type, time, subject, and payload, and a production-ready Rust parser (AST with errors, tests) is available. A type-inference feature is planned. See eventql-parser on GitHub.

HN Comments

Naturally Occurring Quasicrystals

Naturally occurring quasicrystals are extremely rare. The first three were found in the Khatyrka meteorite: Icosahedrite (Al63Cu24Fe13) with full icosahedral symmetry; Decagonite (Al71Ni24Fe5), a decagonal two-dimensional pattern with periodic stacking in the third direction; and i-Phase II (Al62Cu31Fe7), also icosahedral but copper-rich. A possible natural example also arose in a Nebraska fulgurite from lightning, Mn72.3Si15.6Cr9.7Al1.8Ni0.6, with 12-fold symmetry; another known quasicrystal, Si61Cu30Ca2Fe2, was found at the first atomic bomb test. These phenomena are analyzed via higher-dimensional 'slice and project' constructions.

HN Comments

Waymo driverless cars become trapped in Atlanta suburb after glitch

Waymo driverless cars were seen looping around a cul-de-sac in an Atlanta suburb after a routing glitch. The autonomous vehicles, deployed in more than ten U.S. cities, addressed the issue after community feedback.

HN Comments

The day the Pintupi Nine entered the modern world

BBC tells how the Pintupi Nine, the last nomadic Pintupi family in the Gibson Desert, entered modern Australia in 1984 after decades of isolation following 1950s relocations for Blue Streak tests. Found near Kiwirrkurra by relatives and a help party, they faced cars, planes and sugar for the first time during a three-day bush chase. They joined settled life; some married quickly, one brother later returned to the bush. Now the siblings are acclaimed artists; their country is protected as the Kiwirrkurra Indigenous Protected Area, one of the world’s largest arid lands.

HN Comments

ASCII by Jason Scott

Jason Scott narrates the completion of the Manuals Plus project: 13,000 manuals digitized and online at Internet Archive after years of salvage, sorting, and fundraising largely by volunteers and the Digital Library of Amateur Radio Communications (DLARC). Some manuals remain undigitized due to corporate rights (HP/Agilent, Tektronix). He invites community reviews to improve metadata and notes funding needs. The piece also covers his office move and ongoing archiving work, plus reflections on the Living Computer Museum’s decline, billionaire philanthropy, AI hype, and his online-life stance, including blocking and VCF experiences.

HN Comments

Echoes (Live at Pompeii)

A page blocks access with a human-verification prompt, asking users to enable JavaScript and cookies to continue; includes a 'Genius' motif and a call to follow @genius.

HN Comments

Made by Johno Whitaker using FastHTML