AI Summarized Hacker News

Front-page articles summarized hourly.

Grandparents are glued to their phones, families are worried [video]

An Atlantic essay by Charlie Warzel examines why many older adults spend more time on digital devices and why their children and grandchildren worry. It asks whether this concern is justified or a projection of younger generations’ anxieties about screen time. Katty Kay interviews Warzel, exploring tech’s impact on family relationships and loneliness among seniors.

HN Comments

In Memoriam: John W. Addison, my PhD advisor

Bill Wadge honors his late PhD advisor, John W. Addison Jr. (1930–2026), recounting how Addison’s precise, elegant logic teaching at UC Berkeley shaped his career. He recalls Addison’s tough yet brilliant courses in model theory and definability, and how Addison steered him to a breakthrough via an infinite-game approach and a Hartley Rogers paper, yielding his Borel-set work and a 350-page dissertation. Wadge notes Addison’s generosity, his Berkeley network (Gödel, Tarski, Kleene, Church), and how Addison’s mentorship influenced his own supervision and the Lucid dataflow work. Addison’s spirit lives on in his descendants.

HN Comments

Office.eu launches as Europe's sovereign office platform

Office.eu launched in The Hague as a 100% European, open‑source‑based alternative to Microsoft 365 and Google Workspace. Built on Nextcloud and European infrastructure, it offers an all‑in‑one office suite with document editing, collaboration and secure data storage, fully compliant with EU data protection laws. Aims to reduce dependency on non‑European software; supports easy migration from Microsoft 365 and Google Workspace. Rolling out across Europe by invitation with a broad Q2 2026 launch; pricing is comparable to market options. The Hague’s Security Delta and local partners back the project.

HN Comments

C++26: The Oxford Variadic Comma

C++26 deprecates ellipsis parameters without a preceding comma to improve C compatibility and reduce confusion with parameter packs. Deprecated forms include void f(int ...); void g(auto args ...); template<class T> void h(T ...); The comma-separated forms (void f(int, ...); void g(auto args, ...); template<class T> void h(T, ...);) remain valid and preferred. Standalone ellipsis (void f(...);) stays valid. The change is non-breaking and can be automated, clearing space for future features like homogeneous variadic parameters.

HN Comments

Learning athletic humanoid tennis skills from imperfect human motion data

LATENT learns athletic humanoid tennis skills from imperfect human motion data—motion fragments that capture primitive tennis skills, not complete match sequences. By extracting priors from these quasi-realistic motions and applying correction and composition, it trains a policy that consistently returns balls to target locations with natural motion. The approach includes robust sim-to-real transfer designs and is deployed on a Unitree G1 humanoid, achieving multi-shot rallies with human players in the real world.

HN Comments

The Webpage Has Instructions. The Agent Has Your Credentials

The piece argues that prompt injection is an infrastructure risk, not only a model-safety issue, as browser, memory, and multi-agent handoffs can leak data or cause harmful actions from untrusted content. It traces 2025–2026 developments: expanding attack surfaces (web, email, tool calls, memory), public incidents like the MCP GitHub exploit leaking private data, and defender strategies (least privilege, per-task credentials, signed cards, memory-origin tracking, cross-agent policies). It concludes security must be built in: per-repo scoped credentials, tool signing, memory controls, and auditable data flow; some residual risk will remain.

HN Comments

Zipp 2001 Restoration

Zipp 2001 Restoration, Part 1 recounts Ben Katz’s discovery of a late-1990s Zipp 2001 frame (one of about eight variants) and his plan to modernize it. He tests removable dropouts to widen hub spacing for 11s/12s and add a disc-brake mount, using a UDH hanger for safety. A 5-axis machined prototype dropout is produced and anodized. He documents a gaudy paint plan—primer, dark base, blue sparkle flake, multiple clear coats—tested on a fork before applying to the beam. The post ends with machining a new seat clamp; more parts are forthcoming.

HN Comments

Separating the Wayland Compositor and Window Manager

River 0.4.0 splits the Wayland stack by running the window manager as a separate process, coordinated with river via the river-window-management-v1 protocol. This preserves frame-perfect rendering and low latency, while giving window managers full control over placement, keybindings, and policy. The protocol splits state into window-management state and rendering state, with atomic manage and render sequences so no per-frame roundtrips are needed. Benefits include easier WM development, crash isolation, and support for high-level languages. Limitations target 2D desktop use (no VR or wobble effects). Aiming for river 1.0 with broader WM compatibility.

HN Comments

Trust no one: are one-way trusts one way?

Trust no one: one-way Windows domain trusts can be exploited in practice. The trusted-domain account created for a trust (the TDO) stores the trust password and Kerberos inter-realm keys on the trusting domain. A new tool, tdo_dump.py (Impacket-based), can extract the TDO from the trusting domain, revealing the TRUST_ACCOUNT password and Kerberos keys, enabling an attacker with Domain Admins on the trusting domain to authenticate to the trusted domain and perform typical AD attacks. Thus, one-way trusts can effectively be bidirectional in practice, enabling lateral movement.

HN Comments

Palantir defends its role in the kill chain: "We are proud of that"

At Palantir's AIPCon, CEO Alex Karp defended the company's role in military kill chains, saying they're proud to help warfighters and that some casualties are inevitable; he warned AI's dangers and shifts in power. The conference showcased Maven for Targeting Workflow (integration of reconnaissance-to-action), ShipOS for the US Navy, and an extended Airbus Skywise partnership. Healthcare demos included Care Progression Navigator and Reforge, a Joint Commission 'healthcare data router' project. Other examples highlighted real-time patient flow and AI-enabled workflows; Palantir portrays its platform as universal across sectors, despite controversy.

HN Comments

Codegen Is Not Productivity

Generative AI doesn’t make software more productive; lines of code remain a poor productivity metric. Programming is about expressing ideas and managing complexity, not rapid code production. LLMs can speed coding but encourage premature implementation, raise maintenance costs, and hinder collaboration and support. The piece advocates prioritizing design, reusable libraries, and thoughtful tradeoffs over sheer code volume, and calls for explicit questions about productivity, value, and cost rather than assuming more code equals better outcomes.

HN Comments

Show HN: GDSL – 800 line kernel: Lisp subset in 500, C subset in 1300

The piece contrasts the size of modern compilers with small, practical ones: a 1500-line C subset and a 500-line Lisp compiler can function effectively, suggesting large codebases add many features through seams and kludges rather than essential functionality. The author then details sixteen months of work on a physical project—digging, bending, barren patch of dirt—named Seams/Landscapes/Kludges, with a plaque and seeds, as a tangible start, and frames it as part of the 'Modern GDSL' effort to post about their work.

HN Comments

UMD Scientists Create 'Smart Underwear' to Measure Human Flatulence

HTTP 403 Forbidden: the page could not be loaded properly.

HN Comments

The Official DR DOS Website

DR DOS preserves Gary Kildall’s legacy as a non-clone DOS originally from Digital Research in 1988, offered as a faster, more compatible alternative to MS-DOS. DR DOS 9.0 is a clean-room reimplementation, legally unencumbered. The latest release, DR DOS 9.0 Revision 330 (Mar 14, 2026), includes core commands (CD, COPY, DEL, DIR, MD, MOVE, REN, TYPE), a full editor, utilities (MEM, VER, DATE, CLS, MORE), and advanced tools (HEXDUMP, MOUSE, REBOOT). It provides low-level access with PEEK/POKE/JMP, appealing to hackers, OS developers, learners, and embedded DOS use.

HN Comments

Kniterate Notes

This piece covers the first material‑programming workshop on the Kniterate knitting machine, funded to train students and experiment with our knit tools. Attendees create a 100‑stitch cast‑on template organized in layers, then compare the Kniterate interface to the knitout visualiser and CMU tools. The session explores plating rib structures, front/rear transfers, and bind-offs, and notes how waste yarn and feeder placement affect results. A pattern from Rosie is knitted after a few trials. Reflections suggest knitout visuals are less usable for knitters than the Kniterate view, underscoring the need for clearer, knitter‑friendly visualisations.

HN Comments

Show HN: What if your synthesizer was powered by APL (or a dumb K clone)?

A ksynth UI snippet with run, clear/save/load patches and pads, drum/melodic modes, wasm loading, history, and controls to play, download WAV, rename, set base rate, and adjust slot/pitch (OK/cancel).

HN Comments

Glassworm Is Back: A New Wave of Invisible Unicode Attacks Hits Repositories

Aikido reports Glassworm returns with a new wave of invisible Unicode attacks compromising GitHub, npm, and VS Code extensions. The attacker embeds payloads in seemingly empty Unicode characters, decoded at runtime via eval, enabling token and secret theft. The wave affects hundreds of repositories (at least 151) including Wasmer, Reworm, anomalyco/opencode-bench. Timeline: campaigns since 2025, with mass GitHub compromises in March 2026; attackers tailor changes to appear legitimate; standard reviews miss detection. Aikido recommends its malware scanning and Safe Chain to detect and block in real time; start for free.

HN Comments

What makes Intel Optane stand out (2023)

Intel Optane uses 3D XPoint to blend DRAM-like latency with NAND-like persistence. The P4800X (Gen1) and P5800X (Gen2) deliver ultra-low latency (~25 μs read), high durability (DWPD up to 30–100), and strong, consistent write performance with up to ~1.3–1.5M 4K IOPS. NAND drives lag in latency and write consistency due to garbage collection. Ideal for high-write, latency-sensitive workloads (Ceph WAL/SLOG, ZFS ZIL, QoS, databases, VDI, vSAN caching). Intel halted Optane innovation in 2022; PMEM NV-DIMM 300 for Sapphire Rapids arrived 2023; NAND prices fall; sales continue for now.

HN Comments

Small U.S. town, big company. Can it weather the tariff Blizzard? (Digi-Key)

Thief River Falls, Minnesota hosts DigiKey, a warehouse giant employing about 3,800 people and shipping 25,000 orders daily, a regional economic linchpin. Since 2018, tariff spikes—up to 145% on China—have forced the company to spend about $500 million on duties. To cope, DigiKey uses a foreign-trade zone to defer taxes and pursues duty drawbacks to recover roughly 60% of costs. But new tariffs curb drawbacks and raise uncertainty, prompting tariff-management churn, potential supply-chain shifts, and questions about the town’s economic future.

HN Comments

Brazil publishes a list of companies needing age verification, includes Ubuntu

Em ação de monitoramento do ECA Digital, a ANPD prorrogou para 13 de fevereiro de 2026 o prazo para as 37 empresas selecionadas comunicarem as medidas técnicas e organizacionais adotadas para cumprir a Lei nº 15.211 (ECA Digital). O monitoramento, previsto no Regulamento de Fiscalização (Resolução CD/ANPD 01/2021), visa mapear iniciativas e avaliar o estágio de implementação, dificuldades e maturidade de conformidade, subsidiando orientações e ações de fiscalização. A postergação reconhece a complexidade das exigências e o período de festas, buscando informações mais completas de empresas influentes no ecossistema destinado a crianças e adolescentes.

HN Comments

Made by Johno Whitaker using FastHTML