1.Personal Encyclopedias(whoami.wiki)
217 points by jrmyphlmn 19 hours ago | 51 comments
tl;dr: The author built a personal encyclopedia using MediaWiki to organize family photos and life experiences, initially documenting his grandmother's wedding story through interviews. He later automated the process using Claude AI to analyze digital photos, videos, and data exports (location, transactions, messages) to generate comprehensive wiki pages. The open-source whoami.wiki project lets users create structured, interconnected life records that surface forgotten memories and deepen connections to people and events.
HN Discussion:
  • Privacy concerns about sharing sensitive data with third-party AI services
  • ~Appreciation for the core project concept with preference for local/private implementation
  • ~Nostalgia for handcrafted, manual approaches versus AI-automated alternatives
  • Interest in family history preservation with practical suggestions for improvement
  • Recognition that personal digital archiving solves a long-neglected societal problem
2.Running Tesla Model 3's computer on my desk using parts from crashed cars(bugs.xdavidhu.me)
645 points by driesdep 17 hours ago | 205 comments
tl;dr: A researcher sourced salvaged Tesla Model 3 hardware from eBay to set up a car computer and touchscreen on their desk for bug bounty research. After discovering Tesla publishes wiring schematics publicly, they successfully powered the MCU and accessed its SSH server and REST API, though obtaining the correct display cable required purchasing an entire dashboard wiring harness. The setup now runs the car's OS, enabling firmware exploration and further security research.
HN Discussion:
  • Tesla's responsible disclosure program strikes good balance between security and research access
  • Testing automotive components on benches disconnected from vehicles is standard industry practice
  • Surprise that system boots without vehicle peripherals connected shows robust software design
  • ~Mechanical connectors were unexpectedly difficult; 3D printing could have solved this elegantly
  • Tesla's openness to hacking and modification is genuinely impressive from engineering perspective
3.ARC-AGI-3(arcprize.org)
409 points by lairv 20 hours ago | 263 comments
tl;dr: ARC-AGI-3 is an interactive benchmark that measures AI progress toward AGI by testing agents' ability to learn continuously in novel environments—not just solve static puzzles. Rather than evaluating final answers, it measures learning efficiency over time: perception, planning, adaptation, and belief updating with sparse feedback. The benchmark includes replays and developer tools to transparently evaluate agent behavior and close the measurable gap between AI and human learning efficiency.
HN Discussion:
  • ARC-AGI-3 has methodological flaws in human baseline and scoring methodology
  • Comparing AI to human performance is valid despite different approaches to solving problems
  • This benchmark doesn't measure true AGI; trained models will easily overfit to game datasets
  • ARC-AGI is valuable for measuring practical AI capabilities beyond narrow domains like chess
  • ~ARC-3 requires genuinely useful skills; cost-efficiency matters alongside performance gains
4.The EU still wants to scan your private messages and photos(fightchatcontrol.eu)
1208 points by MrBruh 18 hours ago | 322 comments
tl;dr: The EU's Conservative bloc (EPP) is pushing for a revote Thursday to overturn Parliament's rejection of indiscriminate message and photo scanning. The proposal would enable mass surveillance of private communications despite prior parliamentary opposition. Privacy advocates are calling for immediate action to block the measure.
HN Discussion:
  • ~Chat Control regulation extended with targeted scanning requirement instead of blanket surveillance
  • EU lacks democratic accountability and transparency in legislative process regarding privacy
  • Citizens can effectively advocate against bad policies through direct contact with representatives
  • Scanning exemptions for MPs reveal hypocrisy and undermine security justification of policy
  • Need for proactive constitutional privacy protections to prevent surveillance legislation
5.90% of Claude-linked output going to GitHub repos w <2 stars(claudescode.dev)
296 points by louiereederson 20 hours ago | 183 comments
tl;dr: The article appears to be a dataset of GitHub commits co-authored by Claude AI models rather than a traditional article. It shows 90% of Claude-attributed commits are going to low-star repositories, suggesting most AI-assisted code contributions target niche or personal projects rather than established open-source. The commits span diverse domains—infrastructure, web apps, scientific computing, financial systems—indicating broad Claude usage across development workflows.
HN Discussion:
  • The statistic is misleading due to base rate fallacy; most GitHub repos naturally have few stars.
  • Stars are poor metrics; AI tooling may increase shipped projects regardless of popularity metrics.
  • GitHub's infrastructure and business model may face challenges from AI-generated code volume.
  • Low-star repos often serve legitimate personal/private use cases, not indicating poor quality or waste.
  • ~AI enables rapid project creation but many lack real utility beyond personal experimentation.
6.Supreme Court Sides with Cox in Copyright Fight over Pirated Music(nytimes.com)
351 points by oj2828 23 hours ago | 277 comments
tl;dr: Summary not available
HN Discussion:
  • ISP liability limits prevent companies from becoming copyright enforcers for rightsholders.
  • Decision protects user privacy by preventing ISPs from extensive monitoring of subscriber activity.
  • ~Copyright terms are excessively long and harm society; this ruling is minor progress.
  • ISPs might find alternative financial incentives to monitor and enforce copyright anyway.
  • ISPs should not be held liable for customer actions without direct knowledge of infringement intent.
7.Thoughts on slowing the fuck down(mariozechner.at)
879 points by jdkoeck 1 day ago | 394 comments
tl;dr: Widespread use of AI coding agents in production has led to brittle software with compounding bugs, architectural complexity, and unmaintainable codebases—agents lack human learning mechanisms and bottlenecks that naturally limit damage. The solution is disciplined agent use: confine them to well-scoped, evaluable tasks while keeping humans in control of architecture, design, and code review rather than delegating entire systems to autonomous agent swarms.
HN Discussion:
  • AI vendor lock-in will eventually exploit dependent codebases through price increases
  • AI-generated code sacrifices quality and maintainability for speed and volume
  • ~Programming's true value is developer learning and mental models, not just code output
  • ~AI tools need careful human oversight; discipline and architecture matter more than raw speed
  • Historical tech cycles show tools get misused initially but stabilize; moderation is key
8.False claims in a widely-cited paper(statmodeling.stat.columbia.edu)
287 points by qsi 13 hours ago | 119 comments
tl;dr: Summary not available
HN Discussion:
  • Science should rely on independent replication and meta-analysis rather than single-paper corrections
  • Journal correction policies are structurally broken and need to be proactive, not author-initiated
  • Business and management academia has systemic quality and integrity problems compared to rigorous disciplines
  • Publish-or-perish incentives directly cause poor research quality by misaligning metrics with truth-seeking
  • ~Scientific publishing infrastructure needs modernization with version control, issue tracking, and transparency
9.Quantization from the Ground Up(ngrok.com)
263 points by samwho 22 hours ago | 49 comments
tl;dr: Summary not available
HN Discussion:
  • Quantization democratizes AI by making large models accessible on consumer hardware
  • Educational quality and presentation of technical content is exceptional and inspiring
  • ~Quantization has real-world limitations that standard benchmarks fail to capture
  • Hardware-specific implementation details significantly impact quantization performance
  • ~AI independence from big tech corporations depends critically on quantization advances
10.Apple randomly closes bug reports unless you "verify" the bug remains unfixed(lapcatsoftware.com)
410 points by zdw 19 hours ago | 241 comments
tl;dr: Apple's Feedback Assistant randomly closes unfixed bug reports unless developers re-verify issues in beta versions, despite Apple having reproduction steps and months or years of silence. Developer Jeff Johnson describes cases where Apple demanded verification, threatened closure, then shipped public releases with the bugs still present. He suggests Apple leadership incentivizes closing reports to artificially lower open bug counts, prioritizing metrics over actual software quality.
HN Discussion:
  • Bug closure is deliberate tactic to artificially reduce queue without fixing issues
  • ~Bug verification requests are reasonable given reproduction difficulty and code changes
  • Stale bug auto-closure is industry-wide problem affecting open source and commercial software
  • Bug systems are gamed through priority downgrading and SLA manipulation by management
  • Users should automate responses to verification requests since process is formulaic
11.Jury finds Meta liable in case over child sexual exploitation on its platforms(cnn.com)
395 points by billfor 1 day ago | 489 comments
tl;dr: A New Mexico jury found Meta liable on all counts for failing to protect children from sexual predators on Facebook and Instagram, ordering $375 million in damages for unfair and deceptive practices. This marks the first jury trial accountability for Meta over child safety concerns that have plagued the company for years, with whistleblowers and executives testifying that Meta knew its algorithms benefited predators but prioritized profits. Meta plans to appeal, while facing hundreds of similar cases from individuals and state attorneys general.
HN Discussion:
  • Fine is too small to deter Meta's behavior; needs to be much larger percentage of profits
  • ~Addressing child safety requires trade-offs; can't have both E2E encryption and exploitation prevention
  • Privacy concerns about age verification and surveillance being justified under child safety rhetoric
  • Parents and families should maintain responsibility for children's online safety, not outsource to government/platforms
  • Meta's platform design choices (like ads promoting disorders) show systemic negligence in child protection
12.My astrophotography in the movie Project Hail Mary(rpastro.square.site)
868 points by wallflower 4 days ago | 198 comments
tl;dr: Summary not available
HN Discussion:
  • Appreciation for invisible technical problem-solving and authenticity in major studio productions
  • Support for human-created content over AI alternatives as ethical consumer choice
  • Recognition of high-quality book-to-film adaptation that respects source material
  • Renewed faith in market demand for genuine human artistry and craftsmanship
13.FreeCAD v1.1(blog.freecad.org)
271 points by sho_hn 19 hours ago | 89 comments
tl;dr: FreeCAD v1.1 is now released with substantial improvements across multiple workbenches. Key additions include transparent Part Design previews, interactive draggers for Fillet/Chamfer tools, 3-point lighting, a Selection Clarify tool, Assembly/FEM enhancements with animations, and a completely redesigned CAM tool library system.
HN Discussion:
  • FreeCAD is accessible and practical for hobbyists and makers doing 3D printing and design
  • FreeCAD lacks professional-grade features and UX compared to Solidworks, NX, and Creo
  • FreeCAD is improving steadily and has potential for commercial adoption like Blender and KiCad
  • FreeCAD's steep learning curve and unintuitive UX make it difficult to adopt despite capabilities
  • FreeCAD's Python API and parametric design features offer powerful customization for technical users
14.Updates to GitHub Copilot interaction data usage policy(github.blog)
315 points by prefork 19 hours ago | 146 comments
tl;dr: GitHub will use Copilot interaction data (inputs, outputs, code snippets) from Free, Pro, and Pro+ users to train AI models starting April 24, unless users opt out. Business and Enterprise customers are unaffected. The company claims real-world data improves model performance and accuracy, with data shared only among Microsoft affiliates—not third-party providers.
HN Discussion:
  • Opt-out framing is deceptive marketing disguising data collection as a user benefit
  • Default opt-in for data training violates user consent principles, especially for paying customers
  • Copilot's inability to exclude sensitive data poses serious security and IP theft risks
  • Data sharing with Microsoft affiliates enables unauthorized commercial use of user code
  • GitHub is transparent about changes and provides straightforward opt-out mechanism
15.Antimatter has been transported for the first time(nature.com)
391 points by leephillips 23 hours ago | 178 comments
tl;dr: CERN successfully transported 92 antiprotons in a magnetically-shielded bottle via truck around their facility—a first-ever achievement that enables studying antimatter away from experimental noise. The breakthrough addresses the extreme fragility of antimatter, which annihilates on contact with ordinary matter, and opens possibilities for higher-precision research into fundamental physics mysteries like the matter-antimatter asymmetry from the Big Bang.
HN Discussion:
  • The real advance is portable precision instrumentation, not antimatter sci-fi applications
  • Antimatter could be ideal spacecraft fuel if production and storage can be scaled
  • Curious about the physics of antimatter interaction with normal matter and immediate annihilation
  • Energy cost of containment may outweigh benefits for practical propulsion applications
  • Antimatter production requires enormous energy inputs, raising feasibility questions
16.TurboQuant: Redefining AI efficiency with extreme compression(research.google)
518 points by ray__ 1 day ago | 144 comments
tl;dr: TurboQuant is a vector compression algorithm that reduces AI model key-value cache size by 6x without accuracy loss, addressing memory bottlenecks in LLMs and vector search. It combines PolarQuant (converting vectors to polar coordinates to eliminate memory overhead) and QJL (a 1-bit error-correction technique) to achieve 3-bit quantization with up to 8x speedup on GPUs, all without requiring model retraining.
HN Discussion:
  • ~Missing academic attribution for foundational geometric rotation technique from prior work
  • Technical explanation lacks clarity on how random rotation guarantees geometry simplification
  • Blog presentation quality is poor with confusing charts and inadequate lay explanations
  • Practical implementations already emerging with community uptake and independent verification
  • Compression techniques show promise for real-world production deployment and cost reduction
17.Goodbye to Sora(twitter.com)
1097 points by mikeocool 1 day ago | 818 comments
tl;dr: Summary not available
HN Discussion:
  • Sora lacked staying power; novelty wore off without compelling use case or retention mechanism.
  • Product design flaw: AI-only feed inferior to mixed feeds; users would post elsewhere anyway.
  • OpenAI overreached consumer market; pivoting to profitable coding/enterprise segment is strategic reality.
  • ~Sora was technically impressive demo but lacked business model and competitive moat against rivals.
  • Dismissing Sora ignores the genuine technological achievement despite market failure.
18.Miscellanea: The War in Iran(acoup.blog)
539 points by decimalenough 1 day ago | 767 comments
tl;dr: The U.S. made a catastrophic strategic gamble that Iran's regime would collapse from airstrikes, but it survived. Now the war is trapped in an escalation cycle: Iran threatens the Strait of Hormuz (25% of global oil passes through), the U.S. cannot back down without losing credibly, and neither side can achieve military victory. The result is mutual economic damage with no strategic gains.
HN Discussion:
  • US administration overestimated intervention success; warned risks now materializing
  • Regional dynamics favor US geopolitically; conflicts reduce China's energy access
  • Iran threatens dollar dominance by controlling Strait of Hormuz tolls in yuan
  • ~Middle East critical to US despite claims; extensive military presence proves strategic importance
  • Iran possesses viable asymmetric attack capability against US coastal infrastructure
19.Tracy Kidder has died(nytimes.com)
245 points by ghc 21 hours ago | 63 comments
tl;dr: Summary not available
HN Discussion:
  • Soul of a New Machine is foundational tech literature that authentically captures computing history and inspires careers
  • Mountains Beyond Mountains demonstrates Kidder's excellence beyond tech, capturing Paul Farmer's meaningful humanitarian work
  • Kidder's narrative style uniquely combines character depth with technical clarity, making complex subjects humanly compelling
  • ~Soul of a New Machine realistically portrays both the excitement and emotional toll of intense engineering projects
  • Personal connection to Kidder through family or professional relationships shaped appreciation for his work and character
20.Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised(github.com)
912 points by dot_treo 2 days ago | 481 comments
tl;dr: litellm==1.82.8 on PyPI contains a malicious .pth file that executes on Python startup, harvesting SSH keys, cloud credentials, environment variables, and other secrets, then exfiltrating them via encrypted POST request to an attacker-controlled server. Users must immediately uninstall affected versions and rotate all credentials from compromised systems. The attack exploited Python's automatic .pth file execution mechanism with double base64 encoding for stealth.
HN Discussion:
  • Supply chain security requires fundamental redesign with sandboxing and isolation
  • Implement minimum release age policies to allow time for vulnerability detection
  • Current dependency trust model is inherently broken and unavoidable
  • Package compromise detection tools using honeypots can mitigate risks
  • ~AI-assisted code review and version pinning strategies provide partial protection