Super HN

New Show
241. Dead Internet Theory
The other day I was browsing my one-and-only social network -- which is not a social network, but I'm tired of arguing with people online about it -- HackerNews...
242. The super-slow conversion of the U.S. to metric (2025)
When the U.S. made the transition to the metric system voluntary in the 1970s, that effectively hamstrung the country’s move to metric. While most other manufacturers in the world only have to deal with the centimeter side of the ruler, U.S. metal fabricators have to use both sides.
243. Radboud University selects Fairphone as standard smartphone for employees
Radboud University has decided to choose Fairphone as its standard company smartphone model for reasons of sustainability, cost efficiency and management support.
244. Show HN: Company hiring trends and insights from job postings
Browse automated generated profiles for top organizations based on job postings.
245. Computer vision papers reimplemented with minimal PyTorch code
Implementation of papers in 100 lines of code. Contribute to MaximeVandegar/Papers-in-100-Lines-of-Code development by creating an account on GitHub.
246. Vibecoding #2
I feel like I got substantial value out of Claude today, and want to document it. I am at the tail end of AI adoption, so I don't expect to say anything particularly useful or novel. However, I am constantly complaining about the lack of boring AI posts, so it's only proper if I write one.
247. Internet voting is insecure and should not be used in public elections
All internet voting systems are insecure. The insecurity is worse than a well-run conventional paper ballot system, because a very small number of people may have the power to change any (or all) votes that go through the system, without detection.
248. Linux kernel framework for PCIe device emulation, in userspace
A Linux framework to enable userspace-defined "Virtual" PCIe card shims to enable in-host PCIe card driver development. - cakehonolulu/pciem
249. I'm 34. Here's 34 things I wish I knew at 21
...
250. What Will You Do When AI runs Out of Money and Disappear?
251. You can now download Windows 7 and Vista ISO images with all the updates
252. Reticulum, a secure and anonymous mesh networking stack
The cryptography-based networking stack for building unstoppable networks with LoRa, Packet Radio, WiFi and everything in between. - markqvist/Reticulum
253. X For You Feed Algorithm
Algorithm powering the For You feed on X. Contribute to xai-org/x-algorithm development by creating an account on GitHub.
254. Evolution Unleashed (2018)
Is evolutionary science due for a major overhaul – or is talk of ‘revolution’ misguided?
255. Waze built the largest crowdsourced surveillance system
256. Where I find free game assets (compiled my go-to sources)
A comprehensive guide to the best sources for free 2D art, 3D models, textures, music, and sound effects for your game projects.
257. The Rise and Impending Fall of the Dental Cavity
Another of history's great killers is on the chopping block
258. The US national debt will soon be growing faster than the economy itself
"The United States is deeply indebted, and its finances are on an unsustainable long-term trajectory," says the Committee for a Responsible Federal Budget.
259. Provably Unmasking Malicious Behavior Through Execution Traces
Abstract page for arXiv paper 2512.13821: The Double Life of Code World Models: Provably Unmasking Malicious Behavior Through Execution Traces
260. Are Arrays Functions?
A high-performance and high-level purely functional data-parallel array programming language that can execute on the GPU and CPU.
261. Use Social Media Mindfully
Danielle's approach to social media in 2026
262. macOS Tahoe broke Finder columns view
263. Show HN: A Node Based Editor for Three.js Shading Language (TSL)
Visual node-based shader editor for Three.js shading language (TSL)
264. Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw
The tech giant said providing encryption keys was a standard response to a court order. But companies like Apple and Meta set up their systems so such a privacy violation isn’t possible.
265. Linux from Scratch
266. Reliable Signals of Honest Intent
It's better if the message comes in an expensive box.
267. Porsche Sold More Electrified Cars in Europe in 2025 Than Pure Gas-Powered Cars
With a balanced sales structure across individual markets, Dr. Ing. h.c. F. Porsche AG, Stuttgart, delivered a total of 279,449 cars to customers around the world in 2025.
268. When "Likers'' Go Private: Engagement with Reputationally Risky Content on X
Abstract page for arXiv paper 2601.11140: When "Likers'' Go Private: Engagement With Reputationally Risky Content on X
269. The coming industrialisation of exploit generation with LLMs
Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I added a variety of modern exploit mitigations, various constraints (like assuming an unknown heap starting state, or forbidding hardcoded offsets in the…
270. Sins of the Children (Adrian Tchaikovsky)
The circle of life on Chelicer 14d.