Super HN

New Show
241. The New Collabora Office for Desktop
242. Reverse-Engineering Raiders of the Lost Ark for the Atari 2600
Reverse Engineering Raiders of the Lost Ark for the Atari 2600 - joshuanwalker/Raiders2600
243. Canada, better the 28th EU member than the 51st US state
COLUMN. The Canadian prime minister has called for an alliance of middle powers to stand up to the world's great powers. This is a compelling idea, and one that Europe has been pursuing for 60 years, writes Le Monde columnist Pascal Riché.
244. Immigrants Reduced US Deficits by $14.5T Since 1994
245. Show HN: Google Maps but for your repo (Open Source)
Contribute to zacharykapank/repomap development by creating an account on GitHub.
246. RS-SDK: Drive RuneScape with Claude Code
Runescape automation library, optimized for use by coding agents. - MaxBittker/rs-sdk
247. Ask HN: Open Models are 9 months behind SOTA, how far behind are Local Models?
248. A few CPU hardware bugs
Catherine (Whitequark)’s recent observations on poorly-engineered firmware reminded me of a few mistakes I’ve seen in vendors’ CPUs; some unimportant and others surprisingly bad. Since I’ve never seen these widely discussed, here’s some discussion and links to supporting evidence to make them more widely known, since I think they’re interesting.
249. LinkedIn checks for 2953 browser extensions
Contribute to mdp/linkedin-extension-fingerprinting development by creating an account on GitHub.
250. OpenAI Frontier
251. Psychometric Jailbreaks Reveal Internal Conflict in Frontier Models
Abstract page for arXiv paper 2512.04124: When AI Takes the Couch: Psychometric Jailbreaks Reveal Internal Conflict in Frontier Models
252. How to Be a Class Act
253. AI fatigue Is real and nobody talks about it
You're using AI to be more productive. So why are you more exhausted than ever? The paradox every engineer needs to confront.
254. I squeezed a BERT sentiment analyzer into 1GB RAM on a $5 VPS
Read the article "How I squeezed a BERT sentiment analyzer into 1GB RAM on a $5 VPS" by Mohammed Essam.
255. Show HN: Curated list of 1000 open source alternatives to proprietary software
256. Building a 24-bit arcade CRT display adapter from scratch
257. Bits About Money: Fraud Investigation Is Believing Your Lying Eyes
The financial industry has paid tens of billions of dollars in tuition on fraud detection. Here are some observations for investigators with badges, press cards, or GoPros.
258. Both GCC and Clang generate strange/inefficient code
259. Generative Pen-Trained Transformer
Have a hard time deciding what to hang on your walls? Boy, do I have the solution for you.
260. Token-to-Credit Conversion: Avoiding Floating-Point Errors in AI Billing Systems
261. What Every Programmer Should Know About Memory [pdf]
262. Google Translate apparently vulnerable to prompt injection
tl;dr Argumate on Tumblr found you can sometimes access the base model behind Google Translate via prompt injection. The result replicates for me, an…
263. Pandoc for the people: Convert documents without leaving the browser
264. Waymo exec admits remote operators in Philippines help guide US robotaxis
Waymo's Chief Safety Officer disclosed Wednesday that some of the remote operators who assist its self-driving vehicles in navigating difficult scenarios are based in the Philippines.
265. Guinea worm on track to be 2nd eradicated human disease; only 10 cases in 2025
When the eradication program began in 1986, there were a 3.5 million cases.
266. Show HN: ARM64 Android Dev Kit
Android development on Linux ARM64. Contribute to denuoweb/ARM64-ADK development by creating an account on GitHub.
267. Show HN: Local task classifier and dispatcher on RTX 3080
Local, offline 7B LLM task orchestrator — analyzes urgency, debates assignment, balances load. Runs on RTX 3080/4090. Chaos mode included. - resilientworkflowsentinel/resilient-workflow-sentinel
268. Tiny C Compiler
269. Anthropic's Claude Opus 4.6 uncovers 500 zero-day flaws in open-source code
270. Top downloaded skill in ClawHub contains malware
The same capabilities that make OpenClaw a groundbreaking tool also make it an urgent security risk. This blog contains confirmed examples of agent skills being used as malware vectors, and advice on how to protect yourself if you're experimenting with them.