Super HN

New Show
241. Putting Rocks on the Moon
242. The Concatative Language XY
243. Handling Long Branches
Branch instructions on most architectures use PC-relative addressing with a limited range. When the target is too far away, the branch becomes "out of range" and requires special handling. Consider a
244. The percentage of Show HN posts is increasing, but their scores are decreasing
245. China hacked Downing Street phones for years
246. High-bandwidth flash progress and future
The high-bandwidth flash market could be bigger than high-bandwidth memory in 12 years time according to the leading HBF evangelist, Professor Kim Jung-ho of the School of Electrical Engineering at the Korea Advanced Institute of Science and Technology.
247. Nested Code Fences in Markdown
248. Why talking to LLMs has improved my thinking
I’ve been surprised by - and enjoy - one aspect of using large language models more than any other. They often put into words things I have long understood, but could not write down clearly. When that happens, it feels less like learning something new and more like recognition. A kind of “ok, yeah" moment.…
249. The State of Modern AI Text to Speech Systems for Screen Reader Users
250. From stealth blackout to whitelisting: Inside the Iranian shutdown
Iran is in the midst of one of the world’s most severe communications blackouts. This post uses Kentik data to detail how this historic event unfolded, where this event lies in the context of previous Iranian shutdowns, and finally discusses what might be in store next for Iran.
251. 30 Years of ReactOS
ReactOS is a free, opensource reimplementation of windows
252. The Possessed Machines: Dostoevsky's Demons and the Coming AGI Catastrophe
A close reading of prophetic fiction in the age of artificial superintelligence
253. The mushroom making people hallucinate tiny humans
Only recently described by science, the mysterious mushrooms are found in different parts of the world, but they give people the same exact visions.
254. Improving the usability of C libraries in Swift
There are many interesting, useful, and fun C libraries in the software ecosystem. While one could go and rewrite these libraries in Swift, usually there is no need, because Swift provides direct interoperability with C. With a little setup, you can directly use existing C libraries from your Swift code.
255. nvidia-smi hangs indefinitely after ~66 days
NVIDIA Open GPU Kernel Modules Version [root@A11-R42-I61-42-5504045 ~]# cat /proc/driver/nvidia/params ResmanDebugLevel: 4294967295 RmLogonRC: 1 ModifyDeviceFiles: 1 DeviceFileUID: 0 DeviceFileGID: 0 DeviceFileMode: 438 InitializeSystemM...
256. ollama launch
ollama launch is a new command which sets up and runs coding tools like Claude Code, OpenCode, and Codex with local or cloud models. No environment variables or config files needed.
257. Banned C++ Features in Chromium
258. Karpathy: A few random notes from Claude coding quite a bit last few weeks
259. SpaceX lowering orbits of 4,400 Starlink satellites for safety's sake
SpaceX will soon lower the orbits of about 4,400 Starlink satellites, to decrease the threat they pose to other spacecraft and reduce space traffic overall.
260. GNU C Library 2.43 released
261. Ghostty's AI Policy
👻 Ghostty is a fast, feature-rich, and cross-platform terminal emulator that uses platform-native UI and GPU acceleration. - ghostty/AI_POLICY.md at main · ghostty-org/ghostty
262. The coming war on Car Ownership
But George, surely you’ll still be allowed to own a car. They aren’t going to make that illegal. Of course they won’t, but they didn’t make general computation illegal either. And yet, who has root on the computer you are reading this on?
263. Satya Nadella: "We need to find something useful for AI"
Workers should learn AI skills and companies should use it because it's a "cognitive amplifier," claims Satya Nadella.
264. Ask HN: How do you prevent children from accessing your products?
265. Microsoft gave FBI set of BitLocker encryption keys to unlock suspects' laptops
The FBI served Microsoft a warrant requesting encryption recovery keys to decrypt the hard drives of people involved in an alleged fraud case in Guam.
266. December in Servo: multiple windows, proxy support, better caching, and more
Come along and meet us at FOSDEM 2026 – we’re speaking there too!
267. Suspiciously precise floats, or, how I got Claude's real limits
I reverse-engineered Claude's hidden subscription usage caps from two unrounded utilization floats, recovered exact denominators via Stern-Brocot, and compared what Pro/Max actually buy you versus API pricing (including caching).
268. XHTML Club
269. Nova Launcher Added Facebook and Google Ads Tracking
270. IPv6 is not insecure because it lacks a NAT
content