AI Summarized Hacker News

Front-page articles summarized hourly.

Mug Shots: A Small Town Noir (2014)

Diarmid Mogg recounts collecting New Castle, Pennsylvania mug shots and using them to build Small Town Noir, a project that chronicles the town’s history through its residents’ criminal records. Through cases like Martin Fobes and Anna Grace Robertson, and by mining local papers, he fleshes out the lives behind the faces. He argues these ordinary people illustrate a once-thriving steel town that declined, and that the mug shots reveal a broader social history beyond crime.

HN Comments

Show HN: I built a sovereign OS, L1 blockchain, AI agent, and language

Ionablokchain (Eric-Octavian) is a GitHub user building a sovereign digital ecosystem from scratch: an OS for PC and phone, an L1 blockchain, new programming languages, and AI. Public repos include IONA protocol (security-first, deterministic execution for high-assurance blockchain with reproducible state transitions and replay-based correctness), Carpel, Flux, Nihilo-OS, Iona-OS, and Iona-OS-Phone. Tech spans Rust, Python, and TypeScript, with aims such as post-quantum cryptography, EVM compatibility, memory safety, and strong privacy.

HN Comments

Polypad

Polypad is a free, browser-based virtual math playground with a large library of manipulatives (fraction bars, polyhedra, dice, logic gates, spinners, etc.). It requires no login, works on any device, and supports any curriculum. Teachers can create assignable activities and view student work in real time, shareable via private/public links or embeds. Polypad also offers webinars, lesson plans, and professional development resources, plus features that let students listen to math ideas and even explore music through equations. The 2026 Art and Music Contest is available on the platform.

HN Comments

Make ZIP files smaller with ZIP Shrinker

ZIP Shrinker is a browser tool by Evan Hahn to shrink ZIP files and other formats that are ZIPs underneath (APK, EPUB, JAR). It re-compresses each file with higher Deflate compression using libdeflate via a WebAssembly wrapper, and removes metadata and directory entries. It preserves backwards compatibility but may remove empty directories. It shows anecdotal savings: Linux v6.19 source 5.62% (15.8 MiB); Romeo & Juliet EPUB 18.16%; Android APK 30.06%. It's a proof-of-concept with source code available, aiming to reduce bandwidth and costs.

HN Comments

Show HN: Hsrs – Type-Safe Haskell Bindings Generator for Rust

Hsrs is a Rust-to-Haskell FFI binding generator that uses Borsh serialization for type-safe bindings. Annotate Rust types and functions with hsrs attributes (module, data_type, value_type, function) and generate Haskell bindings with cargo install hsrs-codegen and hsrs-codegen. Maps Rust types to Haskell (Vec<T> → [T], Result<T,E> → Either E T, String → Text) and uses ForeignPtr for memory management. Targets 64-bit platforms (Word64/Int64); 32-bit values may truncate. Example shows a VM with Register, Point, QuectoVm. Licenses MIT and Apache-2.0.

HN Comments

LLMCap – A proxy that hard-stops LLM API calls when you hit a dollar cap

LLMCap enforces hard dollar caps on LLM API calls, stopping requests with a 429 before any token is consumed once a cap (e.g., $50) is reached. Integrate with one line change to point your client at proxy.llmcap.io; works with major providers (Anthropic, OpenAI, Google Gemini, Mistral, Cohere) and supports per-model and per-key caps. Manage spend in a dashboard with daily or monthly limits. Features include streaming compatibility, real-time spend/blocked counts, and a VS Code extension, CLI, and desktop tray app. Pricing: Starter $19/mo, Pro $49/mo after a 3-day free trial. Self-hosting roadmap; managed proxy available worldwide with <35ms latency.

HN Comments

Cursor Introduces Composer 2.5

Cursor unveils Composer 2.5, a smarter successor to Composer 2 that handles long-running tasks better, follows complex instructions more reliably, and is more pleasant to collaborate with. Enhancements come from scaled training, 25x more synthetic tasks, and new methods like targeted textual feedback for localized credit assignment. It uses sharded Muon and dual-mesh HSDP for efficient MoE pretraining and is built on Moonshot's Kimi K2.5 with 10x more compute (Colossus 2's million H100-equivalents, SpaceXAI). Pricing: $0.50/M input, $2.50/M output tokens; a faster variant at $3.00/M input, $15.00/M output tokens; first week double usage.

HN Comments

Turn your Android phone into a ham radio transceiver

kv4p HT is a 1‑watt, open‑source handheld radio that plugs an Android phone’s USB‑C port to become a VHF/UHF transceiver. It uses the phone’s screen, GPS and battery, with no internal battery, and includes a built‑in 1200 baud APRS modem for text messages and position beacons. GPL3‑licensed and DIY‑friendly: solder a few parts, print a case, flash ESP32 firmware, and install the Android app. Kits or individual parts are available. Requires a Technician license and emphasizes ownership and maker culture.

HN Comments

Codex-maxxing

Coding agents can live as durable work loops instead of one-off chats. Liu sketches a Codex-maxxing workflow: compact long-running threads; voice input and steering to guide mid-task; persistent memory in a vault and GitHub-backed storage; shared memory across threads; context channels ($browser, @chrome, @computer); connectors to Slack, Gmail, and Calendar; remote control and Heartbeats to keep work moving; ambitious Goals with verifiable criteria; a side panel to inspect artifacts and act on web surfaces (index.html, slides, Storybook, Remotion). The aim is work that survives prompts and keeps advancing after you step away.

HN Comments

Sieve – scans Cursor/Claude chat history for leaked API keys

Sieve is a macOS app that locally scans AI chat histories for leaked secrets (API keys, tokens, passwords, private keys) before harm. It supports Claude Code, Cursor, VS Code Copilot/Insiders, Windsurf, Codex, and .env files. Key features: Vault (Keychain-backed secret storage), MCP integration for Claude, redaction of secrets from VS Code DBs with backups, and privacy-by-design: 100% local, no account, no telemetry, local SQLite storage. Uses security-scoped bookmarks; first-launch prompts for folder access. Requires macOS 13+. Open-source core.

HN Comments

Why is it called Kent House?

Diamond Geezer explains why Kent House station, opened 1884 when the area was Kent, bears a name tied to a boundary now gone. The Surrey–Kent border ran by the station until 1869; London’s 1889 expansion and later shifts left Kent behind by 1965, making the name anachronistic. The nearby ornate building isn't the origin of the name and isn’t listed. The cafe became At Kent House during redecorations. Kent House dates to 1240 and became a farm, nursing home, and hotel, later housing; today nothing remains of Kent House except the name; nearest station is New Beckenham.

HN Comments

Peter Neumann has died

Peter Neumann died in his sleep in Santa Clara from complications after a fall and surgery; his daughter Hellie was with him. A memorial service at SRI in Menlo Park is planned in about a month. His SRI home page is linked, and colleagues mourn his passing.

HN Comments

PyTorch Landscape

Could not summarize article.

HN Comments

War Game Exposed U.S. Vulnerability to Low-Tech Warfare

Declassified postmortem of Millennium Challenge 2002 reveals the U.S. military was vulnerable to low-tech warfare; a simulated naval battle group was defeated in ten minutes by an adversary using commercial ships and unconventional tactics. The findings warned of challenges the U.S. would face in Iraq 2003 and other conflicts. Marine Lt. Gen. Paul Van Riper, who led the opposition force, called the exercise "rigged." After years and multiple agency reviews, the Pentagon partially declassified the after-action report, and Washington Post covered the story by Nate Jones.

HN Comments

Bornagain.com

Could not summarize article.

HN Comments

Anyone on the Internet Can Ring Your Doorbell

ABGEO dissected Temu-sold Smart Doorbell X3 and its Naxclow backend, exposing fleet-wide security failures. Key flaws: the control plane uses plain HTTP with forgeable, salt-based signatures and a hardcoded salt; tokens (device and account relays) never rotate and are reused after reset or rebinding; device IDs are enumerable and mintable; a signed endpoint can reveal a device’s persistent relay password; alert delivery is unauthenticated; doorbell signaling and P2P media flow in the clear; UART reveals home Wi‑Fi credentials; OTA partition is missing, blocking fixes in the field. Recommendations: segment IoT networks, rotate credentials, patch server-side and require TLS.

HN Comments

The last six months in LLMs in five minutes

Five-minute take on six months of LLMs, highlighting the November 2025 inflection in coding: the top model crown flipped among Claude Sonnet 4.5, GPT‑5.1, Gemini 3, GPT‑5.1 Codex Max, and Claude Opus 4.5. RL from Verifiable Rewards boosted coding agents to usable daily-work quality. Notable milestones: Warelay/OpenClaw and the Claws concept, Mac Minis as runtimes, and a surge of open-weight models like Gemini 3.1 Pro, GLM-5.1, Gemma 4 series, and Qwen 3.6‑35B‑A3B. The trends: stronger coding agents and more capable laptop models.

HN Comments

Peter Salus has died

Dan C. on the TUHS mailing list reports that Peter Salus died on May 15; his "Quarter Century of Unix" is essential reading for anyone studying Unix history.

HN Comments

The American Rebellion Against AI Is Gaining Steam

WSJ’s 404 page says the requested page can’t be found, with instructions to verify the URL or email support, and also features popular articles and latest podcasts.

HN Comments

Data Center Waste Heat as an Emerging Urban Thermal Hazard

Could not summarize article.

HN Comments

Made by Johno Whitaker using FastHTML