[{"id":"fca6fa11e2897434","title":"Leaving GitHub for Forgejo","link":"https://jorijn.com/en/blog/leaving-github-for-forgejo/","author":"jorijn","published_at":"2026-05-13T12:54:00+00:00","content":"\n\n<p><a href=\"https://jorijn.com/en/blog/leaving-github-for-forgejo/\" rel=\"noopener noreferrer\">Leaving GitHub for Forgejo</a></p>\n\n\n\n<p><small>360 points | <a href=\"https://news.ycombinator.com/item?id=48121266\" rel=\"noopener noreferrer\">195 comments</a></small></p>\n\n\n<blockquote>\nEveryone seems to be leaving GitHub, and forgetting the entire spirit of what git is in my eyes. Git was always meant to be decentralized, the problem here is that all the tooling around git was centralized to GitHub because it was a cleaner experience, they scaled nicely, and were properly maintained. I would prefer to still see mirrors on GitHub that are auto-synched because I've seen projects for years either self-host or go somewhere niche, then the GitHub mirror dies or is removed, and said projects go poof to the sands of time for one reason or another, completely gone. Everyone seems to be picking some random git host alternative, and some of them are really simple to use.<p>Git is decentralized, GitHub is just another place you can host your code in, but you can push your code to multiple remote servers.\n— giancarlostoro\n</p></blockquote>\n","metadata":{"score":360,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"5ec95a334b5793cd","title":"I moved my digital stack to Europe","link":"https://monokai.com/articles/how-i-moved-my-digital-stack-to-europe/","author":"monokai_nl","published_at":"2026-05-13T11:42:20+00:00","content":"\n\n<p><a href=\"https://monokai.com/articles/how-i-moved-my-digital-stack-to-europe/\" rel=\"noopener noreferrer\">I moved my digital stack to Europe</a></p>\n\n\n\n<p><small>640 points | <a href=\"https://news.ycombinator.com/item?id=48120629\" rel=\"noopener noreferrer\">432 comments</a></small></p>\n\n\n<blockquote>\nFor the past days I've been participating(albeit over Teams) in a conference relevant to my industry (intel), basically startups and established companies showcasing their products to a closed audience of EU gov. officials.<p>One thing I noticed right away, is that all companies were asked \"Can we fully host this from within EU or our country\" from the various people in audience. Every single one. Many of the startups had slides prepared for this.</p><p>Definitely a change, because it is not something I can recall being important just a couple of years ago.\n— TrackerFF\n</p></blockquote>\n","metadata":{"score":640,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"f595e4ef8677a8a2","title":"Deterministic Fully-Static Whole-Binary Translation Without Heuristics","link":"https://arxiv.org/abs/2605.08419","author":"matt_d","published_at":"2026-05-13T04:25:03+00:00","content":"\n\n<p><a href=\"https://arxiv.org/abs/2605.08419\" rel=\"noopener noreferrer\">Deterministic Fully-Static Whole-Binary Translation Without Heuristics</a></p>\n\n\n\n<p><small>266 points | <a href=\"https://news.ycombinator.com/item?id=48117810\" rel=\"noopener noreferrer\">64 comments</a></small></p>\n\n\n<blockquote>\n&gt; Elevator achieves performance on par with or better than QEMU's user-mode JIT emulation.<p>I am not sure what QEMU's JIT is doing (in its userspace wrapper), but I think it has a lot of room to improve.</p><p>In 2013 I wrote a x86-64 to aarch64 JIT engine that was able to run what was then Fedora beta aarch64 binaries and rebuild almost the entire aarch64 port of Fedora on a x86_64 Linux. I also made a reverse aarch64 to x86-64 JIT that worked in the same way, and for fun I also showed the two JITs managing to run each other in a loop back fashion: x86-64 -&gt; aarch64 -&gt; x86_64 in the same process.</p><p>The JIT I devised did a 1-to-many instruction and CPU state mapping with overhead that was somewhat 2x to 5x slower than what would be expected to native recompiled code. I later compared this with QEMU's JIT which seemed more in the range of 10x to 50x slower.</p><p>Unfortunately this was not under a open source license settings, so no code release to prove it.. :(\n— da-x\n</p></blockquote>\n","metadata":{"score":266,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"43308846462fa8d9","title":"Starship V3","link":"https://www.spacex.com/updates#starship-v3","author":"fprog","published_at":"2026-05-13T01:29:31+00:00","content":"\n\n<p><a href=\"https://www.spacex.com/updates#starship-v3\" rel=\"noopener noreferrer\">Starship V3</a></p>\n\n\n\n<p><small>288 points | <a href=\"https://news.ycombinator.com/item?id=48116781\" rel=\"noopener noreferrer\">508 comments</a></small></p>\n\n\n<blockquote>\nQuick update for the folks passionate about space things (since this thread is full of unrelated comments):<p>V3 is their first Starship family big upgrade, containing lots of learnings from previous tests, and the big engine upgrades. V3 engines are the first iteration of a production engine, with lots of sensors and auxiliary systems integrated into the engine itself. Besides the improvements in thrust, they've streamlined the production, moved a lot of stuff \"inside\" the engine (the first iterations looked like something out of the steampunk era), and they've simplified lots of fire/heat protection.</p><p>The Booster and Ship also got some major redesigns in the way they're handling fuel, the \"thrust puck\" (the area where the engines get mounted) and so on. It's also a bit taller, helped by the engine upgrades. TWR has also improved, with estimates at 1.6. This should be visibly faster to clear the tower and \"jump\" the launch.</p><p>They are also adding ~44tons of simlinks (starlink simulators, dumb payloads). So they seem to have improved the margins for orbital payload a lot. New this launch will be a few sats that have comms &amp; cameras on them. Hopefully we'll get to see outside shots of Starship from these things, on orbit. They've filed FCC paperwork for this, and they'll likely use it to inspect the health of the heatshield on orbit.</p><p>They've also updated the launch tower, with a flame deflector, and a new deluge system.</p><p>This flight will be still suborbital, testing payload deployment, booster return to a fixed point somewhere in the coastal waters, and the ship aiming for somewhere in the Indian Ocean. They've also removed some parts of hte heatshield, to test how it handles that. (on a previous flight the ship still nailed its simulated landing with huge gaps in it, from multiple tiles missing intentionally).</p><p>If everything works on this flight, the next one is planned to be orbital.\n— NitpickLawyer\n</p></blockquote>\n","metadata":{"score":288,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"0d3905baca6c5290","title":"Tell NYT, Atlantic, USA Today to keep Wayback Machine","link":"https://www.savethearchive.com/newsleaders/","author":"doener","published_at":"2026-05-12T23:11:40+00:00","content":"\n\n<p><a href=\"https://www.savethearchive.com/newsleaders/\" rel=\"noopener noreferrer\">Tell NYT, Atlantic, USA Today to keep Wayback Machine</a></p>\n\n\n\n<p><small>296 points | <a href=\"https://news.ycombinator.com/item?id=48115807\" rel=\"noopener noreferrer\">84 comments</a></small></p>\n\n\n<blockquote>\nAm I correct that this has come about because archive.org respects robots.txt and these sites have blocked their crawler from indexing their sites?<p>I'm not sure how to articulate my thoughts on this exactly, other than to say it's disappointing that doing the right thing (i.e. respecting robots.txt) is rewarded with the burden of soliciting responses to a petition while at the same time others are rewarded with profit for ignoring those same directives.\n— ctippett\n</p></blockquote>\n","metadata":{"score":385,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"48ee3ae7e47fec60","title":"Restore full BambuNetwork support for Bambu Lab printers","link":"https://github.com/FULU-Foundation/OrcaSlicer-bambulab","author":"Murfalo","published_at":"2026-05-12T21:55:21+00:00","content":"\n\n<p><a href=\"https://github.com/FULU-Foundation/OrcaSlicer-bambulab\" rel=\"noopener noreferrer\">Restore full BambuNetwork support for Bambu Lab printers</a></p>\n\n\n\n<p><small>352 points | <a href=\"https://news.ycombinator.com/item?id=48115127\" rel=\"noopener noreferrer\">144 comments</a></small></p>\n\n\n<blockquote>\nThis looks to be a clone of the prior state of the repository that caused all the Bambu drama earlier this week.<p>I did a ton of research because I didn't understand what people wanted here, and this is what's going on:</p><p>Right now, Bambu have adjusted their system into two modalities:</p><p>* \"default\" or \"Cloud\" mode, where you get an app, remote monitoring, but you have to use Bambu Studio or Bambu Connect to send prints. They implemented this by adding cloud auth to their \"internal API;\" the client application has to get a token from Bambu's servers, even if the request it eventually makes is a \"local\" one.</p><p>* LAN / Developer mode, where the device displays a token and you put it into your app. This disables all of the remote monitoring but in exchange, clients can send prints locally.</p><p>What users want is to \"have their cake and eat it too;\" they want the local token authentication _and_ the cloud authentication enabled at the same time. This isn't actually possible, so this plugin approximates it by emulating the interface to the cloud authentication to make the \"Bambu Network\" cloud RPC calls from a local slicer (one of these calls is a local_print call, so ostensibly this allows you to send prints without running them through the cloud, although with all of the online functionality still enabled and required, this seems like a pretty brave thing to trust).</p><p>Personally, I find the Bambu reaction distasteful, and there's an argument that the offline mode only exists due to similar outrage, but I don't see the current system as particularly bad and find the appetite to restore \"untrustworthy\" cloud functionality a bit amusing.\n— bri3d\n</p></blockquote>\n","metadata":{"score":607,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"6f4c31c5fe6e25e5","title":"Scrcpy v4.0","link":"https://github.com/Genymobile/scrcpy/releases/tag/v4.0","author":"xnx","published_at":"2026-05-12T20:50:02+00:00","content":"\n\n<p><a href=\"https://github.com/Genymobile/scrcpy/releases/tag/v4.0\" rel=\"noopener noreferrer\">Scrcpy v4.0</a></p>\n\n\n\n<p><small>331 points | <a href=\"https://news.ycombinator.com/item?id=48114356\" rel=\"noopener noreferrer\">49 comments</a></small></p>\n\n\n<blockquote>\nFor anyone on Android who has not played with scrcpy, it is truly an incredible project. It's not very often I have a mind blown experience when trying out new things, but I very much did. There are a lot of nice switches to get it to do nearly anything you'd want, so it's worth reading through the usage\n— freedomben\n</blockquote>\n","metadata":{"score":331,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"f0bbdbb027dd5e11","title":"How to make your text look futuristic (2016)","link":"https://typesetinthefuture.com/2016/02/18/futuristic/","author":"_vaporwave_","published_at":"2026-05-12T20:16:26+00:00","content":"\n\n<p><a href=\"https://typesetinthefuture.com/2016/02/18/futuristic/\" rel=\"noopener noreferrer\">How to make your text look futuristic (2016)</a></p>\n\n\n\n<p><small>306 points | <a href=\"https://news.ycombinator.com/item?id=48113895\" rel=\"noopener noreferrer\">36 comments</a></small></p>\n\n\n<blockquote>\nDoes the Back To The Future logo really count? Raiders of the Lost Ark as a very similar style but does not evoke \"future\". Yes, there are subtle differences. My point is, if you divorced them from the connection to their content I think it would be hard to point to one as \"future\" and the other as \"not future\"\n— socalgal2\n</blockquote>\n","metadata":{"score":444,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"c808666b0c385b09","title":"CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq","link":"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html","author":"chizhik-pyzhik","published_at":"2026-05-12T18:12:28+00:00","content":"\n\n<p><a href=\"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html\" rel=\"noopener noreferrer\">CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq</a></p>\n\n\n\n<p><small>291 points | <a href=\"https://news.ycombinator.com/item?id=48112042\" rel=\"noopener noreferrer\">134 comments</a></small></p>\n\n\n<blockquote>\nShameless plug time:<p>My own MaraDNS has been extensively audited now that we’re in the age of AI-assisted security audits.</p><p>Not one single serious security bug has been found since 2023. [1]</p><p>The only bugs auditers have been finding are things like “Deadwood, when fully recursive, will take longer than usual to release resources when getting this unusual packet” [2] or “This side utility included with MaraDNS, which hasn’t been able to be compiled since 2022, has a buffer overflow, but only if one’s $HOME is over 50 characters in length” [3]</p><p>I’m actually really pleased just how secure MaraDNS is now that it’s getting real in depth security audits.</p><p>[1] <a href=\"https://samboy.github.io/MaraDNS/webpage/security.html\" rel=\"noopener noreferrer\">https://samboy.github.io/MaraDNS/webpage/security.html</a></p><p>[2] <a href=\"https://github.com/samboy/MaraDNS/discussions/136\" rel=\"noopener noreferrer\">https://github.com/samboy/MaraDNS/discussions/136</a></p><p>[3] <a href=\"https://github.com/samboy/MaraDNS/pull/137\" rel=\"noopener noreferrer\">https://github.com/samboy/MaraDNS/pull/137</a>\n— strenholme\n</p></blockquote>\n","metadata":{"score":355,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"593e5bad736eec21","title":"Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model","link":"https://github.com/cactus-compute/needle","author":"HenryNdubuaku","published_at":"2026-05-12T18:03:11+00:00","content":"\n\n<p><a href=\"https://github.com/cactus-compute/needle\" rel=\"noopener noreferrer\">Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model</a></p>\nHey HN, Henry here from Cactus. We open-sourced Needle, a 26M parameter function-calling (tool use) model. It runs at 6000 tok/s prefill and 1200 tok/s decode on consumer devices.<p>We were always frustrated by the little effort made towards building agentic models that run on budget phones, so we conducted investigations that led to an observation: agentic experiences are built upon tool calling, and massive models are overkill for it. Tool calling is fundamentally retrieval-and-assembly (match query to tool name, extract argument values, emit JSON), not reasoning. Cross-attention is the right primitive for this, and FFN parameters are wasted at this scale.</p><p>Simple Attention Networks: the entire model is just attention and gating, no MLPs anywhere. Needle is an experimental run for single-shot function calling for consumer devices (phones, watches, glasses...).</p><p>Training:\n- Pretrained on 200B tokens across 16 TPU v6e (27 hours)\n- Post-trained on 2B tokens of synthesized function-calling data (45 minutes)\n- Dataset synthesized via Gemini with 15 tool categories (timers, messaging, navigation, smart home, etc.)</p><p>You can test it right now and finetune on your Mac/PC: <a href=\"https://github.com/cactus-compute/needle\" rel=\"noopener noreferrer\">https://github.com/cactus-compute/needle</a></p><p>The full writeup on the architecture is here: <a href=\"https://github.com/cactus-compute/needle/blob/main/docs/simple_attention_networks.md\" rel=\"noopener noreferrer\">https://github.com/cactus-compute/needle/blob/main/docs/simp...</a></p><p>We found that the \"no FFN\" finding generalizes beyond function calling to any task where the model has access to external structured knowledge (RAG, tool use, retrieval-augmented generation). The model doesn't need to memorize facts in FFN weights if the facts are provided in the input. Experimental results to published.</p><p>While it beats FunctionGemma-270M, Qwen-0.6B, Granite-350M, LFM2.5-350M on single-shot function calling, those models have more scope/capacity and excel in conversational settings. We encourage you to test on your own tools via the playground and finetune accordingly.</p><p>This is part of our broader work on Cactus (<a href=\"https://github.com/cactus-compute/cactus\" rel=\"noopener noreferrer\">https://github.com/cactus-compute/cactus</a>), an inference engine built from scratch for mobile, wearables and custom hardware. We wrote about Cactus here previously: <a href=\"https://news.ycombinator.com/item?id=44524544\" rel=\"noopener noreferrer\">https://news.ycombinator.com/item?id=44524544</a></p><p>Everything is MIT licensed. Weights: <a href=\"https://huggingface.co/Cactus-Compute/needle\" rel=\"noopener noreferrer\">https://huggingface.co/Cactus-Compute/needle</a>\nGitHub: <a href=\"https://github.com/cactus-compute/needle\" rel=\"noopener noreferrer\">https://github.com/cactus-compute/needle</a>\n\n\n</p><p><small>240 points | <a href=\"https://news.ycombinator.com/item?id=48111896\" rel=\"noopener noreferrer\">86 comments</a></small></p>\n\n\n<blockquote>\nHmm.. this might make it feasible to build something like a command line program where you can optionally just specify the arguments in natural language. Although I know people will object to including an extra 14 MB and the computation for \"parsing\" and it could be pretty bad if everyone started doing that.<p>But it's really interesting to me that that may be possible now. You can include a fine-tuned model that understands how to use your program.</p><p>E.g. `&gt; toolcli what can you do` runs `toolcli --help summary`, `toolcli add tom to teamfutz group` = `toolcli --gadd teamfutz tom`\n— ilaksh\n</p></blockquote>\n","metadata":{"score":579,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"b58dca402b49eabe","title":"Quack: The DuckDB Client-Server Protocol","link":"https://duckdb.org/2026/05/12/quack-remote-protocol","author":"aduffy","published_at":"2026-05-12T17:54:12+00:00","content":"\n\n<p><a href=\"https://duckdb.org/2026/05/12/quack-remote-protocol\" rel=\"noopener noreferrer\">Quack: The DuckDB Client-Server Protocol</a></p>\n\n\n\n<p><small>257 points | <a href=\"https://news.ycombinator.com/item?id=48111765\" rel=\"noopener noreferrer\">53 comments</a></small></p>\n\n\n<blockquote>\nThis is rad. I've been eyeballing using DuckDB in my firm's internal app framework and this just solved the \"but how do I horizontally scale this\" problem. Kudos to the DuckDB folks. Love \"Quack\" for the protocol name, too.\n— rglover\n</blockquote>\n","metadata":{"score":352,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"766c75bc16163783","title":"Googlebook","link":"https://googlebook.google/","author":"tambourine_man","published_at":"2026-05-12T17:37:36+00:00","content":"\n\n<p><a href=\"https://googlebook.google/\" rel=\"noopener noreferrer\">Googlebook</a></p>\n<a href=\"https://www.reddit.com/r/Android/comments/1tb8xls/introducing_googlebook_a_new_category_of_laptops/\" rel=\"noopener noreferrer\">https://www.reddit.com/r/Android/comments/1tb8xls/introducin...</a>\n\n\n<p><small>555 points | <a href=\"https://news.ycombinator.com/item?id=48111545\" rel=\"noopener noreferrer\">890 comments</a></small></p>\n\n\n<blockquote>\nGross. This is just more proof that corporations simply don't know how to market AI. Everything is an ad for an ad at this point. The very first thing they show this new machine doing is helping people shop for clothes using AI.<p>No one is doing that, these people don't exist. No matter how hard corporate America wishes they did. This is why AI doesn't sell. This is why companies like Microsoft and Dell are pulling back on their AI claims and why Apple has nearly wiped it off their site all together, seriously go check out apple.com, not a single mention of Apple Intelligence.</p><p>At this point I'm convinced that marketing has been completely taken over by shareholder shills, marketing to customers they wish they had instead of the real customers that exist.\n— Jzush\n</p></blockquote>\n","metadata":{"score":882,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"4b71291a0b3de440","title":"Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare","link":"https://www.eff.org/deeplinks/2026/05/canadas-bill-c-22-repackaged-version-last-years-surveillance-nightmare","author":"Brajeshwar","published_at":"2026-05-12T17:35:58+00:00","content":"\n\n<p><a href=\"https://www.eff.org/deeplinks/2026/05/canadas-bill-c-22-repackaged-version-last-years-surveillance-nightmare\" rel=\"noopener noreferrer\">Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare</a></p>\n\n\n\n<p><small>321 points | <a href=\"https://news.ycombinator.com/item?id=48111531\" rel=\"noopener noreferrer\">105 comments</a></small></p>\n\n\n<blockquote>\nBoth the mandatory data retention and encryption backdoor requirements will cause encrypted messaging services like Signal, WhatsApp, iMessage, Matrix, and others to block both Canadians and Canadian businesses from their services.<p>If you live in Canada or are impacted by this legislation, then you need to tell both your MP and the Minister of Public Safety of Canada to reject this legislation.</p><p>---</p><p>The Canadian Civil Liberties Association (CCLA) published information about Bill C-22 here just over a week ago: <a href=\"https://ccla.org/privacy/coalition-to-mps-scrap-unprecedented-surveillance-measures/\" rel=\"noopener noreferrer\">https://ccla.org/privacy/coalition-to-mps-scrap-unprecedente...</a></p><p>The blanket metadata retention and encryption backdoor requirements of Bill C-22 are illegal in the European Union.</p><p>Multiple groups have made easy to use tools for sending your MP and (other members of government) an email about rejecting this terrible legislation in its current form:</p><p>* The Internet Society's tool: <a href=\"https://www.internetsociety.org/our-work/internet-policy/keep-canada-protected/\" rel=\"noopener noreferrer\">https://www.internetsociety.org/our-work/internet-policy/kee...</a></p><p>* OpenMedia's messaging tool: <a href=\"https://action.openmedia.org/page/188754/action/1\" rel=\"noopener noreferrer\">https://action.openmedia.org/page/188754/action/1</a></p><p>* ICLM's messaging tool: <a href=\"https://iclmg.ca/stop-c-22/\" rel=\"noopener noreferrer\">https://iclmg.ca/stop-c-22/</a></p><p>I'd also recommend emailing Minister of Public Safety of Canada (Gary Anandasangaree: gary.anand@parl.gc.ca), and the Minister of Justice (Sean Fraser: sean.fraser@parl.gc.ca).\n— EmbarrassedHelp\n</p></blockquote>\n","metadata":{"score":360,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"6214316dbf2d0fa7","title":"The Future of Obsidian Plugins","link":"https://obsidian.md/blog/future-of-plugins/","author":"xz18r","published_at":"2026-05-12T15:45:54+00:00","content":"\n\n<p><a href=\"https://obsidian.md/blog/future-of-plugins/\" rel=\"noopener noreferrer\">The Future of Obsidian Plugins</a></p>\n\n\n\n<p><small>281 points | <a href=\"https://news.ycombinator.com/item?id=48109970\" rel=\"noopener noreferrer\">116 comments</a></small></p>\n\n\n<blockquote>\nObsidian CEO here. We've been working for nearly a year to launch this new Community site and review system. I'm very excited about this first version but there are many more improvements to come.<p>I've tried to be exhaustive with the blog post, FAQs, and next steps on our roadmap, but I am sure I forgot some things, so feel free to ask!</p><p>This has been an incredibly challenging project for a number of reasons. We're only seven people but we have thousands of plugin developers and millions of users. There are many competing priorities to balance.</p><p>We wanted to make sure the new system would be easy to adopt, backwards compatible, and not completely break people's workflows, while still being a major improvement over the old approach, and allow us to gradually continue enhancing security and discoverability of plugins.</p><p>Consider it a work in progress. We're listening to everyone's ideas and gripes, and will keep iterating :)\n— kepano\n</p></blockquote>\n","metadata":{"score":435,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"b787cba077685096","title":"Operation: Epic Furious","link":"https://www.epicfurious.com/","author":"dmschulman","published_at":"2026-05-12T15:13:01+00:00","content":"\n\n<p><a href=\"https://www.epicfurious.com/\" rel=\"noopener noreferrer\">Operation: Epic Furious</a></p>\n\n\n\n<p><small>323 points | <a href=\"https://news.ycombinator.com/item?id=48109519\" rel=\"noopener noreferrer\">111 comments</a></small></p>\n\n\n<blockquote>\nIt's great except the war is obviously for Israel not oil, we had more access to oil before the war\n— an0malous\n</blockquote>\n","metadata":{"score":370,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"d8d489514fe94b6b","title":"Why senior developers fail to communicate their expertise","link":"https://www.nair.sh/guides-and-opinions/communicating-your-expertise/why-senior-developers-fail-to-communicate-their-expertise","author":"nilirl","published_at":"2026-05-12T15:08:40+00:00","content":"\n\n<p><a href=\"https://www.nair.sh/guides-and-opinions/communicating-your-expertise/why-senior-developers-fail-to-communicate-their-expertise\" rel=\"noopener noreferrer\">Why senior developers fail to communicate their expertise</a></p>\n\n\n\n<p><small>339 points | <a href=\"https://news.ycombinator.com/item?id=48109460\" rel=\"noopener noreferrer\">162 comments</a></small></p>\n\n\n<blockquote>\nBecause the most important parts of the expertise are coming from their internal \"world model\" and are inseparable from it.<p>An average unaware person believes that anything can be put in words and once the words are said, they mean to reader what the sayer meant, and the only difficulty could come from not knowing the words or mistaking ambiguities. The request to take a dev and \"communicate\" their expertise to another is based on this belief. And because this belief is wrong, the attempt to communicate expertise never fully succeeds.</p><p>Factual knowledge can be transferred via words well, that's why there is always at least partial success at communicating expertise. But solidified interconnected world model of what all your knowledge adds up to, cannot. AI can blow you out of the water at knowing more facts, but it doesn't yet utilize it in a way that allows surprisingly often having surprisingly correct insights into what more knowledge probably is. That mysterious ability to be right more often is coming out of \"world model\", that is what \"expertise\" is. That part cannot be communicated, one can only help others acquire the same expertise.</p><p>Communicating expertise is a hint where to go and what to learn, the reader still needs to put effort to internalize it and they need to have the right project that provides the opportunity to learn what needs to be learnt. It is not an act of transfer.\n— hamstergene\n</p></blockquote>\n","metadata":{"score":729,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"bca0992acaca0cda","title":"Bambu Lab is abusing the open source social contract","link":"https://www.jeffgeerling.com/blog/2026/bambu-lab-abusing-open-source-social-contract/","author":"rubenbe","published_at":"2026-05-12T14:54:41+00:00","content":"\n\n<p><a href=\"https://www.jeffgeerling.com/blog/2026/bambu-lab-abusing-open-source-social-contract/\" rel=\"noopener noreferrer\">Bambu Lab is abusing the open source social contract</a></p>\n\n\n\n<p><small>477 points | <a href=\"https://news.ycombinator.com/item?id=48109224\" rel=\"noopener noreferrer\">168 comments</a></small></p>\n\n\n<blockquote>\nFull disclosure: I've never owned a Bambu because I've never loved the idea of a \"closed\" ecosystem 3D printer, however I have used them, and am very familiar with the 3d printing space beyond Bambu.<p>For anyone considering alternatives: You should know that almost all other 3D printers expect you to know a little more about how they actually work than Bambus. Bambus are as close as you can get to a \"just works\" type experience, but modern alternatives from others are nowhere near as hard as they used to be.</p><p>The closest \"easy\" alternative is probably Prusa, but you'll pay significantly more for a Prusa machine than you would a Bambu. They're an excellent company, and the complete opposite of Bambu when it comes to Openness. If money is no object, Prusa is highly recommended.</p><p>Beyond Prusa, there's a <i>lot</i> of other options. <a href=\"https://auroratechchannel.com/#section2\" rel=\"noopener noreferrer\">https://auroratechchannel.com/#section2</a> This list is a good one.</p><p>I personally run an old Elegoo Neptune 4 pro - but my needs are quite low. If I were buying today, a Snapmaker U1 or the Creality K2 Plus is probably where I'd end up going.\n— kn100\n</p></blockquote>\n","metadata":{"score":1338,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"7d3ce05813cf9265","title":"US inflation jumps to 3.8% as energy costs surge from Iran war","link":"https://www.bbc.com/news/articles/c202pgxx89lo","author":"tartoran","published_at":"2026-05-12T13:51:36+00:00","content":"\n\n<p><a href=\"https://www.bbc.com/news/articles/c202pgxx89lo\" rel=\"noopener noreferrer\">US inflation jumps to 3.8% as energy costs surge from Iran war</a></p>\n\n\n\n<p><small>228 points | <a href=\"https://news.ycombinator.com/item?id=48108313\" rel=\"noopener noreferrer\">384 comments</a></small></p>\n\n\n<blockquote>\nI can't think of a <i>single</i> way in which the United States came out ahead in the war. We have<p>* Demonstrated that the US simply can't offer any meaningful security guarantee to it's middle east partners.</p><p>* Permanently ceded de facto control over the straits of Hormuz to Iran</p><p>* Significantly strengthened the hardliners in the Iranian regime and cleared the way for them to have absolute power by eliminating all moderates</p><p>* Spiked inflation at home and doubled down on pissing off pretty much every single country except Russia by heaping sky rocketing energy costs on them</p><p>* Exposed the perilous state of of the defense industrial base (in spite of us spending more than the next 10 countries combined). We simply can't produce enough military hardware to sustain a sustained conflict with a country like Iran. I shudder to think just how badly we will be outmatched in a shooting war with China.</p><p>All of this to get to a point where we are negotiating a deal which is <i>worse</i> than what we already had with the JCPOA.</p><p>I think we will look back on this as the US version of the Suez crisis, the beginning of the end of the US empire.\n— khriss\n</p></blockquote>\n","metadata":{"score":251,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"78bdd4a4535f2bc8","title":"Rendering the Sky, Sunsets, and Planets","link":"https://blog.maximeheckel.com/posts/on-rendering-the-sky-sunsets-and-planets/","author":"ibobev","published_at":"2026-05-12T13:26:46+00:00","content":"\n\n<p><a href=\"https://blog.maximeheckel.com/posts/on-rendering-the-sky-sunsets-and-planets/\" rel=\"noopener noreferrer\">Rendering the Sky, Sunsets, and Planets</a></p>\n\n\n\n<p><small>392 points | <a href=\"https://news.ycombinator.com/item?id=48107997\" rel=\"noopener noreferrer\">34 comments</a></small></p>\n\n\n<blockquote>\nI saw this a while ago so it might not be totally related, but Sebastian Lague did a video on atmospheres for his planet generation experiment which was also very entertaining to watch [1].<p>There's something particularly entertaining on developing visuals and watching them come a reality — I hope at some point be able to experiment in this field.</p><p>[1] <a href=\"https://www.youtube.com/watch?v=DxfEbulyFcY\" rel=\"noopener noreferrer\">https://www.youtube.com/watch?v=DxfEbulyFcY</a>\n— etra0\n</p></blockquote>\n","metadata":{"score":516,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"19968ff2496c4f9b","title":"EU to crack down on TikTok, Instagram's 'addictive design' targeting kids","link":"https://www.cnbc.com/2026/05/12/tiktok-instagram-social-media-addictive-eu-crack-down.html","author":"thm","published_at":"2026-05-12T11:00:07+00:00","content":"\n\n<p><a href=\"https://www.cnbc.com/2026/05/12/tiktok-instagram-social-media-addictive-eu-crack-down.html\" rel=\"noopener noreferrer\">EU to crack down on TikTok, Instagram's 'addictive design' targeting kids</a></p>\n\n\n\n<p><small>378 points | <a href=\"https://news.ycombinator.com/item?id=48106534\" rel=\"noopener noreferrer\">320 comments</a></small></p>\n\n\n<blockquote>\nThis is pretty easy to solve. If you present data by algorithm, you are no longer an impartial common carrier and are liable for the content you present. If the user decides you don’t, ala social media 1.0.\n— conception\n</blockquote>\n","metadata":{"score":504,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"2d1ec0ad41de1a2e","title":"Learning Software Architecture","link":"https://matklad.github.io/2026/05/12/software-architecture.html","author":"surprisetalk","published_at":"2026-05-12T09:30:21+00:00","content":"\n\n<p><a href=\"https://matklad.github.io/2026/05/12/software-architecture.html\" rel=\"noopener noreferrer\">Learning Software Architecture</a></p>\n\n\n\n<p><small>397 points | <a href=\"https://news.ycombinator.com/item?id=48106024\" rel=\"noopener noreferrer\">74 comments</a></small></p>\n\n\n<blockquote>\nI'll give you the cheat sheet:<p>- Good design is a single idea pervaded throughout.</p><p>- More generally, your goal should be to minimize surprise.</p><p>- If your system allows it, people will do it.</p><p>- Everyone will not just.  If your solution starts with \"if everyone will just...\" then you don't have a solution.</p><p>- Isolate the parts of your system that transform data from the ones that use it.  Data models outlive code.</p><p>- Coupling is the root of most evil.</p><p>- Versioning is inevitable.</p><p>- Make state explicit.</p><p>- Every piece of information should have a single source of truth.</p><p>- You should spend more time thinking about naming things correctly.</p><p>- If testing is difficult, the design is wrong.</p><p>- You will regret every undocumented decision.</p><p>- Communication is a tax that you should justify before paying it.</p><p>Remember that the job of an engineer at any level is to use rules of thumb to solve problems for which there is incomplete information.\n— CSMastermind\n</p></blockquote>\n","metadata":{"score":571,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"46384238352d860d","title":"Screenshots of Old Desktop OSes","link":"http://www.typewritten.org/Media/","author":"adunk","published_at":"2026-05-12T05:11:24+00:00","content":"\n\n<p><a href=\"http://www.typewritten.org/Media/\" rel=\"noopener noreferrer\">Screenshots of Old Desktop OSes</a></p>\n\n\n\n<p><small>535 points | <a href=\"https://news.ycombinator.com/item?id=48104428\" rel=\"noopener noreferrer\">262 comments</a></small></p>\n\n\n<blockquote>\nI can't help thinking about how much we have lost. Just finding the scrollbar nowadays can be a challenge. Not to mention if you want to resize a pane - in some applications they seem to have taken extra steps to make it difficult to find the line to grab.\n— bronlund\n</blockquote>\n","metadata":{"score":686,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"ef23e5decd430ef7","title":"Instructure pays ransom to Canvas hackers","link":"https://www.insidehighered.com/news/tech-innovation/administrative-tech/2026/05/11/instructure-pays-ransom-canvas-hackers","author":"Cider9986","published_at":"2026-05-12T02:56:31+00:00","content":"\n\n<p><a href=\"https://www.insidehighered.com/news/tech-innovation/administrative-tech/2026/05/11/instructure-pays-ransom-canvas-hackers\" rel=\"noopener noreferrer\">Instructure pays ransom to Canvas hackers</a></p>\n<a href=\"https://www.instructure.com/incident_update#:~:text=STATUS%20UPDATE%205/11/26\" rel=\"noopener noreferrer\">https://www.instructure.com/incident_update#:~:text=STATUS%2...</a><p><a href=\"https://www.nytimes.com/2026/05/12/us/canvas-instructure-hackers-deal.html\" rel=\"noopener noreferrer\">https://www.nytimes.com/2026/05/12/us/canvas-instructure-hac...</a>, <a href=\"https://archive.ph/HIkdn\" rel=\"noopener noreferrer\">https://archive.ph/HIkdn</a>\n\n\n</p><p><small>256 points | <a href=\"https://news.ycombinator.com/item?id=48103668\" rel=\"noopener noreferrer\">239 comments</a></small></p>\n\n\n<blockquote>\nYears ago I attended a conference that had a \"fireside chat\" with a DoJ official on the topic of these types of ransom payments.<p>He framed the issue as being similar to kidnapping ransoms: When an American is taken hostage each family is inclined to make payment but it fosters an industry around kidnapping Americans. Congress put a stop to it by making it illegal to pay the kidnappers. The industry shifted by ceasing the non-profitable American kidnapping and instead began targeting Europeans.</p><p>His proposal was to begin warning cybersecurity consultants and insurers who were often brought into these situations that payments to sanctioned countries were already likely illegal and could face scrutiny. The first people to suffer this might be burned, but eventually he believed the industry would move on and stop targeting US firms.</p><p>Not sure if anything ever came of his plans, but I always thought it was an interesting framing of the issue.\n— jawiggins\n</p></blockquote>\n","metadata":{"score":266,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"8a211026a78b305e","title":"They Live (1988) inspired Adblocker","link":"https://github.com/davmlaw/they_live_adblocker","author":"tokenburner","published_at":"2026-05-12T00:37:54+00:00","content":"\n\n<p><a href=\"https://github.com/davmlaw/they_live_adblocker\" rel=\"noopener noreferrer\">They Live (1988) inspired Adblocker</a></p>\n\n\n\n<p><small>240 points | <a href=\"https://news.ycombinator.com/item?id=48102700\" rel=\"noopener noreferrer\">76 comments</a></small></p>\n\n\n<blockquote>\nReplacing ads reminds me of the eye tap AR stuff by Steve Mann<p><a href=\"https://news.ycombinator.com/item?id=44406552\" rel=\"noopener noreferrer\">https://news.ycombinator.com/item?id=44406552</a>\n— riedel\n</p></blockquote>\n","metadata":{"score":558,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"7e7d613fe47ae139","title":"TanStack NPM Packages Compromised","link":"https://github.com/TanStack/router/issues/7383","author":"varunsharma07","published_at":"2026-05-11T21:08:25+00:00","content":"\n\n<p><a href=\"https://github.com/TanStack/router/issues/7383\" rel=\"noopener noreferrer\">TanStack NPM Packages Compromised</a></p>\n\n\n\n<p><small>410 points | <a href=\"https://news.ycombinator.com/item?id=48100706\" rel=\"noopener noreferrer\">125 comments</a></small></p>\n\n\n<blockquote>\n<i>Please be careful when revoking tokens. It looks like the payload installs a dead-man's switch at ~/.local/bin/gh-token-monitor.sh as a systemd user service (Linux) / LaunchAgent com.user.gh-token-monitor(macOS). It polls api.github.com/user with the stolen token every 60s, and if the token is revoked (HTTP 40x), it runs rm -rf ~/.</i><p><a href=\"https://github.com/TanStack/router/issues/7383#issuecomment-4425225340\" rel=\"noopener noreferrer\">https://github.com/TanStack/router/issues/7383#issuecomment-...</a>\n— cube00\n</p></blockquote>\n","metadata":{"score":1078,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"1a54f480c7539c3a","title":"I let AI build a tool to help me figure out what was waking me up at night","link":"https://martin.sh/i-let-ai-build-a-tool-to-help-me-figure-out-what-was-waking-me-up-at-night/","author":"showmypost","published_at":"2026-05-11T21:04:10+00:00","content":"\n\n<p><a href=\"https://martin.sh/i-let-ai-build-a-tool-to-help-me-figure-out-what-was-waking-me-up-at-night/\" rel=\"noopener noreferrer\">I let AI build a tool to help me figure out what was waking me up at night</a></p>\n\n\n\n<p><small>254 points | <a href=\"https://news.ycombinator.com/item?id=48100662\" rel=\"noopener noreferrer\">260 comments</a></small></p>\n\n\n<blockquote>\nHey, OP, consider sleeping with ear plugs. They're scientifically proven to reduce night time awakenings due to audio disturbances. [1]<p>[1] <a href=\"https://academic.oup.com/sleep/advance-article/doi/10.1093/sleep/zsag001/8452884?login=false\" rel=\"noopener noreferrer\">https://academic.oup.com/sleep/advance-article/doi/10.1093/s...</a>\n— babblingfish\n</p></blockquote>\n","metadata":{"score":267,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"e8209c5d433a95d8","title":"Interaction Models","link":"https://thinkingmachines.ai/blog/interaction-models/","author":"smhx","published_at":"2026-05-11T20:53:37+00:00","content":"\n\n<p><a href=\"https://thinkingmachines.ai/blog/interaction-models/\" rel=\"noopener noreferrer\">Interaction Models</a></p>\n\n\n\n<p><small>218 points | <a href=\"https://news.ycombinator.com/item?id=48100524\" rel=\"noopener noreferrer\">26 comments</a></small></p>\n\n\n<blockquote>\nThese videos are worth a watch. There are tons of impressive moments, but they had me at the very first one where a woman says: \"I'm going to tell you a story,\" and then pauses for a long, luxurious sip from a cup of coffee, and the model ... does nothing, just waits. Take my money.<p>Speaking of taking my money, what's the economic model for a company like this? They've published a fair amount about their architecture - enough that I imagine frontier labs could implement. Patents? Trade secrets? It's hard for me to understand how you'd be able to beat that training compute and knowhow at Anthropic/GOOG/oAI/Meta without some sort of legal protection.</p><p>I can't wait to see what these model architectures do with like 30-40% lower latency and more model intelligence. Very appealing. For reference, these look to be roughly 1/10 the size of Opus 4.7 / GPT 5.x series -- 275B, 12B active. So there's lots of room to add intelligence, and lots of hope that we could see lower latency.\n— vessenes\n</p></blockquote>\n","metadata":{"score":327,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"9aea541ed714fafe","title":"GitLab Announces Workforce Reduction and End of Their CREDIT Values","link":"https://about.gitlab.com/blog/gitlab-act-2/","author":"AnonGitLabEmpl","published_at":"2026-05-11T20:51:57+00:00","content":"\n\n<p><a href=\"https://about.gitlab.com/blog/gitlab-act-2/\" rel=\"noopener noreferrer\">GitLab Announces Workforce Reduction and End of Their CREDIT Values</a></p>\n\n\n\n<p><small>240 points | <a href=\"https://news.ycombinator.com/item?id=48100500\" rel=\"noopener noreferrer\">207 comments</a></small></p>\n\n\n<blockquote>\nTheir old CREDIT values:  Collaboration,  Results for Customers,  Efficiency,  Diversity, Inclusion &amp; Belonging,  Iteration, and  Transparency.<p>New values: Speed with Quality, Ownership Mindset, Customer Outcomes.</p><p>In other words, work harder, not smarter, and no more DEI.\n— Animats\n</p></blockquote>\n","metadata":{"score":687,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"f9464f162f677a60","title":"If AI writes your code, why use Python?","link":"https://medium.com/@NMitchem/if-ai-writes-your-code-why-use-python-bf8c4ba1a055","author":"indigodaddy","published_at":"2026-05-11T20:45:55+00:00","content":"\n\n<p><a href=\"https://medium.com/@NMitchem/if-ai-writes-your-code-why-use-python-bf8c4ba1a055\" rel=\"noopener noreferrer\">If AI writes your code, why use Python?</a></p>\n\n\n\n<p><small>394 points | <a href=\"https://news.ycombinator.com/item?id=48100433\" rel=\"noopener noreferrer\">401 comments</a></small></p>\n\n\n<blockquote>\nNot just for LLMs, but in general if code is produced automatically by a tool and isn't going to be a hundred percent proofread and tested by humans who could have written it manually, it's always better to use the safest possible language so that the compiler can catch most of the errors. So yeah, Rust or OCaml are good candidates. Performance is also a good point but it's a secondary issue in my opinion.\n— p4bl0\n</blockquote>\n","metadata":{"score":891,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"3acd862d3a1fafc1","title":"Can someone please explain whether Cloudflare blackmailed Canonical?","link":"https://www.flyingpenguin.com/can-someone-please-explain-whether-cloudflare-blackmailed-canonical/","author":"speckx","published_at":"2026-05-11T18:12:38+00:00","content":"\n\n<p><a href=\"https://www.flyingpenguin.com/can-someone-please-explain-whether-cloudflare-blackmailed-canonical/\" rel=\"noopener noreferrer\">Can someone please explain whether Cloudflare blackmailed Canonical?</a></p>\n\n\n\n<p><small>229 points | <a href=\"https://news.ycombinator.com/item?id=48098537\" rel=\"noopener noreferrer\">136 comments</a></small></p>\n\n\n<blockquote>\n\"Renting attack capacity from [cloudflare]\" is inaccurate as I understand things. That group hosts their site behind cloudflare but I have not seen anyone claim that cloudflare's infra is used for the attacks.<p>This whole article seems conflate hosting an informational site run by the attackers and hosting the attack itself.\n— jwitthuhn\n</p></blockquote>\n","metadata":{"score":279,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"54de282e8d390630","title":"UCLA discovers first stroke rehabilitation drug to repair brain damage (2025)","link":"https://stemcell.ucla.edu/news/ucla-discovers-first-stroke-rehabilitation-drug-repair-brain-damage","author":"bookofjoe","published_at":"2026-05-11T17:53:08+00:00","content":"\n\n<p><a href=\"https://stemcell.ucla.edu/news/ucla-discovers-first-stroke-rehabilitation-drug-repair-brain-damage\" rel=\"noopener noreferrer\">UCLA discovers first stroke rehabilitation drug to repair brain damage (2025)</a></p>\n\n\n\n<p><small>306 points | <a href=\"https://news.ycombinator.com/item?id=48098261\" rel=\"noopener noreferrer\">62 comments</a></small></p>\n\n\n<blockquote>\nMy understanding was that strokes caused brain cell death, and that there was no coming back from that, but my neurologists would speak of 'bruised' brain cells, and that after weeks or months or even years you can see recovered function. UCLA's work here is targeting this disconnection and the lost rhythm in the surviving, distant networks. However there is, as yet, NO concievable intervention that could recover function from cell death at that center of the infarct.\n— padolsey\n</blockquote>\n","metadata":{"score":441,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"21f0219953ddf95f","title":"CUDA-oxide: Nvidia's official Rust to CUDA compiler","link":"https://nvlabs.github.io/cuda-oxide/index.html","author":"adamnemecek","published_at":"2026-05-11T15:55:07+00:00","content":"\n\n<p><a href=\"https://nvlabs.github.io/cuda-oxide/index.html\" rel=\"noopener noreferrer\">CUDA-oxide: Nvidia's official Rust to CUDA compiler</a></p>\n\n\n\n<p><small>347 points | <a href=\"https://news.ycombinator.com/item?id=48096692\" rel=\"noopener noreferrer\">107 comments</a></small></p>\n\n\n<blockquote>\nThis is amazing.. ive been working with custom CUDA kernels and <a href=\"https://crates.io/crates/cudarc\" rel=\"noopener noreferrer\">https://crates.io/crates/cudarc</a> for a long time, and this honestly looks like it could be a near drop-in replacement.<p>im especially curious how build times would compare? Most Rust CUDA crates obv rely on calling CMake or nvcc, which can make compilation painfully slow. coincidentally, just last week i was profiling build times and found that tools like sccache can dramatically reduce rebuild times by caching artifacts - but you still end up paying for expensive custom nvcc invocations (e.g. candle by hugging face calls custom nvcc command in their kernel compilation): <a href=\"https://arpadvoros.com/posts/2026/05/05/speeding-up-rust-whisper-rs-build-times/\" rel=\"noopener noreferrer\">https://arpadvoros.com/posts/2026/05/05/speeding-up-rust-whi...</a>\n— arpadav\n</p></blockquote>\n","metadata":{"score":419,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"71fa5645a39b90dd","title":"Software engineering may no longer be a lifetime career","link":"https://www.seangoedecke.com/software-engineering-may-no-longer-be-a-lifetime-career/","author":"movis","published_at":"2026-05-11T14:34:08+00:00","content":"\n\n<p><a href=\"https://www.seangoedecke.com/software-engineering-may-no-longer-be-a-lifetime-career/\" rel=\"noopener noreferrer\">Software engineering may no longer be a lifetime career</a></p>\n\n\n\n<p><small>335 points | <a href=\"https://news.ycombinator.com/item?id=48095550\" rel=\"noopener noreferrer\">579 comments</a></small></p>\n\n\n<blockquote>\nMultiple times per week I have the same conversation.  It goes something like this:<p></p><pre><code>  - AI will make developers irrelevant\n  - Why?\n  - Because LLMs can write code\n  - Do you know what I do for a living?\n  - Yes, write code?\n  - Yes, about 2-5% of the time.  Less now.\n  - But you said you are a developer?\n  - I did\n  - So what do you do 95-98% of the time?\n  - I understand things and then apply my ability to formulate solutions\n  - But I can do that!\n  - So why aren't you?\n</code></pre>\nThe developers who still think their job is about writing code will perhaps not have a job in the future.  Brutal as it may sound: I'm fine with that. I'm getting old and I value my remaining time on the planet.<p>Business owners who think they can do without developers because they think LLMs replace developers are fine by me too.  Natural selection will take care of them in due course.\n— bborud\n</p></blockquote>\n","metadata":{"score":479,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"5758f8cee8647f22","title":"Google says criminal hackers used AI to find a major software flaw","link":"https://www.nytimes.com/2026/05/11/us/politics/google-hackers-attack-ai.html","author":"donohoe","published_at":"2026-05-11T13:20:14+00:00","content":"\n\n<p><a href=\"https://www.nytimes.com/2026/05/11/us/politics/google-hackers-attack-ai.html\" rel=\"noopener noreferrer\">Google says criminal hackers used AI to find a major software flaw</a></p>\nUnlocked: <a href=\"https://www.nytimes.com/2026/05/11/us/politics/google-hackers-attack-ai.html?unlocked_article_code=1.hlA.vW7Y.pO_0G8yLYoca&amp;smid=nytcore-android-share\" rel=\"noopener noreferrer\">https://www.nytimes.com/2026/05/11/us/politics/google-hacker...</a>, <a href=\"https://archive.ph/I4Ui5\" rel=\"noopener noreferrer\">https://archive.ph/I4Ui5</a><p><a href=\"https://apnews.com/article/google-ai-cybersecurity-exploitation-mythos-926aea7f7dc5e0e61adce3273c55c6d4\" rel=\"noopener noreferrer\">https://apnews.com/article/google-ai-cybersecurity-exploitat...</a></p><p><a href=\"https://www.cnbc.com/2026/05/11/google-thwarts-effort-hacker-group-use-ai-mass-exploitation-event.html\" rel=\"noopener noreferrer\">https://www.cnbc.com/2026/05/11/google-thwarts-effort-hacker...</a>\n\n\n</p><p><small>236 points | <a href=\"https://news.ycombinator.com/item?id=48094641\" rel=\"noopener noreferrer\">171 comments</a></small></p>\n\n\n<blockquote>\n&gt; <i>“We have high confidence that the actor likely leveraged an A.I. model to support the discovery and weaponization of this vulnerability,” the report said.</i><p>I wonder what gives them that \"high confidence\", as opposed to this being just a traditional zero-day?</p><p>I'm not being snarky or critical, I'm genuinely wondering what about an attack could possibly indicate it was discovered with LLM assistance?</p><p>Like, unless the attackers' computers have been seized and they've been able to recover the actual LLM transcript history? But nothing in the article indicates that the hackers have been caught, just that a patch was developed.\n— crazygringo\n</p></blockquote>\n","metadata":{"score":236,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"f5afa4d4d45143f3","title":"Ratty – A terminal emulator with inline 3D graphics","link":"https://ratty-term.org/","author":"orhunp_","published_at":"2026-05-11T10:13:04+00:00","content":"\n\n<p><a href=\"https://ratty-term.org/\" rel=\"noopener noreferrer\">Ratty – A terminal emulator with inline 3D graphics</a></p>\n\n\n\n<p><small>449 points | <a href=\"https://news.ycombinator.com/item?id=48093100\" rel=\"noopener noreferrer\">156 comments</a></small></p>\n\n\n<blockquote>\nThis reminds me of when compiz came out and everyone was like MY WINDOWS ARE ON A CUBE and I NEED WOBBLY WINDOWS.<p>So anyway, being that guy, I immediately installed it.\n— ghostoftiber\n</p></blockquote>\n","metadata":{"score":668,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"32219edd5c02a2a6","title":"A.I. note takers are making lawyers nervous","link":"https://www.nytimes.com/2026/05/09/business/dealbook/ai-notetakers-legal-risk.html","author":"JumpCrisscross","published_at":"2026-05-11T10:04:47+00:00","content":"\n\n<p><a href=\"https://www.nytimes.com/2026/05/09/business/dealbook/ai-notetakers-legal-risk.html\" rel=\"noopener noreferrer\">A.I. note takers are making lawyers nervous</a></p>\n\n\n\n<p><small>224 points | <a href=\"https://news.ycombinator.com/item?id=48093043\" rel=\"noopener noreferrer\">163 comments</a></small></p>\n\n\n<blockquote>\n<a href=\"https://archive.is/wPKhf\" rel=\"noopener noreferrer\">https://archive.is/wPKhf</a>\n— Tistron\n</blockquote>\n","metadata":{"score":258,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"f5b2f0bbc13e0dac","title":"Gmail registration now requires scanning a QR code and sending a text message","link":"https://discuss.privacyguides.net/t/google-account-registration-now-requires-sending-an-sms-via-phone-instead-of-receiving-an-sms/36082","author":"negura","published_at":"2026-05-11T07:26:54+00:00","content":"\n\n<p><a href=\"https://discuss.privacyguides.net/t/google-account-registration-now-requires-sending-an-sms-via-phone-instead-of-receiving-an-sms/36082\" rel=\"noopener noreferrer\">Gmail registration now requires scanning a QR code and sending a text message</a></p>\n\n\n\n<p><small>288 points | <a href=\"https://news.ycombinator.com/item?id=48092028\" rel=\"noopener noreferrer\">155 comments</a></small></p>\n\n\n<blockquote>\nAny Gmail person can tell me why Gmail is tolerating Gmail phishing emails that use Google's own services (e.g. <a href=\"https://storage.googleapis.com/savelinge/\" rel=\"noopener noreferrer\">https://storage.googleapis.com/savelinge/</a>... ?<p>More info here: <a href=\"https://news.ycombinator.com/item?id=46665414\" rel=\"noopener noreferrer\">https://news.ycombinator.com/item?id=46665414</a>\n— dvh\n</p></blockquote>\n","metadata":{"score":622,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"9dbefb0322d8795c","title":"Mythos Finds a Curl Vulnerability","link":"https://daniel.haxx.se/blog/2026/05/11/mythos-finds-a-curl-vulnerability/","author":"TangerineDream","published_at":"2026-05-11T06:39:08+00:00","content":"\n\n<p><a href=\"https://daniel.haxx.se/blog/2026/05/11/mythos-finds-a-curl-vulnerability/\" rel=\"noopener noreferrer\">Mythos Finds a Curl Vulnerability</a></p>\n\n\n\n<p><small>477 points | <a href=\"https://news.ycombinator.com/item?id=48091737\" rel=\"noopener noreferrer\">206 comments</a></small></p>\n\n\n<blockquote>\nQuote:<p>\"My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.\"</p><p>It's a good reminder for us all that the competition in this space is rough and lots of more or less subtle marketing is involved.\n— rzmmm\n</p></blockquote>\n","metadata":{"score":685,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"0c0dc07e1a55a1ca","title":"The greatest shot in television: James Burke had one chance to nail this scene (2024)","link":"https://www.openculture.com/2024/10/the-greatest-shot-in-television.html","author":"susam","published_at":"2026-05-11T02:43:34+00:00","content":"\n\n<p><a href=\"https://www.openculture.com/2024/10/the-greatest-shot-in-television.html\" rel=\"noopener noreferrer\">The greatest shot in television: James Burke had one chance to nail this scene (2024)</a></p>\n\n\n\n<p><small>283 points | <a href=\"https://news.ycombinator.com/item?id=48090521\" rel=\"noopener noreferrer\">159 comments</a></small></p>\n\n\n<blockquote>\nThis is my pet peeve.<p>I don't know the show, but when I first watched this clip (under the title of \"greatest shot on television\") I totally bought in to the hype and thought it really was amazing. You start out just walking alongside him, and only slowly realize where you are and what is about to happen, and everything is perfectly timed and composed: he ends his walk, reaches the conclusion of his explanation, and you realize what is going on, all at the exact time the launch begins. Brilliant!</p><p>Except that this is not \"a shot\" at all. I just hadn't noticed on my first watch that there's a very obvious cut just at the end of the \"walk\". It's a different angle from a different location at a different time of day, and he just has one sentence to say before he looks back at the blast off.</p><p>It would be no different from any news reporter on location at the time, reading a prepared message ahead of the launch, timed to end before the launch itself with no need for extensive rehearsals, the launch timing is widely broadcast, you time yourself accordingly with your talking speed, by adding pauses, etc. And on top of everything they probably had to do it live too.</p><p>I have no issue with James Burke or his show. And this scene is really beautifully done. But it's not the greatest shot in television. It's not even one shot!</p><p>(edited: typos)\n— hjkl0\n</p></blockquote>\n","metadata":{"score":361,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"59668b82caa93fb5","title":"I'm going back to writing code by hand","link":"https://blog.k10s.dev/im-going-back-to-writing-code-by-hand/","author":"dropbox_miner","published_at":"2026-05-11T01:23:51+00:00","content":"\n\n<p><a href=\"https://blog.k10s.dev/im-going-back-to-writing-code-by-hand/\" rel=\"noopener noreferrer\">I'm going back to writing code by hand</a></p>\n\n\n\n<p><small>245 points | <a href=\"https://news.ycombinator.com/item?id=48090029\" rel=\"noopener noreferrer\">101 comments</a></small></p>\n\n\n<blockquote>\nI've set a few rules for working with coding agents:<p>1. If I use a coding agent to generate code, it should be something I am absolutely confident I can code correctly myself given the time (gun to my head test).</p><p>2. If it isn't, I can't move on until I completely understand what it is that has been generated, such that I would be able to recreate it myself.</p><p>3. I can create debt (I believe this is being called Cognitive Debt) by breaking rule 2, but it must be paid in full for me to declare a project complete.</p><p>Accumulating debt increases the chances that code I generate afterwards is of lower quality, and it also feels like the debt is compounding.</p><p>I'm also not really sure how these rules scale to serious projects. So far I've only been applying these to my personal projects. It's been a real joy to use agents this way though. I've been learning a lot, and I end up with a codebase that I understand to a comfortable level.\n— baddash\n</p></blockquote>\n","metadata":{"score":995,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"1619555bcc255328","title":"An AI coding agent, used to write code, needs to reduce your maintenance costs","link":"https://www.jamesshore.com/v2/blog/2026/you-need-ai-that-reduces-your-maintenance-costs","author":"cratermoon","published_at":"2026-05-10T23:39:55+00:00","content":"\n\n<p><a href=\"https://www.jamesshore.com/v2/blog/2026/you-need-ai-that-reduces-your-maintenance-costs\" rel=\"noopener noreferrer\">An AI coding agent, used to write code, needs to reduce your maintenance costs</a></p>\n\n\n\n<p><small>291 points | <a href=\"https://news.ycombinator.com/item?id=48089289\" rel=\"noopener noreferrer\">86 comments</a></small></p>\n\n\n<blockquote>\nIn my Dconf'24 talk \"Software as investment\" I proposed a basic framework based upon a value function (compositional) for each piece of software. This framework doesn't really need an update due to AI, apart from the (unrelated!) cost model being updated depending on how good AI is at maintenance. Apparently it would do 1.7x the number of bugs, but perhaps it fixes them faster too? I don't know.<p>Seeing software as investment avoids speaking about \"technical debt\" by speaking about \"value\", a liability just being an asset with &lt; 0 value. When software exits the high-margin world of yesterday it needs to develop a precise definition of what software deserves to exist, economically.\n— p0nce\n</p></blockquote>\n","metadata":{"score":366,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"b579cc1729743279","title":"Running local models on an M4 with 24GB memory","link":"https://jola.dev/posts/running-local-models-on-m4","author":"shintoist","published_at":"2026-05-10T23:09:10+00:00","content":"\n\n<p><a href=\"https://jola.dev/posts/running-local-models-on-m4\" rel=\"noopener noreferrer\">Running local models on an M4 with 24GB memory</a></p>\n\n\n\n<p><small>249 points | <a href=\"https://news.ycombinator.com/item?id=48089091\" rel=\"noopener noreferrer\">79 comments</a></small></p>\n\n\n<blockquote>\nGetting so close to good!<p>I consider Gemma 4 31B (dense / no MoE), the new baseline for local models. It's obviously worse than the frontier models, but it feels less like a science experiment than any previous local model I’ve run, including GPT OSS 120B and Nemotron Super 120B.</p><p>On my M5 Max with 128 GB of RAM and the full 256K context window, I see RAM use spike to about 70 GB, with something like 14 GB of system overhead. A 64 GB Panther Lake machine with the full Arc B390, or a 48 GB Snapdragon X2 Elite machine, could probably run it with a 128K to 256K context window. Maybe you can squeeze it into 32GB (27.5GB usable) with a 32K context window?</p><p>Even last year, seeing this kinda performance on a mainstream-ish/plus configuration would have seemed like a pipe dream.\n— soganess\n</p></blockquote>\n","metadata":{"score":560,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"3d0b28dff435691c","title":"Obsidian plugin was abused to deploy a remote access trojan","link":"https://cyber.netsecops.io/articles/obsidian-plugin-abused-in-campaign-to-deploy-phantom-pulse-rat/","author":"cmbailey","published_at":"2026-05-10T22:02:43+00:00","content":"\n\n<p><a href=\"https://cyber.netsecops.io/articles/obsidian-plugin-abused-in-campaign-to-deploy-phantom-pulse-rat/\" rel=\"noopener noreferrer\">Obsidian plugin was abused to deploy a remote access trojan</a></p>\n\n\n\n<p><small>213 points | <a href=\"https://news.ycombinator.com/item?id=48088576\" rel=\"noopener noreferrer\">110 comments</a></small></p>\n\n\n<blockquote>\nObsidian CEO here. There is a major update coming soon for plugin security. I think it will address many of the concerns people have raised in this thread. It's a hard problem but we are working on it.<p>That said, the headline is misleading. This article is about a social engineering attack that requires the user to actively reject multiple safety warnings in Obsidian. As far as I know this is a proof of concept, I haven't seen any reports of users being affected by this attack.\n— kepano\n</p></blockquote>\n","metadata":{"score":359,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"ec11e5562c015d66","title":"Maryland citizens hit with $2B power grid upgrade for out-of-state AI","link":"https://www.tomshardware.com/tech-industry/artificial-intelligence/maryland-citizens-slapped-with-usd2-billion-grid-upgrade-bill-for-out-of-state-ai-data-centers-state-complains-to-federal-energy-regulators-says-additional-cost-breaks-ratepayer-protection-pledge-promises","author":"lemonberry","published_at":"2026-05-10T21:16:58+00:00","content":"\n\n<p><a href=\"https://www.tomshardware.com/tech-industry/artificial-intelligence/maryland-citizens-slapped-with-usd2-billion-grid-upgrade-bill-for-out-of-state-ai-data-centers-state-complains-to-federal-energy-regulators-says-additional-cost-breaks-ratepayer-protection-pledge-promises\" rel=\"noopener noreferrer\">Maryland citizens hit with $2B power grid upgrade for out-of-state AI</a></p>\n\n\n\n<p><small>222 points | <a href=\"https://news.ycombinator.com/item?id=48088151\" rel=\"noopener noreferrer\">123 comments</a></small></p>\n\n\n<blockquote>\nIt seems that big money can overrule local government regulators at will.<p>Here in Nevada, (Warran Buffet owned) NV Energy already has approval for a \"Demand Charge\" that will increase rates for everyone, and further reduce the ridiculously low amount of money that consumers get for selling their excess solar power back to the grid.</p><p>The regulators didn't even resist, but there has now been so much backlash that they're finally scheduling public hearings after the fact.  The announcement doesn't even mention the Demand Charge by name, and many consumers aren't even aware they they're about to be screwed.</p><p>One of the more obscene things about this new charge is that people with PV arrays will pay a fee for demanding more power from their own grid-tied systems.</p><p><a href=\"https://www.nvenergy.com/publish/content/dam/nvenergy/bill_inserts/2026/06_jun/GRC-Consumer-Session-Notice-2026-06_1_17.pdf\" rel=\"noopener noreferrer\">https://www.nvenergy.com/publish/content/dam/nvenergy/bill_i...</a>\n— anonymousiam\n</p></blockquote>\n","metadata":{"score":316,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"5664d860c6fc551f","title":"Hardware Attestation as Monopoly Enabler","link":"https://grapheneos.social/@GrapheneOS/116550899908879585","author":"ChuckMcM","published_at":"2026-05-10T17:54:02+00:00","content":"\n\n<p><a href=\"https://grapheneos.social/@GrapheneOS/116550899908879585\" rel=\"noopener noreferrer\">Hardware Attestation as Monopoly Enabler</a></p>\n\n\n\n<p><small>748 points | <a href=\"https://news.ycombinator.com/item?id=48086190\" rel=\"noopener noreferrer\">279 comments</a></small></p>\n\n\n<blockquote>\nThe EU Digital (identity) Wallet EUDI requires hardware attestation by Google or Apple, effectively tying all the digital EU identities to American duopoly. Talk about digital sovereignity. Apparently protecting the children &gt; sovereignity.<p><a href=\"https://gitlab.opencode.de/bmi/eudi-wallet/wallet-development-documentation-public/-/work_items/2\" rel=\"noopener noreferrer\">https://gitlab.opencode.de/bmi/eudi-wallet/wallet-developmen...</a>\n— miohtama\n</p></blockquote>\n","metadata":{"score":2140,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"0d75130776f646ba","title":"Incident Report: CVE-2024-YIKES","link":"https://nesbitt.io/2026/02/03/incident-report-cve-2024-yikes.html","author":"miniBill","published_at":"2026-05-10T17:43:10+00:00","content":"\n\n<p><a href=\"https://nesbitt.io/2026/02/03/incident-report-cve-2024-yikes.html\" rel=\"noopener noreferrer\">Incident Report: CVE-2024-YIKES</a></p>\n\n\n\n<p><small>345 points | <a href=\"https://news.ycombinator.com/item?id=48086082\" rel=\"noopener noreferrer\">84 comments</a></small></p>\n\n\n<blockquote>\nFor anyone confused, this is (very good imo) fiction about supply-chain incidents. It had me very worried during a brief scan that it was real though, which made me read it more attentively :)\n— lynndotpy\n</blockquote>\n","metadata":{"score":700,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"21755babb1e409c1","title":"Ask HN: What are you working on? (May 2026)","link":"https://news.ycombinator.com/item?id=48085993","author":"david927","published_at":"2026-05-10T17:34:41+00:00","content":"\n\nWhat are you working on?  Any new ideas that you're thinking about?\n\n\n<p><small>186 points | <a href=\"https://news.ycombinator.com/item?id=48085993\" rel=\"noopener noreferrer\">682 comments</a></small></p>\n\n\n<blockquote>\nI recently released my first Steam game, a little physics soccer game about scoring great goals: <a href=\"https://store.steampowered.com/app/3802120/Put_One_In_for_Johnny_Minn/\" rel=\"noopener noreferrer\">https://store.steampowered.com/app/3802120/Put_One_In_for_Jo...</a>. It's not successful, but I'm very happy with how it came out, and I learned a lot.<p>I've been using and tuning a tool I built myself to help me lower my LDL and ApoB: <a href=\"https://www.heartroutine.com/\" rel=\"noopener noreferrer\">https://www.heartroutine.com/</a>. I still don't like how the daily check-in system works (it's still too dumb) but it's keeping me consistent for now.</p><p>In a few days I'll start running playtests of my combat prototype for my next game, Today I Will Destroy You, some kind of SNES Zelda and Sekiro inspired combat adventure.</p><p>Periodically thinking about what the future of helping small teams build software will look like and keeping my personal site up to date: <a href=\"https://piinecone.com/\" rel=\"noopener noreferrer\">https://piinecone.com/</a>.\n— piinecone\n</p></blockquote>\n","metadata":{"score":271,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"06fc27d7c0abdd83","title":"Local AI needs to be the norm","link":"https://unix.foo/posts/local-ai-needs-to-be-norm/","author":"cylo","published_at":"2026-05-10T17:19:28+00:00","content":"\n\n<p><a href=\"https://unix.foo/posts/local-ai-needs-to-be-norm/\" rel=\"noopener noreferrer\">Local AI needs to be the norm</a></p>\n\n\n\n<p><small>434 points | <a href=\"https://news.ycombinator.com/item?id=48085821\" rel=\"noopener noreferrer\">220 comments</a></small></p>\n\n\n<blockquote>\nFor the mainstream audience, the sentiment around local ai today is the same that they had around open source a few decades ago. For a few products, some paid solutions were so much more advanced that open source were very often completely overlooked. Why bother ? And the like. Then we had captive SaaS and other plateforms and now it's obviously wrong for most of us.<p>The dependency we have with anthropic and openai for coding for instance is insane. Most accept it because either they don't care, or they just hope chinese will never stop open weights. The business model of open weights is very new, include some power play between countries and labs, and move an absurd amount of money without any concrete oversight from most people.</p><p>It's a very dangerous gamble. Today incredible value is available for nearly everyone. But it may stop without any warning, for reason outside our control.\n— TheJCDenton\n</p></blockquote>\n","metadata":{"score":1828,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"2d7e3922c855c79f","title":"Training an LLM in Swift, Part 1: Taking matrix mult from Gflop/s to Tflop/s","link":"https://www.cocoawithlove.com/blog/matrix-multiplications-swift.html","author":"zdw","published_at":"2026-05-10T17:05:05+00:00","content":"\n\n<p><a href=\"https://www.cocoawithlove.com/blog/matrix-multiplications-swift.html\" rel=\"noopener noreferrer\">Training an LLM in Swift, Part 1: Taking matrix mult from Gflop/s to Tflop/s</a></p>\n\n\n\n<p><small>208 points | <a href=\"https://news.ycombinator.com/item?id=48085685\" rel=\"noopener noreferrer\">11 comments</a></small></p>\n\n\n<blockquote>\nThis is a pretty phenomenal article.<p>Even for those who don’t care about LLM use, this is just a great article on optimizing Swift performance, which is sadly something that doesn’t have a lot of written material for.</p><p>I’m curious if the AMX instructions are truly secret. In theory you could use an M4 or above and get them via SME I think but I’m just guessing as I’ve never tried intrinsic from Swift myself.\n— dagmx\n</p></blockquote>\n","metadata":{"score":240,"source_feed_id":"hn-best","source_feed_type":"hackernews"}},{"id":"9deff31a2577c520","title":"Remind HN: Today is Mother's Day, call your moms","link":"https://news.ycombinator.com/item?id=48085384","author":"rationalist","published_at":"2026-05-10T16:37:04+00:00","content":"\n\nAnd for any mothers here, happy Mother's Day.\n\n\n<p><small>340 points | <a href=\"https://news.ycombinator.com/item?id=48085384\" rel=\"noopener noreferrer\">135 comments</a></small></p>\n\n\n<blockquote>\nThis is the first year when I can’t do that.<p>Please go do it on my behalf, while it’s possible.\n— kstrauser\n</p></blockquote>\n","metadata":{"score":375,"source_feed_id":"hn-best","source_feed_type":"hackernews"}}]