Show HN: Building a web server in assembly to give my life (a lack of) meaning

https://raw.githubusercontent.com/imtomt/ymawky/main/docs/ymawky.png
ymawky is a web server written in ARM64 assembly for MacOS, supporting static file serving, PUT requests, and error pages. It requires Xcode Command Line Tools and runs on apple silicon (arm64) only.

Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Gemini API File Search is now multimodal

https://storage.googleapis.com/gweb-uniblog-publish-prod/images/Gemini_File-Search_Blog-Hero_2096.width-200.format-webp_hm7uhZi.webp
Gemini API's File Search tool now supports retrieval-augmented generation with multimodal data and custom metadata. It processes images and text together, improving search accuracy and transparency with page citations.

Casio S100X Japanese Lacquer Edition (JP Page Only)

You don't have permission to access "http://www.casio.com/jp/basic-calculators/premium/en-s100x-jc1-u/" on this server.

Internet Archive Switzerland

https://blog.archive.org/wp-content/uploads/2026/05/IA-Switzerland-logo.png
Internet Archive Switzerland launched as a non-profit foundation in St. Gallen to preserve endangered archives and AI models. It joins a global network of mission-aligned organizations to build a distributed digital library.

Emerich Juettner: The One Dollar Counterfeiter

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwXpxWbUXh8JQ77qOz95jEMSz1Om4dBMMX9KkNU6q9VOgoSd0c9x09Iz2QFuGHTrW30gZQw-LIkr0LenTF5plIieA_W3peYZAD5JgtXMCAprBF11XeeREsHq8OU1tj5-6Ruz8CYFPEZXmbe-RzX6CvogO8X9ylGDDFCr-iATAGOOUlkSgsuCDx-WCo2ig/s1600/edward-juettner-2%20.jpg
Emerich Juettner, a frail old immigrant, successfully printed nearly 10 years of crude one-dollar bills, evading authorities until 1948. He was sentenced to a year in prison and paroled after 4 months due to his lack of greed, and his story became a folk hero.

I’ve banned query strings

The user doesn't want tracking stuff in URLs and has banned unauthorized query strings on their site. They're testing Caddy's handling of query strings at /no-query-strings.

I'm writing a history of Visual Basic, Chapter 1 is up

https://evilgeniuslabs.ca/uploads/content/2026/05/6fd5a7b3274b436fbae1139adefcda97.png
The author is writing a history of Visual Basic on EvilGeniusLabs.ca, focusing on the people and lineage behind the language, rather than just its technical aspects or Microsoft management. The series will cover the development of Visual Basic from its roots in Dartmouth BASIC to its release in 1991, with a focus on lesser-known individuals who contributed to the project.

The Serial TTL connector we deserve

https://kohlschuetter.github.io/blog/assets/posts/2026/05/07/serial-ttl-connector/before.jpg
The user proposes using Julet connectors for a more reliable and safe connection to embedded devices' UART TTL pins, instead of using USB-Serial TTL adapters or exposed Dupont wires. Julet connectors come in various sizes and pin counts, and can be easily crimped and connected to create a robust and foolproof setup for serial TTL communication.

Local privilege escalation via execve()

FreeBSD-SA-26:13.exec is a security advisory that fixes a local privilege escalation via execve() in all supported versions of FreeBSD. The issue is corrected in stable/15, 14.4-STABLE, and 13.5-STABLE branches.

Show HN: Rust but Lisp

https://opengraph.githubassets.com/d0851894ab5c8490a9a5a5be2262b1a2cb159d3e6ba7ca66f6d488a78e89036c/ThatXliner/rust-but-lisp
rlisp is a LISP frontend for Rust that compiles directly to Rust code. It uses s-expressions for syntax and compiles to native Rust with no runtime or GC.

Zed Editor Theme-Builder

https://zed.dev/_next/image?url=%2Fimg%2Ftheme-builder-dark.jpg&w=3840&q=75
Access Zed's theme builder from the desktop and browse available theme extensions. The MeetingScheduler component helps schedule meetings about scheduling meetings.

Show HN: I made a Clojure-like language in Go, boots in 7ms

https://raw.githubusercontent.com/nooga/let-go/main/meta/logo.png
let-go is a Clojure-family language compiler and VM for Go that produces a single ~10MB binary with ~7ms cold start. It supports standalone executables, WASM web apps, and embeds cleanly as a scripting layer for Go programs.

Making your own programming language is easier than you think (but also harder)

https://lisyarus.github.io/blog/media/making-your-own-programming-language/cover.png
The user is creating a custom programming language called pslang for modding their game, aiming for a low-level, imperative language with a static type system and seamless C interop. The language has a unique syntax, including indentation-based scoping, built-in arrays, and a focus on simplicity and ergonomics, with the goal of making it easy to use for modders.

The first microcomputer: The transfluxor-powered Arma Micro Computer from 1962

https://static.righto.com/images/arma-microcomputer/arma_1-w500.png
The Arma Micro Computer is a compact 20-pound transistorized computer designed for space applications in 1962. It used 22-bit serial architecture and had a small instruction set of 19 instructions.

Distributing Mac software is increasing my cortisol levels

https://blog.kronis.dev/user/pages/blog/apple-is-increasing-my-cortisol-levels/01-quarantine.jpg
The author is creating a Go utility to manage Claude Code profiles but is frustrated with Apple's developer program requirements, including a yearly subscription and ID verification process that doesn't work well with their MacBook's webcam.

LLMs corrupt your documents when you delegate

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Large Language Models (LLMs) degrade documents during long workflows, corrupting 25% of content on average. Current LLMs are unreliable delegates, introducing severe errors that silently corrupt documents over time.

CPanel's Black Week: 3 New Vulnerabilities Patched After Attack on 44k Servers

https://www.copahost.com/blog/wp-content/uploads/2026/05/9d592da9-48e6-4f09-b972-a73a543c754a.png
cPanel released a second emergency security patch on May 8, 2026, covering three new vulnerabilities: CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. Two of the three vulnerabilities have a CVSS score of 8.8, indicating High severity.

A recent experience with ChatGPT 5.5 Pro

A mathematician used ChatGPT 5.5 Pro to improve the upper bound on a problem in additive number theory from exponential to polynomial in time, with the AI producing a result that was almost certainly correct according to a human expert. The mathematician suggests that the era of human mathematicians solving problems independently may be coming to an end, and that the future of mathematics ...

Surfel-based global illumination on the web

https://juretriglav.si/assets/surfel-webgpu-gi/leonardo-da-vinci-treatise-on-painting.png
The author explores the concept of surfels, a technique for rendering global illumination in real-time, and its application in a WebGPU-based pipeline, including surfelization, grid acceleration, and ray tracing. The pipeline is optimized with techniques such as guided sampling, multi-scale mean estimator, and temporal filtering to achieve a stable and noiseless image, but still faces ...

Production engineering when trading billions of dollars a day [video]

EU Parliamentary Research Service calls VPNs "a loophole that needs closing"

https://cyberinsider.com/wp-content/uploads/2026/05/73592.jpg
European regulators warn that VPNs are being used to bypass online age-verification systems, describing it as a loophole that needs closing. Regulators are considering measures to restrict VPN access to adults only, but this could weaken anonymity protections and create new surveillance risks.

The hypocrisy of cyberlibertarianism

https://matduggan.com/content/images/2026/05/image.png
The user reflects on the early days of the internet and how the ideology of cyberlibertarianism, which emphasized individual freedom and deregulation, led to the creation of a platform that prioritizes profit over people and has devastating consequences. The user argues that it's time to face the facts that this ideology has failed and that we need to evolve and find a new ethical code to ...

Sparse Cholesky Elimination Tree

https://www.reidatcheson.com/assets/etree/matrix_fill_diagram.svg
The column elimination tree is a data structure that determines the fill pattern and task graph for sparse Cholesky factorization. It encodes a structural rule that implies a tree representation of the task graph, allowing for efficient computation of the factorization.

Meta's embrace of AI is making its employees miserable

Meta plans to track US employees' computer activity to train AI models, sparking employee backlash and concerns over privacy. Employees have no option to opt out of the tracking on corporate laptops.

Using Claude Code: The unreasonable effectiveness of HTML

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

I caught the car

The author secured a promotion to Senior Software Engineer after two and a half years, but realized the title didn't bring the expected satisfaction. They now prioritize meaningful work, collaboration, and personal growth over external validation.

France moves to break encrypted messaging

https://reclaimthenet.org/wp-content/uploads/2026/01/apWThHm7W0xe.png
France's intelligence delegation recommends breaking WhatsApp, Signal, and Telegram encryption for targeted access to messages. This move is opposed by some lawmakers who fear it could lead to mass surveillance and create vulnerabilities.

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/car.png
The user strongly advises against using WebRTC for voice AI due to its limitations and trade-offs, such as introducing artificial latency and aggressively dropping packets. The user suggests using QUIC instead, which offers better performance and scalability, and provides a detailed explanation of how QUIC can be used for load balancing and connection management.

Mythical Man Month

https://martinfowler.com/mf.jpg
Fred Brooks managed IBM's System/360 in the 1960s and wrote influential book The Mythical Man-Month in 1975. The book emphasizes conceptual integrity in system design, simplicity, and straightforwardness to avoid communication issues and ensure effective work.