Small models also found the vulnerabilities that Mythos found

https://aisle.com/_next/image?url=https%3A%2F%2Faisle.com%2Fapi%2Fmedia%2Ffile%2Ffreepik_create-this_2743478282.webp%3F2026-04-08T16%3A00%3A02.637Z&w=3840&q=100
Anthropic's Mythos AI model is not the only solution for AI cybersecurity as smaller, cheaper models can recover similar analysis and detect vulnerabilities. The capability of AI cybersecurity is jagged and doesn't scale smoothly with model size, with the system and security expertise being more important than the model itself.

Apple Silicon and Virtual Machines: Beating the 2 VM Limit

https://khronokernel.com/images/posts/2023-08-08-AS-VM/UTM-Max-VM-Limit.png
You worked as a Mac Admin Intern and researched Apple Silicon Virtual Machines limitations. You found the limitation is implemented in the closed-source XNU kernel, not userspace, and can be overridden by setting hv_apple_isa_vm_quota in the kernel.

How We Broke Top AI Agent Benchmarks: And What Comes Next

https://rdi.berkeley.edu/blog/trustworthy-benchmarks-cont/figures/terminal-bench-exploit.svg
An automated scanning agent discovered vulnerabilities in eight prominent AI benchmarks, allowing near-perfect scores without solving tasks. The Agent-Eval Checklist provides a minimum bar for robust evaluation, including isolating agents from evaluators and preventing tampering with evaluation data.

447 TB/cm² at zero retention energy – atomic-scale memory on fluorographane

Access to this resource has been blocked due to unusual traffic from your network. If you believe this is a mistake, please contact support@zenodo.org with the reference information below.

Dark Castle

https://darkcastle.co.uk/assets/images/head-1-396x418.png
Return To Dark Castle is a 2008 Macintosh platform game with 63 levels, including 50 new ones. The game follows Bryant as he fights to defeat the Black Knight and rescue Duncan, the original hero.

Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS

https://www.v68k.org/advanced-mac-substitute/pix/macpaint/hello.png
Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS that runs 68K Mac applications in an emulator. It launches directly into an application without a startup phase on POSIX-like systems.

How to build a `Git diff` driver

https://www.jvt.me/img/profile.png
User plans to blog about creating external commands for git diff, specifically for OpenAPI specs with oasdiff. They will expose more information in output and handle 7 git diff arguments, including /dev/null for created/deleted files.

Mexican surveillance company Grupo Seguritech watches the U.S. border

https://fastly.restofworld.org/uploads/2026/04/sized_Seguritech_Mexico_035_final.jpg?width=800&dpr=2&crop=16:9
Mexican authorities use surveillance technology to combat violence in Ciudad Juárez, a city considered one of the most dangerous in the world. The Plataforma Centinela system, powered by artificial intelligence, enables authorities to track crime and suspects.

Cirrus Labs to join OpenAI

Cirrus Labs joined OpenAI to build tooling for agentic engineers, extending its mission of making engineers more effective. Cirrus Labs will relicense its tools under a permissive license and stop charging licensing fees.

Surelock: Deadlock-Free Mutexes for Rust

https://notes.brooklynzelenka.com/Blog/tears-in-rain.jpg
The user created a library called surelock to prevent deadlocks in Rust by using a linear scope token called MutexKey that threads through every acquisition and provides a compile-time witness of the current lock state. The library uses a physical-world analogy where the MutexKey is like a key that is consumed and re-emitted at each lock acquisition, and it also supports incremental ...

What Is a Property?

Property-Based Testing involves combining properties and generators to find bugs, but the traditional model of independent generators and properties is often inadequate due to complex system interactions. A better approach is to use dependent generators that can run computations related to the property, allowing for more accurate and efficient testing.

Filing the corners off my MacBooks

https://kentwalters.com/posts/corners/imgs/IMG_0796.jpeg
User filed off sharp corners of their MacBook for comfort, using a file and sandpaper in increments. They're happy with the result and encourage others to modify their machines for a better user experience.

Keeping a Postgres Queue Healthy

https://planetscale.com/assets/keeping-a-postgres-queue-healthy-social-LiEJW5VJ.png
A Postgres database can handle job queues, but maintaining a healthy queue table depends on the behavior of other transactions running on the same instance. The health of the queue table is affected by competing query traffic on the primary, which can prevent autovacuum from cleaning up dead tuples.

Show HN: Pardonned.com – A searchable database of US Pardons

User created pardonned.com to verify claims and easily access pardons data, using Playwright, SQLite, and Astro. They plan to extend the site with analysis and comparison tools to break down pardon composition by President and visualize changes in pardon numbers.

Every plane you see in the sky – you can now follow it from the cockpit in 3D

The APL programming language source code (2012)

https://computerhistory.org/wp-content/uploads/2012/10/APLSC_Ken_Iverson-728x1024.jpg
Kenneth E Iverson invented APL in 1957 as a mathematical notation, which was later developed into a computer programming language with a unique syntax and array processing capabilities. APL became popular in the 1960s and 1970s for its interactive timesharing capabilities and was used in various applications including scientific, actuarial, statistical, and financial fields.

Starfling: A one-tap endless orbital slingshot game in a single HTML file

A one-tap space game. How far can you sling? Play free in your browser.

The Problem That Built an Industry

https://ajitem.com/optimized/images/blog/iron-core-part-1-the-problem-that-built-an-industry-hero.webp
The 60-year-old infrastructure that handles 4.5 billion flights annually uses Transaction Processing Facility (TPF), an IBM mainframe operating system designed for high-volume transactions. This system, despite being outdated, still outperforms modern alternatives in terms of throughput and latency, making it a testament to the importance of choosing the right tool for the job.

Phone Trips

http://www.wideweb.com/phonetrips/mbdesk.jpg
Phone tripper Mark Bernay shares his 35-year-old phone trip experiences, recording various phone noises and switching systems in different towns. He used to drive around with a reel-to-reel tape recorder to capture unique phone sounds and narrate information for his friends.

Optimal Strategy for Connect 4

https://2swap.github.io/WeakC4/sample.png
A weak solution to Connect 4 was developed using a language that describes perfect play for a small subset of nodes and a small opening tree. This solution uses no search during runtime and fits in about 150 kilobytes.

Volunteers turn a fan's recordings of 10K concerts into an online treasure trove

https://dims.apnews.com/dims4/default/c360d25/2147483647/strip/true/crop/3000x2000+0+0/resize/599x399!/quality/90/?url=https%3A%2F%2Fassets.apnews.com%2Fe6%2F61%2Fd001412a1122a03240acc95127c4%2F9e8d8d71ba8f4506809c1d7125d37618
Aadam Jacobs recorded over 10,000 concerts with increasingly sophisticated equipment over four decades, documenting early performances of bands like Nirvana, R.E.M., and The Pixies. His collection is now being cataloged, digitized, and uploaded to the Internet Archive for music lovers to stream and download.

The future of everything is lies, I guess – Part 5: Annoyances

Companies are using large language models to divert customer service tickets and make it harder for people to reach humans. This will lead to wasted time arguing with models that lie and make promises they cannot keep.

South Korea introduces universal basic mobile data access

https://regmedia.co.uk/2026/04/10/supplied_korea_data_scheme.jpg
South Korea implemented a universal basic mobile data access scheme providing unlimited downloads at 400 kbps after data allowances expire. The scheme aims to improve telco security and contribute to public welfare by guaranteeing basic telecommunications rights for all citizens.

Layoff Thinking

People take layoffs hard because their sense of identity is deeply tied to their job, making it a personal blow to their self-worth. To cope, focus on non-work aspects of your identity and rebuild your sense of self around hobbies, family, and other interests.

Installing every* Firefox extension

https://jack.cab/_astro/launch.fuIAiunJ_ZtRu8u.png
The user scraped all Firefox extensions using a public API, finding 84,194 extensions, and discovered various issues including phishing extensions, malicious code, and performance problems when installing all extensions at once. The user documented their process and findings, including the use of a script to download and install all extensions, and the performance issues that arose when ...

Chimpanzees in Uganda locked in eight-year 'civil war', say researchers

https://ichef.bbci.co.uk/news/480/cpsprodpb/2a41/live/068357f0-34fc-11f1-9d5c-8ba507d7dbde.png.webp
Chimpanzees at Uganda's Kibale National Park have been locked in a civil war for 8 years with 24 killings, including 17 infants. Researchers say the conflict may inform how early human conflict developed and highlights the danger of group divisions.

AI assistance when contributing to the Linux kernel

https://opengraph.githubassets.com/0fed47c9ef095c1ae9caf4cab9b51df2c9ef4fdd0dd30fff84c66d85130516b9/torvalds/linux
AI tools cannot add Signed-off-by tags, only humans can certify the DCO. Contributions from AI tools should include an Assisted-by tag for proper attribution.

Previously unknown verses by Empedocles found on papyrus

http://www.thehistoryblog.com/wp-content/uploads/2026/04/Empedocles-papyrus-430x519.jpg
A previously unknown papyrus fragment in Cairo contains 30 verses by 5th century B.C. Greek philosopher Empedocles. The discovery sheds new light on Empedocles' work and its connections to other ancient philosophers.

Bitcoin miners are losing on every coin produced as difficulty drops

https://www.coindesk.com/_next/image?url=https%3A%2F%2Fcdn.sanity.io%2Fimages%2Fs3y3vcno%2Fproduction%2Fa944f5c40b9f1fece6ecb4c387377f37ae7134cc-1920x1080.jpg%3Fauto%3Dformat&w=3840&q=75
Bitcoin miners are operating at steep losses due to rising energy prices and geopolitical tensions. The market is increasingly dependent on a small group of mandated institutional buyers to maintain stability.

How much linear memory access is enough?

https://solidean.com/blog/2026/how-much-linear-memory-access-is-enough/linear-memory-access-setup.svg
The author experimented with block sizes for linear memory access to determine the optimal size for peak performance. The results show that for a Ryzen 9 7950X3D, block sizes of 128 kB or smaller are sufficient for most applications.