You can't trust macOS Privacy and Security settings

https://eclecticlight.co/wp-content/uploads/2026/04/insenticon.jpg?w=1024
The user demonstrates how an app can gain access to a protected folder on macOS despite being listed as restricted in Privacy & Security settings. This is achieved by using the app to access the folder through an Open and Save Panel, which bypasses the need for user consent and allows the app to retain permanent access to the folder.

Helium Is Hard to Replace

https://substackcdn.com/image/fetch/$s_!sAvO!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ae2519f-6142-44ce-aa4d-0b9b276c12ff_1220x634.png
Helium supply chain disruptions due to the war in Iran have caused prices to spike and shortages to loom, with many industries struggling to find substitutes for the essential gas. Helium's unique properties make it crucial for various applications, including MRI machines, semiconductor manufacturing, and fiber optic cable production.

WireGuard makes new Windows release following Microsoft signing resolution

Jason Donenfeld released updated WireGuard for Windows and WireGuardNT with new features, bug fixes, and performance improvements. Users can update via the built-in updater or download the latest version from the WireGuard website.

1D Chess

1d-chess is a simplified chess variant where white plays against an AI. Assuming optimal play, white has a forced win by checkmating the enemy king.

Code is run more than read (2023)

https://olano.dev/assets/img/readrun.png
The author emphasizes the importance of considering users and maintainability in software development, and that code is a means to an end, not an end itself. They also highlight common software development dysfunctions and the need for a stronger ethical stand to not harm users, while acknowledging business realities.

CPU-Z and HWMonitor compromised

https://regmedia.co.uk/2021/04/13/malware.jpg
CPUID website briefly exposed visitors to malware after attackers hijacked its backend, turning trusted download links into malicious ones. The issue has been fixed, but users who clicked on compromised links may have downloaded malware targeting browser data and credentials.

Bluesky April 2026 Outage Post-Mortem

https://pckt-blog-media.s3.us-east-2.amazonaws.com/images/8ae24c29-6eca-43a7-a128-4d1a87e0d42f/image.png
Hey all! I'm Jim, and I do system-y things at Bluesky. I'm here to give you some details about what happened on Monday of this week that caused Bluesky to go down intermittently for ~1/2 our users for about 8 hours. First, I'd like to apologize to our users for the interruption in service. This is easily the worst outage we've seen in my time here. It's just not ...

Mysteries of Dropbox: Testing of a Distributed Sync Service (2016) [pdf]

Researchers developed a formal model of file synchronizer behavior using Quviq QuickCheck, a testing framework that generates random test cases. The model was used to test Dropbox, Google Drive, and ownCloud, exposing unexpected behavior in two out of three systems, including situations where data could be lost.

FBI used iPhone notification data to retrieve deleted Signal messages

https://9to5mac.com/wp-content/uploads/sites/6/2025/12/Reddit-comment-led-police-to-identify-Brown-University-shooter.jpg?quality=82&strip=all&w=1600
The FBI recovered deleted Signal messages from an iPhone by extracting data from the device's notification database. The messages were preserved in internal memory due to the defendant's iPhone settings and iOS's data caching capabilities.

How NASA built Artemis II’s fault-tolerant computer

The website is blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

I still prefer MCP over skills

https://david.coffee/i-still-prefer-mcp-over-skills/banner.png
The author is against the "Skills" standard for LLMs, preferring the Model Context Protocol (MCP) for service integration. MCP provides a more practical and standardized way to connect LLMs to services.

A new trick brings stability to quantum operations

https://ethz.ch/en/news-and-events/eth-news/news/2026/04/a-new-trick-brings-stability-to-quantum-operations/_jcr_content/articleLeadImage/image.imageformat.carousel.1623848018.jpg
Researchers at ETH Zurich have developed a highly stable swap gate for neutral atom qubits using geometric phases. This robust gate can be applied to 17,000 qubits simultaneously with a precision of over 99.9 percent.

France to ditch Windows for Linux to reduce reliance on US tech

https://techcrunch.com/wp-content/uploads/2026/04/france-flag-2233577438.jpg?w=1024
France plans to switch from Windows to an open source operating system to regain control over its digital destiny and reduce reliance on US tech companies. This move is part of France's effort to achieve digital sovereignty and reduce dependence on US technology.

Show HN: Marimo pair – Reactive Python notebooks as environments for agents

https://opengraph.githubassets.com/177dd4a7de8403c870007868a9e6066a6547ccc5e1bd0f859ed03a168c83e2e3/marimo-team/marimo-pair
The skill declares its own allowed-tools, but Claude Code may still prompt you to approve each Bash call. To avoid repeated prompts, copy the absolute paths to the scripts from the installed skill and add them to your .claude/settings.json (project-level) or ~/.claude/settings.json (global):

Penguin 'Toxicologists' Find PFAS Chemicals in Remote Patagonia

https://www.ucdavis.edu/sites/default/files/styles/sf_landscape_16x9/public/media/images/Penguin%20colony%202%20%28C%29%20Ralph%20Vanstreels.JPG?h=47f8d3d6&itok=1ya16FJB
Scientists used leg bands with chemical sensors on 54 Magellanic penguins to detect pollutants in their environment. The study found PFAS in over 90% of the bands, revealing exposure to pollutants in a remote region.

Deterministic Primality Testing for Limited Bit Width

The Miller-Rabin primality test was improved upon by Agrawal, Kayal, and Saxena in 2002 with a deterministic polynomial-time algorithm. Deterministic Miller-Rabin can be used for fast primality testing with a tunable parameter to increase correctness.

Native Instant Space Switching on macOS

https://arhan.sh/_astro/settings.DnK3wkfD_Z2bVBxH.png
The user is frustrated with MacOS window management, specifically the inability to instantly switch spaces without animation. They found a solution called InstantSpaceSwitcher, a menu bar app that achieves instant space switching without drawbacks.

C++: Freestanding Standard Library

In some earlier articles, we used the term freestanding. We said that a freestanding implementation is one that operates without the support of a hosted operating system. Think embedded systems, OS kernels, or bare-metal environments where heap allocation, system calls, and exception support are typically unavailable. The C++ standard defines a minimal subset of the language and library that ...

We've raised $17M to build what comes after Git

https://blog.gitbutler.com/_next/image?url=https%3A%2F%2Fd2m1ukvwmu7gz4.cloudfront.net%2FCleanShot%25202026-02-17%2520at%252011.06.49%25402x.png&w=3840&q=75
GitButler, a tool for software development, has raised $17M in Series A funding to redesign the way developers collaborate. The goal is to create a more social and intuitive platform that removes friction from collaboration and integrates AI tools seamlessly.

Supply chain nightmare: How Rust will be attacked and what we can do to mitigate

https://kerkour.com/assets/2021/rust-crate-backdoor/num_cpu.png
The Rust ecosystem is vulnerable to supply chain attacks due to its centralized package repository and lack of a comprehensive standard library. Dev Containers and other security measures can help mitigate these risks, but thinking like attackers and learning their tactics is essential for building secure-by-design systems.

US summons bank bosses over cyber risks from Anthropic's latest AI model

https://i.guim.co.uk/img/media/af4915a6ba1caec426b216d6719dab95157d0ad3/432_0_4320_3456/master/4320.jpg?width=465&dpr=1&s=none&crop=none
US Treasury secretary Scott Bessent summoned major bank chiefs to discuss cyber risks from Anthropic's AI model Claude Mythos. The model has exposed thousands of software vulnerabilities, prompting concerns about potential hacking risks.

DRAM has a design flaw from 1966. I bypassed it [video]

Generative art over the years

https://blog.veitheller.de/assets/genart/phyllotaxis.png
The user has been making generative art since 2016, starting as a programming exercise and evolving into a personal journey of self-expression and discovery. Through experimentation and learning various algorithms and techniques, the user has developed a "vocabulary" of creative tools that inform their artistic decisions and help them convey a personal aesthetic.

"Negative" views of Broadcom driving VMware migrations, rival says

https://cdn.arstechnica.net/wp-content/uploads/2026/04/GettyImages-1934095718-640x427.jpg
Nutanix claims to have gained tens of thousands of VMware customers due to customer dissatisfaction with Broadcom's takeover strategy. The main drivers for migration are high costs, bundled products, and reduced channel partners, making VMware unaffordable for small businesses.

OpenAI backs Illinois bill that would limit when AI labs can be held liable

https://media.wired.com/photos/69d81fc99011397f817a1986/125:94/w_2560%2Cc_limit/OpenAI-Backs-Bill-That-Lets-AI-Labs-Dodge-Liability-for-Critical-Harms-Business-2244268254.jpg
OpenAI supports Illinois state bill SB 3444, which shields AI labs from liability for "critical harms" caused by frontier models. The bill defines frontier models as those trained with over $100 million in computational costs and requires labs to publish safety reports.

Show HN: Keeper – embedded secret store for Go (help me break it)

https://opengraph.githubassets.com/7bf9ea37d3895d3bea2f5cb853102a32bb08a75c793992edc74f0cdec447d417/agberohq/keeper
Keeper is a Go library for a hardened secret store with four security levels, per-bucket DEK isolation, and a tamper-evident audit chain. It uses Argon2id key derivation and XChaCha20-Poly1305 authenticated encryption.

Intel 486 CPU announced April 10, 1989

https://i0.wp.com/dfarq.homeip.net/wp-content/uploads/2025/02/intel-486-dx33.jpg?resize=300%2C225&ssl=1
Intel announced the 486 CPU at Comdex on April 10, 1989, priced at $950 each in quantities of 1,000. Predictions about its limited demand and high price were later proven incorrect as the 486 became a viable processor for several years.

Charcuterie – Visual similarity Unicode explorer

https://charcuterie.elastiq.ch/social-share.png
A visual explorer for Unicode. Browse the character set, discover related glyphs, and learn more about the scripts, symbols, and shapes that make up the standard. Charcuterie is still under active development, and feedback is welcome. If you would like to support the project and help make more time for it, consider a donation.

CollectWise (YC F24) Is Hiring

https://bookface-images.s3.us-west-2.amazonaws.com/logos/a5be02a3378f664e1f80f2a84997514d00f9fc1f.png?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=ASIAQC4NIECAP7E3APC3%2F20260410%2Fus-west-2%2Fs3%2Faws4_request&X-Amz-Date=20260410T045507Z&X-Amz-Expires=3600&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEF0aCXVzLXdlc3QtMiJGMEQCIFf2XTlbMxZB7UrlleJLwGmBOzglJmW7nDgNQiqkfFfTAiAZiksJWMqHYvNe7NYf7L4gJUEJeSABxM%2Fr5Rjxr2jLlSrlAwgmEAAaDDAwNjIwMTgxMTA3MiIMtRddX0vjWWWRfFg8KsIDSVtYyUv2JkEGliTavvl3zdB6LAbR21W0uX23ApQ2EIe55DAsAy9FHhZSamo0Tl344S%2FgX63RrBhfhzWfeTDgu8y7aFA3WRyS2nrG7QeSW3LWVECGYVAIZvKqP96qDYNVtgDut3Vcxgwto%2FSKF1GOAhz7VstG7NCC38SxLEypMLpzF%2BVhMSTlotBFkq0Zg84%2BR6vP1dUl2hS827vBklwql4PGkm%2B67txMInMdo2GYk0qHnFEKevjYTmhCr5J80hCFKl7yU3%2B8Qy1NloLXUAItgpQ%2BMQwQj9QZKyQRb7mgjlxsKq6pGAniwEQTflj1omj5mAg7kA2bAO1t9eSPoOH%2BxnIBBRt1HfCxBJCbja0xsGVytVc8Hw3er82dhkXDq8rtAtQ63NXB0169jEc4WFxLLnnOhTQ4GaW2769koTeaGCTw%2Bb05MTYv7j3mXwurgysqCYAupMDzjo6qStRzVe%2FE5gXhdwClV%2B4gvHpnuvBgGP2wH8mrplZJoSL9%2FZGm8sVsE1BWGSo2LM3ozo8KsHKFidDjuwQKU0C%2BCww0UuV77g%2F24F4fcRVgRmgfbOyMWpKiUie%2BHFfB6sspbozIcsJT3BL7MIWC4s4GOqYBf6M6h%2BUzsWsk6zn4hadb1Mb9mhIzE5NsWtGcZMh88lUNmwx50dyDl4J5Csi2PAH7l5rU3PrbGHOPbZeW45JU1B8v1SHtd2Kdu6M1M%2B0iBdUlXzdcxHi2UhHiUP9EuIIEt7TsXCOGr7ohYGY9T39a3PjVFfuNSl6vq0WGrI40nnVQxCdE%2FwC1A88Fv2CMPiYetaRu0dfmTZW1LrpD44wdlbmDe%2F025g%3D%3D&X-Amz-SignedHeaders=host&X-Amz-Signature=ab018f88d9beb9683b14dad68a30588cf87251c36f0cd5472246be22f8fd17c4
CollectWise is a Y Combinator-backed startup using generative AI to automate debt collection. They're hiring an AI Agent Engineer to build voice AI infrastructure and reach $10 million in annual revenue within a year.

Artemis II and the invisible hazard on the way to the Moon

https://www.ansto.gov.au/sites/default/files/styles/hero_image/public/hero-images/Earth%20and%20moon_0.jpg?h=498e3814&itok=c7GdPYbY
NASA's Artemis II mission is testing radiation protection for humans beyond Earth's magnetic shelter, measuring how radiation levels change with trajectory and shielding. The mission will lay the foundation for safe human exploration of the Moon and Mars by characterizing the radiation field inside the spacecraft and linking it to biological effects.