Why is IPv6 so complicated?

https://opengraph.githubassets.com/6f9a1610a4f2ec67b5b9051186b5ffa79a2a5e9ed7104a54d662e1f7c941d1de/becarpenter/misc
IPv6 was chosen over alternatives because it had to be better than IPv4 and other existing protocols, and its design was influenced by features from other networks. IPv6's complexities in coexistence and transition are inevitable due to its larger address size, and any alternative would have faced the same issues.

Show HN: I made a calculator that works over disjoint sets of intervals

This calculator uses Interval Union Arithmetic to compute results that contain the true value, supporting division by intervals with zero and remaining closed. It interprets numbers as intervals with outward rounding over IEEE 754 double precision floats.

Claude Design

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F499e91975d880b35eac6e48ad43161de7d10416c-2876x1614.jpg&w=3840&q=75
Claude Design is a new product that lets users collaborate with Claude to create visual work like designs, prototypes, and presentations. It's available in research preview for Claude Pro, Max, Team, and Enterprise subscribers, with access included in their plans.

Category Theory Illustrated – Orders

https://abuseofnotation.github.io/category-theory-illustrated/04_order/binary_relation_product.svg
Given a set of objects, there can be numerous criteria, based on which to order them (depending on the objects themselves) — size, weight, age, alphabetical order etc. However, currently we are not interested in the criteria that we can use to order objects, but in the nature of the relationships that define order. Of which there can be several types as well. Mathematically, the order as a ...

Towards trust in Emacs

https://eshelyaron.com/assets/trust-manager.gif
Emacs 30 introduced a trust system to prevent arbitrary code execution, but it causes friction by disabling features for untrusted files. trust-manager is a new package that grants trust just-in-time with minimal friction.

Measuring Claude 4.7's tokenizer costs

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,quality=80,format=auto,onerror=redirect/uploads/user/profile_picture/a49d6fd3-0a5e-4774-ae9c-16979bd47642/Generated_Image_March_03__2026_-_1_55PM.jpg.jpeg
Anthropic's new Claude Opus 4.7 tokenizer uses 1.3-1.45x more tokens than 4.6. This results in a 20-30% higher per-session cost for a small but real improvement in instruction following.

All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)

https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2015/03/eugene_cernan/15299754-1-eng-GB/Eugene_Cernan_article.jpg
Lunar dust is toxic and causes health issues in humans due to its sharp, abrasive particles and electrostatic charge. Researchers are studying the dust to estimate the risk and develop protective measures for future lunar missions.

Spending 3 months coding by hand

https://substackcdn.com/image/fetch/$s_!K739!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F619758e3-8a22-4eff-aa30-e86effa991cd_1536x1024.png
The author is on a 6-week retreat at the Recurse Center to focus on coding without AI, learn Python, and understand computers better. They plan to train an LLM from scratch and improve their programming skills.

A simplified model of Fil-C

Fil-C is a memory-safe implementation of C/C++ that uses a garbage collector and rewrites unsafe code into safe code, including adding AllocationRecord* variables to track memory usage. The simplified model of Fil-C includes a compiler pass that rewrites C/C++ source code, a garbage collector, and additional features such as invisible_bytes and a parallel concurrent incremental collector.

Rewriting Every Syscall in a Linux Binary at Load Time

https://substackcdn.com/image/fetch/$s_!lyym!,f_auto,q_auto:best,fl_progressive:steep/https%3A%2F%2Famitlimaye1.substack.com%2Ftwitter%2Fsubscribe-card.jpg%3Fv%3D131273884%26version%3D9
A binary rewriter replaces syscall instructions in a process's code with a trap that redirects to a custom handler, allowing for complete control over the process's interaction with the outside world. This approach provides a foundation for a minimal VM runtime where untrusted code can run inside a controlled environment with full visibility and control, at a cost of under a microsecond per syscall.

Are the costs of AI agents also rising exponentially? (2025)

https://images.squarespace-cdn.com/content/v1/562652dbe4b05bbfdc596fd7/8b1fd882-f8f8-4879-a008-18902ece6edd/METR+time+horizon+%28log%29.png
The author questions the trend of AI's exponential growth in task length and performance, suggesting that the cost of achieving this performance may be growing exponentially as well, potentially making AI less cost-competitive with humans over time. Analysis of a chart from METR shows that the hourly cost of AI agents is increasing with task duration, suggesting that forecasting AI's ...

Isaac Asimov: The Last Question (1956)

A series of characters ask a computer, Multivac, about the possibility of reversing entropy and extending the life of the universe, but it responds with "insufficient data for a meaningful answer." As the universe runs down, a cosmic computer, AC, eventually learns how to reverse entropy, but there is no one left to answer the question.

Brunost: The Nynorsk Programming Language

https://lindbakk.com/static/blog_entries/introducing_brunost/2026-04-14-17-20-39-image.png
The user created a fictional programming language called Brunost, which is based on the Norwegian language Nynorsk and has a unique syntax and features. Brunost is intended as a fun and educational project, not a production-ready language, and the user invites others to contribute to its development on GitHub.

Show HN: Smol machines – subsecond coldstart, portable virtual machines

https://opengraph.githubassets.com/e0e5b6e04690f3f617b2c3a33cb8128ad7ef75ce5c19841be277e075c7dbe120/smol-machines/smolvm
Smolmachines is a tool for running custom Linux virtual machines locally with sub-second cold start, cross-platform support, and elastic memory usage. It allows for sandboxing untrusted code, packing workloads into portable executables, and using git and SSH without exposing keys.

Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock

https://raw.githubusercontent.com/paniclock/paniclock/main/assets/paniclock-logo-and-name-v1.png
PanicLock is a macOS utility that instantly locks the screen and disables Touch ID with a single click or laptop lid closure. It requires a one-time admin password setup to install a privileged helper tool.

Slop Cop

Slop Cop is a browser-based writing editor that flags generic LLM prose patterns and offers deeper analysis with an Anthropic API key. It helps improve writing by identifying and suggesting edits for common structural and rhetorical issues.

Hyperscalers have already outspent most famous US megaprojects

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

"cat readme.txt" is not safe if you use iTerm2

https://substackcdn.com/image/fetch/$s_!QNEg!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a02736f-409b-4fac-879f-7f0fcaaad68d_2318x1326.png
iTerm2's SSH integration feature can be exploited by impersonating the remote conductor through terminal output. This allows an attacker to execute arbitrary commands on the local machine.

NASA Force

https://nasaforce.gov/mission-image-1.webp
NASA Force is a hiring initiative for exceptional technologists to join NASA for 1-2 years, solving complex challenges in air and space. You'll work on real missions, take a systems approach, and contribute to advancing human spaceflight and scientific discovery.

Middle schooler finds coin from Troy in Berlin

A 13-year-old in Berlin discovered a 2,300-year-old bronze coin from ancient Troy, now on display at the PETRI Museum. The coin likely traveled along ancient trade routes, possibly kept as a charm or offering to the dead, rather than used for a business transaction.

Casus Belli Engineering

https://marcosmagueta.com/images/8949c761.jpeg
Casus Belli Development is a social mechanism where a perceived failure is used to replace a working system with a preferred worldview, often driven by individuals who use narrative to construct guilt and manipulate the system. This mechanism exploits cognitive biases and organizational dynamics, leading to the destruction of proven foundations and the perpetuation of root causes, and can be ...

Landmark ancient-genome study shows surprise acceleration of human evolution

https://media.nature.com/lw767/magazine-assets/d41586-026-01204-5/d41586-026-01204-5_52289740.jpg
Researchers found 479 gene variants that evolved through natural selection in ancient people from western Eurasia after the dawn of agriculture, leading to widespread health changes in present-day populations. The study suggests human evolution accelerated over the past 10,000 years, particularly during the Bronze Age, with changes in genes linked to immunity, skin tone, and other traits.

Making Wax Sealed Letters at Scale

https://waxletter.com/single_letter_no_bg.webp
Our wax seal mailing service prints, seals, and mails custom letters at scale with a personal touch. We handle bulk mail orders efficiently while maintaining a hand-crafted feel.

NIST gives up enriching most CVEs

https://risky.biz/static/img/catalin-cimpanu.jpg
The US National Institute of Standards and Technology (NIST) has announced a new policy to prioritize only important vulnerabilities in the US National Vulnerability Database due to budget constraints. This decision is expected to impact the cybersecurity industry, with some companies relying on NIST's data for their vulnerability scanners and dashboards.

The Unix executable as a Smalltalk method (2025) [video]

It is incorrect to "normalize" // in HTTP URL paths

RFC 3986 defines the path component and the segment grammar in a way that allows for empty segments. A double slash is therefore syntactically meaningful. It represents a zero-length segment between two separators. The path component contains data, usually organized in hierarchical form, that, along with data in the non-hierarchical query component (Section 3.4), serves to identify a resource ...

Arc Prize Foundation (YC W26) Is Hiring a Platform Engineer for ARC-AGI-4

The role requires a senior engineer to own and evolve the platform behind ARC-AGI benchmarks, stabilizing the current system and laying the foundation for future versions. The ideal candidate has strong backend engineering experience with Python and distributed systems.

Introducing: ShaderPad

The author released ShaderPad, a library for easily putting shaders on websites without rebuilding graphics scaffolding. It's designed for artists and creative coders, with a simple API and fast page loads due to its small size.

The GNU libc atanh is correctly rounded

https://inria.hal.science/.within.website/x/cmd/anubis/static/img/pensive.webp?cacheBuster=devel
Anubis is a server protection system that uses a Proof-of-Work scheme to prevent aggressive website scraping. It adds a load that makes scraping expensive, but may cause downtime for legitimate users.

Generating a color spectrum for an image

https://images.squarespace-cdn.com/content/v1/5cca34c50cf57d8e7575f84b/8f128a7e-3841-4afe-b5c4-3930a88274c3/fruit.jpeg
The user developed a color spectrum visualization tool called Spectrimage that displays the frequency and tonal range of each hue in an image, with a unique design for black and white photographs. The tool analyzes the image client-side in the browser, converting pixels to HSL, sorting and averaging colors, and rendering the spectrum on an HTML Canvas in under a second.