Show HN: Building a web server in assembly to give my life (a lack of) meaning

https://imtomt.github.io/ymawky/dirlist.png
The author built a web server called ymawky in AArch64 assembly for macOS to understand how a web server works and to strip away convenience layers. The project involved parsing HTTP requests, handling edge cases, and implementing security features such as request timeouts and path sanitization in a low-level and manual way.

Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Internet Archive Switzerland

https://blog.archive.org/wp-content/uploads/2026/05/IA-Switzerland-logo.png
Internet Archive Switzerland launched as a non-profit foundation in St. Gallen to preserve endangered archives and AI models. It joins a global network of mission-aligned organizations to build a distributed digital library.

I’ve banned query strings

The user doesn't want tracking stuff in URLs and has banned unauthorized query strings on their site. They're testing Caddy's handling of query strings at /no-query-strings.

Show HN: Rust but Lisp

https://opengraph.githubassets.com/d0851894ab5c8490a9a5a5be2262b1a2cb159d3e6ba7ca66f6d488a78e89036c/ThatXliner/rust-but-lisp
rlisp is a LISP frontend for Rust that compiles directly to Rust code. It uses s-expressions for syntax and compiles to native Rust with no runtime or GC.

Casio S100X Japanese Lacquer Edition (JP Page Only)

You don't have permission to access "http://www.casio.com/jp/basic-calculators/premium/en-s100x-jc1-u/" on this server.

I'm writing a history of Visual Basic, Chapter 1 is up

https://evilgeniuslabs.ca/uploads/content/2026/05/6fd5a7b3274b436fbae1139adefcda97.png
The author is writing a history of Visual Basic on EvilGeniusLabs.ca, focusing on the people and lineage behind the language, rather than just its technical aspects or Microsoft management. The series will cover the development of Visual Basic from its roots in Dartmouth BASIC to its release in 1991, with a focus on lesser-known individuals who contributed to the project.

Local privilege escalation via execve()

FreeBSD-SA-26:13.exec is a security advisory that fixes a local privilege escalation via execve() in all supported versions of FreeBSD. The issue is corrected in stable/15, 14.4-STABLE, and 13.5-STABLE branches.

Zed Editor Theme-Builder

https://zed.dev/_next/image?url=%2Fimg%2Ftheme-builder-dark.jpg&w=3840&q=75
Access Zed's theme builder from the desktop and browse available theme extensions. The MeetingScheduler component helps schedule meetings about scheduling meetings.

Show HN: I made a Clojure-like language in Go, boots in 7ms

https://raw.githubusercontent.com/nooga/let-go/main/meta/logo.png
let-go is a Clojure-family language compiler and VM for Go that produces a single ~10MB binary with ~7ms cold start. It supports standalone executables, WASM web apps, and embeds cleanly as a scripting layer for Go programs.

The first microcomputer: The transfluxor-powered Arma Micro Computer from 1962

https://static.righto.com/images/arma-microcomputer/arma_1-w500.png
The Arma Micro Computer is a compact 20-pound transistorized computer designed for space applications in 1962. It used 22-bit serial architecture and had a small instruction set of 19 instructions.

Making your own programming language is easier than you think (but also harder)

https://lisyarus.github.io/blog/media/making-your-own-programming-language/cover.png
The user is creating a custom programming language called pslang for modding their game, aiming for a low-level, imperative language with a static type system and seamless C interop. The language has a unique syntax, including indentation-based scoping, built-in arrays, and a focus on simplicity and ergonomics, with the goal of making it easy to use for modders.

CPanel's Black Week: 3 New Vulnerabilities Patched After Attack on 44k Servers

https://www.copahost.com/blog/wp-content/uploads/2026/05/9d592da9-48e6-4f09-b972-a73a543c754a.png
cPanel released a second emergency security patch on May 8, 2026, covering three new vulnerabilities: CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. Two of the three vulnerabilities have a CVSS score of 8.8, indicating High severity.

The Serial TTL connector we deserve

https://kohlschuetter.github.io/blog/assets/posts/2026/05/07/serial-ttl-connector/before.jpg
The user proposes using Julet connectors for a more reliable and safe connection to embedded devices' UART TTL pins, instead of using USB-Serial TTL adapters or exposed Dupont wires. Julet connectors come in various sizes and pin counts, and can be easily crimped and connected to create a robust and foolproof setup for serial TTL communication.

Distributing Mac software is increasing my cortisol levels

https://blog.kronis.dev/user/pages/blog/apple-is-increasing-my-cortisol-levels/01-quarantine.jpg
The author is creating a Go utility to manage Claude Code profiles but is frustrated with Apple's developer program requirements, including a yearly subscription and ID verification process that doesn't work well with their MacBook's webcam.

Sparse Cholesky Elimination Tree

https://www.reidatcheson.com/assets/etree/matrix_fill_diagram.svg
Here I derive the elimination tree for the (right-looking) sparse Cholesky algorithm for computing A = LL^T for lower triangular L and sparse matrices A. This tree forms the foundation for most sparse factorization software, even when the underlying assumptions of Cholesky (symmetric and definite) do not apply. Ultimately this tree tells us two things: 1. where nonzeros appear in the matrix L ...

Surfel-based global illumination on the web

https://juretriglav.si/assets/surfel-webgpu-gi/leonardo-da-vinci-treatise-on-painting.png
The author explores the concept of surfels, a technique for rendering global illumination in real-time, and its application in a WebGPU-based pipeline, including surfelization, grid acceleration, and ray tracing. The pipeline is optimized with techniques such as guided sampling, multi-scale mean estimator, and temporal filtering to achieve a stable and noiseless image, but still faces ...

LLMs corrupt your documents when you delegate

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Large Language Models (LLMs) degrade documents during long workflows, corrupting 25% of content on average. Current LLMs are unreliable delegates, introducing severe errors that silently corrupt documents over time.

A recent experience with ChatGPT 5.5 Pro

A mathematician used ChatGPT 5.5 Pro to improve the upper bound on a problem in additive number theory from exponential to polynomial in time, with the AI producing a result that was almost certainly correct according to a human expert. The mathematician suggests that the era of human mathematicians solving problems independently may be coming to an end, and that the future of mathematics ...

Production engineering when trading billions of dollars a day [video]

EU Parliamentary Research Service calls VPNs "a loophole that needs closing"

https://cyberinsider.com/wp-content/uploads/2026/05/73592.jpg
European regulators warn that VPNs are being used to bypass online age-verification systems, describing it as a loophole that needs closing. Regulators are considering measures to restrict VPN access to adults only, but this could weaken anonymity protections and create new surveillance risks.

The hypocrisy of cyberlibertarianism

https://matduggan.com/content/images/2026/05/image.png
The user reflects on the early days of the internet and how the ideology of cyberlibertarianism, which emphasized individual freedom and deregulation, led to the creation of a platform that prioritizes profit over people and has devastating consequences. The user argues that it's time to face the facts that this ideology has failed and that we need to evolve and find a new ethical code to ...

Meta's embrace of A.I. is making its employees miserable

Meta plans to track US employees' computer activity to train AI models, sparking employee backlash and concerns over privacy. Employees have no option to opt out of the tracking on corporate laptops.

I caught the car

The author secured a promotion to Senior Software Engineer after two and a half years, but realized the title didn't bring the expected satisfaction. They now prioritize meaningful work, collaboration, and personal growth over external validation.

Using Claude Code: The unreasonable effectiveness of HTML

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

France moves to break encrypted messaging

https://reclaimthenet.org/wp-content/uploads/2026/01/apWThHm7W0xe.png
France's intelligence delegation recommends breaking WhatsApp, Signal, and Telegram encryption for targeted access to messages. This move is opposed by some lawmakers who fear it could lead to mass surveillance and create vulnerabilities.

The Trail of Jeremiah

https://theamericanscholar.org/wp-content/uploads/2026/02/Gessner-FULL-719x1024.jpg
EXT. WASATCH MOUNTAINS—AFTERNOON THREE MEN stand huddled together in deep snow, beneath a great wall of mountains. Blue sky overhead, mountains a blinding white. The men are discussing something we can’t hear. One of the men wears a beard and a long fur coat, almost like a pelt, a costume from another time. The two other men walk over to a HELICOPTER and climb in. The bearded man stays ...

Mythical Man Month

https://martinfowler.com/mf.jpg
Fred Brooks managed IBM's System/360 in the 1960s and wrote influential book The Mythical Man-Month in 1975. The book emphasizes conceptual integrity in system design, simplicity, and straightforwardness to avoid communication issues and ensure effective work.

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/car.png
The user strongly advises against using WebRTC for voice AI due to its limitations and trade-offs, such as introducing artificial latency and aggressively dropping packets. The user suggests using QUIC instead, which offers better performance and scalability, and provides a detailed explanation of how QUIC can be used for load balancing and connection management.

Getting arrested in Japan

https://images.squarespace-cdn.com/content/v1/605f04a61395e21d304e636a/068a1a20-0ae4-4cc6-8a76-6bb660ac0e41/Murder+Mile.jpeg
Japan's detention system is strict and designed to wear people down mentally and physically, with rules controlling even the smallest details of daily life, and innocent people can be locked inside for weeks or months while proof of their innocence slowly moves through the system. The system is flawed, and people who are arrested can face prolonged isolation, intense interrogation, and poor ...