A new C++ back end for ocamlc

https://opengraph.githubassets.com/4952a59bb085591aea6dbb8bce7e06140b74b5f7e1ed1bc636f362ebd587e15b/ocaml/ocaml/pull/14701
The suggestion cannot be applied due to various reasons including no code changes, viewing a subset of changes, and pull request status. It cannot be added to a batch for a single commit.

NASA’s Artemis II Crew Launches to the Moon

https://plus.nasa.gov/wp-content/uploads/2026/03/victor.png?w=1024
Artemis II is NASA's first crewed mission under the Artemis program, launching from Kennedy Space Center in Florida. It will test the Orion spacecraft's life support systems and lay groundwork for future crewed missions.

DRAM pricing is killing the hobbyist SBC market

https://www.jeffgeerling.com/blog/2026/dram-pricing-is-killing-the-hobbyist-sbc-market/raspberry-pi-price-increase-since-launch.jpg
Raspberry Pi increased prices for LPDDR4 RAM Pis, making high-end SBCs unaffordable for hobbyists. The hobbyist SBC market is dying due to high DRAM prices, with vendors like Radxa being the only exception.

EmDash – A spiritual successor to WordPress that solves plugin security

https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5VnjnsSUePsv89JB4JiwI/1d69cc5560e220b4e9445aa21b939d83/EmDash-big.png
Cloudflare's EmDash is a new, open-source CMS built on Astro, aiming to replace WordPress with a more secure, serverless, and AI-friendly platform. EmDash offers improved security, scalability, and ease of use, with features like plugin sandboxing, dynamic workers, and AI-driven content management.

Obfuscation is not security – AI can deobfuscate any minified JavaScript code

https://www.afterpack.dev/blog/claude-code-source-leak/cover.png
The AfterPack Blog The internet is on fire over Claude Code's (NPM CLI to be precise) "leaked" source. 512,000 lines! Feature flags! System prompts! Unreleased features! VentureBeat, Fortune, Gizmodo, The Register, Hacker News β€” everyone covered it. A clean-room Rust rewrite (to dodge the DMCA) hit 100K GitHub stars in nearly a day β€” a world record. 110K now and counting. ...

Signing data structures the wrong way

Snowpack is a system that uses random, immutable 64-bit domain separators in the IDL to prevent domain separation bugs in cryptographic data. It ensures canonical encodings and guarantees that the sender and receiver agree on the type of data, making it a simple and effective solution for serialization of inputs to cryptographic functions.

Show HN: Git bayesect – Bayesian Git bisection for non-deterministic bugs

https://opengraph.githubassets.com/5d8f356b7ecef93e75eb578fa9a59d990c25b37a3ac013f950f0145649ffc14b/hauntsaninja/git_bayesect
git_bayesect uses Bayesian inference to identify commits introducing changes, with greedy minimisation of expected entropy and Beta-Bernoulli conjugacy. It sets priors based on commit messages and diffs to handle unknown failure rates.

Fast and Gorgeous Erosion Filter

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeWotRn8KxGEbVTCIl1-znAH0ZDNSwFUf7hkp9GrJ4u5jfK8zS8-sA1SHtWyBaHSLx3Lskzcr0z_XzW9y4847lBQo8e_1TIHa49EQXT1XFbv0lui_ZKX-hNlpDChD3Wq3Rz9n4HcB3MwEosYU5Xi_IOTzADWDd18u4joJcgUOF94ZN-HNhLdZ_8tvnBpM/s1600/ErodedTerrain.png
The user explains an erosion technique for generating virtual landscapes, which involves using a special kind of noise to produce branching gullies and ridges while allowing fast and GPU-friendly evaluation. The technique has been developed and refined over time, with various approaches and tweaks to address issues such as chaotic distortions, inconsistent gully magnitudes, and non-straight gullies.

AI for American-produced cement and concrete

https://engineering.fb.com/wp-content/uploads/2026/03/Meta-AI-for-American-Concrete-HERO.jpg
Meta is releasing an AI model for designing concrete mixes, Bayesian Optimization for Concrete (BOxCrete), to help US producers use domestic materials. The model improves mix design speed and sustainability, reducing US reliance on imported cement.

Ask HN: Who is hiring? (April 2026)

Here are the job postings summarized in 2 concise English sentences each, not exceeding 200 characters:

The revenge of the data scientist

https://hamel.dev/blog/posts/revenge/images/slide_1.png
The data scientist role is not over, but its work has shifted from model training to experiment setup, debugging, and metric design. Data scientists still play a crucial role in evaluating AI systems and driving application-specific metrics.

InspectMind AI (YC W24) Is Hiring

https://bookface-images.s3.amazonaws.com/small_logos/380201f9cadb6a3d51cb0328080b2378d425269f.png
InspectMind AI is building an AI Plan Checker to review construction plans and find issues before building. The company is seeking a software engineer to improve accuracy and ship features quickly using AI coding agents.

Show HN: Flight-Viz – 10K flights on a 3D globe in 3.5MB of Rust+WASM

Loading Flight Viz...

Show HN: Dull – Instagram Without Reels, YouTube Without Shorts (iOS)

A browser strips out social media features designed to keep you scrolling, offering content filters, time limits, and more on-device. It's a tool that puts you in charge of what you see, without accounts, servers, or wellness features.

Swappa.com for GrapheneOS compatible devices – Stay Away

https://discuss.grapheneos.org/opengraph.png
Something went wrong while trying to load the full version of this site. Try hard-refreshing this page to fix the error.

Scientists crack a 20-year nuclear mystery behind the creation of gold

https://www.sciencedaily.com/images/1920/nuclear-physics-atomic-element.webp
Scientists at the University of Tennessee have made three key discoveries about how unstable atomic nuclei decay during the rapid neutron-capture process that creates heavy elements like gold. Their findings could improve models of stellar events and predict the behavior of exotic atomic nuclei.

Jax's true calling: Ray-Marching renderers on WebGL

User is using JAX for GPU accelerated graphics rendering with Signed Distance Functions (SDF) and auto-vectorization. They're exploring its potential for higher-level DSLs and geometric algebra.

StepFun 3.5 Flash is #1 cost-effective model for OpenClaw tasks (300 battles)

https://app.uniclaw.ai/logo.png
A public benchmark for evaluating whether AI agents can complete real workflows. Compare model performance and cost-effectiveness on real agent tasks.

SpaceX files to go public

Please enable JS and disable any ad blocker

How-to guide: Commissioning a Sensor Physics R&D Lab

Set the Line Before It's Crossed

https://substackcdn.com/image/fetch/$s_!_ADw!,w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8f1c97-b5c0-4217-a7b3-9e38c0fb5901_1024x1024.png
By subscribing, you agree Substack's Terms of Use, and acknowledge its Information Collection Notice and Privacy Policy. Soft: These are okay to cross, but not preferable. There may or may not be a tangible action taken afterwards, but the person whose line was crossed should take note. Firm: These are somewhere between soft and hard lines and should result in some tangible action being ...

Windows 95 defenses against installers that overwrite a file with an older one

https://devblogs.microsoft.com/oldnewthing/wp-content/uploads/sites/38/2019/02/ShowCover.jpg
Windows 95 had a backup directory to prevent installers from overwriting system files. It checked for mistakes after installers finished and restored the original files if necessary.

Claude wrote a full FreeBSD remote kernel RCE with root shell

https://opengraph.githubassets.com/179eece63a9eb5f106dd5ffeb676e7ccfe60dfa24304e3385bc8001a8b462d22/califio/publications
FreeBSD 13.5 and later versions have a vulnerability in the RPCSEC_GSS module, allowing a remote kernel code execution attack via NFS. The vulnerability is due to a buffer overflow in the svc_rpc_gss_validate function.

Show HN: Zerobox – Sandbox any command with file, network, credential controls

https://raw.githubusercontent.com/afshinm/zerobox/refs/heads/main/packages/zerobox/assets/sandbox-flow.png
Zerobox is a tool for credential injection and sandboxing processes, allowing secrets to be passed to specific hosts without being visible to the process. It provides features like environment variable inheritance, network proxying, and restricted access to user data and system libraries.

Ask HN: Who wants to be hired? (April 2026)

Multiple individuals are sharing their professional profiles and seeking work opportunities in various fields, including software engineering, game development, data engineering, and design, with a focus on remote or flexible work arrangements. They have diverse skill sets and experiences, with some having worked on high-profile projects, and are looking for full-time, freelance, or ...

Random numbers, Persian code: A mysterious signal transfixes radio sleuths

https://gdb.rferl.org/c3f893f9-d529-4d26-f91e-08de3c642a37_w250_r1.jpg
A mysterious Persian-language numbers station started broadcasting on February 28, about 12 hours after US and Israel began bombing Iran. The signal was jammed on March 4, leading to speculation about its origin and purpose.

An Introduction to Writing Systems and Unicode

https://r12a.github.io/scripts/tutorial/images/early-char-sets.png
The Unicode Standard provides a superset of most character sets in use around the world, allowing for over one million code point slots and enabling simultaneous representation of various scripts and languages. Character encoding, such as UTF-8, UTF-16, and UTF-32, maps abstract characters to numbers for manipulation in a computer, and proper handling of character boundaries is crucial for ...

Intuiting Pratt Parsing

https://louis.co.nz/assets/img/pratt/ast.png
Pratt parsing is a method for parsing expressions with varying precedence by walking back up the spine of the tree when a transition operator appears and building a left-leaning subtree. The Pratt parser uses a recursive descent parser with a call stack to build the tree, and it handles left-associative and right-associative operators by adjusting their left and right binding powers.

ZomboCom stolen by a hacker, sold, now replaced with AI-generated makeover

If you're running a script or application, please register or sign in with your developer credentials here. Additionally make sure your User-Agent is not empty and is something unique and descriptive and try again. if you're supplying an alternate User-Agent string, try changing back to default as that can sometimes result in a block. If you think that we've incorrectly blocked ...

Ada and Spark on ARM Cortex-M – A Tutorial with Arduino and Nucleo Examples

http://inspirel.com/articles/images/ada_on_cortex_cover_medium.jpg
This tutorial was written for all those who are interested in programming embedded systems and who would like to explore the idea of using Ada and SPARK in systems based on ARM Cortex-M microcontrollers.