1.Filing the corners off my MacBooks(kentwalters.com)
859 points by normanvalentine 1 day ago | 423 comments
tl;dr: The author files down the sharp aluminum edges of their MacBook, particularly around the notch and bottom edge, to improve wrist comfort. They document the process using progressively finer files and sandpaper (150-400 grit) while protecting internal components with tape, completing the work incrementally to avoid damage. They encourage others to customize their tools and aren't concerned about the practice affecting machine durability.
HN Discussion:
  • Sharp edges cause physical harm and filing is a practical solution
  • MacBooks have design flaws making them unsuitable for daily use
  • Modifying tools to fit personal needs is valid despite controversy
  • Safer alternatives exist like padding or gloves instead of filing
  • Sharp edges are desirable feature; filing removes appealing sensory quality
2.1D Chess(rowan441.github.io)
834 points by burnt-resistor 1 day ago | 144 comments
tl;dr: 1D Chess is a simplified chess variant with only kings, knights, and rooks on a single dimension. White has a forced winning strategy demonstrated by the sequence N4 N5, N6 K7, R4 K6, R2 K7, R5++. The variant, originally described by Martin Gardner in 1980, retains standard chess rules including checkmate, stalemate, and draw conditions despite the reduced complexity.
HN Discussion:
  • 1D chess is intellectually interesting and worth exploring variations of board sizes and rules
  • 1D variants of classic games reveal interesting mathematical and computational properties worth studying
  • Successfully solving 1D chess provides satisfying intellectual achievement and mastery
  • 1D chess is difficult to understand even with hints and chess notation knowledge required
  • 1D constraints on game mechanics parallel philosophical observations about dimensional limitations and perception
3.Installing every* Firefox extension(jack.cab)
418 points by RohanAdwankar 1 day ago | 57 comments
tl;dr: A developer scraped and installed all 84,235 Firefox extensions (49.3 GB total) by exploiting the AMO API's lack of rate limiting and pagination limits. Analysis revealed widespread PUA schemes (700k+ users in "Custom Web Search" bundles), phishing attacks, AI-generated SEO spam, and that 34% of extensions have zero daily users. Installing all extensions simultaneously rendered Firefox unusable—about:addons took 6 hours to load and regular websites never loaded.
HN Discussion:
  • The experiment exposed real Firefox performance bugs worth investigating further
  • ~Installing many extensions mirrors old browser toolbar bloat problems from Internet Explorer era
  • The article is entertaining and well-written despite describing chaotic experiment results
  • Extension system design has scalability issues with JSON serialization debouncing strategy
  • Similar experiments exist across browser extension ecosystems showing platform-wide design challenges
4.Artemis II safely splashes down(cbsnews.com)
923 points by areoform 1 day ago | 287 comments
tl;dr: NASA's Artemis II crew successfully splashed down in the Pacific Ocean off San Diego on April 10, 2026, after a 10-day lunar mission. All four astronauts were recovered in good condition and airlifted to the USS John P. Murtha. The mission set records for farthest human distance from Earth (252,756 miles) and achieved a flawless reentry with parachute deployment.
HN Discussion:
  • Mission success despite genuine risks; acknowledging 1-in-30 crew mortality rate.
  • ~Nostalgia for America's past scientific leadership and sense of national wonder.
  • Appreciation for mathematical and scientific achievement enabling complex spaceflight.
  • Mission is less ambitious than Apollo 50 years ago; public attention reflects this.
  • Inspiration and awe at humanity's capacity for curiosity and exploration.
5.Chimpanzees in Uganda locked in eight-year 'civil war', say researchers(bbc.com)
339 points by neversaydie 1 day ago | 198 comments
tl;dr: A stable community of ~200 chimpanzees in Uganda split into two hostile groups in 2018, resulting in 24 killings over eight years—likely triggered by deaths of key social connectors and a change in alpha male leadership in 2015-2017. The researchers argue this demonstrates that group-based conflict can emerge from relational dynamics alone, without requiring human constructs like religion or ideology, suggesting these factors may be underestimated in understanding human warfare.
HN Discussion:
  • Coalitionary killing is an evolved trait selected for in primate ancestry
  • ~Violence stems from state structures and resource scarcity, not inherent nature
  • Respiratory epidemic triggered social destabilization leading to conflict
  • Intergroup conflict in chimps is well-documented and unsurprising behavior
  • Chimp social and political dynamics mirror human behavior patterns closely
6.AI assistance when contributing to the Linux kernel(github.com)
337 points by hmokiguess 1 day ago | 246 comments
tl;dr: The Linux kernel now provides guidance for AI-assisted contributions: all code must be GPL-2.0-only compatible, humans alone can sign off via DCO, and AI tools must be properly attributed using an "Assisted-by" tag listing the AI model and any specialized analysis tools used. Developers remain fully responsible for reviewing AI-generated code and ensuring legal compliance before submission.
HN Discussion:
  • Policy appropriately assigns responsibility to human submitters with clear accountability.
  • Policy cannot guarantee GPL compliance given AI training on unlicensed diverse sources.
  • Liability shield doesn't address practical problem of reviewers approving poorly understood code.
  • Policy creates false immunity; Linux remains liable for foreseeable infringement consequences.
  • Human responsibility requirement is sensible; only humans can be held accountable for code.
7.WireGuard makes new Windows release following Microsoft signing resolution(lists.zx2c4.com)
481 points by zx2c4 1 day ago | 142 comments
tl;dr: WireGuard released updated Windows client and kernel driver (WireGuardNT v0.11 and WireGuard for Windows v0.6) after resolving a Microsoft code-signing account suspension. The update includes bug fixes, performance improvements, and cleaner codebase from dropping legacy Windows compatibility, plus new features like selective allowed IP removal. Microsoft quickly resolved the account block after public attention, enabling the release to proceed normally.
HN Discussion:
  • ~Public pressure was necessary to resolve Microsoft's account suspension issue quickly
  • Large companies should be accountable to individual users despite operating at scale
  • Dropping legacy Windows support reduces maintenance burden and technical debt
  • Normal support channels likely wouldn't have resolved this; public visibility was critical
  • Microsoft's widespread account locks suggest systemic process failure, not targeted conspiracy
8.Industrial design files for Keychron keyboards and mice(github.com)
379 points by stingraycharles 1 day ago | 119 comments
tl;dr: Keychron released production CAD files for 88 keyboard and mouse models (686+ files) under a source-available license enabling personal, educational, and compatible accessory use. The repository supports studying industrial design, remixing cases/plates, and building community mods, while prohibiting direct copying or trademark misuse. Files include STEP, DWG, and DXF formats across multiple keyboard series (Q, K, V, P, L) and mice, with documentation and contribution guidelines.
HN Discussion:
  • Keychron keyboards are reliable, high-quality products that justify long-term ownership and loyalty.
  • Open-sourcing design files enables community customization like 3D printing custom cases and modifications.
  • Lack of physical retail keyboard testing locations forces consumers to rely on samplers and returns.
  • ~Non-commercial open-source licenses create ambiguous legal restrictions for derivative works and commercial use.
  • Keychron offers excellent value as an accessible entry point for quality mechanical keyboards.
9.CPU-Z and HWMonitor compromised(theregister.com)
337 points by pashadee 1 day ago | 92 comments
tl;dr: CPUID's backend was compromised for ~6 hours (April 9-10), causing their website to serve malicious installers for CPU-Z and HWMonitor instead of legitimate downloads. The malware targeted 64-bit systems with a fake DLL that established C2 connections, executed in-memory PowerShell payloads, and attempted to steal browser credentials. Original signed files weren't affected—only the download delivery mechanism was compromised.
HN Discussion:
  • False positives from antivirus undermine security awareness and user trust
  • Attack sophistication is escalating toward compromising legitimate distribution infrastructure
  • Using package managers like winget provides signature verification protection against compromised downloads
  • Multiple CPUID products compromised suggests broader infrastructure breach, not isolated incident
  • Early adopters of new software releases bear disproportionate risk from supply chain attacks
10.JSON formatter Chrome plugin now closed and injecting adware(github.com)
224 points by jkl5xx 1 day ago | 111 comments
tl;dr: A popular JSON formatter Chrome extension is transitioning from open source to a closed-source commercial model with premium features. The developer is maintaining JSON Formatter Classic as a free, open-source alternative for users who prefer local-only functionality without updates. The archived repository documents the original extension's features including syntax highlighting, dark mode, and performance optimizations for viewing API responses.
HN Discussion:
  • Betrayal of trust despite developer's prior public commitment to privacy
  • Software update model creates inherent tension between security and user autonomy
  • Chrome Web Store inadequately reviews and polices malicious extension behavior
  • Simple alternatives can be quickly built, reducing lock-in risk from compromised extensions
  • Pattern of established extensions turning malicious suggests systemic monetization pressure
11.Helium is hard to replace(construction-physics.com)
318 points by JumpCrisscross 1 day ago | 222 comments
tl;dr: Helium supply disruptions from Middle East conflicts threaten critical industries because the element is nearly irreplaceable for cooling MRI machines, semiconductor manufacturing, fiber optics, and aerospace applications. While helium is abundant in the universe, Earth's supply comes exclusively from underground natural gas deposits in a handful of countries—primarily Qatar and the US—making substitutes impractical for most high-tech uses despite recycling potential.
HN Discussion:
  • Helium shortage is economic/engineering problem solvable with investment, not physics limitation
  • Semiconductor industry's increasing helium demand per wafer is unsustainable growth problem
  • ~Significant helium consumption reduction possible through alternative materials and processes
  • Helium loss to space is irreversible; waste warnings from decades ago remain unheeded
  • Supply chain disruption will cause severe long-term economic consequences underestimated by public
12.A compelling title that is cryptic enough to get you to take action on it(ericwbailey.website)
239 points by mooreds 1 day ago | 127 comments
tl;dr: Summary not available
HN Discussion:
  • AI-generated content undermines authentic online discourse quality
  • Clickbait titles with vague promises manipulate reader behavior effectively
  • Bad faith arguments exploit selective quoting to misrepresent article content
  • Thoughtful critique acknowledging valid concerns receives community agreement and upvotes
  • Sensationalized commentary relies on empty platitudes rather than substantive analysis
13.You can't trust macOS Privacy and Security settings(eclecticlight.co)
462 points by zdw 1 day ago | 158 comments
tl;dr: macOS Privacy & Security settings don't accurately reflect actual app access to protected folders like Documents. An app can retain full access to a folder even when the settings show it as blocked, if the user previously granted access via an Open/Save dialog. Resetting this requires a Terminal command and restart, potentially trapping users into unintended persistent permissions.
HN Discussion:
  • Privacy controls are fundamentally broken; apps retain access despite UI showing revocation
  • ~Issue is UI bug masking working permissions rather than actual security failure
  • Third-party apps ignore sandbox permissions while native apps respect them properly
  • macOS sandbox model creates permission fatigue and is overly complex for power users
  • Described behavior aligns with expected folder access permissions; not inherently problematic
14.France to ditch Windows for Linux to reduce reliance on US tech(techcrunch.com)
515 points by Teever 1 day ago | 643 comments
tl;dr: France is migrating government computers from Windows to Linux to reduce dependence on U.S. technology and regain control of its digital infrastructure. The transition will begin at the government's digital agency (DINUM) with no specific timeline provided. This move reflects broader European concerns about over-reliance on American tech amid geopolitical tensions, following France's earlier shift away from Microsoft Teams to a French alternative.
HN Discussion:
  • Linux desktop has matured significantly and is now practical for mainstream users
  • Windows is outdated; governments should switch to Linux for better platforms
  • Article headline overstates actual scope; only one agency and a future plan involved
  • ~Microsoft maintains dependency through cloud services and productivity suites beyond OS
  • Europe needs viable mobile OS alternatives to achieve true tech independence
15.Sam Altman's response to Molotov cocktail incident(blog.samaltman.com)
306 points by jack_hanford 1 day ago | 651 comments
tl;dr: Sam Altman's house was attacked with a Molotov cocktail, which he attributes partly to inflammatory rhetoric about him amid AI anxiety. He outlines his core beliefs on AI democratization, safety, and the need for democratic oversight rather than corporate control, while acknowledging past leadership mistakes. He frames industry conflict as stemming from competition over AGI control and calls for de-escalating rhetoric while advancing AI broadly.
HN Discussion:
  • Violence against anyone is unjustifiable regardless of disagreements with their views or leadership
  • ~Sam Altman misuses the incident to deflect criticism and blame investigative reporting for inspiring violence
  • Society's use of force and oppression makes peaceful protest ineffective, justifying extreme responses
  • HN community has deteriorated by justifying or minimizing violence while claiming moral high ground
  • Sam Altman uses apocalyptic rhetoric and victim positioning as strategic communication regardless of circumstances
16.Team from ETH Zurich make high quality quantum swap gate using a geometric phase(ethz.ch)
226 points by joko42 2 days ago | 49 comments
tl;dr: ETH Zurich researchers demonstrated high-fidelity swap gates for neutral atom quantum computers using geometric phases instead of tunneling effects, achieving 99.91% precision across 17,000 qubit pairs simultaneously. This approach is far more robust against laser intensity fluctuations and experimental noise than previous methods. The work advances neutral atoms as a scalable platform for quantum computing, though additional components like quantum gas microscopes are needed for practical systems.
HN Discussion:
  • Title is misleading; experiment demonstrates robust gate scheme but lacks individual control and programmability.
  • Quantum computing hype cycle is repetitive; progress is incremental despite optimistic framing.
  • ~High fidelity (99%) is scientifically useful but insufficient for practical, general-purpose quantum computers.
  • Media outlets use exaggerated titles similar to AI companies' marketing practices.
  • Skepticism about practical quantum computing applications versus theoretical capabilities.
17.We've raised $17M to build what comes after Git(blog.gitbutler.com)
315 points by ellieh 2 days ago | 692 comments
tl;dr: GitButler, founded by GitHub co-creator Scott Chacon, raised $17M Series A to redesign version control beyond Git. The team argues Git's 20-year-old model—designed for linear, single-developer workflows and email patches—fails modern development with AI agents and distributed teams. Their CLI tool enables stacked branches, real-time conflict detection, and better team collaboration while remaining compatible with existing Git projects.
HN Discussion:
  • Git already solves the stated problems; the pitch oversells the need for replacement.
  • VC-backed infrastructure tools risk user exploitation and lock-in despite open-source claims.
  • AI-driven development fundamentally changes version control needs, making new tools necessary.
  • ~Alternative VCS models like Jujutsu better suit modern workflows than Git's commit paradigm.
  • Commercial tools replacing critical open-source infrastructure creates sustainability and vendor risk issues.
18.FBI used iPhone notification data to retrieve deleted Signal messages(9to5mac.com)
588 points by 01-_- 1 day ago | 291 comments
tl;dr: The FBI recovered deleted Signal messages from an iPhone by accessing Apple's internal notification storage database, even after the app was uninstalled. The defendant had notification previews enabled, allowing message content to be cached locally. The exact extraction method remains unclear, but likely involved exploiting iOS vulnerabilities or device backups; Apple recently changed push notification token validation in iOS 16.4.
HN Discussion:
  • Signal's default settings expose messages; users must manually enable privacy protections.
  • Apple should delete notification data when apps are deleted instead of retaining it indefinitely.
  • Real-world court cases reveal actual security vulnerabilities better than theoretical discussions.
  • Most users don't change defaults; Apple knows this and maintains insecure defaults deliberately.
  • End-to-end encryption on proprietary closed systems cannot be truly verified or trusted.
19.Molotov cocktail is hurled at home of Sam Altman(nytimes.com)
230 points by enraged_camel 1 day ago | 549 comments
tl;dr: Summary not available
HN Discussion:
  • Violence and threats are increasing; society's civil discourse temperature is rising dangerously.
  • AI deployment causing job losses and economic disruption will inevitably provoke violent backlash.
  • ~Society needs thoughtful conversation about AI integration rather than rushing forward recklessly.
  • Public anger against AI and tech leaders is widespread but underreported in mainstream media.
  • Attack details suggest incompetence or theater rather than genuine assassination attempt.
20.How NASA built Artemis II’s fault-tolerant computer(cacm.acm.org)
614 points by speckx 2 days ago | 222 comments
tl;dr: Summary not available
HN Discussion:
  • Modern software engineering has lost discipline in deterministic system design needed for critical systems.
  • Desire for deeper technical details about hardware, software, and actual failure telemetry from the system.
  • Skepticism about the technical approach, particularly the consensus mechanism and networking implementation.
  • Interest in comparing classical hardware redundancy approaches with modern fault tolerance implementations.
  • NASA receives undeserved credit when contractors and subcontractors performed the actual engineering work.