0. F-15E jet shot down over Iran (theguardian.com)
605 points · 1384 comments · by tjwds
The Pentagon has confirmed that a U.S. F-15E Strike Eagle fighter jet was shot down over Iranian territory, with debris from the aircraft appearing in verified footage. [src]
The loss of an F-15E and an A-10 over Iran has sparked debate over the effectiveness of U.S. air superiority, with some arguing that these losses are alarming given Iran's degraded defenses compared to historical precedents like the Gulf War [0][1]. While some commenters view the low number of losses after weeks of bombing as a sign of success [8], others point to the lack of "backdoor" access to Iranian systems and the destruction of billion-dollar radar assets as evidence of a much more capable and resilient adversary [3][5][7]. There is also significant concern regarding the vulnerability of search-and-rescue operations and the potential for American hostages to complicate the conflict further [1][2].
1. Tell HN: Anthropic no longer allowing Claude Code subscriptions to use OpenClaw
1075 points · 821 comments · by firloop
Anthropic will stop allowing Claude subscribers to use their monthly limits for third-party harnesses like OpenClaw starting April 4, requiring a separate pay-as-you-go billing option to manage system demand. [src]
Anthropic’s decision to ban OpenClaw stems from a conflict between "unlimited" subscription models and autonomous agents that maximize token usage far beyond typical human patterns [0][2]. While some argue this is a necessary move to prevent power users from subsidizing their high costs at the expense of others, critics suggest it is a strategic attempt to lock users into Anthropic’s own tools by restricting third-party harnesses [1][3][8]. The change has prompted some users to consider downgrading to cheaper API-based models or local LLMs to avoid inconsistent rate limits and the high costs of premium tiers [4][6][9].
2. Artemis II crew take “spectacular” image of Earth (bbc.com)
1060 points · 378 comments · by andsoitis
The Artemis II crew captured a high-resolution image of Earth from the Orion spacecraft during their mission to orbit the Moon. [src]
Technical analysis of the image's EXIF data reveals it was captured using a Nikon D5 at ISO 51200 with a 1/4 second shutter speed, leading to discussions about the impressive lack of motion blur and the high level of sensor noise [0][4][5]. Users noted that the photo uniquely depicts a moonlit nightside Earth, which mimics dayside colors but allows for the visibility of stars and planets like Venus due to the long exposure [1][7]. While some debated the extent of post-processing in Lightroom compared to the raw NASA assets, others jokingly anticipated flat-earth conspiracies or lightheartedly complained about being photographed without a model release [2][3][6][9].
3. Show HN: I built a frontpage for personal blogs (text.blogosphere.app)
769 points · 193 comments · by ramkarthikk
Blogosphere is a new platform designed to support the indie web by aggregating and highlighting recent posts from personal blogs across various categories in both minimal and standard formats. [src]
The rise of AI-generated content and declining search quality has sparked a "regression" toward hand-curated blog aggregators and webrings reminiscent of the early internet [0][6]. While some users appreciate these indie discovery tools, others argue that centralized aggregators lack long-term sustainability and quality control, suggesting instead that bloggers should host "social graphs" of links to peers they personally trust [1][7][8]. There is a notable divide regarding community interaction: some miss the connection of blog comments, while others prefer their absence to avoid the "wasteland" of spam and toxicity [3][5][6].
4. Show HN: Apfel – The free AI already on your Mac (apfel.franzai.com)
728 points · 150 comments · by franze
Apfel is a free, open-source application that allows Mac users to access and run AI models locally on their devices. [src]
The discussion highlights a strong preference for local AI models due to increasing privacy concerns and the risks of sharing context with cloud providers [0][4]. However, some users warn that local servers can introduce security vulnerabilities, such as allowing malicious JavaScript from random webpages to issue commands via local ports [1][9]. While the project's landing page was criticized for being overly "marketing heavy," the underlying technology is praised for effectively leveraging Apple's surprisingly capable built-in models [2][7].
5. Marc Andreessen is wrong about introspection (joanwestenberg.com)
392 points · 471 comments · by surprisetalk
Joan Westenberg critiques Marc Andreessen’s claim that introspection was "manufactured" in the 20th century, arguing that self-examination is a foundational historical practice essential for understanding human flourishing and guiding meaningful progress. [src]
The discussion centers on the perceived intellectual decline of wealthy tech figures like Marc Andreessen and Elon Musk, with many arguing that financial success has been conflated with universal expertise [1][2][3]. Commentators suggest this "mental rot" stems from social media influence and a recursive belief that wealth validates all personal opinions, insulating the elite from necessary correction [0][2][4]. While some debate whether these figures have actually changed or simply lost their "natural filters," others warn that dismissing the wealthy entirely is a form of anti-intellectualism that ignores the practical costs and realities of decision-making [5][7][8].
6. Oracle files H-1B visa petitions amid mass layoffs (nationaltoday.com)
514 points · 314 comments · by kklisura
Oracle has filed over 3,100 H-1B visa petitions for fiscal years 2025 and 2026 while simultaneously laying off thousands of American workers as part of a major organizational shift. [src]
The discussion centers on whether Oracle’s H-1B petitions during layoffs represent a genuine need for specialized talent or a strategy to suppress wages and exploit workers with reduced mobility [1][2][5]. While some argue that the layoffs primarily affected international offices and that domestic IT labor remains at "near full employment," others point to systemic "gaming" of the program, such as hiding job postings from U.S. citizens and using middlemen to source cheaper labor [1][4][5]. Significant debate exists regarding the efficacy of recent policy changes, such as the $100k H-1B fee, with some questioning if the fee is being enforced or if corporations simply find the cost justifiable to maintain control over their workforce [3][5][7]. There is also a call for a temporary moratorium on new visas, with critics noting that unlike the PERM process
7. OpenClaw privilege escalation vulnerability (nvd.nist.gov)
510 points · 254 comments · by kykeonaut
A privilege escalation vulnerability identified as CVE-2026-33579 has been discovered in OpenClaw, potentially allowing attackers to compromise systems running the software. [src]
The OpenClaw creator clarified that the vulnerability was a "scope-ceiling bypass" rather than a remote exploit, requiring an already-authorized user to escalate privileges via a specific command path [3]. While some users find the tool useful for automating tasks like meeting scraping or gym bookings within isolated environments [7], others criticize the project for "vibe coded bloat" and a track record of over 400 security issues [5][8]. There is significant debate regarding the software's utility, with skeptics questioning the risks of granting such a vulnerable codebase access to personal data or local networks [0][2][5].
8. Solar and batteries can power the world (nworbmot.org)
290 points · 453 comments · by edent
By 2030, solar and batteries can provide 90% of electricity for 80% of the global population at costs below 80 €/MWh. While high-latitude regions face seasonal challenges, integrating wind and hydro further reduces costs, making renewable-dominated systems a viable, cheap, and clean solution for most of the world. [src]
The feasibility of a solar and battery-powered world is heavily debated, with critics highlighting the massive energy requirements for heating and the lifestyle trade-offs currently required in mild or northern climates [0][7]. Proponents argue that the transition is a matter of time and infrastructure, noting that replacing land currently used for ethanol corn with solar panels could exceed total U.S. energy demands [1][2][5]. While some suggest that modern insulation and nuclear power offer more efficient paths to decarbonization [6][8], others emphasize that recent advancements in lithium technology have already made net-zero living possible for those who right-size their systems [4][7].
9. The FAA’s flight restriction for drones is an attempt to criminalize filming ICE (eff.org)
545 points · 181 comments · by detaro
The EFF is demanding the FAA rescind a nationwide 21-month flight restriction that prohibits drones from flying within 3,000 feet of government vehicles, arguing the rule unconstitutionally criminalizes the filming of ICE and CBP agents. [src]
Commenters express concern that the FAA’s drone restrictions are a "power grab" designed to prevent the documentation of ICE activities, particularly since the rules apply to potentially unmarked vehicles [5][6]. While some argue that "mens rea" requirements might protect accidental violators, others suggest the primary impact will be the legal suppression of drone footage used against the agency [9]. The thread also features a broader debate on political stability, with some advocating for robust social safety nets to prevent extremism while others discuss more radical solutions like state secession or subdivision [0][7][8].
10. Claude Code Found a Linux Vulnerability Hidden for 23 Years (mtlynch.io)
413 points · 258 comments · by eichin
Anthropic researcher Nicholas Carlini used Claude Code to discover multiple remotely exploitable vulnerabilities in the Linux kernel, including a critical heap overflow in the network file share (NFS) driver that had remained hidden for 23 years. [src]
While some users argue that LLM-driven security audits are plagued by high false-positive rates and significant human overhead [0], others contend that multi-stage pipelines can now automatically filter and verify vulnerabilities with high accuracy before they reach a developer [2][5]. There is a sharp disagreement regarding cost: some find token prices negligible for routine coding [3], while others report that exhaustive, deep-system security exploration remains prohibitively expensive, potentially costing hundreds of thousands of dollars [1][7]. Despite skepticism that the discovered bug was simply a "low-hanging fruit" overlooked by static analyzers [4], many developers view LLMs as powerful tools for identifying complex threading or distributed system bugs that lack traditional tooling [6][8].
11. iNaturalist (inaturalist.org)
527 points · 134 comments · by bookofjoe
iNaturalist is a global citizen science platform that allows users to record, share, and crowdsource identifications of biological observations to support biodiversity research and conservation. [src]
While users praise iNaturalist for its educational value and "gem" of an open API [1][3][5], significant concerns exist regarding privacy and doxxing, as non-technical users often inadvertently reveal their home addresses by uploading backyard observations [0]. Some users report that publicizing rare or invasive species can lead to unexpected real-world visits from both curious hobbyists and government agricultural inspectors [9]. There is a consensus that the "Seek" companion app is hindered by repetitive safety modals [4][8], leading many to prefer the main iNaturalist app or Cornell’s Merlin and BirdNet tools for identification [2][4][6].
12. NHS staff refusing to use FDP over Palantir ethical concerns (freevacy.com)
356 points · 170 comments · by chrisjj
We couldn't summarize this story. [src]
The NHS's £330 million contract with Palantir has sparked intense criticism regarding its high cost relative to patient care and the company's controversial reputation for government surveillance [0][1][9]. While some argue the NHS is plagued by structural inefficiency and questionable bureaucratic spending [2][3], others contend the contract price is negligible compared to the total £242 billion annual budget of a system still struggling to modernize basic technology [6]. The debate also triggered a pedantic dispute over whether the UK possesses a constitution, with users clarifying that it exists in an uncodified, non-entrenched form [4][5][7][8].
13. Why are we still using Markdown? (bgslabs.org)
222 points · 303 comments · by veqq
The author argues that Markdown has become a "Frankenstein’s monster" due to ambiguous syntax, security vulnerabilities like XSS and ReDoS, and the inclusion of inline HTML, suggesting it should be replaced by a saner markup language with a formal build system and a trivially parsable grammar. [src]
Markdown persists because it prioritizes "worse is better" pragmatism, minimizing friction for authors by codifying long-standing text conventions from Usenet and email [0][1][2]. While critics point to technical flaws like parsing ambiguities and "disappearing" characters, proponents argue that its primary value lies in being human-readable even in its raw form [5][8][9]. Ultimately, the consensus is that Markdown’s lack of layout control is a feature that ensures content remains accessible across any device or tool [6][7].
14. European alternatives to Google, Apple, Dropbox and 120 US apps (only-eu.eu)
361 points · 158 comments · by madman_dev
Only EU is a curated directory that helps users find European alternatives to popular U.S. software and products, emphasizing stricter privacy standards, environmental sustainability, and regional quality. [src]
Critics argue the website is a low-effort affiliate marketing project that lacks credibility because it relies on US-based infrastructure like Cloudflare and Porkbun while claiming to promote European independence [0][3][7][9]. Commenters also challenge the "European superiority" narrative, noting that many listed vendors must still comply with the US Cloud Act and pointing to recent controversies regarding Proton's privacy claims [0][5]. Furthermore, there is significant disagreement over the definition of "European," with users questioning whether the term refers to geographic, political, or EU-specific boundaries [2].
15. April 2026 TLDR Setup for Ollama and Gemma 4 26B on a Mac mini (gist.github.com)
319 points · 119 comments · by greenstevester
This guide details how to set up Ollama and Gemma 4 on Apple Silicon Mac minis, providing instructions for installation, auto-starting the application, and using launch agents to keep models preloaded in memory for faster performance. [src]
The discussion reveals a strong divide over inference tools, with several users arguing that Ollama is a "dumbed down" or "shameless" wrapper of llama.cpp and recommending alternatives like LM Studio or Unsloth Studio for better performance and flexibility [0][1][9]. Experts caution that early implementations of new models like Gemma 4 are often riddled with bugs in tokenization and quantization, leading to frequent failures in tasks like tool calling [2][3][5]. Additionally, while some users look to models like Qwen 3.5 for coding tasks, others warn against relying on LLM-generated advice for evaluating brand-new releases [4][7][8].
16. Post Mortem: axios NPM supply chain compromise (github.com)
285 points · 139 comments · by JeanMeche
On March 31, 2026, malicious versions of the axios npm package (1.14.1 and 0.30.4) were briefly published after a lead maintainer's account was compromised, delivering a remote access trojan to users before being removed three hours later. [src]
The Axios compromise has reignited debate over NPM’s security model, with some arguing the platform is fundamentally designed to run untrusted code and others calling for mandatory package and commit signing [0][2][4]. While critics blame the maintainers for "normalized negligence" regarding security practices, others point out that the Axios team already used OIDC and signed commits; the attack succeeded because a Remote Access Trojan (RAT) allowed the attacker to bypass 2FA and publish malicious versions locally [3][8][9]. Ultimately, consensus is split on whether the responsibility lies with NPM to forbid local publishing, maintainers to adopt hardware tokens, or users to stop relying on unsigned code [5][6][8].
17. SSH certificates: the better SSH experience (jpmens.net)
259 points · 124 comments · by jandeboevrie
SSH certificates offer a more secure and scalable alternative to traditional SSH key pairs by using a central Certificate Authority to eliminate "Trust on First Use" warnings, automate host verification, and enforce granular access controls like expiration times and specific user permissions. [src]
While SSH certificates are praised for eliminating manual key management and Trust On First Use (TOFU) risks, critics argue the setup complexity is a significant barrier [1][2]. A major point of contention is the management of revocation lists, though some suggest that using short-lived certificates can bypass this issue [3][5]. However, reliance on short-lived certificates introduces concerns regarding system availability and the need for a highly available signing service [6][8].
18. Critics say EU risks ceding control of its tech laws under U.S. pressure (politico.eu)
240 points · 140 comments · by nickslaughter02
EU lawmakers are criticizing the European Commission for proposing a "dialogue" with Washington on digital rules, warning it allows the Trump administration to interfere with the enforcement of the bloc's flagship tech laws. [src]
Commenters are divided on the efficacy of the EU's regulatory approach, with some arguing that fines have failed to govern American megacorps and suggesting that banning them or "jailbreaking" their ecosystems may be the only viable path forward [0][5]. There is a notable tension between EU institutions, as critics claim the Commission often prioritizes quiet deals over the public's rights and sovereignty, potentially aligning with US interests on mass surveillance [4][8][9]. Meanwhile, the debate touches on cultural friction, with some defending European standards against what they perceive as a "degraded" American corporate culture [1][3].
19. Iran strikes leave Amazon availability zones "hard down" in Bahrain and Dubai (bigtechnology.com)
245 points · 122 comments · by upofadown
Iranian missile strikes have severely damaged Amazon Web Services infrastructure in Bahrain and Dubai, leaving multiple availability zones "hard down" and forcing the company to migrate customers to other regions for an extended period. [src]
The recent strikes on Amazon data centers have sparked a debate on the vulnerability of centralized cloud infrastructure, which some argue is now a primary strategic target due to the military's increasing reliance on AI [0][1]. While some suggest that targeting electrical substations is a more efficient way to disable these facilities, others note that physical destruction of the hardware itself would create a "soft underbelly" for modern society that is far more difficult to recover from than a temporary power outage [3][8]. While blast-resistant construction is common in industries like oil refining, experts suggest that protecting above-ground data centers against sustained bombardment is commercially prohibitive, leaving underground facilities as the only viable long-term defense [9].
Brought to you by ALCAZAR. Protect what matters.