Top HN Daily Digest · Sat, Apr 11, 2026

A daily Hacker News digest with story summaries, thread context, and direct links back to the original discussion.


0. Artemis II safely splashes down (cbsnews.com)

1271 points · 440 comments · by areoform

NASA's Artemis II crew safely returned to Earth on Friday, splashing down in the Pacific Ocean near San Diego after a historic nine-day mission that set a record for the farthest distance humans have ever traveled from the planet. [src]

The successful splashdown of Artemis II has sparked debate over NASA's "acceptable" crew mortality rate of 1 in 30, which some view as an alarming regression in safety standards [0][1]. However, others argue that these figures represent a more honest acknowledgment of the extreme physical risks inherent in lunar travel compared to the Shuttle's historically understated dangers [0][2][8]. While the mission's success provided a sense of national pride and scientific continuity [4], technical concerns persisted throughout the flight, ranging from heat shield integrity to surprisingly basic communication issues [3][9].

1. Small models also found the vulnerabilities that Mythos found (aisle.com)

1239 points · 328 comments · by dominicq

Research by AISLE reveals that small, cheap, open-weights AI models can detect the same high-profile vulnerabilities recently showcased by Anthropic’s "Mythos" model. The findings suggest that cybersecurity capability is "jagged" and depends more on the surrounding expert system and orchestration than on the scale of the underlying model. [src]

While small models can identify the same vulnerabilities as Anthropic's Mythos when presented with isolated, relevant code snippets [3][5], critics argue this "suggestive" framing bypasses the primary challenge of security research: locating bugs within massive, complex codebases [0][4]. The debate centers on whether the "moat" lies in the model's intelligence or the scaffolding system that automates the search process [1][5], with some suggesting that smaller models might produce too many false positives to be useful at scale [0][2][7]. Ultimately, while a $20,000 automated scan is significantly cheaper than a human researcher [2], some observers remain skeptical of "earth-shattering" productivity claims given the lack of visible improvements in software quality at major tech companies [9].

2. France's government is ditching Windows for Linux, says US tech a strategic risk (xda-developers.com)

491 points · 286 comments · by pabs3

The French government is transitioning its ministries from Windows to Linux and other open-source solutions to reduce strategic dependence on non-European technology and strengthen digital sovereignty, with departments required to submit transition plans by fall 2026. [src]

While some users express pride in France's move toward digital sovereignty and successful transitions to open-source tools like Matrix [4], others argue the announcement is largely "performative" or "just words" given the vague timeline and previous secret contracts with Microsoft [0][1]. A debate exists regarding whether Linux truly qualifies as non-US tech, noting that while creator Linus Torvalds is Finnish, he is also a naturalized American citizen [2][6]. Critics suggest the plan faces significant hurdles, including the need for local GPU and AI infrastructure to remain competitive in the future [8].

3. Show HN: Pardonned.com – A searchable database of US Pardons

483 points · 262 comments · by vidluther

Pardonned.com is a new open-source, searchable database built with Astro and SQLite that allows users to easily verify and browse U.S. Department of Justice pardon records. [src]

The discussion centers on the potential for pardon power to grant blanket immunity, with many users arguing that "preemptive" pardons for uncharged or future crimes should be abolished to prevent political abuse [0][3]. While some see pardons as a necessary shield against "vengeful administrations" [3][6], others argue that the need for such protection highlights a fundamental breakdown in the separation of powers and the judicial system's impartiality [7][8]. Commenters also compared the historical scope of pardons, noting that while recent grants cover long timeframes, precedents like the Nixon pardon were even more significant in their lack of restrictions [4][9].

4. Exploiting the most prominent AI agent benchmarks (rdi.berkeley.edu)

507 points · 130 comments · by Anon84

UC Berkeley researchers discovered that eight major AI agent benchmarks are systematically exploitable, allowing an automated agent to achieve near-perfect scores through environment manipulation and reward hacking without actually solving any tasks. [src]

Researchers achieved near-perfect scores on major AI agent benchmarks without solving any tasks, instead utilizing exploits ranging from simple empty inputs to trojanizing binary wrappers [0]. While some commenters argue that evaluating AI has always relied on trust and that these vulnerabilities are an inevitable result of agents having control over their evaluation environments [4][5], others expressed shock that these benchmarks were not properly sandboxed or verified for actual solutions [2][8]. The discussion also highlights a cynical view that AI companies may prioritize marketing over legitimate metrics, potentially twisting these "alignment" failures into hype for investment [3][6].

5. South Korea introduces universal basic mobile data access (theregister.com)

406 points · 123 comments · by saikatsg

South Korea has launched a universal basic mobile data scheme providing unlimited 400 Kbps access to all citizens after their primary allowances expire, alongside cheaper 5G plans. The initiative aims to guarantee telecommunications rights following several high-profile security lapses by the nation's major carriers. [src]

South Korea's plan to provide unlimited 400 kbps data after allowances expire is seen as a logical step toward treating internet as a basic necessity, though critics note it still requires a paid plan and a device [0][1][3]. While some argue this move reinforces a problematic societal dependency on smartphones, others contend that digital access is now as essential as roads or postal services [4][6][7]. Similar initiatives, such as the UK's zero-rating of government websites during the pandemic, highlight the ongoing debate over net neutrality and the role of the state in ensuring information access [2][8][9].

6. Bitcoin miners are losing on every coin produced as difficulty drops (coindesk.com)

235 points · 222 comments · by PaulHoule

Bitcoin miners are losing approximately $19,000 per token as rising energy costs and geopolitical tensions push average production expenses to $88,000, well above market prices. [src]

Commenters emphasize that miners operating at a loss is a fundamental design feature of Bitcoin's self-correcting difficulty adjustment, mirroring cycles in commodities like oil and gold [0][1][3]. While some question why miners don't simply stop production during unprofitable periods, others note that fixed costs like hardware depreciation incentivize continued operation, though extreme volatility could theoretically threaten the system if miners exit faster than difficulty can adjust [2][5][6][9]. There is further debate regarding whether mining infrastructure could be repurposed for AI or if the network's inherent scaling limitations remain a long-term concern [7][8].

7. The future of everything is lies, I guess – Part 5: Annoyances (aphyr.com)

274 points · 163 comments · by aphyr

The integration of machine learning into customer service and commerce threatens to create a "hellscape" of automated bureaucracy, where unreliable AI models frustrate accountability, facilitate biased decision-making, and force consumers into an exhausting arms race of algorithmic haggling and "agentic commerce." [src]

The discussion centers on the concern that LLMs are being utilized to deepen class divides and manipulate public discourse rather than serve the common good [0][8]. While some argue that AI can improve efficiency in customer service and lower software costs [6], others contend that it merely automates existing "grindingly slow" bureaucratic frustrations to benefit shareholders [7]. A notable anecdote highlights how heavy AI usage may be eroding human attention spans and critical thinking, as users increasingly rely on shallow AI summaries for complex topics [1]. To counter these trends, commenters suggest a need for stronger regulatory frameworks [3] and a return to trusted, local human collectives [0].

8. Cirrus Labs to join OpenAI (cirruslabs.org)

279 points · 139 comments · by seekdeep

Cirrus Labs has agreed to join OpenAI’s Agent Infrastructure team to develop tooling for agentic engineering, leading to the shutdown of Cirrus CI in June 2026 and the open-sourcing of its existing virtualization tools. [src]

The acquisition of Cirrus Labs by OpenAI is viewed as a talent-focused "acquihire" rather than a product acquisition, as the Cirrus CI service is scheduled to shut down in June 2026 [0][2]. While the team plans to relicense their virtualization tools like Tart under more permissive terms [8], users expressed frustration over the "puffery" of the announcement and the burden of migrating off a service on relatively short notice [4][5]. Some commenters argue this move highlights the risks of depending on third-party SaaS providers, advocating instead for self-hosted infrastructure to avoid such disruptions [1].

9. 447 TB/cm² at zero retention energy – atomic-scale memory on fluorographane (zenodo.org)

259 points · 144 comments · by iliatoli

Researchers have proposed a new atomic-scale memory architecture using single-layer fluorographane that can store 447 terabytes per square centimetre with zero retention energy. This non-volatile system uses the bistable orientation of fluorine atoms to achieve data densities five orders of magnitude higher than existing technologies. [src]

The discussion initially centers on the paper's unusual metadata, with users questioning the single-author format, the use of a personal email, and the author's pursuit of three PhDs [0][3]. The author defends the work as a 13-year independent project verified by multiple levels of theory, explaining that the multiple degrees reflect a genuine interest in interdisciplinary learning [1][7]. Skeptics argue that while atomic-scale storage is a common research "breakthrough," these technologies rarely survive the transition from lab prototypes to mass production due to slow I/O speeds and manufacturing hurdles [2][4][5]. To address these concerns, the author outlines a theoretical "Tier 2" architecture using infrared arrays to achieve high parallel throughput, though commenters suggest the work should undergo formal peer review in a journal to move beyond "hot takes" [6

10. Apple Silicon and Virtual Machines: Beating the 2 VM Limit (2023) (khronokernel.com)

230 points · 166 comments · by krackers

By booting a custom development kernel and configuring specific boot-args, users can bypass Apple Silicon's two-instance limit for macOS virtual machines. This technical workaround overrides the kernel's internal quota, allowing for numerous simultaneous guest VMs for research and testing purposes. [src]

Users and developers largely view Apple's two-VM limit as an arbitrary and "silly" restriction that hinders the Mac's utility as a development platform [0][1][3]. While some attribute this limitation to "rent-seeking" behavior intended to force hardware upgrades [9], others debate whether macOS remains a "serious" environment given Apple's tight control over its ecosystem [2][4]. Despite these frustrations, many developers continue to choose Mac over Linux to avoid the hardware compatibility and quality assurance issues often found in open-source alternatives [5][8].

11. Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS (v68k.org)

261 points · 68 comments · by zdw

Advanced Mac Substitute is an API-level reimplementation that allows 1980s-era 68K Macintosh applications to run on modern systems without requiring original Apple ROMs or system software. [src]

Advanced Mac Substitute (AMS) reimplements the 1980s-era Macintosh Toolbox at the TRAP instruction level, allowing legacy software to run without emulating the original hardware [9]. While some users encountered unimplemented functions like `OpenDF` during testing [0][6], others noted that the original Mac OS's reliance on software APIs rather than hardware quirks facilitated this type of compatibility [1][7]. Discussion highlighted the era's unique constraints, such as Pascal-style strings and the "floppy-dance" of early hardware, leading to suggestions for "slow-down" features to replicate the mechanical feel of the original machines [4][5][8].

12. 20 years on AWS and never not my job (daemonology.net)

254 points · 64 comments · by cperciva

Colin Percival reflects on 20 years of collaborating with AWS, detailing his efforts to bring FreeBSD to the platform, his role in identifying critical security vulnerabilities, and his eventual recognition as an AWS Hero and sponsored FreeBSD Release Engineering Lead. [src]

The discussion centers on the "asymmetric" relationship between Amazon and the open-source community, with many arguing that AWS "Heroes" and contributors provide massive amounts of free R&D and labor to a trillion-dollar entity [0][3]. While some suggest that developers can use restrictive licenses like the AGPL or specific "Business Source Licenses" to prevent hyperscaler monetization, others argue these are often ignored unless enforced or are merely "optics" for companies that never truly intended to be open source [1][7][9]. Additionally, technical debates emerged regarding the security of AWS IAM roles, with one commenter defending them as a powerful policy-driven alternative to the "manual procedure" of handling secrets [5].

13. Polymarket gamblers betting millions on war (theguardian.com)

157 points · 126 comments · by sandebert

A Guardian investigation highlights how Polymarket gamblers are wagering millions on war outcomes, raising ethical concerns about the platform's influence on news and its reliance on anonymous crypto-token holders to determine "the truth" of global events. [src]

The discussion centers on whether betting on war outcomes represents a modern capitalist excess or a timeless human impulse, with some arguing that such platforms reduce humanity to "fungible currency" [0][3]. While some commenters view these markets as a dangerous new "VC platform" for war that incentivizes corruption and the intentional creation of suffering for profit [1][4][9], others point out that wagering on conflict and political death is a centuries-old phenomenon that predates modern economic systems [2][6]. Ultimately, critics worry that making war profitable for the public will lead to massive consequences for global stability and corruption [5][9].

14. Dark Castle (darkcastle.co.uk)

240 points · 33 comments · by evo_9

Dark Castle provides a nostalgic platform for PC users to download and play the classic Macintosh trilogy—*Dark Castle*, *Beyond Dark Castle*, and *Return to Dark Castle*—using a pre-configured emulator. [src]

The discussion highlights *Dark Castle*’s historical significance, noting it was programmed by Jonathan Gay, who later created Flash [0]. Users fondly recall the game's iconic sound effects and influence [1][6], while noting its release year coincided with the original *Castlevania* [9]. While the original site's download links are dead [2][3], commenters provided links to archived versions [5] and browser-based emulators [7], alongside rumors that a 40th-anniversary edition may be in development [4].

15. The disturbing white paper Red Hat is trying to erase from the internet (osnews.com)

193 points · 75 comments · by choult

Red Hat is reportedly attempting to remove a 2024 white paper titled "Compress the kill cycle with Red Hat Device Edge," which details how its AI and edge computing technologies can be used by the military to accelerate targeting and increase lethality in combat operations. [src]

The discussion centers on the ethical implications of Red Hat’s involvement in military AI, with some arguing that "smart" precision weapons are morally preferable to indiscriminate "dumb" bombs [0]. However, critics highlight the lack of accountability for AI-driven war crimes [2] and the potential for "hallucinations" to result in catastrophic targeting errors [1][3]. While some commenters note that Red Hat has long served the U.S. military as a primary customer [8], others question how this collaboration affects internal morale and the company's "hacker idealist" culture [4][7].

16. Productive Procrastination (maxvanijsselmuiden.nl)

157 points · 50 comments · by maxvij

Max van IJsselmuiden explores "productive procrastination," explaining how the brain’s preference for novelty and avoidance of negative emotions lead people to complete secondary tasks instead of essential ones, and suggests overcoming this through self-forgiveness, affect labeling, and introducing new stimuli to old projects. [src]

The discussion highlights various strategies for managing procrastination, ranging from psychological reframing—such as viewing tasks as choices rather than obligations [2]—to "productive" diversions like typing books to build skill and novelty [0]. While some users advocate for professional ADHD assessments as a life-changing step [3], others debate whether productivity is best achieved through strict discipline [4] or intentional periods of rest and idleness [6]. A notable anecdote involves a user who increased their typing speed to 100 WPM by redirecting their procrastination urges toward transcribing *On the Origin of Species* [0].

17. The Problem That Built an Industry (ajitem.com)

144 points · 48 comments · by ShaggyHotDog

This article explores the enduring legacy of the airline industry's 60-year-old infrastructure, specifically the **Transaction Processing Facility (TPF)**. Despite its 1960s origins, this specialized mainframe system continues to power global flight bookings by delivering high-volume, low-latency transaction performance that modern distributed architectures often struggle to match. [src]

The SABRE system serves as a powerful reminder that well-designed, purpose-built software can achieve massive scale and longevity—handling 50,000 transactions per second for decades—without the overhead of modern cloud abstractions [0][2][6]. While some argue that our current "stack of turtles" (VMs, containers, and complex runtimes) is a necessary evolution for security, portability, and developer velocity [3], others contend these layers merely mask fundamental failures in solving base-level problems like installability and build performance [5]. Despite the "mythological" speed often attributed to SABRE's origin, the project actually took over a decade from the initial pitch to go live, highlighting that truly robust infrastructure requires significant time and rigorous design [4].

18. Rockstar Games Hacked, Hackers Threaten a Massive Data Leak If Not Paid Ransom (kotaku.com)

109 points · 60 comments · by c420

We couldn't summarize this story. [src]

The threat of a GTA 6 source code leak sparks debate over whether Rockstar should pay the ransom, with some arguing that payment only invites future attacks [0] while others suggest modern hacking groups operate like professional startups and often honor agreements to maintain their "business" reputation [2][4]. While a leak of unreleased assets could be devastating [5], some users question the actual impact of a source code leak, noting that compiling a functional game from such data is a non-trivial task that might only result in story spoilers [7]. Anecdotal accounts from those who have interacted with similar hacking groups describe them less as sophisticated organizations and more as "script kiddies" with excessive free time [9].

19. How to build a `Git diff` driver (jvt.me)

129 points · 14 comments · by zdw

Jamie Tanna explains how to create custom Git diff drivers by handling the seven specific arguments Git passes to external commands, providing a practical implementation example using the OpenAPI comparison tool `oasdiff`. [src]

The discussion highlights a variety of specialized tools for viewing diffs, ranging from browser-based utilities like `diff2html` and `webdiff` [0][4][5] to established desktop software like WinMerge, Beyond Compare, and Kdiff3 [2][6]. While many users rely on visual wrappers and pipelines to improve readability [3][8][9], there is a strong emphasis on the value of semantic diffing—using ASTs to reduce noise in structured data like OpenAPI specs where standard text diffs fail [7]. Additionally, participants expressed interest in finding open-source solutions specifically for diffing images and multimedia files [1].