Top HN Weekly Digest · W16, Apr 13-19, 2026

A weekly Hacker News digest for readers who want the strongest stories and discussions from the entire week in one place.


0. Claude Opus 4.7 (anthropic.com)

1952 points · 1443 comments · by meetpateltech

Anthropic has released Claude Opus 4.7, featuring significant improvements in software engineering, instruction following, and high-resolution vision. The model introduces new "xhigh" effort controls and advanced cybersecurity safeguards while maintaining the same pricing as its predecessor, Opus 4.6. [src]

The release of Claude Opus 4.7 has sparked confusion and frustration among users regarding the new "adaptive thinking" feature, which some find difficult to configure and others blame for a perceived decline in model performance [0][7][8]. While the model demonstrates improved self-awareness regarding its own logical fallacies—such as failing to realize a car must be driven to a car wash—users report significant issues with hallucinations, overly restrictive cybersecurity filters, and a lack of transparency from Anthropic regarding capacity constraints [1][5][9]. Consequently, some developers are migrating to competitors like Codex, citing more consistent performance and better compute availability [1][6].

1. Google broke its promise to me – now ICE has my data (eff.org)

1705 points · 764 comments · by Brajeshwar

The Electronic Frontier Foundation has filed complaints with state attorneys general after Google allegedly broke its privacy promise by handing a student's data to ICE without prior notification, depriving him of the opportunity to challenge the administrative subpoena. [src]

The discussion highlights a growing distrust of Google, with some users citing this incident as their final motivation to migrate to self-hosted or privacy-focused alternatives like Proton Mail [0]. While some commenters question the specific legal details of the subpoena and whether Google technically violated its own non-disclosure policies [5], others argue that the core issue is the systemic weaponization of data by government agencies like ICE against individuals [3][9]. There is a strong consensus that such stories are vital for industry decision-makers to see, as they fundamentally alter the legal and ethical calculations of trusting major tech corporations with sensitive data [1][2].

2. Claude Design (anthropic.com)

1217 points · 750 comments · by meetpateltech

Anthropic has launched Claude Design, a new initiative from Anthropic Labs focused on exploring and sharing the design principles and creative processes behind the development of the Claude AI interface. [src]

The release of Claude Design has sparked a debate over whether AI-driven UI generation fosters efficiency or merely accelerates the "homogenization" of the web [0][6]. While some argue that standardized, "obvious" interfaces are ideal for functional tools like medical software, others contend that AI lacks the capacity for the original thought and "artisanal weirdness" required for truly groundbreaking design [1][8][9]. Critics warn that these tools may lead users to confuse output with agency, potentially blinding them to the deep structural problem-solving that defines professional design [2][4]. Conversely, proponents suggest that AI can accelerate learning by handling mundane tasks, allowing creators to focus on higher-level architecture rather than "tracking down stupid issues" [7][8].

3. Backblaze has stopped backing up OneDrive and Dropbox folders and maybe others (rareese.com)

1127 points · 690 comments · by rrreese

Backblaze has updated its backup client to automatically exclude folders from cloud storage providers like OneDrive, Dropbox, and Google Drive, as well as `.git` directories. Users are criticizing the company for implementing these exclusions silently without direct notification or clear documentation on their website. [src]

Backblaze's decision to exclude OneDrive and Dropbox folders from its personal backup service is seen by users as a breach of its "unlimited" storage promise and a failure to act as a reliable last-resort backup [0][3][8]. While some commenters suggest the change is a technical necessity to prevent "files on demand" features from crashing laptops by forcing massive downloads [1], others argue that excluding synced folders leaves users vulnerable to data loss if a sync service accidentally overwrites or corrupts files [3][5]. Critics contend that "unlimited" marketing is inherently unsustainable and signals that financial teams are prioritizing cost-cutting over data integrity [2][9].

4. Qwen3.6-35B-A3B: Agentic coding power, now open to all (qwen.ai)

1266 points · 531 comments · by cmitsakis

Alibaba has open-sourced Qwen3.6-35B-A3B, a sparse mixture-of-experts model with 3 billion active parameters that delivers high-performance agentic coding and multimodal reasoning. The model rivals much larger dense models and is now available via open weights, Qwen Studio, and the Alibaba Cloud API. [src]

The Qwen 3.6 release has sparked excitement for its agentic coding capabilities, with early users reporting it can outperform models like Opus 4.7 in specific creative tasks [2]. While there is relief that the Qwen team continues to publish open weights despite recent internal departures [3], some users expressed disappointment that the highly requested 27B variant was bypassed in favor of this 35B model [9]. Technical discussions focus on hardware requirements, noting that while 16GB GPUs may struggle with quality loss [1][7], quantized versions from providers like Unsloth allow the model to run on consumer laptops [0][2]. However, community members caution that launch-day quantizations often require later revisions to fix performance bugs [8].

5. Codex for almost everything (openai.com)

998 points · 554 comments · by mikeevans

OpenAI has released a major update to Codex, enabling the AI to operate computers alongside users, browse the web, generate images, and automate long-term developer workflows through new memory features and over 90 third-party plugins. [src]

The rise of "professional agents" like Codex and Claude Cowork is viewed by some as a potentially massive product category that could disrupt traditional software by allowing agents to interface with apps on behalf of non-technical users [2]. However, critics argue that these tools are merely catching up to existing features in Claude [3] and that non-technical users may find the unpredictable nature of AI-generated interfaces and "vague request" processing frustrating rather than helpful [7]. While some users find value in replacing CLI tasks with AI commands [9], others express significant security concerns regarding giving models direct control over their computers and applications [8]. There is also a cynical view that the current hype is driven by OpenAI's strategic use of subsidized compute to win a PR war against Anthropic [0][5][6].

6. Someone bought 30 WordPress plugins and planted a backdoor in all of them (anchor.host)

1194 points · 340 comments · by speckx

A malicious buyer acquired a portfolio of over 30 WordPress plugins and planted a sophisticated backdoor that remained dormant for eight months before injecting SEO spam via `wp-config.php`. WordPress.org has since closed the affected plugins, which include popular tools like Countdown Timer Ultimate and Popup Anything on Click. [src]

The incident highlights a critical vulnerability in modern software where attackers can simply purchase dependencies or bribe employees to insert backdoors, a tactic fueled by the massive financial incentives of cryptocurrency [0][7]. Commenters argue that the industry's reliance on massive trees of unvetted transitive dependencies makes supply chain attacks nearly inevitable [1][3][9]. While some debate whether "bug-free" software is even possible, others contend that we possess the technical tools to achieve high quality but consistently prioritize speed and cost over security [2][4][5][8].

7. The future of everything is lies, I guess: Where do we go from here? (aphyr.com)

728 points · 762 comments · by aphyr

Kyle Kingsbury argues that society should resist the adoption of large language models to preserve human skill and critical thinking, warning that AI's rapid integration threatens to cause profound cultural, economic, and psychological harm similar to the historical impact of the personal automobile. [src]

Commenters debate whether AI's societal impact will mirror the automobile, which some argue provided utility while causing deep cultural isolation and environmental harm [0][2][7]. While some fear AI will devalue human intellect and empower a small elite to control society [3][4], others contend the technology is currently too unreliable to replace human decision-making and is being overhyped to justify corporate layoffs [9]. Ultimately, there is a sense of unease regarding the shift in human values, as skills like writing and thinking may lose their status as primary drivers of upward mobility [4][5].

8. DaVinci Resolve – Photo (blackmagicdesign.com)

1145 points · 296 comments · by thebiblelover7

Blackmagic Design has introduced a dedicated Photo page to DaVinci Resolve, bringing its advanced Hollywood color grading tools, AI-powered effects, and RAW support to still photography. The update includes non-destructive editing, GPU-accelerated processing, and cloud-based collaboration for professional photographers and retouchers. [src]

Users are excited that DaVinci Resolve is bringing advanced video-centric color science and creative tools like relighting and film emulation to the stagnant photography market [0][3]. While some praise its performance on Linux via containerization [9], others report significant frustration with outdated audio APIs and codec support on the platform [2]. Early testers find the interface confusing and "tacked on" compared to Lightroom, suggesting that while the software is powerful, it currently lacks the intuitive workflow required to sway professional photographers [7].

9. IPv6 traffic crosses the 50% mark (google.com)

812 points · 614 comments · by Aaronmacaron

Google's tracking data shows that global IPv6 adoption has reached approximately 45.54%, reflecting the percentage of users who access the platform via the updated internet protocol. [src]

While IPv6 traffic has reached 50%, users observe a plateau in adoption driven by enterprise resistance and the protocol's inherent complexity [0][5]. Critics argue that IPv6 is not a simple expansion of IPv4 but a "recursive WTF" with unresolved issues regarding address selection, DHCP support, and fragmentation that break established operational practices [5]. Major platforms like GitHub remain IPv4-only, likely due to the risk of breaking customer IP-based access controls during a transition [1][8]. Consequently, many organizations continue to actively block IPv6 at the firewall, leading some to believe the protocol will never fully succeed in its current form [7][9].

10. A new spam policy for “back button hijacking” (developers.google.com)

912 points · 512 comments · by zdw

Google has introduced a new spam policy targeting "back button hijacking," a technique that prevents users from returning to search results by manipulating browser history. The policy aims to improve user experience by penalizing sites that trap visitors or redirect them to unwanted content. [src]

Users identify major platforms like LinkedIn, Reddit, and Microsoft as frequent offenders that manipulate browser history to trap visitors within their ecosystems [0][3][7]. While some argue that the History API is essential for modern single-page applications and bookmarking, there is a strong consensus that these features are being weaponized for "encrapification" and advertising [1][9]. Proposed solutions include restricting third-party domains from modifying history stacks and broader calls to limit how much JavaScript can override native browser behaviors [2][5][6].

11. GitHub Stacked PRs (github.github.com)

898 points · 524 comments · by ezekg

GitHub has introduced Stacked PRs in private preview, featuring a new CLI and native UI support to help developers break large changes into a chain of small, independently reviewable pull requests that can be merged together. [src]

The introduction of stacked PRs on GitHub aims to replicate the Phabricator and Mercurial workflow, which proponents argue makes reviewing large features more manageable by breaking them into smaller, logical chunks [0][8]. While some users find the concept redundant or confusing compared to reviewing individual commits [3][4], others highlight that current GitHub UX makes manual stacking difficult due to merge conflicts and target branch issues [7]. Despite Git's dominance and speed, there is a lingering debate over whether its API is inferior to Mercurial's, leading to the rise of tools like `jujutsu` to bridge the gap [1][2][9].

12. Stop Flock (stopflock.com)

989 points · 307 comments · by cdrnsf

Stop Flock is a campaign raising awareness about Flock Safety’s AI-powered surveillance network, which uses "vehicle fingerprints" to track movement patterns and associations across a nationwide database accessible to police without a warrant, sparking significant Fourth Amendment and privacy concerns. [src]

The discussion highlights a tension between public safety and the dangers of mass surveillance, with some arguing that institutional leaders face immense pressure to eliminate camera blind spots to track criminals [0]. Critics contend that the current business model of data brokering creates "toxic waste" that threatens privacy, suggesting that data should be treated as a legal extension of the home requiring warrants and mandatory notifications [1][2]. While some argue there is no expectation of privacy in public spaces [3], others emphasize the need to close legal loopholes that allow the government to "launder" information through third parties to bypass Fourth Amendment protections [5][9].

13. Migrating from DigitalOcean to Hetzner (isayeter.com)

868 points · 422 comments · by yusufusta

A software company successfully migrated its production infrastructure from DigitalOcean to Hetzner, reducing monthly costs from $1,432 to $233 while increasing performance and achieving zero downtime through a strategy of MySQL replication, DNS TTL reduction, and Nginx reverse proxying. [src]

Users report significant cost savings when migrating from DigitalOcean or AWS to Hetzner, with some leveraging AI tools like Claude Code to automate the complex migration of legacy environments [0][6]. However, critics argue that these "hyper-aggressive" cost-cutting measures often sacrifice high availability, noting that single-server setups lack the redundancy, live migrations, and managed backups provided by larger cloud platforms [1][3][8]. While some maintain that lower uptime is acceptable for non-critical "long tail" websites, others express concerns regarding Hetzner's strict KYC requirements and the potential for AI-driven astroturfing in technical discussions [4][5][7].

14. Measuring Claude 4.7's tokenizer costs (claudecodecamp.com)

707 points · 493 comments · by aray07

Anthropic's Claude 4.7 tokenizer uses 1.3x to 1.47x more tokens for English and code compared to version 4.6, effectively increasing per-session costs by 20–30%. While the change improves strict instruction following by roughly 5%, it causes users to hit rate limits and context windows significantly faster. [src]

The discussion centers on whether the increased cost of Claude 3.7 Opus reflects a genuine leap in intelligence or simply a move along a logarithmic performance-to-cost frontier with diminishing returns [0][1]. While some users report frustrating regressions in model behavior and high latency [4], others argue that token costs remain negligible compared to the value of human engineering time [7]. There is also significant skepticism regarding Anthropic’s corporate trajectory, with commenters suggesting that price hikes and a potential IPO signal a shift from "global good" ethics toward prioritizing shareholder profit and revenue per user [2][3][5].

15. Anonymous request-token comparisons from Opus 4.6 and Opus 4.7 (tokens.billchambers.me)

605 points · 566 comments · by anabranch

Community data comparing Anthropic's Opus 4.6 and 4.7 models shows that version 4.7 averages a 37.1% increase in both token usage and request costs across 463 submissions. [src]

The release of Claude Opus 4.7 has sparked debate over its efficiency, with some users reporting significantly faster consumption of usage limits [6], while others note that reduced reasoning costs and output token counts may actually make it cheaper for specific workloads [9]. This volatility has led some developers to abandon Claude in favor of open-source models like Qwen to avoid "hard dependencies" on multi-billion dollar companies and the associated costs of proprietary tokens [0][3][7]. While some fear that heavy AI reliance causes skill atrophy [1], others argue it accelerates learning and enables complex infrastructure tasks that would otherwise be impossible [2][4].

16. All elementary functions from a single binary operator (arxiv.org)

854 points · 294 comments · by pizza

Researcher Andrzej Odrzywołek has identified a single binary operator, $eml(x,y) = \exp(x) - \ln(y)$, that can generate all standard elementary functions and constants, enabling a uniform tree-based structure for symbolic regression and scientific computation. [src]

The discovery of a single binary operator (EML) capable of representing all elementary functions is seen as a potentially significant breakthrough for modeling complex data and wave functions via gradient descent [0]. However, critics argue that while mathematically elegant, the approach suffers from an exponential "expression blow-up"—for instance, simple multiplication requires a depth-8 tree with over 40 leaves—making it computationally inefficient compared to traditional polynomials or NAND-gate logic [2][6]. Furthermore, some note that EML is not unique in its universality, as other binary operators like $1/(x-y)$ can also derive all elementary operations [1]. While some users have already begun testing LLMs on their ability to compose EML trees, others remain skeptical of the practical hardware trade-offs compared to traditional math coprocessors [3][5].

17. Claude Code Routines (code.claude.com)

718 points · 413 comments · by matthieu_bl

Claude Code routines are automated, cloud-based configurations that execute tasks like code reviews and backlog maintenance via scheduled, API, or GitHub event triggers. [src]

The introduction of Claude Code Routines has sparked significant skepticism regarding vendor lock-in, with users expressing a lack of trust in Anthropic’s long-term stability and a preference for "dumb pipe" API access over integrated platforms [0][2]. Developers are particularly concerned about confusing Terms of Service regarding third-party harnesses and the potential for account termination when integrating these tools into external applications [1][4]. Additionally, many users report a perceived decline in model performance and "nerfing," questioning how autonomous routines can function effectively under increasingly restrictive usage limits [3][5][8]. While some compare these fears to early cloud adoption anxieties that never fully materialized [6], others are impressed by Anthropic's rapid feature delivery, which is quickly outpacing open-source alternatives [9].

18. Why Japan has such good railways (worksinprogress.co)

553 points · 543 comments · by RickJWagner

Japan’s world-leading railway success is driven by private vertical integration, liberal zoning that encourages transit-oriented development, and policies that force cars to internalize their costs, rather than unique cultural factors. [src]

Japan's railway success is attributed to a "city-shaping" economic model where rail companies develop the real estate and commerce surrounding their stations [3]. This is supported by liberal, nationalized zoning laws that allow for high-density development and prevent local "NIMBY" opposition from stalling infrastructure projects [1][2][7]. Additionally, Japan discourages car dependency by requiring proof of private parking before vehicle purchase, whereas Western nations often subsidize "free" street parking [0]. Critics argue this model is difficult to replicate in the U.S. due to high construction costs, a lack of collective social orientation, and a geography less suited to the linear corridors that make Japanese rail so efficient [5][6][8].

19. Isaac Asimov: The Last Question (1956) (hex.ooo)

772 points · 301 comments · by ColinWright

Across trillions of years, humanity repeatedly asks its most advanced computers if entropy can be reversed to save the dying universe, only to receive "insufficient data" until the final machine, existing alone in the void, discovers the solution and triggers a new Big Bang. [src]

The story’s iconic refrain, "INSUFFICIENT DATA FOR MEANINGFUL ANSWER," sparked a debate over modern LLMs, with some arguing they are "hardcoded to never say no" while others believe they can be prompted to admit ignorance [0][3][4]. Readers shared nostalgic anecdotes of experiencing the story in planetariums or compared its themes of cosmic entropy to the video game *Outer Wilds* [5][6]. While the story remains a perennial favorite, some users questioned if their love for the genre is actually a specific preference for Asimov’s unique writing style [1][2].

20. Tell HN: Fiverr left customer files public and searchable

828 points · 231 comments · by morpheuskafka

Fiverr is reportedly exposing sensitive customer documents and PII in public Google search results due to the use of unsecured Cloudinary URLs for private messaging and work products. [src]

Fiverr has faced criticism for leaving sensitive customer files—including tax forms, API tokens, admin credentials, and internal reports—publicly searchable and accessible [3][4][5][7]. While Fiverr claims they are working on a resolution and disputed the timeline of initial reports, users argue the leak is so severe that the company should immediately block all static asset access regardless of business impact [1][3][8]. The incident sparked a debate over professional standards: some argue for mandatory software engineering certifications to prevent such incompetence, while others contend that licensing would be an ineffective "hassle" that cannot solve fundamental carelessness [0][2][6][9].

21. jj – the CLI for Jujutsu (steveklabnik.github.io)

547 points · 494 comments · by tigerlily

Jujutsu (`jj`) is a distributed version control system that aims to be simpler and more powerful than Git while maintaining full Git compatibility, allowing users to adopt its advanced workflows without requiring their collaborators to switch. [src]

The primary debate surrounding `jj` centers on its "automatic commit" behavior, which some users find intuitive for tracking logical changes while others view it as a "footgun" that risks accidentally rewriting history [0][1][2]. Critics argue that the `jj edit` command leads to unintended rebases of subsequent work, though proponents suggest using `jj new` to create cheap snapshots instead of traditional Git-style staging [2][7][8]. Despite disagreements over the workflow's "backward" mental model, there is strong consensus that `jj`’s Git-compatible backend makes it a low-risk tool to trial within existing ecosystems [6][9].

22. Vercel April 2026 security incident (bleepingcomputer.com)

658 points · 375 comments · by colesantiago

Vercel has confirmed a security breach following claims by hackers that they are selling stolen data, though the company is still investigating the full scope of the incident. [src]

The Vercel security incident originated from a compromised third-party AI tool, Context.ai, which allowed attackers to escalate access through a Vercel employee's Google Workspace account [2][9]. Users criticized Vercel’s initial communication as "intentionally vague" and lacking actionable advice, such as the immediate rotation of all sensitive credentials [3][9]. The discussion highlights a growing consensus that the modern web's reliance on interconnected third-party services and AI agents has created a dangerously large attack surface [0][5][8]. While some argue this vulnerability could affect any host, others suggest it is a consequence of "vibe-coded" development practices and the extreme application of the Unix philosophy to hosting models [4][5][6][7].

23. The buns in McDonald's Japan's burger photos are all slightly askew (mcdonalds.co.jp)

708 points · 311 comments · by bckygldstn

McDonald's Japan's official English menu features a variety of regular, dinner, and breakfast items, including the Chicken Tatsuta and "Bai Burger" double-patty options, with a disclaimer that all product images are for illustrative purposes only. [src]

Users praised the McDonald's Japan website for its exceptional speed and low payload (806kB) compared to competitors like Burger King, whose site is significantly heavier and slower [0]. While some commenters noted that in-store kiosks have become much more responsive over time [1], others argued that the mobile app remains frustratingly slow and buggy [5]. The discussion also touched on the "askew" burger aesthetic, with users suggesting it is a deliberate attempt to look "home-made" [3], a reflection of Japanese "wabi-sabi" [6], or a result of strict truth-in-packaging laws [4].

24. The dangers of California's legislation to censor 3D printing (eff.org)

501 points · 469 comments · by salkahfi

California bill A.B. 2047 proposes mandating print-blocking algorithms on all 3D printers to prevent the production of firearms, a move critics argue will criminalize open-source software, stifle innovation, and create significant consumer privacy and surveillance risks. [src]

Commenters argue that California's legislation is ineffective because 3D printing is a less reliable method of manufacturing firearms than using metal pipes or purchasing unregulated components like rifled barrels [0][1]. While some believe the bill is a genuine, if misguided, attempt by gun control lobbyists to prevent the production of handgun frames and "Glock switches," others suspect it is driven by gun manufacturers seeking to eliminate competition from a growing cottage industry [1][2][6]. Critics contend the law unfairly targets 3D printing technology and innovators while failing to address the underlying availability of ammunition or the reality of the hundreds of millions of firearms already in national circulation [3][5][9].

25. Ban the sale of precise geolocation (lawfaremedia.org)

757 points · 196 comments · by hn_acker

Citing significant privacy and national security risks, this report argues that the U.S. must ban the sale of precise geolocation data to prevent both domestic surveillance abuses and exploitation by foreign intelligence services. [src]

Commenters argue that "anonymized" geolocation data is a rhetorical fiction, as precise coordinates for home and work can easily de-anonymize individuals by cross-referencing public records [1][9]. While some suggest banning data gathering without explicit contractual agreements or warrants [0][6], others contend that one-sided EULAs make genuine user consent impossible [4][7]. There is significant debate over the efficacy of the GDPR, with some viewing it as a needlessly complex compliance burden and others defending it as a clear regulation that was undermined by adtech industry narratives and a lack of enforcement [2][3][5][8].

26. I wrote to Flock's privacy contact to opt out of their domestic spying program (honeypot.net)

669 points · 258 comments · by speckx

Flock Safety denied a California resident's CCPA request to delete personal and vehicle data, claiming that as a service provider, it cannot fulfill requests directly because its customers own and control the collected information. [src]

The primary debate centers on whether Flock Safety acts as a mere service provider, similar to a cloud storage vendor, or as a data broker responsible for the information its cameras collect [1][3][9]. Flock claims that customers own the data, but critics argue the company maintains "unfettered access" to a massive surveillance network to drive its multi-billion dollar valuation while shifting legal liability to local agencies [0][8]. There is significant disagreement over whether license plate captures in public constitute "personal information" under the CCPA and whether the company's ownership of the hardware makes them legally responsible for deletion requests [4][5][6][7].

27. Rare concert recordings are landing on the Internet Archive (techcrunch.com)

708 points · 216 comments · by jrm-veris

The Internet Archive is digitizing music superfan Aadam Jacobs’ collection of over 10,000 rare concert cassette tapes recorded since the 1980s, featuring previously unreleased performances from artists like Nirvana, Phish, and Sonic Youth. [src]

The preservation of rare concert recordings on the Internet Archive highlights the historical value of bootlegging, with recordists sharing anecdotes of bands embracing high-quality fan recordings as valuable additions to their digital legacy [0][7]. While some users lament the loss of physical music shops where such "gems" were once easily accessible, others argue that copyright laws should be reformed to move music into the public domain after 30 years [2][3]. There is a strong consensus that artists benefit from these archives, leading to suggestions that musicians should officially record and sell live sets directly to attendees [1][2].

28. Spain to expand internet blocks to tennis, golf, movies broadcasting times (bandaancha.eu)

446 points · 460 comments · by akyuu

We couldn't summarize this story. [src]

The debate centers on whether Spain’s aggressive internet blocking is a response to a "service problem" or a "pricing problem." Some argue that piracy persists because official services are fragmented, laden with ads, and difficult to cancel [0][2], while others contend that many users pirate simply to get "free stuff" as a game or cultural habit, even when they can afford to pay [1][3]. Critics suggest these blocks are an "absurd" overreach by a bureaucratic state that undermines privacy and should be regulated at the EU level [4][6][7]. Ultimately, some believe pirate sites will always offer a superior user experience because they lack the legal and financial constraints of official channels [8].

29. Anna's Archive loses $322M Spotify piracy case without a fight (torrentfreak.com)

441 points · 451 comments · by askl

A U.S. judge awarded Spotify and major record labels a $322 million default judgment against Anna’s Archive after the shadow library failed to contest charges of scraping and distributing millions of tracks. The ruling includes a permanent injunction ordering service providers to disable the site's domains. [src]

Commenters largely view the $322M judgment as a symbolic gesture that will fail to collect any money or stop the site's operations, as the operators remain unidentified and likely reside in non-extradition jurisdictions [0][3][5]. While some users defend the archive's mission to preserve research and books, others argue that expanding into music piracy was a strategic blunder that invited unnecessary legal heat from major corporations for little added public benefit [2][8]. The discussion also highlights a deep frustration with the current music industry, noting that while piracy pays artists nothing, "scummy" streaming models and major labels also fail to fairly compensate niche creators [2][9].

30. College instructor turns to typewriters to curb AI-written work (sentinelcolorado.com)

466 points · 414 comments · by gnabgib

A Cornell University German instructor is requiring students to use manual typewriters for certain assignments to prevent the use of AI and translation tools while encouraging more intentional, distraction-free writing. [src]

Educators are increasingly returning to proctored, paper-based exams and handwritten assignments to ensure students possess competence beyond AI prompting [0][2][7]. While some argue that high-stakes exams are artificial and stressful compared to rewarding project work [1][8], others contend that projects have always been susceptible to cheating and are better suited for learning than evaluation [5][9]. Meanwhile, students report a confusing lack of consensus on AI policy, with some instructors banning the technology entirely while others mandate its use to produce "Ph.D level" work [3]. Some skeptics note that even physical mediums like typewriters can be bypassed by simply transcribing AI-generated drafts [4].

31. The local LLM ecosystem doesn’t need Ollama (sleepingrobots.com)

640 points · 208 comments · by Zetaphor

The article argues that users should abandon Ollama due to its history of downplaying its reliance on `llama.cpp`, performance issues caused by a buggy custom backend, misleading model naming, and a shift toward venture-backed cloud services that compromise the project's original local-first, open-source mission. [src]

While some argue that `llama.cpp` has evolved to offer a comparable one-command setup and built-in GUI [1][3][9], many users maintain that Ollama remains superior for its seamless model management and "OpenAI compatible" API [5][6]. Critics of the transition note that `llama.cpp` can still be unfriendly to "normal users" and prone to versioning errors when loading new architectures like Gemma 4 [2][4][7]. Ultimately, the consensus suggests both tools serve different needs, with Ollama excelling at UX and Apple Silicon performance while `llama.cpp` offers more granular control and up-to-date fixes [2][8].

32. Apple's accidental moat: How the "AI Loser" may end up winning (adlrocha.substack.com)

436 points · 384 comments · by walterbell

Apple is emerging as a surprise AI winner by leveraging its "unified memory" chip architecture and vast ecosystem of personal user context to run increasingly commoditized, high-performance open-source models locally on-device, avoiding the massive infrastructure costs and privacy concerns plaguing competitors like OpenAI. [src]

Apple’s strategy is viewed by some as a classic "leapfrog" approach, waiting for competitors to make sunk investments before architecting a superior, integrated consumer solution [0][2]. There is a growing consensus that local models are rapidly closing the gap with cloud-based AI; if local performance reaches the level of current top-tier models within the next two years, the need for third-party cloud subscriptions may vanish for many users [1][6]. However, skeptics argue that hardware constraints like RAM will limit mobile local AI [9], while others criticize Apple for maintaining a "walled garden" that increasingly prioritizes integrated advertising over user experience [4][7].

33. Live Nation illegally monopolized ticketing market, jury finds (bloomberg.com)

623 points · 191 comments · by Alex_Bond

A jury has found Live Nation guilty of illegally monopolizing the ticketing market following an antitrust trial investigating the company's dominant industry practices. [src]

The jury's finding that Live Nation overcharged consumers by $1.72 per ticket has been met with cynicism regarding the actual impact on individual refunds [5]. Commenters argue that the core issue is vertical integration, where Ticketmaster lacks the incentive to stop scalpers because it profits from fees on both initial sales and secondary market resales [0][7]. While some suggest banning ticket transfers to eliminate scalping [1], others point out that this creates significant friction for legitimate fans who need flexibility for illness or gifting [2][9], leading to a debate over whether concert tickets should be treated like non-transferable airline tickets or flexible dinner reservations [3][8]. Additionally, there is praise for the federalist system, as the involvement of 30 states ensured the case continued despite potential changes in federal administration [4].

34. Backpacks got worse on purpose (worseonpurpose.com)

428 points · 384 comments · by 113

VF Corporation’s acquisition of major backpack brands like JanSport and The North Face led to a deliberate decline in quality, using cheaper materials and hardware to maximize profit margins while leveraging established brand reputations to drive repeat purchases. [src]

While modern products are often perceived as lower quality, some argue that inflation-adjusted prices for high-end goods remain consistent with the past; the primary issue is that "cheap" alternatives now flood the market, making it difficult for consumers to identify genuine quality [0][4]. This shift is attributed to private equity firms leeching value from established brands and a consumer tendency to prioritize the lowest price, though some maintain that these budget options provide necessary access for those with limited needs or funds [3][6][8]. However, critics point out that "inflation-adjusted" arguments ignore a massive decline in median purchasing power and that low-quality tools often fail to perform even basic tasks [2][9]. For those seeking reliable gear, users recommend brands like Osprey that maintain independent ownership and lifetime warranties [5].

35. US appeals court declares 158-year-old home distilling ban unconstitutional (nypost.com)

460 points · 337 comments · by t-3

The 5th U.S. Circuit Court of Appeals has struck down a 158-year-old federal ban on home distilling, ruling that the Reconstruction-era law is an unconstitutional overreach of congressional taxing power. [src]

The ruling has sparked debate over the federal government's power to regulate non-commercial home activities under the Commerce Clause, with some users arguing that precedents like *Gonzales v. Raich* and *Wickard v. Filburn* should be overturned next [0][6]. While many expect federal marijuana legalization within a decade due to broad public support, others remain opposed due to the "negative externalities" of the smell and smoke in public or multi-family housing [1][3][4]. Additionally, commenters clarified that the primary danger of home distilling is fire rather than methanol poisoning, which historically stems from industrial alcohol rather than grain fermentation [5].

36. Cybersecurity looks like proof of work now (dbreunig.com)

557 points · 213 comments · by dbreunig

The rise of highly capable AI models like Anthropic’s Mythos is shifting cybersecurity into a "proof of work" model, where system hardening requires organizations to outspend attackers on token-based exploit discovery to ensure security. [src]

The integration of LLMs into cybersecurity creates a "proof of work" dynamic where defenders may hold a structural advantage due to full source code access and the ability to fix vulnerabilities before attackers discover them [0][6]. However, this shift also empowers attackers by drastically lowering the labor costs of reverse engineering and decompilation through token-intensive automated audits [1][4][7]. While some argue that defenders must be perfect while attackers only need one lucky break [8], others suggest that the rapid evolution of models is currently outperforming manual improvements to security harnesses [2].

37. Darkbloom – Private inference on idle Macs (darkbloom.dev)

500 points · 250 comments · by twapi

Darkbloom is a decentralized AI network that utilizes idle Apple Silicon machines to provide private, OpenAI-compatible inference at costs up to 70% lower than centralized providers. The platform uses hardware-level encryption and hardened runtimes to ensure operators cannot access user data while retaining 95% of revenue. [src]

Users are skeptical of Darkbloom's projected earnings, noting that current demand is insufficient to justify claims of making $1,000–$2,000 monthly [0][1]. While the developers admit these figures assume 100% utilization, independent calculations suggest a more modest revenue of roughly $67 per month for a fully utilized high-end Mac [3][4]. Technical debates center on the security of the "private inference" model; critics argue Macs lack a true hardware TEE for the GPU, while the developers claim that macOS kernel-level protections like SIP and Hardened Runtime can effectively isolate memory [2][5][7]. Furthermore, some users warn that the requirement to install MDM software grants the company significant control over the host machine, making it unsuitable for primary personal devices [9].

38. Nothing Ever Happens: Polymarket bot that always buys No on non-sports markets (github.com)

469 points · 274 comments · by m-hodges

"Nothing Ever Happens" is an open-source Python bot designed to automatically buy "No" outcomes on standalone, non-sports markets on the Polymarket prediction platform. [src]

The "Nothing Ever Happens" bot is presented as a "meme" project that bets against fantastical outcomes, leveraging the fact that 73% of Polymarket events resolve to "No" [0][1]. While some argue this strategy capitalizes on a human bias toward "exciting" outcomes that are often overpriced, others contend that market efficiency and bookie cuts likely price these bets at their fair value, negating potential profits [2][4][7][8]. Commenters emphasize that while inefficient markets may offer positive expected value (EV) initially, open-sourcing such strategies quickly leads to a stable feedback loop where the market reprices to eliminate the edge [3][9].

39. Android now stops you sharing your location in photos (shkspr.mobi)

424 points · 319 comments · by edent

Google has updated Android to automatically strip geolocation metadata from photos shared via the web, Bluetooth, and email to enhance user privacy, a move that complicates the functionality of niche websites and services that rely on geotagged image data. [src]

The consensus among commenters is that stripping EXIF data is a necessary privacy protection, as most users are unaware they are sharing live GPS coordinates with random websites [0][1]. However, critics argue this "toddler-proofing" approach breaks legitimate workflows, such as government data collection or file naming, and frustrates power users who want full control over their data [3][4][9]. Some participants remain skeptical of Google's motives, noting that the company often prioritizes privacy only when it doesn't interfere with advertising revenue or data consolidation [2][6].

40. Make tmux pretty and usable (2024) (hamvocke.com)

457 points · 278 comments · by speckx

This guide explains how to customize tmux by editing the `.tmux.conf` file to improve usability and aesthetics. It provides specific configurations for remapping prefix keys, creating intuitive pane splits, enabling mouse support, and applying custom color schemes to the status bar and panes. [src]

While many users have migrated from tmux to modern alternatives like Zellij for its superior UI and mouse handling [0][4], others have returned to tmux due to stability issues or specific key-binding fixes [2]. A significant portion of the community argues that tmux should be used minimally for session persistence rather than complex window management, which they prefer to handle via native terminal features or window managers [5][8][9]. For those seeking a middle ground, "Control Mode" (`tmux -CC`) is highlighted as a way to integrate tmux sessions directly into a terminal's native tabs and scrollback [6].

41. US Bill Mandates On-Device Age Verification (reclaimthenet.org)

398 points · 328 comments · by ronsor

The Parents Decide Act (H.R. 8250) would require operating system providers like Apple and Google to verify the age of all users during device setup, creating a mandatory national identification layer for smartphones and computers under the guise of child safety. [src]

Commenters are divided on whether this bill represents a "privacy-preserving" approach to age verification that could preempt more draconian measures [3][6], or a "draconian" overreach that ignores the root causes of poor parenting [2]. Significant concerns exist regarding the bill's vague definitions of "operating system" and "mobile device," which critics argue could inadvertently criminalize independent software development or apply to hardware like cars and appliances [1][4][5][6]. Furthermore, some skeptics point out that on-device verification is easily bypassed by children borrowing adult devices or using accounts registered by others [7][9].

42. Ask HN: Who is using OpenClaw?

337 points · 388 comments · by misterchocolat

An individual active in the AI community is inquiring whether anyone is actually using OpenClaw, noting a lack of adoption within their professional circles. [src]

While some users find OpenClaw valuable for managing personal knowledge bases, tracking health metrics, and automating family history documentation [0][4][6], others dismiss it as "manufactured bot hype" driven by social media signaling rather than utility [1][2][3]. Practical adoption is frequently hindered by high token costs—sometimes exceeding $100 a month—and reliability issues where agents repeatedly fail to execute scheduled tasks [5][7]. Despite these frustrations, some proponents view the tool as a "Dropbox moment" that simplifies complex automation for non-technical users, potentially serving as a prototyping phase for more deterministic software [8][9].

43. All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018) (esa.int)

451 points · 264 comments · by cybermango

All 12 Apollo moonwalkers experienced "lunar hay fever" caused by sharp, abrasive lunar dust that smells like burnt gunpowder and can damage human lung and brain cells. ESA is now researching these toxic effects to ensure the safety of future long-term missions to the Moon. [src]

The "gunpowder" scent reported by moonwalkers is attributed to the rapid oxidation of lunar dust when it first contacts oxygen in an airlock, whereas the distinct ozone smell of space is compared to UV sterilizers, lightning, or photocopiers [1][3][4][5]. Discussion regarding Mars highlights that its regolith contains toxic perchlorates, presenting a significant barrier to colonization that would require specialized docking suits or massive terraforming efforts to neutralize the soil [0][2][8][9]. While some argue that Mars’s solid ground is preferable to the acidic but pressure-stable atmosphere of Venus, others express concern over the long-term health risks of exposure to "space asbestos" [2][6][7].

44. Archive of BYTE magazine, starting with issue #1 in 1975 (archive.org)

562 points · 147 comments · by DamnInteresting

The Internet Archive has digitized the September 1975 debut issue of *BYTE*, a seminal "small systems journal" featuring guides on microprocessors, assembly language, and hardware kits for early computing enthusiasts. [src]

Readers remember *BYTE* as a massive, book-like publication that often exceeded 300 pages, characterized by a high density of advertisements that served as a vital directory for hardware and software in the pre-internet era [0][2]. While some found the 1:3 article-to-ad ratio jarring, others viewed the targeted ads as essential content, often "devouring" issues cover-to-cover while living in remote areas or writing code by hand before owning a computer [0][3][7][9]. The magazine is fondly recalled for its platform-agnostic technical depth and legendary columns like Jerry Pournelle’s "Chaos Manor," though it eventually shifted focus toward the high-end PC market before the rise of the web rendered print media obsolete [3][4][5].

45. I’m spending months coding the old way (miguelconner.substack.com)

357 points · 351 comments · by evakhoury

Miguel Conner is attending a programming retreat at the Recurse Center in Brooklyn to improve his technical skills by coding without AI assistance, focusing on building large language models from scratch and mastering Python to gain a deeper understanding of computer science fundamentals. [src]

The integration of LLMs into software development has sparked a debate over the loss of "cognitive persistence," with experienced developers arguing that reaching for AI after only 20 minutes of debugging prevents the deep learning that comes from multi-hour or multi-week struggles [0][2]. While some see AI as a vital tool for physical longevity and productivity [1][3], others emphasize that manual coding fosters "active recall" and a mental model of the codebase that "vibe coding" lacks [4][8]. Educators have noted that removing modern luxuries, such as using line editors and assembly, forces students to plan and internalize logic in ways high-level tools do not [6], though critics question how new developers can realistically gain this "old hand" experience at scale [5][7].

46. Cal.com is going closed source (cal.com)

390 points · 316 comments · by Benjamin_Dobell

Scheduling platform Cal.com is transitioning to a closed-source model to protect customer data from AI-driven security threats, though it will maintain a separate open-source version called Cal.diy for hobbyists and developers. [src]

Cal.com’s decision to go closed source is framed by its leadership as a defense against AI-driven vulnerability discovery [3], though many commenters suspect the move is actually a business decision to prevent "copyright-washing" or to combat declining conversion rates for self-hosted users [4][5][7]. While some argue that closing source code provides a necessary delay against automated attackers [6][9], critics contend this is a return to "security through obscurity" that ignores the benefits of shared auditing budgets in open-source ecosystems [0][1][8]. Others suggest that if LLMs are proficient at finding exploits, developers should simply integrate them into their own pre-release CI/CD pipelines to harden code before it goes public [2].

47. Mozilla Thunderbolt (thunderbolt.io)

367 points · 338 comments · by dabinat

Mozilla has launched Thunderbolt, an open-source and cross-platform AI client designed for enterprises to maintain data sovereignty through self-hosting and customizable, model-agnostic infrastructure. [src]

The launch of Mozilla Thunderbolt has reignited a debate over Mozilla’s core mission, with many users urging the organization to stop "distracting" projects and focus exclusively on browser performance and web standards [0][3][9]. Critics point to a significant performance gap between Firefox and Chrome [9] and the omission of features like Web USB [6], while defenders argue that Firefox remains a superior daily driver for privacy and ad-blocking [1][5]. However, some clarify that this project stems from the independent, revenue-positive Thunderbird team and serves as a necessary attempt to diversify income streams away from Google [2][8].

48. The economics of software teams: Why most engineering orgs are flying blind (viktorcessan.com)

417 points · 281 comments · by kiyanwang

Most engineering organizations lack financial visibility, failing to track the roughly €1 million annual cost of an eight-person team against the 3x to 5x value return required for viability. As AI reduces the competitive moat of large codebases, companies must shift from activity metrics to rigorous economic analysis. [src]

The discussion centers on whether the primary challenge of software engineering is the technical implementation or the conceptual task of defining what to build [0][4][8]. While some argue that programming is merely a means to explore a problem space [0], others contend that complex engineering remains a significant hurdle that cannot be dismissed as easy [4][8]. There is strong skepticism regarding the article's optimism for AI agents; critics argue that LLMs currently produce "bricked" codebases where structural integrity is sacrificed for a polished exterior, eventually leading to a total inability to make progress [3][5]. Despite these technical concerns, some commenters find the prospect of an "agent-to-agent" world appealing if it eliminates corporate bureaucracy and management layers [1][2].

49. €54k spike in 13h from unrestricted Firebase browser key accessing Gemini APIs (discuss.ai.google.dev)

398 points · 288 comments · by zanbezi

A developer incurred over €54,000 in Gemini API charges within 13 hours after an unrestricted Firebase browser key was exploited by automated traffic, leading Google to emphasize the importance of spend caps and server-side key management. [src]

The discussion highlights a consensus that cloud providers' lack of hard spending caps is a major liability, as budget alerts often trigger hours after costs have already spiraled into life-altering sums [0][2][3]. While some argue that real-time billing synchronization is technically difficult [5], others contend that the current system is predatory and should be replaced by prepaid models or legal protections against unauthorized overages [8][9]. A specific point of contention is the security of API keys; while historically treated loosely in some Google contexts, their use for expensive LLM inference now requires a level of secrecy that many developers have failed to implement [1][4].