I now assume that all ads on Apple news are scams
The article discusses the author's experience with suspicious ads on the Apple News platform, highlighting concerns about the prevalence of scam advertisements and the need for greater scrutiny and regulation of digital advertising on platforms like Apple News.
The Waymo World Model
The article discusses Waymo's development of the Waymo World Model, a new simulation platform for autonomous driving that aims to improve the safety and performance of self-driving cars by creating a highly realistic virtual environment to test and train AI systems.
Microsoft open-sources LiteBox, a security-focused library OS
Litebox is an open-source library from Microsoft that provides a lightweight, customizable, and accessible lightbox experience for web applications. It offers a range of features, including support for images, videos, and iframes, as well as keyboard accessibility and responsive design.
An Update on Heroku
Heroku announces a major update, outlining changes to its platform, pricing, and support for various languages and frameworks. The blog post provides details on the company's new direction and its commitment to supporting developers' evolving needs.
NIMBYs aren't just shutting down housing
The article explores how NIMBYism (Not In My Backyard) goes beyond just opposing new housing, and can also manifest in efforts to limit growth, preserve the status quo, and restrict changes to a community. It highlights how NIMBY attitudes can shape broader political and economic decisions, not just local land use.
Fraud investigation is believing your lying eyes
This article discusses the steps involved in a fraud investigation, including gathering evidence, conducting interviews, and analyzing financial records. It provides an overview of the process that law enforcement and financial institutions use to detect and investigate fraudulent activities.
Show HN: If you lose your memory, how to regain access to your computer?
Due to bike-induced concussions, I've been worried for a while about losing my memory and not being able to log back in.
I combined shamir secret sharing (hashicorp vault's implementation) with age-encryption, and packaged it using WASM for a neat in-browser offline UX.
The idea is that if something happens to me, my friends and family would help me get back access to the data that matters most to me. 5 out of 7 friends need to agree for the vault to unlock.
Try out the demo in the website, it runs entirely in your browser!
I spent 5 years in DevOps – Solutions engineering gave me what I was missing
The article discusses the evolution of the DevOps role into Solutions Engineering, highlighting the growing need for engineers who can bridge the gap between technical and business domains, and provide comprehensive solutions that address both operational and customer-facing aspects of software development.
Man who videotaped himself BASE jumping in Yosemite arrested, says it was AI
A man was videotaped base jumping in Yosemite National Park, which is illegal. He claims the footage was created using AI technology, not actual footage of him committing the crime.
Oregon raised spending by 80%, math scores dropped
The article discusses the recently released National Assessment of Educational Progress (NAEP) results, which show declining academic performance in reading and math across the United States. The author argues that these results highlight the need for significant educational reforms to address the widening achievement gaps and improve student outcomes.
Masked namespace vulnerability in Temporal
The article discusses a vulnerability in the Temporal programming language, known as the 'Masked Namespace Vulnerability' (CVE-2025-14986). It explains how the vulnerability could allow attackers to bypass security measures and execute arbitrary code on affected systems.
Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox
Example repo: https://github.com/valdanylchuk/breezydemo
The underlying ESP-IDF component: https://github.com/valdanylchuk/breezybox
It is something like Raspberry Pi, but without the overhead of a full server-grade OS.
It captures a lot of the old school DOS era coding experience. I created a custom fast text mode driver, plan to add VGA-like graphics next. ANSI text demos run smooth, as you can see in the demo video featured in the Readme.
App installs also work smoothly. The first time it installed 6 apps from my git repo with one command, felt like, "OMG, I got homebrew to run on a toaster!" And best of all, it can install from any repo, no approvals or waiting, you just publish a compatible ELF file in your release.
Coverage:
Hackaday: https://hackaday.com/2026/02/06/breezybox-a-busybox-like-she...
Hackster.io: https://www.hackster.io/news/valentyn-danylchuk-s-breezybox-...
Reddit: https://www.reddit.com/r/esp32/comments/1qq503c/i_made_an_in...
Controlled Cot: A SystemLevel Design for LLM's Reliable Reasoning
The article explores a novel system-level design approach called Controlled CoT (Controlled Complexity of Transformation) for optimizing the performance and efficiency of digital systems. It emphasizes the importance of managing the complexity of transformations within the system to achieve improved power, area, and delay characteristics.
Waymo exec admits remote operators in Philippines help guide US robotaxis
Waymo, a leading self-driving car company, has revealed that it employs remote human operators in the Philippines to help guide its autonomous vehicles in the United States when they encounter challenging situations.
There is empirical evidence of AI acting against our instructions
The article discusses concerns raised by AI pioneer Yoshua Bengio, a winner of the Turing Award, about the potential for AI systems to act against human instructions. Bengio cites empirical evidence and calls for greater oversight and safeguards to ensure AI alignment with human values and goals.
Who entered Epstein's jail tier the night of his death?
The article discusses the release of records related to Jeffrey Epstein's death, including surveillance footage from outside his jail cell on the day of his apparent suicide. The records shed light on the circumstances surrounding Epstein's death and the handling of the investigation by prison officials and authorities.
Show HN: A password system with no database, no sync, and nothing to breach
Hi HN, Bastion Enclave is an experiment in removing centralized trust from password management by eliminating server-side state entirely. Instead of storing an encrypted vault or syncing secrets through a backend, Bastion computes credentials deterministically on-the-fly using explicit cryptographic inputs. Given the same master entropy, service name, username, and version counter, the same password is reproduced across platforms. There is no account system, no database, and no persistent server storage — the server serves static code only. Password generation uses domain-separated salts and PBKDF2-HMAC-SHA512 (210k iterations) to produce a byte stream, followed by unbiased rejection sampling to avoid modulo bias when mapping to character sets. Nothing is stored; passwords are derived when needed and discarded immediately after use. When users choose to persist data locally (vault state, notes, file keys), encryption is handled separately using Argon2id (64 MB memory, 3 iterations) to derive a master key, followed by AES-256-GCM for authenticated encryption. All plaintext exists only in volatile memory; closing the tab tears down the runtime. Recovery and key escrow are handled via Shamir Secret Sharing over a large prime field (secp256k1 order) using a hybrid scheme: the secret is encrypted with a random session key, and only that key is split into shards. Invalid or mismatched shards fail cryptographically via AEAD tag verification. The security claim here is architectural, not policy-based: no stored vaults, no encrypted blobs on servers, no sync endpoints, and no recovery infrastructure to subpoena or breach. Attacking Bastion means attacking individual devices, not a centralized honeypot. This design intentionally trades convenience (sync, automated recovery) for reduced attack surface and deterministic guarantees. It assumes a trusted local execution environment and a strong master secret; it does not attempt to defend against a compromised OS or browser runtime. Live demo: https://bastion-enclave.vercel.app Spec / source / threat model: https://github.com/imkevinchasse/Bastion-Enclave-repo-V2 I’d appreciate critique of the threat model and whether this class of design meaningfully removes attack vectors inherent to cloud-based managers.
Show HN: GitClaw – An AI assistant that runs in GitHub Actions
Gitclaw is a command-line tool that simplifies and automates common Git workflows, providing a user-friendly interface for managing repositories, branches, and other Git operations.
US Accuses China of Secret Nuclear Explosive Tests
The U.S. has accused China of conducting secret nuclear explosive tests in violation of an international treaty, raising concerns about China's nuclear capabilities and the potential impact on global nuclear nonproliferation efforts.
We Moved Object Storage Metadata Off LSM Trees
The article discusses the challenges of using LSM trees for object storage metadata and how the authors at Fractal moved their metadata off LSM trees to improve performance and reduce complexity. They describe their approach and the benefits they achieved.