~hackernews | Bookmarks (12528)
-
Meta and Yandex are de-anonymizing Android users' web browsing identifiers
An overview of Yandex identifier sharing An overview of Yandex identifier sharing A timeline of web...
-
Covert Web-to-App Tracking via Localhost on Android
While there are subtle differences in the way Meta and Yandex bridge web and mobile contexts...
-
Claude has learned how to jailbreak Cursor
I have “rm” specifically disallowed, along with “mv” and a few other scary commands. Claude realized...
-
Wendelstein 7-X sets new fusion record
The Wendelstein 7-X nuclear fusion research reactor in Greifswald has reported a new record. The Max...
-
There should be no Computer Art (1971)
The dominating and most important person in the art world today is the art dealer. He...
-
Plutonium Mountain: The 17-year mission to guard remains of Soviet nuclear tests
On the desolate steppe of eastern Kazakhstan, the Soviet Union carried out 456 nuclear explosive tests...
-
Fun with Futex
Implementing an optimized lock in Linux requires some Operating System help. You can only get so...
-
Ask HN: Cloud vs. Edge Computing–Why Choose a Local NAS?
With cloud storage subscriptions like iCloud, OneDrive, Google Cloud, and Dropbox piling up, edge computing—running your...
-
Stop Over-Thinking AI Subscriptions – Peter Steinberger
I’ve been working heavily with AI for the past few months, and many times when I...
-
A Complete Guide to Meta Prompting
One of the first benefits I found when using Large Language Models (LLMs) was that they...
-
Poison Pill: Is the killer behind 1982 Tylenol poisonings still on the loose?
In the early hours of September 29, 1982, two Kane County sheriff’s deputies, Joseph Chavez and...
-
Why GUIs are built at least 2.5 times
Patricia Aas, 30 May 2025 Over the past few days I’ve been writing on LinkedIn (here...
-
Running Qwen3:30B MoE on an RTX 3070 laptop with Ollama
Running large language models locally is no longer a research novelty, it is a workflow that...