Entertainment

How Safe Is Your Job? โ€” AI Jobs Report

How Safe Is Your Job? โ€” AI Jobs Report

๐Ÿ”ฅ Read this trending post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ“Œ **What Youโ€™ll Learn**: "> ๐Ÿค– Type in your job and find out how much AI could change it. Takes 5 seconds. What's your job? Check My Job Based on data from 342 jobs tracked by the Bureau of Labor Statistics. When Will You Feel It? Get the Full Report Detailed salary trends, future outlook, and personalised career advice โ€” delivered to your inbox. You're on the list. We'll email you when it's ready. Think a friend should check their job? ๐Ÿค– Analyzing your job... Scanning 342 occupations... AIJobsReport…
Read More
concensure/Semantic: Semantic analysis ยท GitHub

concensure/Semantic: Semantic analysis ยท GitHub

โœจ Read this awesome post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ’ก **What Youโ€™ll Learn**: Local Rust service for deterministic code retrieval by symbol, span, and logic graph. IDE Semantic-First Integration Use the semantic-first integration guide for RooCode/KiloCode/Codex/Claude wiring, middleware policy controls, and end-to-end flow diagrams: docs/IDE_SEMANTIC_FIRST.md docs/TOOL_CALLING_GUIDE.md (objective + usage of API and MCP tool callings) docs/AB_TEST_DEV_RESULTS.md (development benchmark history and latest metrics) engine shared contracts parser Tree-sitter extraction storage SQLite + Tantivy indexer repo indexing orchestration retrieval operation handlers watcher incremental file updates api Axum JSON service Implemented semantic layers now include logic nodes, persisted control/data-flow edges, semantic…
Read More
axios Compromised on npm – Malicious Versions Drop Remote Access Trojan

axios Compromised on npm – Malicious Versions Drop Remote Access Trojan

โœจ Discover this insightful post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ’ก **What Youโ€™ll Learn**: On March 31, 2026, StepSecurity identified two malicious versions of the widely used axios HTTP client library published to npm: axios@1.14.1 and axios@0.30.4. Both versions were published using the compromised npm credentials of a lead axios maintainer, bypassing the project's normal GitHub Actions CI/CD pipeline. The attacker changed the maintainer's account email to an anonymous ProtonMail address and manually published the poisoned packages via the npm CLI.The malicious versions inject a new dependency, plain-crypto-js@4.2.1, which is never imported anywhere in the axios source code. Its…
Read More
March 30th, 2026 โ€” Authenticated user data cached

March 30th, 2026 โ€” Authenticated user data cached

โœจ Read this must-read post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ“Œ **What Youโ€™ll Learn**: Table of ContentsImpactIncident TimelineWhat Happened?Preventative Measures๐Ÿš„Edits have been added to provide additional clarity as of 00:00 UTC, in addition to an update to the title for accuracyRailway experienced an incident where CDN features were accidentally enabled for some domains without users enabling them.For those affected, this may have resulted in potentially authenticated data being served to unauthenticated users.On March 30, 2026 between 10:42 UTC and 11:34 UTC (52 minutes), a Railway engineer rolled out a change causing HTTP GET responses to be incorrectly cached across…
Read More

A sea of sparks: Seeing radioactivity (Maurycy’s blog)

๐Ÿš€ Explore this trending post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ’ก **What Youโ€™ll Learn**: 2025-12-14 โ€” 2026-01-25 (Ionizing Radiation) (Physics) Atoms are very small[citation needed]. Seeing individual atoms is completly impossible: They are thousands of times smaller smaller then the wavelength of light. ... but is it possible to see an atom do something? Lots of chemical reactions glow, but none of them are bright enough to see single atoms... but what about nuclear reactions... Heavy elements like uranium often decay by the emission of a helium nucleus. This alpha particle is ejected with around a picojoule of kinetic…
Read More
Why I’m betting on ATProto (and why you should, too)

Why I’m betting on ATProto (and why you should, too)

๐Ÿ”ฅ Read this awesome post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ’ก **What Youโ€™ll Learn**: Iโ€™m coming home from ATmosphereConf filled with hope and a renewed sense of purpose. I want to talk about why.But first, some context.I have strong opinions about social media. A lot of these come from reading books like The Chaos Machine and Careless People. I highly recommend both if this is something youโ€™re interested in, but if you just want a high-level overview, the story goes something like this:Many social platforms started as human-centered. Then they had to start making money. A lot of them…
Read More

Your ticket is a prompt โ€” Dheer

๐Ÿ”ฅ Read this insightful post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ“Œ **What Youโ€™ll Learn**: A lot of people I speak to donโ€™t realize that their tickets are now prompts, and if we continue using them the way we used them pre-AI, they will poison your context. The words on the ticket shape what an agent considers in scope and constrain its reasoning. A fragment produces fragment-shaped work. Last week I skipped enforcing strict workflows on my agent team for a fairly straightforward task. They gave into their natural instinct immediately: push work to other tickets. One agent wrote an…
Read More
Rolling out to all developers on Play Console and Android Developer Console

Rolling out to all developers on Play Console and Android Developer Console

โœจ Read this must-read post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ’ก **What Youโ€™ll Learn**: Posted by Matthew Forsythe, Director Product Management, Android App Safety Android is for everyone. Itโ€™s built on a commitment to an open and safe platform. Users should feel confident installing apps, no matter where they get them from. However, our recent analysis found over 90 times more malware from sideloaded sources than on Google Play. So as an extra layer of security, we are rolling out Android developer verification to help prevent malicious actors from hiding behind anonymity to repeatedly spread harm. Over the past…
Read More
America Is Now a Rogue Superpower

America Is Now a Rogue Superpower

โœจ Explore this insightful post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: ๐Ÿ’ก **What Youโ€™ll Learn**: Whenever and however Americaโ€™s war with Iran ends, it has both exposed and exacerbated the dangers of our new, fractured, multipolar realityโ€”driving deeper wedges between the United States and former friends and allies; strengthening the hands of the expansionist great powers, Russia and China; accelerating global political and economic chaos; and leaving the United States weaker and more isolated than at any time since the 1930s. Even success against Iran will be hollow if it hastens the collapse of the alliance system that for eight…
Read More
Turning a MacBook into a Touchscreen with $1 of Hardware

Turning a MacBook into a Touchscreen with $1 of Hardware

๐Ÿš€ Explore this awesome post from Hacker News ๐Ÿ“– ๐Ÿ“‚ **Category**: โœ… **What Youโ€™ll Learn**: We turned a MacBook into a touchscreen using only $1 of hardware and a little bit of computer vision. The proof-of-concept, dubbed โ€œProject Sistineโ€ after our recreation of the famous painting in the Sistine Chapel, was prototyped by me, Kevin, Guillermo, and Logan in about 16 hours. The basic principle behind Sistine is simple. Surfaces viewed from an angle tend to look shiny, and you can tell if a finger is touching the surface by checking if itโ€™s touching its own reflection. Kevin, back in…
Read More