HN Evening Brief - March 12, 2026


Welcome to your evening Hacker News brief for March 12, 2026. Today’s top 30 stories cover a diverse range of topics from AI agent security and formal languages for LLMs to scientific breakthroughs in cognitive decline and innovative technical projects.


AI & Tech Policy

Kotlin creator’s new language: a formal way to talk to LLMs instead of English codespeak.dev

Andrey Breslav, creator of the Kotlin programming language, has introduced a new formal language designed specifically for communicating with large language models. The language aims to provide more precise, unambiguous interactions with LLMs compared to natural language, which can be prone to misinterpretation. This addresses a fundamental challenge in AI development where the quality of outputs depends heavily on how prompts are phrased, and small variations can lead to significantly different results. The formal syntax allows developers to encode intent and constraints more explicitly, potentially reducing the need for extensive prompt engineering and making AI interactions more predictable.

Discussion highlights: Commenters debated whether a formal language is really needed or if prompt engineering will continue to evolve. Some questioned whether this adds another layer of complexity, while others saw value in having a structured way to communicate with LLMs. There was discussion about how this compares to existing approaches like function calling and structured outputs.

Show HN: Understudy – Teach a desktop agent by demonstrating a task once github.com

Understudy is a local-first desktop agent runtime for macOS that can operate GUI apps, browsers, shell tools, files, and messaging in one session. Its key innovation is teach-by-demonstration: users perform a task once, the agent records screen video and semantic events, extracts intent rather than coordinates, and turns it into a reusable skill. The demo shows teaching the agent to Google Image search, download a photo, remove background in Pixelmator Pro, export, and send via Telegram, then asking it to repeat the task for Elon Musk. The published skill stores intent steps and route options, not brittle macros, allowing it to prefer faster routes when available.

Discussion highlights: Users were excited about the teach-by-demonstration approach and asked about privacy implications of screen recording. There was discussion about how this compares to other automation tools like Keyboard Maestro and the challenges of handling UI changes. The macOS-only limitation was noted, with hopes for cross-platform support.

Show HN: Rudel – Claude Code Session Analytics github.com

Rudel provides analytics for Claude Code sessions after the creators realized they had no visibility into their own usage patterns. They built it to understand which sessions were efficient, why some got abandoned, and whether they were improving over time. The tool analyzed 1,573 real Claude Code sessions with 15M+ tokens and 270K+ interactions, revealing that skills were only used in 4% of sessions, 26% of sessions are abandoned (most within 60 seconds), and session success rates vary significantly by task type. Error cascade patterns appear in the first 2 minutes and can predict abandonment with reasonable accuracy. The tool is free and open source.

Discussion highlights: Commenters were interested in the data insights and asked about methodology for measuring “success.” There was discussion about whether analytics could help identify patterns for better agent behavior. Some questioned whether session analytics might discourage experimentation, while others saw it as valuable for understanding agent performance.

Show HN: Axe – A 12MB binary that replaces your AI framework github.com

Axe is a 12MB binary written in Go that treats LLM agents like Unix programs. Each agent is a TOML config with a focused job like code reviewer, log analyzer, or commit message writer. It supports stdin piping so commands like git diff | axe run reviewer work, and agents can call other agents via tool use with depth limiting. Key features include persistent memory across runs, MCP server support, built-in tools like web_search and url_fetch, multi-provider support (Anthropic, OpenAI, Ollama, or models.dev format), and path-sandboxed file operations. The philosophy is that good software is small, focused, and composable, and AI agents should follow this principle rather than being monolithic chatbot frameworks.

Discussion highlights: Commenters liked the Unix philosophy approach and asked about how it handles state persistence. There was discussion about whether replacing frameworks with simple binaries is practical for complex workflows. Some noted similarities to other lightweight agent tools and asked about the trade-offs compared to full-featured frameworks.

Claude now creates interactive charts, diagrams and visualizations claude.com

Anthropic has added the ability for Claude to generate interactive charts, diagrams, and visualizations directly in the interface. Users can ask Claude to create visual representations of data and get interactive, rendered outputs that can be explored. This feature extends Claude’s capabilities beyond text into visual communication, making it easier to understand complex data at a glance. The implementation includes support for various chart types and can produce visualizations that would otherwise require separate tools or significant manual work.

Discussion highlights: Users were impressed by the feature but noted that it might increase the “confidently incorrect” problem. Some reported hitting message length limits when generating complex visualizations. There was discussion about whether this changes how people interact with LLMs and whether visual outputs help with debugging or just make errors look more polished. Others praised Anthropic’s shipping speed and wondered about the underlying implementation.


Security & Privacy

Malus – Clean Room as a Service malus.sh

Malus is presented as a clean room service that provides isolated environments for security testing and analysis. The service aims to help organizations safely examine suspicious files, malware, and other potentially dangerous content without risking their production systems. By providing a dedicated, sandboxed environment, Malus enables security researchers and incident responders to analyze threats while maintaining separation from critical infrastructure. This approach is particularly valuable for organizations that need to handle unknown or potentially malicious code safely.

Discussion highlights: Commenters asked about the technical implementation and how it compares to existing sandbox solutions. There was discussion about whether “as a service” is the right model for sensitive security workloads given data privacy concerns. Some questioned the value proposition given the availability of open-source sandboxing tools, while others saw benefits in managed services for teams without dedicated security infrastructure.

Show HN: OneCLI – Vault for AI Agents in Rust github.com

OneCLI is an open-source gateway that sits between AI agents and the services they call, addressing the problem of agents being given raw API keys. Users store real credentials once in OneCLI’s encrypted vault and give agents placeholder keys. When an agent makes an HTTP call through the proxy, OneCLI matches the request by host/path, verifies access, swaps the placeholder for the real credential, and forwards the request. The agent never touches the actual secret. The proxy is written in Rust with a Next.js dashboard, uses AES-256-GCM encryption, and runs in a single Docker container with embedded Postgres (PGlite). Future plans include access policies, audit logging, and human approval for sensitive actions.

Discussion highlights: Commenters praised the approach of credential vaults for agents and asked about the threat model. There was discussion about how this compares to other secret management solutions and whether the placeholder approach is secure. Some noted that this is essentially a pattern that should be built into agent frameworks, while others appreciated having it as a standalone tool. Questions about support for different authentication methods and logging capabilities were common.


Geopolitics & War

Asia rolls out 4-day weeks, WFH to solve fuel crisis caused by Iran war fortune.com

Asian governments are implementing emergency measures including 4-day work weeks, mandatory work-from-home policies, school closures, and fuel price caps to address a severe fuel crisis triggered by the ongoing Iran war. The conflict has disrupted oil supplies and caused prices to spike, prompting countries across the region to take drastic steps to reduce consumption. These measures represent a significant shift in work and education practices, potentially accelerating trends toward remote work that were already underway before the crisis. The long-term economic and social impacts of these emergency policies remain uncertain, but they highlight how geopolitical conflicts can force rapid changes in everyday life.

Discussion highlights: Commenters discussed the broader implications of the Iran war and its economic impact. There was skepticism about whether 4-day weeks would actually reduce fuel consumption given other energy uses. Some noted that remote work might increase residential energy use even if it reduces transportation fuel. Others discussed how this compares to energy crises in the past and questioned the effectiveness of price caps. The conversation also touched on how quickly societies can adapt when forced to by external circumstances.


Tech Tools & Projects

The Met Releases High-Def 3D Scans of 140 Famous Art Objects openculture.com

The Metropolitan Museum of Art has released high-definition 3D scans of 140 famous art objects, making them freely available for educational and research purposes. This initiative opens up access to cultural heritage in unprecedented ways, allowing scholars, students, and the public to examine artifacts in detail that would previously require physical visits to the museum. The scans include works from various periods and cultures, providing a diverse collection for study and appreciation. This release represents part of a growing trend of museums digitizing their collections and making them accessible online, though the quality and completeness of these scans sets a new standard for what’s possible.

Discussion highlights: Commenters praised the Met for making this data freely available and discussed potential uses in education and research. There was conversation about the technical challenges of creating high-quality 3D scans and the file formats used. Some noted that this could enable new kinds of art historical analysis and reproduction. Others asked about the legal status of derivatives made from the scans and whether the Met would release even more objects in the future.

Show HN: Aurion OS – A 32-bit GUI operating system written from scratch in C github.com/Luka12-dev/AurionOS

A 13-year-old developer built Aurion OS as a solo learning project over 14 days working approximately 12 hours per day. It’s a 32-bit x86 operating system written entirely in C and x86 Assembly with no external libraries. Features include a custom bootloader and kernel, VESA framebuffer graphics at 1920x1080 with double buffering, a window manager with draggable overlapping windows, a macOS-inspired dock with transparency, PS/2 keyboard and mouse drivers, an ATA hard drive driver with filesystem, PCI bus enumeration, an RTL8139 network driver (work in progress), and a real-time clock. It runs on just 16MB RAM with up to 10 windows simultaneously. Built-in apps include Terminal with DOS mode, Notepad, Calculator, Paint with multiple colors and brush sizes, Snake game, Settings for theme switching, and System Info. It currently works best on QEMU, VirtualBox, and VMware with real hardware support still being developed.

Discussion highlights: Commenters were impressed by what the 13-year-old accomplished in such a short time. There was extensive discussion about OS development challenges and tips for the developer. Some shared their own OS projects and experiences. Others noted that building an OS from scratch is one of the best ways to learn low-level programming. There were questions about the TCP/IP stack being the next goal and suggestions for how to approach it.

The Cost of Indirection in Rust blog.sebastiansastre.co

This technical blog post explores the performance costs of various levels of indirection in Rust programming. The author analyzes how Rust’s ownership system, references, and smart pointers introduce runtime overhead compared to direct memory access, and quantifies the impact of different abstractions. The discussion covers everything from simple references to boxed values, Rc, Arc, and more complex indirection patterns, providing benchmarks and analysis of when indirection matters and when it doesn’t. This kind of performance analysis is particularly relevant in Rust, where the language’s safety guarantees often require indirection, but performance-critical code may need to minimize it.

Discussion highlights: Commenters discussed the trade-offs between safety and performance in systems programming. There was conversation about how Rust compares to C and C++ in terms of indirection overhead. Some shared their own experiences optimizing Rust code and noted that the compiler can often optimize away unnecessary indirection. Others pointed out that readability and maintainability often matter more than micro-optimizations. The discussion also touched on how modern CPUs with deep caches and branch prediction affect the actual cost of indirection.

Dolphin Progress Release 2603 dolphin-emu.org

The Dolphin emulator project has released its latest progress report, highlighting improvements to GameCube and Wii emulation. The report covers bug fixes, performance optimizations, new features, and enhanced compatibility with games. As one of the most mature and actively developed console emulators, Dolphin continues to push the boundaries of what’s possible in terms of accuracy and performance. This release represents another step forward in preserving classic console gaming experiences on modern hardware, with improvements that benefit both casual players and preservationists interested in archival-quality emulation.

Discussion highlights: Commenters discussed specific games that had seen improvements and shared their experiences with the emulator. There was conversation about the technical challenges of accurate console emulation and the trade-offs between accuracy, performance, and usability. Some asked about the future of the project and whether there were plans to support additional platforms. Others noted the importance of projects like Dolphin for game preservation and accessibility.

Show HN: Web-based ANSI art viewer sure.is

A web-based ANSI art viewer provides full width rendering, scrolling by baud rate simulation, selectable text, and other features for viewing classic ASCII/ANSI art. The viewer includes example links for those who want to explore the medium and demonstrates how modern web technologies can preserve and present retro digital art forms. ANSI art was a significant part of early computer culture, particularly on BBS systems, and tools like this help keep that history accessible to new generations while providing a convenient viewing experience for enthusiasts.

Discussion highlights: Commenters shared memories of the ANSI art scene and their favorite artists from the era. There was discussion about the technical challenges of rendering ANSI art accurately in a web browser, including handling different terminal codes and color schemes. Some suggested additional features like animation support for ANSI sequences. Others asked about specific art files they’d like to see added. The conversation also touched on the cultural significance of ANSI art and its place in computing history.


Web & Infrastructure

WolfIP: Lightweight TCP/IP stack with no dynamic memory allocations github.com/wolfssl/wolfip

WolfIP is a lightweight TCP/IP stack designed for embedded systems that avoids dynamic memory allocations entirely. This design choice makes it suitable for resource-constrained environments where heap allocation is undesirable or impossible. By eliminating dynamic allocations, WolfIP can provide more predictable memory usage and avoid issues like heap fragmentation, which are critical in embedded and real-time systems. The stack is designed to be small and efficient while still providing the core networking functionality needed for most embedded applications.

Discussion highlights: Commenters asked why someone would choose this over established embedded stacks like Contiki’s uIP or lwIP. There was discussion about the trade-offs of avoiding dynamic allocations, including the complexity of static buffer management. Some noted that while no dynamic allocations is valuable in certain contexts, it can also make the stack less flexible. Others shared their experiences with embedded networking and the challenges of working with memory-constrained systems. The conversation also touched on how WolfIP compares to other lightweight stacks in terms of features and performance.

The Road Not Taken: A World Where IPv4 Evolved owl.billpg.com

This speculative article explores an alternative history where IPv4 evolved to support larger addresses instead of being replaced by IPv6. The proposed IPv4x would keep the version field as 4 but extend addresses to 128 bits, with the first 32 bits in their usual position and additional 96 bits carried in the packet body. This would allow backwards compatibility with existing IPv4 infrastructure while providing more address space. However, commenters pointed out that this would still require updating all network elements, DNS, socket APIs, and applications - essentially the same challenges as IPv6 adoption. The article sparked discussion about why IPv6 adoption has been slow and whether an evolutionary approach might have been more successful.

Discussion highlights: Commenters extensively debated whether IPv4x would actually be more practical than IPv6. Many pointed out that the fundamental challenges of updating infrastructure remain the same regardless of the technical approach. Some noted that IPv4x would give existing IPv4 address owners vast new address space, potentially entrenching incumbents rather than providing fresh opportunities for new players. Others discussed how IPv6 is often deployed with IPv4-like design patterns rather than taking advantage of its capabilities. The conversation also touched on the “second system effect” and whether IPv6 represents an over-engineered solution to the address space problem.

Emacs internals: Tagged pointers vs. C++ std:variant and LLVM (Part 3) thecloudlet.github.io

This technical blog post continues a series on Emacs internals, examining how Emacs uses tagged pointers to represent different types of values. The author compares this approach to C++ std::variant and LLVM’s CastInfo trait, exploring the trade-offs between different implementations of runtime type information and polymorphic behavior. Tagged pointers store type information in the pointer itself, using the fact that pointers are aligned to allow unused bits to be repurposed. This technique allows Emacs to efficiently represent a variety of types without the overhead of full object-oriented polymorphism.

Discussion highlights: Commenters discussed the details of tagged pointer implementations and how they compare to other approaches to polymorphism. There was conversation about CRTP (Curiously Recurring Template Pattern) and how it’s used for static polymorphism in C++. Some shared additional resources on the topic, including LLVM documentation and articles on devirtualization. Others noted that while tagged pointers are clever, they rely on assumptions about memory alignment and may not work on all architectures. The discussion also touched on the trade-offs between runtime and compile-time polymorphism.


History & Science

Reversing memory loss via gut-brain communication med.stanford.edu

Stanford researchers have discovered a potential pathway for reversing memory loss through gut-brain communication. The study found that manipulating the gut microbiome can affect cognitive function and memory in animal models, suggesting new therapeutic approaches for age-related cognitive decline and neurodegenerative diseases. This research adds to the growing body of evidence showing that the gut microbiome plays a crucial role in brain health and cognitive function, potentially opening new avenues for treating conditions that have been difficult to address with conventional approaches focused solely on the brain.

Discussion highlights: Commenters expressed excitement about the potential implications of this research for treating cognitive decline. There was discussion about the mechanisms by which the gut communicates with the brain and how specific interventions might work. Some shared personal experiences with dietary changes affecting cognitive function. Others noted the challenges of translating animal research into human therapies. The conversation also touched on the broader field of psychobiotics and how our understanding of the gut-brain axis is evolving.

Full Spectrum and Infrared Photography timstr.website

This article explores full spectrum and infrared photography, explaining how modified cameras can capture light beyond the visible spectrum. Full spectrum photography involves removing the internal infrared blocking filter from cameras, allowing them to capture ultraviolet, visible, and infrared light. This technique reveals details and effects that are invisible to normal photography, creating otherworldly and artistic images. Infrared photography, which captures only infrared light, produces particularly striking results with vegetation appearing bright white and dark skies, creating dramatic contrast.

Discussion highlights: Commenters shared their experiences with infrared and full spectrum photography, discussing camera modifications and techniques. There was conversation about the challenges of focusing and exposing for infrared light given its different properties than visible light. Some asked about the best cameras to modify and recommended specific filters for different effects. Others discussed the artistic possibilities of these techniques and shared examples of their work. The conversation also touched on the scientific applications of infrared imaging in fields like astronomy and forensics.

Long Overlooked as Crucial to Life, Fungi Start to Get Their Due e360.yale.edu

This comprehensive article examines the often-overlooked importance of fungi in ecosystems and human life. Fungi play crucial roles in decomposition, nutrient cycling, plant symbiosis, and even human health through their effects on our microbiomes. Despite their fundamental importance, fungi have received far less research attention than plants and animals, but this is beginning to change as scientists recognize their critical ecological functions. The article explores how fungi form vast underground networks (mycelium) that connect plants and facilitate nutrient exchange, how they can break down tough materials like plastic, and their potential applications in medicine, agriculture, and environmental remediation.

Discussion highlights: Commenters discussed the fascinating biology of fungi and their ecological importance. There was conversation about the symbiotic relationships between fungi and plants, including how this affects farming practices like no-till agriculture. Some questioned how scientists estimate the total number of fungal species when most remain undiscovered. Others shared their experiences with mushroom cultivation and foraging. The conversation also touched on the potential for fungi to help address environmental challenges like plastic waste and climate change.

Avoiding Trigonometry (2013) iquilezles.org

This classic article from 2013 explores techniques for avoiding expensive trigonometric functions in computer graphics and game development. The author shows how many operations that traditionally use sine, cosine, and tangent can be reformulated using vector math, avoiding the computational overhead of trig functions. This is particularly relevant for real-time rendering where performance is critical. The techniques include using dot and cross products, quaternions for rotations, and other geometric approaches that can be more efficient than calculating angles.

Discussion highlights: Commenters discussed various mathematical approaches to avoiding trigonometry, including using complex numbers to represent angles and quaternions for rotations. Some pointed out that these techniques are particularly valuable in graphics programming but may not be worth the complexity in most applications where performance isn’t critical. There was discussion about whether modern compilers can optimize away some trig operations and whether these micro-optimizations are still relevant given today’s fast processors. Others shared additional resources on geometric algebra and rotation mathematics.


Academic & Research

DDR4 Sdram – Initialization, Training and Calibration systemverilog.io

This technical article provides a detailed explanation of DDR4 SDRAM initialization, training, and calibration processes. DDR4 memory requires complex initialization sequences and training procedures to ensure reliable operation at high speeds. The article covers the various timing parameters, calibration steps, and design considerations involved in interfacing with DDR4 memory. This deep-dive technical content is valuable for engineers working on memory controllers, FPGA designs, and other systems that need to interface directly with DDR4 memory chips.

Discussion highlights: This story had no comments at the time of collection, which is common for highly technical specialized content. DDR4 memory initialization is a niche but important topic in systems design, and the complexity of modern memory interfaces makes detailed technical resources valuable for engineers working in this area.


Business & Industry

ATMs didn’t kill bank teller jobs, but the iPhone did davidoks.blog

This article examines the counterintuitive history of automation in banking, noting that ATMs didn’t reduce the number of bank tellers as many predicted. Instead, teller jobs evolved from handling cash transactions to focusing on relationship banking and sales. However, the iPhone and mobile banking apps have had a more profound impact on bank employment, enabling many routine transactions to be handled remotely without any human interaction. This story illustrates how technological disruption often works in unexpected ways, and how predictions about job displacement often fail to account for how roles evolve rather than simply disappearing.

Discussion highlights: Commenters discussed the broader trend of how automation affects jobs in unexpected ways. Some shared personal experiences of how their own jobs have evolved with technology. There was conversation about whether the iPhone was the real catalyst or if other factors were more important. Others pointed out that while transactional banking has moved to mobile, the relationship aspects of banking still require human interaction. The discussion also touched on how predictions about AI job displacement might similarly miss the mark.

US banks’ exposure to private credit hits $300B (2025) alternativecreditinvestor.com

US banks have accumulated $300 billion in exposure to private credit markets as of 2025, representing a significant shift in lending practices away from traditional public markets. Private credit involves direct lending to companies that may not have access to public bond markets, often involving higher risk but potentially higher returns. This growing exposure has raised concerns among regulators about risk concentration and whether banks have adequate safeguards in place. The growth of private credit reflects broader trends in finance as investors seek yield in a low-interest-rate environment and companies seek alternatives to traditional bank lending.

Discussion highlights: Commenters discussed the risks of private credit and whether this exposure level is concerning. There was conversation about how private credit compares to traditional lending in terms of risk and return. Some noted that private credit has grown significantly since the 2008 financial crisis as regulations on traditional lending have tightened. Others questioned whether banks have the expertise to evaluate private credit risks effectively. The discussion also touched on how this might affect financial stability and whether we’re seeing the formation of another bubble.

Italian prosecutors seek trial for Amazon, 4 execs in alleged $1.4B tax evasion reuters.com

Italian prosecutors have requested a trial for Amazon and four of its executives over alleged tax evasion totaling $1.4 billion. The case centers on accusations that Amazon used complex corporate structures and transfer pricing arrangements to avoid paying taxes in Italy. This development is part of broader efforts by European authorities to hold multinational technology companies accountable for their tax practices and ensure they pay their fair share in countries where they generate revenue. The outcome of this case could have significant implications for how tech companies structure their European operations.

Discussion highlights: Commenters discussed the broader issue of international tax avoidance by multinational corporations. There was conversation about the complexity of international tax law and how companies legally minimize their tax liabilities. Some expressed support for holding companies accountable, while others noted that tax planning is a fiduciary responsibility to shareholders. Others discussed how countries are coordinating efforts to prevent base erosion and profit shifting (BEPS) through initiatives like the OECD’s global minimum tax.

Apple’s MacBook Neo makes repairs easier and cheaper than other MacBooks arstechnica.com

Apple’s new MacBook Neo features a more modular design that makes it significantly easier and cheaper to repair than previous MacBook models. The teardown shows that components like ports, battery, and keyboard can be replaced individually with simple tools, contrasting with the soldered and glued construction of recent Apple laptops. This shift toward repairability is likely influenced by right-to-repair legislation and growing consumer demand for more sustainable products. The Neo appears to be positioned particularly for the education market where durability and repairability are especially important.

Discussion highlights: Commenters praised Apple for making a more repairable laptop and hoped this design philosophy would extend to other MacBook models. There was discussion about whether this was driven by regulatory pressure or genuine design evolution. Some noted that the education market, which has been moving toward Chromebooks due to repairability concerns, might be a key target. Others shared experiences with repairing Apple devices and how the Neo compares to previous models. The conversation also touched on whether this represents a broader trend toward more sustainable product design at Apple.


System Administration

Scrt: A CLI secret manager for developers, sysadmins and DevOps [github.com/loderunner/scrt)

Scrt is a command-line secret manager designed for developers, system administrators, and DevOps engineers who need to manage credentials securely. The tool provides a CLI interface for storing, retrieving, and managing secrets with encryption at rest. While the project is described as not yet production-ready, it aims to provide a simple, secure way to handle secrets without the complexity of full enterprise secret management solutions. This addresses a common pain point where teams need something more secure than environment variables or plaintext config files but don’t need the overhead of enterprise vaults.

Discussion highlights: Commenters questioned how this differs from existing tools like SOPS with age encryption and other secret management solutions. Some noted that the name is dangerously close to “scrot,” a common screenshot tool, which could cause confusion. Others asked about the security architecture and whether it’s actually ready for production use given the disclaimer. There was discussion about whether the proliferation of secret management tools is necessary or if teams should just standardize on existing solutions.


Other

Bubble Sorted Amen Break parametricavocado.itch.io

This is a creative project that presents the famous “Amen Break” drum break (one of the most sampled breaks in music history) being sorted using the bubble sort algorithm and visualized. The result is an audio-visual experience that shows how the break sounds at various stages of being sorted by different criteria. This kind of creative coding project demonstrates how algorithms can be applied to unexpected domains, creating novel artistic and educational experiences that bridge computer science and music.

Discussion highlights: Commenters appreciated the creative application of sorting algorithms to audio and shared other examples of algorithmic music. There was conversation about the cultural significance of the Amen Break in hip-hop and electronic music. Some noted how hearing the break sorted in different ways reveals its structure in interesting ways. Others asked about the technical implementation and whether other sorting algorithms produce different musical results. The discussion also touched on the broader genre of creative coding and algorithmic art.


Discussion summary compiled from Hacker News comments on March 12, 2026. For full comment threads and up-to-date discussions, visit news.ycombinator.com.