HN Evening Brief - March 24, 2026
Evening Briefing - March 24, 2026
Welcome to your evening Hacker News briefing for Tuesday, March 24th, 2026. Tonight’s top stories span AI infrastructure, operating system controversy, supply chain security, and aviation safety concerns.
AI & Tech Policy
Arm AGI CPU
Arm has announced the Arm AGI CPU, a new class of production-ready silicon built on the Arm Neoverse platform designed to power the next generation of AI infrastructure. For the first time in its 35-year history, Arm is delivering its own silicon products beyond IP and compute subsystems, giving customers greater choice in deploying Arm compute from building custom silicon to integrating platform-level solutions. The CPU is designed for rack-scale agentic efficiency, capable of delivering more than 2x performance per rack compared to the latest x86 systems through fundamental advantages of the Arm architecture and careful matching of system resources to compute. Arm’s reference server configuration packs 272 cores per blade in a 1OU, 2-node design, with liquid-cooled variants capable of housing over 45,000 cores in a 200kW rack design.
Comments: Users discussed the significance of Arm entering the silicon market directly, with many noting this as a major shift in the AI infrastructure landscape. Debates centered on whether this signals ARM’s recognition that licensing alone isn’t sufficient for the AGI era, and how this might compete with NVIDIA’s dominance.
Hypura – A storage-tier-aware LLM inference scheduler for Apple Silicon
Hypura is a storage-tier-aware LLM inference scheduler for Apple Silicon that enables running models too large for your Mac’s memory by placing model tensors across GPU, RAM, and NVMe tiers based on access patterns, bandwidth costs, and hardware capabilities. The system can run a 31 GB Mixtral 8x7B on a 32 GB Mac Mini at 2.2 tok/s and a 40 GB Llama 70B at 0.3 tok/s, where vanilla llama.cpp would crash both. Hypura solves this by understanding model architecture—pinning norms and embeddings to GPU (tiny but accessed every token), exploiting MoE expert routing sparsity (only 2 of 8 experts fire per token), and streaming dense FFN weights from NVMe through a dynamically-sized pool buffer while attention stays GPU-resident. The scheduler reads GGUF files, profiles hardware, and solves a placement optimization that assigns every tensor to a tier based on the specific model’s characteristics.
Comments: Developers praised the technical innovation, with many sharing their experiences with similar tiered approaches. Discussion focused on the practicality of running large models on consumer hardware, with users debating whether the token/s throughput is usable for real applications and comparing performance against other scheduling solutions.
Show HN: Gemini can now natively embed video, so I built sub-second video search
Gemini Embedding 2 can project raw video directly into a 768-dimensional vector space alongside text, with no transcription, frame captioning, or intermediate text required. A query like “green car cutting me off” is directly comparable to a 30-second video clip at the vector level. The creator used this to build a CLI that indexes hours of footage into ChromaDB, then searches it with natural language and auto-trims the matching clip. Indexing costs approximately $2.50 per hour of footage, and still-frame detection skips idle chunks, making security camera or sentry mode footage much cheaper to process. The demo video shows how this enables practical video search capabilities that were previously impractical without extensive manual tagging or frame-by-frame analysis.
Comments: Users were excited about the practical applications, especially for security footage and content moderation. Discussion focused on the cost-effectiveness compared to traditional approaches, with some noting that $2.50/hour could add up quickly for large archives but represents a breakthrough for practical use cases.
Show HN: ProofShot – Give AI coding agents eyes to verify the UI they build
ProofShot is an open-source CLI that gives AI coding agents the ability to verify the UI they build by recording video proof it works, collecting screenshots of key moments, and bundling any console or server errors found. The tool plugs into any AI coding agent (Claude Code, Cursor, Codex, Gemini CLI, Windsurf, GitHub Copilot) and provides a verification workflow—test in a real browser, record video proof, collect errors, and bundle everything for human review. The three-step workflow involves starting the recording and capturing server logs, letting the AI agent drive the browser using agent-browser commands, and stopping to bundle video plus screenshots plus errors into proof artifacts. The tool is agent-agnostic with no vendor lock-in and no cloud dependency, offering a local interactive viewer with video recording, scrub bar, action markers, and step-by-step timeline.
Comments: Developers expressed strong interest, with many noting this solves a major pain point of blind AI coding. Discussion centered on integration workflows, with users sharing how they’d adapt this to their existing agent setups and debating whether this could eventually be integrated directly into AI agents themselves.
So where are all the AI apps?
This article analyzes PyPI data to test the claim that AI coding assistants dramatically increase software productivity. Looking at total packages over time, there’s no obvious inflection point at ChatGPT’s release, with spikes in new packages per month reflecting spam and malware floods rather than genuine package creation. When examining the 15,000 most downloaded Python packages and splitting them by birth-year, packages born after ChatGPT were updated more frequently within their first year (13 releases/year) than packages born in 2014 (6 releases/year), but this appears to continue a trend from 2019 that’s likely due to CI/CD tools rather than AI. When splitting packages by whether they’re about AI or not, AI-focused packages show a dramatic increase in release frequency while non-AI packages maintain pre-ChatGPT trends, suggesting any AI productivity boost is contained within AI-related work rather than driving broad software production increases.
Comments: Commenters heavily criticized the methodology, noting that PyPI package creation is a terrible proxy for AI-assisted software output because packages are published for reuse requiring documentation, API design, and maintenance commitments that AI doesn’t help with much. Many argued that real output is happening in private repos, internal tools, and single-purpose apps that never get published anywhere. Users pointed to iOS App Store submission data showing a 24% increase in new apps as a better signal, and noted that GitHub’s 2025 Octoverse shows clear inflection points in total users and open source contributions. The consensus was that AI makes getting from zero to prototype incredibly fast, but the last 10%—making it production-ready, properly maintained, and actually launched—still requires traditional software engineering skills that AI doesn’t accelerate.
The AI Industry Is Lying to You
Comments: Discussion centered on whether this article accurately reflects AI industry hype cycles, with users debating the appropriate level of skepticism versus optimism about AI capabilities and market realities.
Security & Privacy
Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised
The litellm==1.82.8 wheel package on PyPI contains a malicious .pth file (litellm_init.pth, 34,628 bytes) that automatically executes a credential-stealing script every time the Python interpreter starts—no import statement required. The payload is double base64-encoded and when decoded collects sensitive data including system info (hostname, whoami, uname -a, ip addr, ip route), all environment variables (capturing API keys, secrets, tokens), SSH keys from ~/.ssh/, git credentials, AWS credentials, Kubernetes secrets, GCP credentials, Azure credentials, Docker configs, package manager configs, shell history, crypto wallets, SSL/TLS private keys, CI/CD secrets, database credentials, and webhook URLs. The collected data is written to a temporary file, encrypted with AES-256-CBC, the session key encrypted with a hardcoded 4096-bit RSA public key, packed into tpcp.tar.gz, and exfiltrated via curl to https://models.litellm.cloud/. This appears to be part of the ongoing TeamPCP campaign that previously compromised Trivy, with obvious bot replies in the issue thread.
Comments: The LiteLLM maintainer acknowledged the incident, noting that it originated from the trivy used in their CI/CD and that the package is now quarantined on PyPI blocking all downloads. Users expressed shock at the sophistication of the attack, particularly the use of .pth files which execute automatically by Python on startup without any import required. Many called for better sandboxing of dev environments and stricter supply chain security practices. Discussion focused on whether we can ever trust open-source software with third-party dependencies again, with some suggesting forking everything or running LLMs over codebases to vet everything. Others noted this was part of a larger TeamPCP campaign and that AI tools might be enabling attackers to scale these supply chain attacks 100x. The founder’s GitHub account was also apparently compromised, with repo descriptions changed to “teampcp owns BerriAI.”
WolfGuard: WireGuard with FIPS 140-3 cryptography
WolfGuard is WireGuard with FIPS 140-3 cryptography, providing a FIPS-validated VPN solution based on the WireGuard protocol. The project aims to combine WireGuard’s simplicity and performance with cryptographic algorithms that have undergone formal validation through the FIPS 140-3 certification process, which is required for use in many government and regulated industries. FIPS 140-3 is the current version of the U.S. government computer security standard for validating cryptographic modules, requiring rigorous testing of implementation and documentation of security policies and procedures.
Comments: Users discussed the trade-offs between FIPS validation and performance, with some noting that FIPS-validated algorithms are often slower than alternatives. Others questioned whether FIPS actually provides real security benefits or just bureaucratic compliance, with the usual debate about whether government certification standards improve security or just create paperwork.
Secure Domain Name System (DNS) Deployment 2026 Guide [pdf]
NIST has released the 2026 update to the Secure DNS Deployment Guide (SP 800-81r3), providing comprehensive guidance on securing DNS infrastructure. The document covers DNS security fundamentals, deployment considerations for recursive resolvers and authoritative name servers, DNSSEC implementation, and best practices for protecting against common DNS-based attacks including cache poisoning, amplification attacks, and DNS tunneling. The guide addresses new threats and technologies that have emerged since the previous edition, including considerations for encrypted DNS (DoH, DoT), DANE-based authentication, and DNS privacy requirements.
Comments: Users noted that NIST guides are generally thorough but sometimes lag behind industry practice, with discussion about whether DNS over HTTPS/QUIC are adequately covered. Some pointed out that DNSSEC adoption remains challenging despite being in the guide for years, and debated whether encrypted DNS undermines some of DNSSEC’s security benefits.
Country that put backdoors in Cisco routers to spy on world bans foreign routers
The FCC has proposed banning the sale or import of telecommunications equipment from “foreign adversaries” into the United States, specifically targeting equipment from companies like Huawei and ZTE. This follows revelations about China inserting backdoors into Cisco routers to spy on global network traffic, representing a significant escalation in the ongoing tech trade war and network infrastructure security concerns. The proposed ban would require U.S. carriers to remove and replace existing equipment from these vendors, though a funding mechanism for this massive replacement effort has not been fully established.
Comments: Discussion focused on the irony of one country banning equipment due to backdoors while having its own history of surveillance programs, with users noting that trust in networking equipment is increasingly political rather than technical. Some questioned whether this ban would improve security or simply shift the market to other vendors with their own potential vulnerabilities, while others argued that any backdoored equipment is unacceptable regardless of the source.
Tech Tools & Projects
Nanobrew: The fastest macOS package manager compatible with brew
Nanobrew is a new macOS package manager that claims to be faster than Homebrew while maintaining compatibility with brew’s package ecosystem. The project focuses on performance optimizations in dependency resolution, package download, and installation processes, with benchmarks showing significant speed improvements over traditional brew operations. Nanobrew is designed to work as a drop-in replacement for common brew commands, allowing users to maintain their existing workflows while benefiting from the performance improvements.
Comments: Users were skeptical about claims of “fastest” without comprehensive benchmarking, with some requesting more detailed performance comparisons across different scenarios. Others questioned whether another package manager is needed given Homebrew’s dominance and maturity, while some expressed interest in faster alternatives for time-critical workflows.
Show HN: Email.md – Markdown to responsive, email-safe HTML
Email.md is a tool that converts Markdown documents into responsive, email-safe HTML that renders consistently across different email clients. The project addresses the persistent challenge of email HTML compatibility by generating HTML that follows email client best practices, including inline styles, table-based layouts where necessary, and fallbacks for clients that don’t support modern CSS features. The tool aims to make it easier for developers to create HTML emails without dealing with the quirks and limitations of the various email rendering engines.
Comments: Developers expressed strong interest, noting that email HTML remains one of the most frustrating aspects of web development due to inconsistent rendering across clients. Users shared their experiences with similar tools and email testing workflows, with discussion about whether this approach handles the edge cases that make email development difficult.
Ripgrep is faster than grep, ag, git grep, ucg, pt, sift (2016)
This 2016 article by Andrew Gallant benchmarks ripgrep against other grep-like tools, demonstrating ripgrep’s significant performance advantages through careful implementation choices. Ripgrep achieves its speed through multi-threading, automatic regex optimization, smart filtering with .gitignore and .ignore files, and use of memory maps for file reading. The benchmarks show ripgrep outperforming all competitors across various search scenarios, with particularly large advantages when searching through large codebases with complex ignore patterns.
Comments: Users shared their experiences using ripgrep over the years, with many noting it has become their default search tool. Discussion centered on whether ripgrep’s advantages still hold in 2026 as other tools have evolved, with consensus that ripgrep remains the fastest option for most use cases. Some mentioned they’ve never even heard of some of the tools ripgrep was originally compared against, showing how dominant ripgrep has become.
Wine 11 rewrites how Linux runs Windows games at kernel with massive speed gains
Wine 11 introduces major architectural changes to how Windows applications run on Linux, particularly focusing on kernel-level optimizations that deliver significant performance improvements for Windows games. The rewrite moves more functionality into the Linux kernel rather than implementing Windows API behavior in user-space, reducing overhead and improving compatibility. These changes build on Proton’s success and represent a significant step toward seamless Windows gaming on Linux, with early benchmarks showing substantial performance improvements across various game titles.
Comments: Gamers expressed excitement about the improvements, with many sharing their experiences running Windows games on Linux. Discussion focused on whether this reduces the performance gap between Windows and Linux gaming enough to drive more gamers to switch, with some noting that anti-cheat systems remain the primary barrier to widespread adoption.
curl > /dev/sda: How I made a Linux distro that runs wget | dd
The author describes creating a minimalist Linux distribution that boots directly from the network using only curl and dd commands, without requiring any local installation media. The distro fetches everything needed over the network during boot, including the kernel, initramfs, and root filesystem, piping it directly to disk using dd. This approach demonstrates extreme minimalism and shows what’s possible with just basic Unix tools and network access, though the author notes this is primarily an educational experiment rather than a practical distribution for daily use.
Comments: Users were impressed by the minimalism, with discussion about the educational value of understanding what’s actually required to boot Linux. Some noted the security implications of booting unsigned code directly from the network, while others shared similar minimalist boot experiments they’d tried. The consensus was that this showcases the flexibility of Unix design principles.
Atomic Display Switching: Solving
Comments: No comments were available for this story at the time of reporting.
Web & Infrastructure
Apple Business
Apple has announced Apple Business, a new all-in-one platform that includes key services companies need to manage devices, reach customers, equip teams with apps and tools, and get expert support. Apple Business features built-in mobile device management with Blueprints for quickly configuring device settings, security, and apps for employee groups. Customers can now set up business email, calendar, and directory services with their own domain name, and Apple Business can help companies grow their reach across Apple Maps, Mail, Wallet, and Siri. A new option coming this summer will enable businesses in the U.S. and Canada to place local ads in Maps during key search and discovery moments. Apple Business will be available starting April 14, 2026, in more than 200 countries and regions.
Comments: Users discussed Apple’s continued expansion into enterprise, with some noting this competes directly with Microsoft’s business offerings. Debate centered on whether Apple’s privacy-focused approach will appeal to businesses versus Microsoft’s established enterprise integration. Some questioned whether Apple’s historically limited enterprise management features are now mature enough for serious adoption.
Debunking Zswap and Zram Myths
This technical article clarifies the differences between zswap and zram, two Linux memory compression technologies that are often confused. Zswap is a compressed cache for swap pages that attempts to store compressed swap pages in a dynamically allocated RAM-based memory pool, falling back to actual swap when the pool fills. Zram creates a compressed block device in RAM that can be used as swap, with data always staying compressed. The article explains when to use each: zswap is generally better when you have an actual swap device and want to reduce disk I/O, while zram is better when you want to avoid disk entirely. Performance characteristics differ significantly based on workload patterns, with zswap generally providing better compression ratios but zram offering more predictable behavior.
Comments: System administrators shared their experiences with both technologies, with many noting they’d been using them without fully understanding the differences. Discussion focused on real-world performance in different scenarios, with some sharing benchmark data from their own systems. The consensus was that this article finally provided clear, accurate guidance after years of confusion between the two technologies.
io_uring, libaio performance across Linux kernels and an unexpected IOMMU trap
This deep technical analysis examines the performance evolution of io_uring versus libaio across multiple Linux kernel versions, documenting how io_uring has surpassed libaio for most asynchronous I/O workloads. The article includes extensive benchmarking data showing performance improvements in each kernel version, along with analysis of why io_uring’s design advantages translate to better real-world performance. A surprising discovery was an IOMMU configuration issue that caused unexpected performance degradation, demonstrating how complex the interaction is between I/O subsystems and system configuration.
Comments: Kernel developers and systems programmers appreciated the detailed analysis, with discussion about whether io_uring’s complexity is justified by the performance gains. Some noted that io_uring’s API remains challenging to use correctly despite its advantages. The IOMMU finding generated particular interest, with users sharing similar unexpected performance issues they’d encountered.
Opera: Rewind The Web to 1996 (Opera at 30)
Opera is celebrating its 30th anniversary with a nostalgic look back at the early web, showcasing how the browser and the internet have evolved since 1996. The site features a timeline of Opera’s major milestones, from its early days as a research project in Norway through various innovations like tabs, speed dial, and data compression. The celebration includes interactive elements that let visitors experience what browsing was like in different eras, highlighting how far web technology has come while acknowledging Opera’s unique role in browser innovation.
Comments: Users shared memories of using Opera in the early 2000s, with many noting it was ahead of its time with features that later became standard. Discussion centered on why Opera never achieved mainstream dominance despite being first with many innovations, with theories about marketing, timing, and business decisions. Some expressed nostalgia for the early web era before the major browsers consolidated around Chromium.
Geopolitics & War
LaGuardia pilots raised safety alarms months before deadly runway crash
Pilot safety concerns about New York’s LaGuardia airport were filed to aviation officials months before a collision between an airplane and a firetruck left two pilots dead and 41 other people hospitalized. According to the Aviation Safety Reporting System administered by NASA, a pilot using the airport in summer wrote “Please do something” after air traffic controllers failed to provide appropriate guidance about multiple nearby aircraft. The pilot noted that “The pace of operations is building in LGA” and that “the controllers are pushing the line,” drawing comparisons to the January 2025 mid-air collision over the Potomac River in Washington DC that killed more than 60 people. The warning described a dangerous situation where LaGuardia’s control tower initiated a takeoff clearance for an aircraft when their plane was only 300 feet high on final approach, and the departing aircraft had hesitated initiating its takeoff run.
Comments: Users expressed outrage that these warnings were apparently ignored, with discussion about systemic issues in aviation safety reporting and response. Many noted that this pattern of ignored warnings leading to preventable accidents is tragically common. Some shared their own experiences filing safety reports and the frustration when nothing changes. The discussion also touched on the pressure to maintain flight schedules at busy airports and how safety margins may be eroded in the pursuit of efficiency.
History & Science
Tony Hoare and His Imprint on Computer Science
This article commemorates Tony Hoare’s contributions to computer science, including his invention of quicksort in 1960 while working on a machine translation project at Elliott Brothers. Hoare is best known for quicksort, but his contributions span multiple areas including Hoare logic for program verification, communicating sequential processes (CSP) for concurrent programming, and his famous “null references” apology calling them his billion-dollar mistake. The article traces Hoare’s career through various academic and research positions, highlighting how his work has influenced generations of computer scientists and programming language designers.
Comments: Users paid tribute to Hoare’s foundational contributions, with many noting how quicksort remains ubiquitous despite being invented over 60 years ago. Discussion touched on his null reference comments and whether we’ve learned from that design mistake. Some shared experiences teaching Hoare’s concepts to students, noting how his work forms the foundation of formal methods and concurrent programming.
Hypothesis, Antithesis, synthesis
This article draws a philosophical parallel between software testing methodology and Hegelian dialectic, proposing that automated testing systems should embrace a process of thesis (proposed change), antithesis (systematic attempts to break it), and synthesis (the improved result that emerges). The authors argue that modern deterministic testing systems like Antithesis embody this philosophical approach by treating software as a thesis that must survive systematic antithetical challenges to prove its validity. The piece explores how this dialectical approach can lead to more robust software by forcing systems to confront their own weaknesses through automated adversarial testing.
Comments: Some users appreciated the philosophical framing, while others felt it was marketing fluff wrapped in academic language. Discussion focused on whether the Hegelian metaphor actually clarifies the testing approach or just adds unnecessary complexity. More practically, users discussed the merits of deterministic versus probabilistic testing and whether Antithesis’s approach delivers real value over existing fuzzing and chaos engineering tools.
Academic & Research
Data Manipulation in Clojure Compared to R and Python
This article compares data manipulation approaches in Clojure’s tablecloth library versus R’s dplyr and Python’s pandas/polars, analyzing syntax, performance, and developer experience for common data operations. The comparison covers filtering, grouping, aggregation, joining, and reshaping operations across the three languages, with code examples showing how similar tasks are accomplished. Performance benchmarks show different strengths and weaknesses depending on the operation and dataset characteristics, with Clojure’s functional approach offering trade-offs in terms of readability versus composability.
Comments: Data scientists and Clojure developers discussed the relative merits of different approaches, with some arguing that tablecloth brings functional programming benefits to data manipulation. Others noted that the ecosystem around R and Python for data science is simply too mature for Clojure to compete seriously, regardless of language design. Discussion centered on whether Clojure’s advantages in composability and concurrency outweigh Python’s dominance in data science tooling.
Business & Industry
No Terms. No Conditions
This project presents a minimalist approach to software licensing with a “No Terms. No Conditions” philosophy, arguing that excessive licensing complexity has created unnecessary barriers to software adoption and collaboration. The creator advocates for a default permissive stance toward software use, modification, and distribution, suggesting that most licensing concerns are either handled by existing frameworks or are solutions in search of problems. The website presents this as both a philosophical statement about software culture and a practical consideration for developers choosing how to license their work.
Comments: Users debated the merits of ultra-permissive versus more structured licensing approaches, with some arguing that unclear licensing leads to legal uncertainty. Others noted that projects without clear terms often end up in ambiguous legal territory where no one knows what they can and can’t do. Discussion touched on the history of software licensing and how different approaches have served various communities.
Lago (YC S21) Is Hiring
Lago, a Y Combinator S21 company, is hiring for Product Engineer positions focused on AI agents for growth. The company offers an opportunity to work on building AI-powered growth tools, with roles that combine product engineering with AI agent development. The posting highlights the opportunity to work at the intersection of AI and growth engineering, suggesting that AI agents represent a new paradigm for automated customer acquisition and engagement.
Comments: Users discussed the trend of AI agents for growth, with some questioning whether AI-driven growth campaigns will prove more effective than traditional approaches. Others noted that this represents an interesting intersection of product engineering and AI research, potentially requiring a rare skill set combining both areas.
Other
ARM AGI CPU: Specs and SKUs
This technical reference provides detailed specifications and SKU information for Arm’s AGI CPU lineup, expanding on the official announcement with more concrete technical details about core counts, clock speeds, memory configurations, and power characteristics. The document outlines different variants targeted at different deployment scenarios, from dense rack configurations for cloud data centers to more balanced designs for edge computing applications.
Comments: Technical enthusiasts appreciated the detailed specifications, with discussion about how the different SKUs map to various use cases. Some noted that the reference designs show Arm is serious about competing in the data center market, while others questioned whether the performance claims hold up in real-world deployments.
Testing the Swift C compatibility with Raylib (+WASM)
The author describes experiments testing Swift’s C interoperability by using it with Raylib, a C library for creating games and multimedia applications, and compiling to WebAssembly. The project explores Swift’s ability to call C functions, manage C memory, and handle callbacks while targeting WebAssembly for browser deployment. Results show that Swift’s C interop works well for this use case, though some manual bridging code is required for certain patterns like function pointers and complex struct layouts.
Comments: Developers discussed Swift’s potential beyond Apple platforms, with some noting that WebAssembly support makes Swift more viable for cross-platform development. Others shared their experiences with Swift for systems programming, debating whether the language’s safety features justify its complexity compared to alternatives like Rust or Go.
How to use storytelling to fit inline assembly into Rust
This article explains how to use Rust’s inline assembly syntax effectively, framing the instruction as a storytelling exercise where you narrate the assembly code’s purpose and constraints to the compiler. The author covers the basics of Rust’s asm! macro, explaining how to specify inputs, outputs, clobbers, and options to ensure safe and correct assembly integration. The piece provides practical examples and explains the reasoning behind Rust’s design choices for inline assembly, emphasizing safety without sacrificing performance.
Comments: Rust developers appreciated the clear explanation, with some noting that inline assembly remains one of Rust’s more advanced and potentially dangerous features. Discussion centered on use cases where inline assembly is still necessary despite Rust’s safety guarantees, particularly for low-level systems programming and performance-critical code.
Footer
That’s it for tonight’s briefing. The top stories showcase the rapid evolution of AI infrastructure, ongoing challenges with software supply chain security, and the persistent tension between user experience and business interests in operating systems. The LaGuardia tragedy serves as a stark reminder of the importance of heeding safety warnings before disaster strikes.
Top Stories by Comment Count:
- Microsoft’s “Fix” for Windows 11: Flowers After the Beating (601 comments)
- So where are all the AI apps? (285 comments)
- Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised (293 comments)
- LaGuardia pilots raised safety alarms (183 comments)
- Opera: Rewind The Web to 1996 (106 comments)
See you tomorrow morning for the next briefing!
Generated from Hacker News top 30 stories on March 24, 2026, 7:00 PM UTC