HackerNews Digest

April 23, 2026

Alberta startup sells no-tech tractors for half price

The page, hosted by Wheel Front Ltd. (Sheridan, WY, USA) and copyrighted 2026, presents a brief headline: “This Alberta Startup Sells No‑Tech Tractors for Half Price.” No additional narrative or product specifications are included. The visual assets listed consist of: - The 2026 Wheel Front logo. - A side view of “Hajime‑chan’s Soarer” featuring retro‑styled wheels. - An image of a Tesla Cybertruck with an oil leak in a driveway. - An artist’s rendering of Mazda’s upcoming electric‑vehicle platform concept. - A front view of the Aston Martin Vantage Roadster. - A Tesla Model Y demonstrating autonomous‑driving capability. - A generic avatar photo and a placeholder comment image. - Icons for Google‑preferred source, Facebook, Twitter, LinkedIn, location, Reddit, and email. No further technical details, pricing data, or contextual information about the Alberta tractor venture are provided in the scraped text.
Read full article →
Comments express strong nostalgia for simple, mechanically‑focused tractors and praise for a new low‑tech offering that promises lower price, easier repair, and independence from proprietary software lock‑ins. Many view this approach as a potential challenger to entrenched manufacturers and a step toward right‑to‑repair and open‑ecosystem standards. Skepticism appears around the startup’s long‑term financial viability, market size, emissions compliance and whether reduced electronics might limit needed functionality. Overall sentiment blends enthusiasm for simplicity and competition with caution about sustainability and practical trade‑offs.
Read all comments →

Apple fixes bug that cops used to extract deleted chat messages from iPhones

Apple issued an iOS/iPadOS update that stops a bug where notification payloads were cached on devices for up to a month, permitting deleted or self‑destructing messages to be recovered. The issue, first reported by 404 Media, showed that the FBI could retrieve deleted Signal messages because their content remained in the system’s notification database after the app deleted them. Signal’s president asked Apple to eliminate the retention of notifications for deleted messages; Apple’s fix, back‑ported to iOS 18, removes the stored data. Apple has not explained why the notifications were originally retained and did not comment on the FBI’s forensic methods. Privacy advocates warned that the bug undermined security features (e.g., timed‑message deletion) used by at‑risk users to protect communications from device seizure.
Read full article →
The comments focus on privacy risks from notifications that persist in device storage after display, noting that Apple and Google’s services route content through servers and cache it locally, undermining end‑to‑end encryption. Users highlight a recent fix that removes cached entries when an app is deleted but criticize Signal’s lack of user alerts and the broader inability of apps to prevent OS‑level storage. There is general distrust of closed platforms, calls for generic “message received” alerts, and speculation about similar issues on Android, while acknowledging the recent iOS update addressed the specific bug.
Read all comments →

We found a stable Firefox identifier linking all your private Tor identities

A privacy vulnerability was identified in all Firefox‑based browsers, including Tor Browser. The bug resides in the indexedDB.databases() API, which returns database metadata in an order derived from internal process‑scoped structures rather than a neutral, canonical ordering. In Private Browsing mode and Tor’s “New Identity” sessions, Firefox maps private database names to UUIDs stored in a global hash table that persists for the lifetime of the browser process. When indexedDB.databases() enumerates these entries, it iterates over the hash set without sorting, producing a deterministic permutation that is identical across unrelated origins and survives across private windows until the process restarts. Controlling N database names yields N! possible permutations (≈44 bits of entropy for N = 16), providing a strong cross‑origin fingerprint. The issue breaks expectations that private sessions leave no trace and that sites cannot link activity without shared storage. Mozilla fixed the leak in Firefox 150 and ESR 140.10.0 by canonicalising the result order (e.g., lexicographic sorting), eliminating the fingerprinting vector. The patch is tracked in Mozilla Bug 2024220 and applies to all Gecko‑based browsers.
Read full article →
The comments praise the research’s quality while expressing concern about the privacy implications of an IndexedDB‑based fingerprinting vulnerability. Critics question why the reporting company disclosed the issue rather than exploiting it, and note that the process‑scoped identifier persists only while the browser runs, limiting attacker usefulness. There is confusion over Firefox’s site‑isolation status and calls for stricter permission models similar to mobile platforms. Suggestions include using Tor, disabling JavaScript, or alternative browsers to mitigate tracking, and broader criticism that expanding web APIs facilitates fingerprinting.
Read all comments →

How the Heck does Shazam work?

Shazam identifies songs by converting a short audio capture into a compact fingerprint. - The microphone records air‑pressure samples, which are digitized into a waveform. - A Fast Fourier Transform (FFT) is applied to overlapping 1,024‑sample windows (≈23 ms), producing a spectrogram that maps time, frequency, and amplitude. - Most spectrogram data is discarded; only the highest‑energy points (landmarks) remain, forming a sparse “constellation map” that is robust to background noise. - Each landmark serves as an anchor; it is paired with nearby landmarks to generate a hash from the two frequencies and their time difference. A song of a few minutes yields thousands of such hashes. - The system uses an inverted index: each hash points to a list of song identifiers and timestamps. Matching compares hashes from the query clip to the index, counting coincident time‑offsets to determine the best‑fit song. - Traditional Shazam performs this lookup on a server; newer implementations (e.g., Apple on‑device, Google Pixel “Now Playing”) use smaller local databases and machine‑learning models to improve speed and resilience to noise.
Read full article →
The comment conveys a nostalgic, factual recollection of personal involvement with early home computing, noting that a science project was completed in 1986 using an Apple IIc. The tone is straightforward and reflects interest in retro technology without expressing strong positive or negative sentiment, focusing solely on the historical detail of the device and the educational context.
Read all comments →

Qwen3.6-27B: Flagship-Level Coding in a 27B Dense Model

None
Read full article →
The comments convey overall optimism about Qwen 3.6’s recent releases, highlighting that the models run on consumer‑grade hardware with acceptable memory footprints and provide coding assistance comparable to larger cloud services. Users appreciate the improvements in quantization, context handling, and open‑source availability, while noting that early versions still exhibit speed bottlenecks, occasional bugs, and higher VRAM needs than smaller models. There is demand for clearer hardware requirements, better benchmark comparisons, and low‑latency API options, alongside cautious skepticism about performance parity with premium proprietary models.
Read all comments →

5x5 Pixel font for tiny screens

The post describes a hand‑crafted 5×5 pixel monospaced font designed for ultra‑low‑resolution displays. Built on lcamtuf’s 5×6 font (itself derived from the ZX Spectrum 8×8 set) and intended for a 6×6 grid, it is the smallest size that retains legibility—2×2 is impossible, 3×3 unreadable, 4×4 cannot render “E”, “M”, or “W”. Fixed‑width characters make layout calculations trivial (string width = 6 × character count) and prevent overflow when mixing numbers and letters. The entire font occupies 350 bytes, fitting comfortably in 8‑bit microcontrollers such as the AVR128DA28 (16 KB RAM). The author compares the 5×5 set with narrower variants (4×5, 3×5, 3×4, 3×3, 2×3, 3×2, 2×2), noting progressive loss of distinct glyphs, especially for “M”, “W”, “Q”, and numeric clarity. Real‑screen tests show sub‑pixel rendering adds a pseudo‑dropshadow effect, improving perceived smoothness on color displays, while monochrome screens still render acceptably. The font targets small OLED panels (e.g., 128×64) where hand‑drawn, memory‑efficient glyphs are essential.
Read full article →
The discussion centers on the practicality of extremely small bitmap fonts, with participants comparing 3 × 5, 4 × 5, 5 × 5, and slightly larger grids. Consensus holds that 3 × 5 is generally illegible, while 5 × 5 can be readable if extra spacing is added, and 4 × 5 or 5 × 6 often provide a better balance of clarity and compactness. Historical retro examples and modern embedded uses are cited, and several contributors express admiration for the design skill required, while noting that modern high‑resolution displays reduce the need for such ultra‑tiny fonts.
Read all comments →

Tempest vs. Tempest: The Making and Remaking of Atari's Iconic Video Game

No content was provided to summarize.
Read full article →
The comments express strong approval of the piece, highlighting its clear writing, thorough contextualization of different game versions, and helpful visual diagrams. Readers appreciate the inclusion of primary sources and the availability of additional code, noting the technical depth while suggesting slight simplification for broader accessibility. Nostalgic references to the arcade experience and personal connections to the game's creator reinforce the positive reception, and several remarks describe the content as a valuable resource or “gold mine.”
Read all comments →

Over-editing refers to a model modifying code beyond what is necessary

The post defines **over‑editing** as a code‑generation model fixing a bug while structurally diverging from the minimal required change. Using a synthetic dataset of 400 deliberately corrupted functions from BigCodeBench, the author measures over‑editing with token‑level Levenshtein distance (normalized) and added Cognitive Complexity, comparing the model output (M) to the corrupted input (C) and the true minimal edit (G). Results show that even state‑of‑the‑art models over‑edit: GPT‑5.4 has the highest Levenshtein (≈0.35) and added complexity, while Claude Opus 4.6 achieves the best balance (Pass@1 ≈ 0.91, Levenshtein ≈ 0.07). Explicit prompts to preserve original code consistently reduce over‑editing and often improve Pass@1, especially for reasoning models. Training experiments on Qwen‑3 4B (SFT, rejection‑sampled SFT, DPO, RL) reveal that only reinforcement learning yields generalizable minimal‑editing behavior without catastrophic forgetting; RL with LoRA matches full‑RL performance up to rank 64. Scaling to Qwen‑3 14B preserves gains. The study concludes that over‑editing is widespread but mitigable through prompting and targeted RL fine‑tuning.
Read full article →
The comments express mixed but generally positive views on AI‑assisted coding, noting substantial productivity gains and the ability to handle large projects, while repeatedly highlighting a recurring problem of “over‑editing” where agents add excessive or unnecessary code, modify many files, and hide failures. Users stress the need for explicit prompts for minimal changes, thorough review, and quality‑gate mechanisms to maintain control and reduce technical debt. Concerns also arise about loss of understanding, anxiety over autonomous actions, and the desire for semi‑autonomous, steerable tools rather than full replacements.
Read all comments →

OpenAI's response to the Axios developer tool compromise

None
Read full article →
Comments express criticism of continued reliance on Axios, describing it as outdated and suggesting that developers using it may lack familiarity with native fetch alternatives that are viewed as simpler and preferable today. The timing of a related blog post and subsequent communications is also questioned, with concerns that the response to the Axios security incident was delayed and insufficiently urgent. While most remarks focus on these shortcomings, a brief note acknowledges the post itself as well‑executed.
Read all comments →

Website streamed live directly from a model

None
Read full article →
The comments convey strong enthusiasm for the visual AI demo, praising its interactivity, striking graphics and potential as an educational or reference tool. Simultaneously, many note recurring flaws: frequent inaccuracies, mislabeled components, hallucinations, slow or glitchy performance, high resource and cost demands, and limited availability due to quota limits. The prevailing view sees the concept as exciting and promising, but regards the current implementation as premature, requiring more reliable models, faster processing, and lower expenses before it becomes practical.
Read all comments →