HN Summaries - 2026-04-26

Top 10 Hacker News posts, summarized


1. New 10 GbE USB adapters are cooler, smaller, cheaper

HN discussion (520 points, 305 comments)

New RTL8159-based 10 GbE USB 3.2 adapters offer a smaller, cooler, and cheaper alternative to traditional bulky Thunderbolt 10G adapters. The $80 WisdPi model, for example, is significantly less expensive than Thunderbolt options and operates at lower temperatures. However, achieving full 10 Gbps speeds requires a USB 3.2 Gen 2x2 port (20 Gbps bandwidth), which is inconsistently labeled and difficult to identify across devices. On machines without this port (like tested Macs or USB 3.1 Gen 2 ports), speeds drop to 6-7 Gbps. While 2.5G and 5G adapters remain better value for most users, the new 10G adapters are a compelling option for those needing RJ45 connectivity and compact form factors, provided they have the correct USB port.

HN comments highlighted several key points: PCIe versions of the RTL8159 chipset are available as an alternative to USB adapters, and Framework recently announced a 10G expansion card. Users noted significant confusion and inconsistency in USB port labeling and naming conventions (e.g., USB 3.2 Gen 2x2), making it hard to identify compatible ports. Performance was noted to vary substantially between devices, even with similar port specs, potentially due to driver or hardware differences. Practical concerns included the lack of SFP+ ports on these adapters, cable compatibility questions (Cat6a/Cat7 for 10Gbase-T), and the niche positioning of 10G speeds between sufficient 2.5G for HDDs and Thunderbolt/40G+ for SSDs. Thermal performance was also debated, with some reporting overheating on specific Mac models despite the adapter's generally cooler operation.

2. Plain text has been around for decades and it’s here to stay

HN discussion (261 points, 127 comments)

The article examines modern plain text diagramming tools like Mockdown, Wiretext, and Monodraw, which represent a contemporary revival of ASCII-based UI design from the 1970s-80s era. It highlights three key aspects: these tools offer a modern take on TUIs (Text User Interfaces) with web access and mouse affordances; constraint practice in design is becoming increasingly important as computing power grows, especially with AI; and the enduring power of monospace text due to its portability and the well-established nature of text editing as an interface. The author notes the tools loosely use "ASCII," including Unicode box-drawing characters, and emphasizes the longevity and simplicity of plain text formats.

Hacker News comments primarily focused on the enduring value of plain text, with many users sharing personal experiences and additional tools (e.g., AsciiFlow, AsciiDraw, Emacs artist-mode, draw.io). A key discussion point challenged the concept of "plain text" itself, referencing Dylan Beattie's presentation arguing no such thing truly exists. Comments also explored nostalgia for DOS-era TUIs with mouse support and debated plain text's limitations compared to structured systems. Practical use cases included text-based accounting (Beancount+Fava) and note/invoicing systems. While praising plain text's simplicity, portability, and longevity ("Lindy"), some countered that it struggles with complex tasks and lacks enforced structure compared to dedicated formats. Screen reader accessibility concerns were also raised.

3. Replace IBM Quantum back end with /dev/urandom

HN discussion (327 points, 44 comments)

The article details a test challenging a quantum computing claim made in Project Eleven, which awarded 1 BTC for recovering a 17-bit elliptic curve private key using IBM Quantum hardware. By replacing the IBM Quantum backend in the code with `/dev/urandom` (generating random bitstrings), the author replicated all key recovery results. The patch substituted quantum execution with uniformly random classical outputs, leaving the rest of the algorithm—including circuit construction, oracle logic, and verification—unchanged. The `/dev/urandom` version successfully recovered keys identical to the original IBM hardware results, including the 17-bit key, proving the quantum hardware contributed no cryptanalytic value beyond random noise. The author notes the underlying engineering is non-trivial but critiques the core claim that the hardware constituted a genuine quantum attack on ECDLP.

HN commenters heavily criticized Project Eleven's validation process, calling the quantum claim a "classical brute-force attack" and "grifting." Many emphasized that a 17-bit key (131,072 possibilities) is trivially solvable classically, making the quantum demonstration meaningless. Strilanc highlighted a prior warning (via their Sigbovik paper) that small quantum benchmarks often succeed due to classical noise rather than quantum advantage. Skepticism extended to quantum computing itself, with one user calling it a "3-decade-old scam" and referencing Google's disputed claims. Others defended the experiment's scientific value, noting that proving "quantum grifting" is a valid research activity. The submitter's non-quantum background and "vibe-coded" implementation were also scrutinized.

4. GPT‑5.5 Bio Bug Bounty

HN discussion (119 points, 90 comments)

Unable to fetch article: HTTP 403

The Hacker News discussion centers on widespread skepticism about OpenAI's GPT-5.5 Bio Bug Bounty program. Key criticisms include the paltry $25,000 reward compared to OpenAI's massive revenue ($65M/day), the exclusive "vetted list of trusted red-teamers" excluding public participation, and the requirement for participants to sign NDAs preventing disclosure of findings. Participants must apply without knowing the specific bio-safety questions they are testing, yet need to propose jailbreak approaches upfront, raising concerns about transparency and fairness. Many commenters dismiss the program as a "scam," "PR stunt," or "spec work," arguing the low payout, secrecy, and limited eligibility effectively exploit testers' labor without meaningful reward. The program is also compared unfavorably to previous bounties with higher payouts and open results.

5. Using coding assistance tools to revive projects you never were going to finish

HN discussion (121 points, 87 comments)

The author details reviving an abandoned personal project—a YouTube Music to OpenSubsonic API shim—using Claude Code to implement features they lacked time for manually. After an initial proof-of-concept stalled, they structured the project with dependencies (FastAPI, ytmusicapi, yt-dlp), an OpenAPI spec, and a CLAUDE.md file guiding conventions. Using iterative prompts and the tool’s plan mode, they stubbed endpoints, implemented core streaming/search functionality, and later added optimizations like in-memory caching and SQLite for metadata. The project was completed in a short evening, though skipped authentication. The author frames AI as enabling "bucket 2" projects (desired but non-learning-focused) while emphasizing continued "bucket 1" (learning/growth) projects to avoid deskilling.

HN comments reflect polarized views. Positive experiences highlight AI’s ability to resurrect stalled projects: users successfully built tools (e.g., note-taking apps, weather visualizers, game prototypes) that previously lacked time or expertise, with Claude Code praised for rapid iteration and handling "boring" implementation details. Skeptics argue AI-generated projects lack learning value, feel hollow, or promote "slop" (aokdi, nothinkjustai). Others critique cost and ethics (sdevonoes, hansmayer), suggesting self-hosted alternatives or dismissing corporate promotion. Practical benefits include AI’s role in automating repetitive tasks for existing setups (aifactory5) and enabling "wish fulfillment" for niche tools (theshrike79, referencing Zawinski’s Law). Emotional resonance emerged, with some reporting pride in shipping long-standing ideas (tarr1124) while others felt detached from code they didn’t write (cedws).

6. Martin Galway's music source files from 1980's Commodore 64 games

HN discussion (152 points, 20 comments)

Martin Galway, the current copyright holder, has released original music source files from his 1980s Commodore 64 game compositions, including works for titles like Wizball and Athena. The files are intended for educational purposes, allowing analysis of his music players and techniques, and permit reassembly, modification, and new music generation with proper attribution. Galway acquired these rights from Infogrames after initially creating the music in the 1980s. He details two generations of players: the first (used from 1984–1987 in Wizball) and the second (debuting in Athena and appearing in games like Times of Lore).

The HN discussion centers on nostalgia and technical fascination with Galway's music, with users praising his SID compositions (e.g., Wizball, Green Beret) and sharing links to listen to them via platforms like DeepSID and Slay Radio. Technical analysis dominates, including an AI-assisted attempt to translate melodies into Strudel JS, debates about assembly directives (DSP as memory displacement, DFC for PETSCII), and caution that modern notation systems cannot replicate the authentic SID sound without precise per-frame register manipulations. One commenter notes the source files likely exceed C64 RAM, suggesting they were not the original development tools.

7. Lambda Calculus Benchmark for AI

HN discussion (127 points, 38 comments)

The article introduces "LamBench," a GitHub repository (v1) that provides a benchmark for AI models using lambda calculus. It consists of 120 pure lambda calculus programming problems where models must write algorithms in Lamb, a minimal lambda calculus language using λ-encodings for data structures. Each problem provides a description, encoding specification, and test cases. The model outputs a single `.lam` program defining `@main`, which is tested against all input/output pairs to determine if the problem is solved. The benchmark aims to evaluate how well AI models can implement algorithms in pure lambda calculus.

The HN discussion critiques the benchmark methodology for being a single-attempt one-shot per problem, arguing that probabilistic nature of LLMs requires multiple runs (e.g., 45 times) to meaningfully evaluate performance. Observations note that GPT-5.5 underperforms GPT-5.4, and Opus-4.7 is slightly worse than Opus-4.6. Commenters highlight that new, unbenchmarked problems are necessary to differentiate models, with top lab models being neck-and-neck while others lag significantly. This is seen as countering "Opus killer" marketing hype for smaller Chinese models. Technical discussion focuses on why models fail FFT implementations, attributing it to inherent inefficiencies in Church numeral/list encodings for array indexing and mutable states in pure lambda calculus.

8. Discret 11, the French TV encryption of the 80s

HN discussion (138 points, 23 comments)

The article details the history of Discret 11, an analog encryption system used by the French television channel Canal+ from its launch in 1984 until 1995. Designed to secure the broadcast signal and prevent unauthorized viewing, Discret 11 operated by delaying individual scanlines of a television frame by a variable amount (0, 13, or 26 pixels) using a secret 11-bit key. This key was generated via a Linear Feedback Shift Register (LFSR) and was entered monthly by users on a decoder box. The system also used specific lines for synchronization and audience-level information, and a separate, less secure encryption method for audio. Despite its initial ingenuity, the system was quickly compromised, with schematics leaking and piracy becoming rampant, leading to its eventual replacement by Nagravision encryption.

The Hacker News comments reveal widespread nostalgia for the era of pirate decoders and the subculture that grew around them. Users shared personal anecdotes, such as their fathers building pirate decoders from leaked schematics and young enthusiasts reverse-engineering the signal using home computers. A key highlight was the discovery of a "leet-speak" Easter egg in the system, where the universal free mode key was "1337". The discussion also drew parallels to similar and contemporary pay-TV encryption systems in the UK and Poland, and noted that modern streaming piracy has simply evolved, with services like Stremio filling the void left by traditional broadcast cracking.

9. A web-based RDP client built with Go WebAssembly and grdp

HN discussion (99 points, 40 comments)

The article details a web-based RDP client built using Go WebAssembly (WASM) and the grdp library. It enables direct connection to Windows Remote Desktop servers from browsers without plugins by employing a lightweight Go proxy server that bridges browser WebSocket connections to the RDP server's TCP port. The setup involves cloning the repository, building with `make all`, and running a proxy server accessible via `http://localhost:8080`. Users connect by entering server details (host, port, credentials, resolution) in a web form. The client supports full keyboard/mouse input (including mouse wheel) and streams remote audio through the browser's Web Audio API. Security warnings emphasize running it only on trusted networks or adding authentication/HTTPS for untrusted networks. The project is GPLv3 licensed.

Hacker News comments highlighted skepticism about the project's practicality given native RDP clients are widely available, with some questioning its necessity. Technical concerns focused on clipboard sharing limitations, where browsers' permission requirements and user prompts for clipboard reads/writes create friction, often forcing users to choose between OS integration loss or frequent manual intervention. Other comments explored potential use cases, like using it as an RDP jumphost with SSO support (comparing it to Azure Bastion), and noted challenges with specific features like Alt-Tab. The discussion also emphasized the need for high-performance, open-source alternatives to commercial solutions (e.g., Teradici/PCoIP) being discontinued, mentioning projects like RustDesk and Teraguchi as existing options.

10. Can you stop beans from making you gassy?

HN discussion (77 points, 55 comments)

Unable to fetch article: HTTP 403

The Hacker News discussion centers on reducing bean-induced gas, with the original article concluding that common cooking techniques do not significantly lessen "fartyness." Key insights from commenters include the observation that consistent consumption over weeks or months reduces gas for many, though introducing new bean types can reset the issue. Alternative solutions proposed include soaking beans with baking soda, using digestive enzyme supplements (e.g., Bean-zyme, Beano), adding spices like asafoetida or mustard, consuming fermented foods with beans (e.g., miso), sprouting beans to convert sugars, and cultural methods like peeling bean skins. The author, Dave Arnold, was noted for credibility, but readers pointed out omissions such as epazote and the potential of sprouting. Reactions highlighted the prevalence of anecdotal fixes and the role of individual adaptation, with some viewing gas as an inevitable aspect of bean consumption.


Generated with hn-summaries