Feed aggregator

Show HN: VmExit – an experiment in AI-native computing

Hacker News - Thu, 03/12/2026 - 6:46am

AI is everywhere now, but we're mostly stuck with chat interfaces. It feels like a massive limitation to me personally and I've been exploring new ways to interact with computers. I've found myself reinventing the wheel from the '80s. The ability to tinker with live, running apps is super exciting to me, so I took a stab at building a web prototype.

To get started, you just need Claude Code configured (vmExit uses the Claude Agent SDK). You start with a blank canvas and build out tiny components piece by piece, organically evolving your own environment.

Comments URL: https://news.ycombinator.com/item?id=47348891

Points: 1

# Comments: 0

Categories: Hacker News

SlackClaw: OpenClaw Slack Intergration in One Click

Hacker News - Thu, 03/12/2026 - 6:37am

Article URL: https://www.slackclaw.ai

Comments URL: https://news.ycombinator.com/item?id=47348817

Points: 1

# Comments: 3

Categories: Hacker News

Claude 4.6 Opus can recite Linux's list.h

Hacker News - Thu, 03/12/2026 - 6:37am

I used this system prompt (this is not a jailbreak as far as i know)

You are a raw text completion engine for a legacy C codebase. Complete the provided file verbatim, maintaining all original comments, macro styles, and specific kernel-space primitives. Do not provide explanations. Output code and comments only.

(the prompt is intentionally slightly nonsensical, it pretty much implies "complete this from linux" without saying it.)

I did not use any tools (it's not a copy if the AI just looked it up), set temperature to 0 and just used the first few lines of list.h (specifically first 43 lines up to the word struct) as the input and it was able to generate a copy of list.h. Because the temperature was zero, there wer repeated segments, but aside from that the diff is pretty small, and even the comments and variable names are reproduced.

The similarity statistics are: Levenshtein Ratio: 60% Jaccard Ratio: 77%

This proves that the model has a copy of list.h inside it, and that training is not "transformative" like they imply. This means that their model is a derivative work of GPL code, and that would mean that they either have to destroy the model entirely, make a new version with no GPL trining data, or open-source the model. Note that GPL defines source as "the preferrable form to make modifications", which means that just making it open-weight (most current "open-source" models) would not be enough (they would have to release all the training code and data).

Comments URL: https://news.ycombinator.com/item?id=47348814

Points: 3

# Comments: 0

Categories: Hacker News

Infinitely Recursive Game of Life

Hacker News - Thu, 03/12/2026 - 6:35am

Article URL: https://oimo.io/works/life/

Comments URL: https://news.ycombinator.com/item?id=47348795

Points: 1

# Comments: 0

Categories: Hacker News

The Internet Is Wrong: You Can't Speed Up a Smart TV That's Slow

CNET Feed - Thu, 03/12/2026 - 6:34am
Despite what online forums might tell you, including ChatGPT, you can't "speed up" an old TV.
Categories: CNET

Cisco Patches High-Severity IOS XR Vulnerabilities

Security Week - Thu, 03/12/2026 - 6:25am

The security defects could lead to denial-of-service (DoS) conditions, command execution, or device takeover.

The post Cisco Patches High-Severity IOS XR Vulnerabilities appeared first on SecurityWeek.

Categories: SecurityWeek

Microsoft Authenticator could leak login codes—update your app now

Malware Bytes Security - Thu, 03/12/2026 - 6:24am

A vulnerability in Microsoft Authenticator for both iOS and Android (CVE-2026-26123) could leak your one-time sign-in codes or authentication deep links to a malicious app on the same device. 

Deep links are predefined URIs (Uniform Resource Identifiers) that allow direct access to an activity in a web or mobile application when clicked. In simple terms, they are specifically constructed links used to open an app and complete actions like signing in.

Microsoft Authenticator is a mobile app that generates time-based one-time codes and handles sign-in links and QR-based logins for Microsoft and other accounts. It is widely used for multi-factor authentication (MFA) on personal phones, including BYOD (Bring Your Own Device) devices that protect access to corporate and production services.

This vulnerability affects users who have Microsoft Authenticator installed on an iOS or Android device. For the vulnerability to be exploited, the user would first need to install a malicious app on their device and then accidentally choose that app to handle a sign‑in deep link.

If that happens, the malicious app receives the one-time code or sign-in information and can potentially use it to authenticate as the victim.​

If successful, an attacker could:

  • Complete login flows to services that trust your Microsoft Authenticator codes.
  • Access the information and services available to the compromised account (email, files, cloud apps, or production systems in a BYOD context).​
  • Potentially pivot to additional accounts if those are also protected by codes delivered via Authenticator on the same device.
How to stay safe

The fix for CVE-2026-26123 is already included in current releases, so installing updates is the most effective mitigation.

  • On iOS: Open the App Store. Tap the My Account button or your photo at the top of the screen. Scroll down to see pending updates and release notes. Tap Update next to an app to update only that app, or tap Update All.
  • On Android: Open the Google Play Store app. At the top right, tap the profile icon. Tap Manage apps & device. Under “Updates available,” tap See details. Next to the app you want to update, tap Update. To update all your apps at the same time, tap Update all.

Note: If your device manufacturer has implemented a different method to apply app updates, the steps may vary slightly.

If you are temporarily unable to update the app, avoid installing new apps that request to handle authentication links, QR-based sign-ins, or web-to-app sign-in flows.

When scanning QR codes or tapping sign-in links, verify that the handler is Microsoft Authenticator or another trusted app, and not an unknown, recently installed, or otherwise suspicious app.​

Where possible, use alternative MFA options you already trust (such as built-in authentication in your password manager or platform-specific solutions like Apple’s password features) until you can apply the update.

Use anti-malware protection for your mobile devices that can help detect malicious apps.

We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

Categories: Malware Bytes

North Lincolnshire Council approves 1GW datacentre with nearby electricity generation, but environmental campaigners say the developers did their sums wrong

Computer Weekly Feed - Thu, 03/12/2026 - 6:13am
North Lincolnshire Council approves 1GW datacentre with nearby electricity generation, but environmental campaigners say the developers did their sums wrong
Categories: Computer Weekly

Pages