Feed aggregator

Show HN: LANscape – a fast local network scanner in Python

Hacker News - Sun, 03/08/2026 - 7:02pm

I built this tool as an alternative to Advanced IP Scanner since both the speed and configurability of it are underwhelming. LANscape is highly configurable, allowing you to get into the weeds of what and how you are scanning subnets. I'm definitely looking for feedback on how I can make this better!

Comments URL: https://news.ycombinator.com/item?id=47302552

Points: 1

# Comments: 0

Categories: Hacker News

My posts stop appearing to people, this is a test

Hacker News - Sun, 03/08/2026 - 6:58pm

Yes just a test

Comments URL: https://news.ycombinator.com/item?id=47302526

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: OxiMedia – Pure Rust Reconstruction of FFmpeg and OpenCV

Hacker News - Sun, 03/08/2026 - 6:56pm

Author here. OxiMedia is a clean-room reconstruction of FFmpeg and OpenCV in pure Rust. v0.1.0, 92 crates, ~1.36M lines.

Key decisions: `#![forbid(unsafe_code)]` workspace-wide, patent-free codecs only (AV1/VP9/Opus/FLAC -- no H.264/H.265/AAC ever), async on Tokio, zero C/Fortran deps in default features, native WASM target.

This is v0.1.0 -- APIs are stabilized but not yet battle-tested at scale. Performance benchmarks vs FFmpeg/rav1e/dav1d coming soon.

Feedback on API design welcome, especially the filter graph and transcoding pipeline.

GitHub: https://github.com/cool-japan/oximedia

Comments URL: https://news.ycombinator.com/item?id=47302515

Points: 2

# Comments: 0

Categories: Hacker News

Show HN: GYML – YAML syntax, JSON semantics, zero runtime dependencies

Hacker News - Sun, 03/08/2026 - 6:55pm

YAML keeps surprising people in production. The Norway Problem (`NO` parsed as `False`). Silent duplicate key overwrites. The spec has 211 grammar productions. Most of that complexity exists to support features nobody wanted in a config file.

GYML is a strict subset of YAML. Valid GYML is always valid YAML. It keeps the block indentation syntax and pairs it with JSON's type semantics: one spelling for each type, no anchors, no aliases, no tags, duplicate keys are a hard error. From-scratch parser, no runtime dependencies, fully typed Python.

https://github.com/janbjorge/gyml

Comments URL: https://news.ycombinator.com/item?id=47302509

Points: 1

# Comments: 0

Categories: Hacker News

Ring doorbells: Won’t you see my neighbor? (Lock and Code S07E05)

Malware Bytes Security - Sun, 03/08/2026 - 6:55pm

This week on the Lock and Code podcast…

On February 8, during the Super Bowl in the United States, countless owners of one of the most popular smart products today got a bit of a wakeup call: Their Ring doorbells could be used to see a whole lot more than they knew.

In a commercial that was broadcast to one of most reliably enormous audiences in the country, Amazon, which owns the company Ring, promoted a new feature for its smart doorbells called “Search Party.” By scouring the footage of individual Ring cameras across a specific region, “Search Party” can implement AI-powered image recognition technology to find, as the commercial portrayed it, a lost dog. But immediately after the commercial aired, people began wondering what else their Ring cameras could be used to find.

As US Senator Ed Markey wrote on social media:

“Ring’s Super Bowl ad exposed a scary truth: the technology in its doorbell cameras could be used to hunt down a lost pet…or a person. Amazon must discontinue its dystopian monitoring features.”

These “dystopian monitoring features” aren’t entirely new, but that’s not to say that most Ring owners knew what they were allowing when they originally bought their devices.

Bought by Amazon in 2018, Ring is the most popular manufacturer of a product that, as of 15 years ago, didn’t really exist. And while other “smart” innovations failed, smart doorbells have become a fixture of American neighborhoods, providing a mixture of convenience and security. For instance, a Ring owner away from home can verify and buzz in their mailman dropping off a package behind a gated entrance. Or, a Ring owner can see on their phone that the person knocking at their door is a salesman and choose to avoid talking to them. Or, a Ring owner can help police who are investigating a crime in their area by handing over relevant footage. Even the presence of a Ring doorbell, and its variety of motion-detecting alerts, could possibly serve as a deterrent to crime.

What has seemingly upset so many of those same owners, then, is learning exactly how their personal devices might be used for a company’s gains.

Today, on the Lock and Code podcast with host David Ruiz, we speak with Matthew Guariglia, senior policy analyst at Electronic Frontier Foundation, about Ring’s long history of partnering with—and sometimes even speaking directly for—police, who can access Ring doorbell footage both inside the company and outside it, and what people really open themselves up to when purchasing a Ring device.

 ”There’s this impression, a myth practically, that ‘I buy a ring doorbell to put on my house, I control the footage… But there is [an] entire secondary use of this device, which is by police that you don’t really get a lot of say in.”

Tune in today to listen to the full conversation.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)

Listen up—Malwarebytes doesn’t just talk cybersecurity, we provide it.

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium Security for Lock and Code listeners.

Categories: Malware Bytes

Last Statements

Hacker News - Sun, 03/08/2026 - 6:54pm

Article URL: https://walzr.com/last-statements

Comments URL: https://news.ycombinator.com/item?id=47302490

Points: 1

# Comments: 0

Categories: Hacker News

Claude's Constitution

Hacker News - Sun, 03/08/2026 - 6:50pm
Categories: Hacker News

Show HN: Engram — a brain-inspired context database for AI agents

Hacker News - Sun, 03/08/2026 - 6:42pm

Hi HN,

I’ve been working on Engram, a persistent context layer for AI agents and LLM sessions.

The inspiration came from a simple problem: when you work with LLMs for a long time, context collapses. Conversation history gets too long, summaries drift, and models forget or mix up earlier decisions. It becomes even worse when multiple agents or different models are involved.

Engram is an attempt to treat AI memory more like how human memory works: * knowledge is stored incrementally * related concepts reinforce each other * context is reconstructed when needed rather than replaying the entire past

Instead of storing conversations as raw text or chunks, Engram commits information into a persistent context structure and then materializes the relevant pieces when a model needs them.

Some other capabilities built so far: * multi-agent updates to the same context * evolving knowledge instead of append-only memory * context reconstruction across long sessions * working across models (e.g. start in ChatGPT, continue in Claude)

Repo: https://github.com/softmaxdata/engram

Would love feedback from people building agents or long-running AI workflows. Happy to answer questions or run experiments people suggest.

Comments URL: https://news.ycombinator.com/item?id=47302396

Points: 1

# Comments: 0

Categories: Hacker News

Pages