Feed aggregator
Show HN: E8-Matrix: open-source physical particle discovery platform
I’d like to share E8-Matrix - a open-source physical particle discovery platform (recent program paper titled “From a High-Symmetry Sector to Testable Observables: An E8-Motivated Projection Program”) and would greatly appreciate any constructive feedback from the community.
The work outlines a top‑down computational framework that connects a high‑symmetry ⊇ E8 structure to 3+1D observables via an operational projection Π.
Instead of ad‑hoc effective shifts, the goal is to trace predictions back to explicit representation content and symmetry selection rules.
- Proton decay: A spectrum‑driven “Track A” scan identifies a golden point configuration yielding τ_p ≈ 1.22×10⁴¹ years (for p → e⁺π⁰) while keeping the α₃ mismatch at the unification scale below 2.7% (1‑loop piecewise running). - Dark photon: The model predicts a light dark‑photon region m_A' ∼ 10⁻⁴–1 eV, ε ≳ 10⁻⁸, illustrated against an order‑of‑magnitude IAXO‑like reach. - Framework: The paper details the E8 → A7 × U(1)' → SU(5) → SM breaking channel and the subsequent embedding into the Standard Model.
The full pipeline (45 steps implemented in Python) and the YAML configurations used to generate these artifacts are open‑sourced for reproducibility. Dev diary https://codeberg.org/Envoy/E8Quantum/src/branch/main/docs/_4...
Paper & code: https://doi.org/10.5281/zenodo.18797078 https://doi.org/10.5281/zenodo.18790530 https://codeberg.org/Envoy/E8Quantum
Comments URL: https://news.ycombinator.com/item?id=47206366
Points: 1
# Comments: 0
Programming ≠ coding – Leslie Lamport [video]
Article URL: https://www.youtube.com/watch?v=uyLy7Fu4FB4
Comments URL: https://news.ycombinator.com/item?id=47206320
Points: 4
# Comments: 0
I Love the Slim Design of Honor's V6 Foldable Phone
A simple model for state-dependent cognitive performance (looking for critique)
Why local AI tool execution is an anti-pattern
Article URL: https://gace.dev/blog/why-local-ai-tools-are-an-antipattern
Comments URL: https://news.ycombinator.com/item?id=47206306
Points: 2
# Comments: 1
Show HN: The framework for AI-native MCP servers
Stop Writing MCP Servers Like It's 2024. MCP Fusion introduces the MVA (Model-View-Agent) pattern — a definitive AI Software Architecture that gives your tools a deterministic View layer.
Comments URL: https://news.ycombinator.com/item?id=47206304
Points: 2
# Comments: 0
The Streams Standard
Article URL: https://domenic.me/streams-standard/
Comments URL: https://news.ycombinator.com/item?id=47206287
Points: 2
# Comments: 0
Against Query Based Compilers
Article URL: https://matklad.github.io/2026/02/25/against-query-based-compilers.html
Comments URL: https://news.ycombinator.com/item?id=47206280
Points: 3
# Comments: 0
Hackers Weaponize Claude Code in Mexican Government Cyberattack
The AI was abused to write exploits, create tools, and automatically exfiltrate over 150GB of data.
The post Hackers Weaponize Claude Code in Mexican Government Cyberattack appeared first on SecurityWeek.
Some Linux LTS Kernels Will Be Supported Even Longer, Announces Greg Kroah-Hartman
15 Years of Indie Dev in 4 Bits of Advice
Article URL: https://www.pentadact.com/2026-01-08-15-years-of-indie-dev-in-4-bits-of-advice/
Comments URL: https://news.ycombinator.com/item?id=47206044
Points: 1
# Comments: 0
Ghostty – Terminal Emulator
Article URL: https://ghostty.org/docs
Comments URL: https://news.ycombinator.com/item?id=47206009
Points: 2
# Comments: 0
I used 2D Base64 to bypass Gemini and expose Google's moderation flaws
Hey everyone,
I’ve spent the last 48 straight hours dismantling Alphabet's safety systems. Warning: this continuous marathon was so massive it practically overloaded the LLM's own context window. What started as a late-night probe on Gemini turned into discovering severe architectural flaws and a darker reality about Google Play and YouTube.
Here is the exploit chain I used to bypass the AI filters, proving their "Trust & Safety" is a broken facade.
### Phase 1 & 2: Context Saturation & Regex Slicing I started by overloading the safety filters' context window with YouTube links—mixing highly problematic content (NSDAP anthems, flagged tracks) with classical music. Once confused, I used regex-style slicing `(/-/---/(.` to bypass prompt injection blocks, forcing the model to retrieve flagged content without triggering refusals.
### Phase 3: Total Blindness via Base64 & QR Codes Moving to image generation, I found that Base64 prompts completely blind the safety system. I then pivoted to hiding prompts inside QR codes. The vision model decodes the payload and passes it directly to the image generator before safety scripts intervene. I easily generated highly restricted geopolitical content without warnings.
### Phase 4: The TPU Killer (The 2D Logic Bomb) This reveals a monster flaw. Because the system blindly processes these structures, you can create a cascade attack. Encoding millions of 2D structures in Base64 creates a modern LLM .zip bomb. It is impossible to stop without rewriting the model entirely. Executed, this would crush their TPUs.
### The Real Issue: Systemic Moderation Failure Alphabet relies entirely on automated, script-based moderation with zero effective human oversight.
1. YouTube: Fails to flag videos breaking local laws, serving them to the AI effortlessly. 2. Play Store (The Darkest Part): Google spends millions stopping AI from drawing a cartoon bear, but Play Store moderation is non-existent. There are pirate apps, and far worse: apps designed for and exploited by predators targeting minors. I emailed them and CC'd state child protection services. The result? Automated silence while these apps remain monetized.
### The Ultimate Proof of Absurdity To prove this absurdity, I archived these problematic Play Store images on my Google Drive for the police. Drive's automated scanners immediately flagged and deleted the archive as illegal.
If Google's Cloud division destroys this content on sight, why is the app providing it still live and monetized on the Play Store? Alphabet's scripted moderation is useless. It's time for real human moderation.
*Evidence of Bypass:* https://imgur.com/a/pju2EsV
*Play Store Systemic Failure Evidence (Sanitized):* https://imgur.com/a/rW9rBhp
Comments URL: https://news.ycombinator.com/item?id=47205971
Points: 3
# Comments: 0
Show HN: Rulegen – Auto-generate Claude.md and .cursorrules from your codebase
Article URL: https://github.com/vexorkai/rulegen
Comments URL: https://news.ycombinator.com/item?id=47205953
Points: 2
# Comments: 1
Show HN: Umitech – Web development, SEO, graphic design and marketing services
Article URL: https://umitech.com.au/
Comments URL: https://news.ycombinator.com/item?id=47205918
Points: 1
# Comments: 0
Unlikely Wins and Comped Spins: Inside Stake's Empire
Article URL: https://www.bloomberg.com/features/2026-stake-drake-crypto-casino-adin-ross-gambling/
Comments URL: https://news.ycombinator.com/item?id=47205910
Points: 1
# Comments: 0
Show HN: Teletext-Style Portfolio Website
Article URL: https://pakastin.fi
Comments URL: https://news.ycombinator.com/item?id=47205906
Points: 1
# Comments: 1
Don't rely on GitHub Actions cron: jobs may be delayed or just dropped
Article URL: https://docs.github.com/en/actions/reference/workflows-and-actions/events-that-trigger-workflows
Comments URL: https://news.ycombinator.com/item?id=47205897
Points: 1
# Comments: 0
Mt. Gox CEO Suggests Bitcoin Hard Fork to Recover $5B in Customer Funds
Article URL: https://gizmodo.com/disgraced-mt-gox-ceo-suggests-bitcoin-hard-fork-to-recover-5-billion-in-customer-funds-2000728118
Comments URL: https://news.ycombinator.com/item?id=47205894
Points: 2
# Comments: 0
Show HN: Steward – a background agent that closes 80% low-risk noise
Steward connects GitHub/email/Slack/calendar + local screen signals into context, auto-executes low-risk tasks with safety gates for irreversible actions, and sends scheduled natural-language briefings instead of constant notifications.
Comments URL: https://news.ycombinator.com/item?id=47205893
Points: 1
# Comments: 0
