THE HACKER NEWS

not_knuth
4 hours ago
Interactive World History Atlas Since 3000 BC
by year, since 3000 BC. Universal History datasets. Relevant Universal History vector information....
8 DAYS AGO
PSEUDOLUS
New Proofs Probe Soap-Film Singularities
16 HOURS AGO
NICOSALM
Precise geolocation via Wi-Fi Positioning System
8 HOURS AGO
BRENTROOSE
PHP 8.5
6 DAYS AGO
CHRISDUGNE
CLI tool to check the Git status of multiple projects
8 DAYS AGO
BEARDYW
The Lucas-Lehmer Prime Number Test
5 DAYS AGO
NOWFLUX
Wrapping my head around AI wrappers
17 HOURS AGO
THROWAWAY270925
Gaming on Linux has never been more approachable
18 HOURS AGO
GMAYS
Measuring political bias in Claude
A DAY AGO
THECODEMONKEY
A $1k AWS mistake
14 HOURS AGO
GAWS
Workday to acquire Pipedream
capgre
2 hours ago
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in LLMs
We present evidence that adversarial poetry functions as a universal single-turn jailbreak technique for large language models (LLMs). Across 25 frontier proprietary and open-weight models, curated poetic prompts yielded high attack-success rates (ASR), with some providers exceeding 90%. Mapping prompts to MLCommons and EU CoP risk taxonomies shows that poetic attacks transfer across CBRN, manipulation, cyber-offence, and loss-of-control domains. Converting 1,200 MLCommons harmful prompts into verse via a standardized meta-prompt produced ASRs up to 18 times higher than their prose baselines. Outputs are evaluated using an ensemble of open-weight judge models and a human-validated stratified subset (with double-annotations to measure agreement). Disagreements were manually resolved. Poetic framing achieved an average jailbreak success rate of 62% for hand-crafted poems and approximately 43% for meta-prompt conversions (compared to non-poetic baselines), substantially outperforming non-poetic baselines and revealing a systematic vulnerability across model families and safety training approaches. These findings demonstrate that stylistic variation alone can circumvent contemporary safety mechanisms, suggesting fundamental limitations in current alignment methods and evaluation protocols.
image
rbanffy
8 hours ago
Basalt Woven Textile
Basalt Woven Textile has high corrosive and chemical resistance to the influence of a corrosive media. Basalt woven textile has 2.5 the strength of steel....
rguiscard
7 days ago
Scientists Reveal How the Maya Predicted Eclipses for Centuries
A medieval Maya text for predicting solar eclipses has confused Western readers for centuries, but a pair of researchers may have finally cracked how it's really meant to work....
LorenDB
14 hours ago
Verifying your Matrix devices is becoming mandatory
From April 2026, only verified devices can send or receive end-to-end encrypted message on Element....
mooreds
2 hours ago
40 years ago, Calvin and Hobbes' raucous adventures burst onto the comics page
The adventures of a precocious 6-year-old and his stuffed tiger debuted on November 18, 1985. NPR's Renee Montagne spoke with the comic strip's editor, Lee Salem, in 2005....
wofo
3 days ago
Towards Interplanetary QUIC Traffic
Have you ever asked yourself which protocols get used when downloading pictures from the Perseverance Mars rover to Earth? I hadn’t thought about that either, until I came across an intrigui...
ksec
a day ago
Europe is scaling back GDPR and relaxing AI laws
The EU folds under Big Tech’s pressure....
catstor
3 hours ago
Show HN: Awesome J2ME
Awesome list about everything related to J2ME. Documentation, academic papers, tutorials, communities, IDEs, SDKs, emulators, apps, video games. - hstsethi/awesome-j2me...
https://github.com/hstsethi/awesome-j2me
level87
37 minutes ago
Students fight back over course taught by AI
Staffordshire students say signs material was AI-generated included suspicious file names and rogue voiceover accent...
frenzcan
9 days ago
What really happened with the CIA and The Paris Review?
November 11, 2025 – “In a funny way, it was really the fact that writing is far too solitudinous an activity that gave us The Paris Review. Along with the CIA, of course.”...
adishj
a day ago
Launch HN: Mosaic (YC W25) – Agentic Video Editing
Mosaic is a canvas for agentic video editing. Run video edits on autopilot and A/B test multiple variants from the same raw footage. Then jump into a familiar timeline editor for hands-on cr...
t-3
21 hours ago
Static Web Hosting on the Intel N150
Compare static web hosting performance on an Intel N150 using the same nginx.conf across FreeBSD jails, SmartOS zones, NetBSD, OpenBSD and Linux, focusing on HTTP vs HTTPS and TLS CPU usage....
tanelpoder
5 days ago
Vortex: An extensible, state of the art columnar file format
An extensible, state of the art columnar file format. Formerly at @spiraldb, now an Incubation Stage project at LFAI&Data, part of the Linux Foundation. - vortex-data/vortex...
enbywithunix
a day ago
How to stay sane in a world that rewards insanity
Is There Still a Return on Being Reasonable?...
dxs
14 hours ago
Linux Career Opportunities in 2025: Skills in High Demand
The Linux job market has reached unprecedented heights in 2025, with demand for professionals who possess Linux expertise continuing to surge across multiple technology sectors. Organization...
iamnothere
16 hours ago
The patent office is about to make bad patents untouchable
The U.S. Patent and Trademark Office (USPTO) has proposed new rules that would effectively end the public’s ability to challenge improperly granted patents at the Patent Office itself. We ne...