frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
399•klaussilveira•5h ago•90 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
755•xnx•10h ago•462 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
133•isitcontent•5h ago•14 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
123•dmpetrov•5h ago•53 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
20•SerCe•1h ago•15 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
33•quibono•4d ago•2 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
235•vecti•7h ago•114 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
60•jnord•3d ago•3 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
302•aktau•11h ago•152 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
305•ostacke•11h ago•82 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
162•eljojo•8h ago•123 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
381•todsacerdoti•13h ago•215 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
310•lstoll•11h ago•230 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
45•phreda4•4h ago•7 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
103•vmatsiiako•10h ago•34 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
173•i5heu•8h ago•128 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
139•limoce•3d ago•76 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
225•surprisetalk•3d ago•30 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
963•cdrnsf•14h ago•413 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
10•gfortaine•3h ago•0 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
37•rescrv•13h ago•17 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
7•kmm•4d ago•0 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
33•lebovic•1d ago•11 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
76•antves•1d ago•56 comments

The Oklahoma Architect Who Turned Kitsch into Art

https://www.bloomberg.com/news/features/2026-01-31/oklahoma-architect-bruce-goff-s-wild-home-desi...
17•MarlonPro•3d ago•2 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
31•ray__•2h ago•7 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
38•nwparker•1d ago•8 comments

Claude Composer

https://www.josh.ing/blog/claude-composer
98•coloneltcb•2d ago•68 comments

Evolution of car door handles over the decades

https://newatlas.com/automotive/evolution-car-door-handle/
38•andsoitis•3d ago•61 comments

Planetary Roller Screws

https://www.humanityslastmachine.com/#planetary-roller-screws
34•everlier•3d ago•6 comments
Open in hackernews

Definitive solution to the hardest problem in computing: P = NP?

https://www.researchgate.net/publication/391442238_A_Constructive_Proof_that_P_NP_via_Circuit-Resistant_Hash_Encodings_and_Local_Certification
22•vicentesteve•8mo ago

Comments

vicentesteve•8mo ago
Hi everyone,

I’m an independent researcher and recently completed a formal, self-contained proof that P ≠ NP. The result is based on an explicit language L* ∈ NP \ P that resists all polynomial-time machines via a certified local test. The core techniques combine locally testable codes, circuit resistance, and diagonalisation.

Unlike many previous attempts, the proof avoids relativization, natural proofs, and algebrization, and relies entirely on constructive combinatorics and meta-complexity arguments. It has been submitted to the Journal of the ACM and also made publicly available here:

ResearchGate (PDF, with DOI): https://doi.org/10.13140/RG.2.2.14071.74408

I’m sharing this for discussion and feedback from the theoretical CS and cryptography communities. Constructive criticism is welcome — I’d genuinely like to know if any gaps remain. The paper is intended to be rigorous and elementary in its construction.

Thanks in advance, Vicent Esteve Voltes https://orcid.org/0009-0003-1371-7561

LPisGood•8mo ago
It seems the PDF and associated DOI have been removed.

Is there a reason you haven’t put it on ArXiv?

akkartik•8mo ago
I'm able to open the PDF.
vicentesteve•8mo ago
Thanks for pointing that out. I’m not sure what happened with the DOI — I’m already in contact with ResearchGate to get that fixed. But the PDF is still available and can be viewed or downloaded directly from the ResearchGate page, just below the summary.

As for arXiv: I haven't submitted it yet because I need an endorsement and I'm not advanced enough to get one. Because I'm new and haven't written much, I haven't been able to get one yet. I hope I will down the road — I'd really like to submit it there when it's done.

akkartik•8mo ago
Did you really (pre)publish these 3 papers in just the last couple of months?

https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=756...

slwvx•8mo ago
I always get nervous when the author is the one who is posting a link to their work on Hacker News. I find humility to be very appealing.

The abstract in the research gate page is garbled (equations are duplicated), and don't match the PDF.

Some of the author's other publications are shown on his google scholar page. In all cases Voltes is the sole author: https://scholar.google.com/citations?user=uA1sptcAAAAJ&hl=en

On an unrelated note; I guess that respected journals are getting a significant amount of papers written with varying amounts of AI assistance. I never envied or enjoyed reviewing papers, and would enjoy such activities even less now.

vicentesteve•8mo ago
Appreciate the comment, I understand what you're trying to say.

Just to clear something up where I'm at: I'm a student, not a professional researcher (yet, anyway), and I'm trying to get into this realm step by step. I don't actually have much of a network or people around me to help share my work, so publishing it myself is kind of the only way I can get feedback from others who are into this sort of thing.

Also, I realize grades and university matter, but I think that trying to do it — even if it's not perfect — has to count for something as well. Publishing this is a way of learning, improving, and maybe getting closer to being part of a real research team someday.

You're correct as far as the abstract on ResearchGate is concerned — I didn't realize it got scrambled when I copied it over from the LaTeX version. Thank you for pointing it out to me, I'll fix it.

And sure, I know it sounds weird that I'm the only author. I understand why you'd question it. But I'm not claiming this is the evidence of anything — I'm just presenting a thing I've been messing around with and hoping that people can help say where there might be something to it, or where it doesn't work. That's the entire premise.

And AI — and this was not accomplished by AI. It's just me. Sure, I did use LaTeX and a PDF editor, but the writing and the thinking are mine.

Thanks again for reading. If you have any ideas on the actual content, I'd really love to hear them.

lightandlight•8mo ago
I'm encouraged by what you've shared here. My impression of this topic is that it attracts a lot of cranks: "The secrets of the universe have been revealed, and you are all blind!" Sounds like you're open to feedback and the possibility of being wrong.

My main concern is that it will be hard for you to find people who could give you excellent feedback on this, because they probably have epistemic shields up around this topic due to all the surrounding crankery. I don't know how to solve this, but I wish you luck.

fjfaase•8mo ago
I have no idea if the proof is correct or not, but my first impression is that it does not sound bogus, like so many other attempts.
immibis•8mo ago
Proving that parsing the input takes time polynomial in the size of the input is a red flag to me. Normally this is so obvious it's not worth stating.

It's also wrong (I think). It says skipping over l bits is O(l) but an actual Turing machine would have to go to the first unskipped bit and mark it skipped, then go back to the counter at the beginning and decrement it, and so on, making it O(l^2).

This is irrelevant since it's more sensible to give the input in a Turing-machine-friendly format when feeding it to a Turing machine.

Bigger red flag: I don't understand why the verifier has to take s in the certificate and evaluate Hn*(s) when Hn*(s) is already given as input. Also r is unused except in an edge case where it also wouldn't be needed? So basically both parts of the certificate are redundant according to the algorithm description and you could run the deterministic verifier without a certificate, meaning the problem is in P if this verifier algorithm is correct.

Another gaping flaw is that the LTC verification (I don't really understand this so will assume it's correct) tests a random sample of q bits yet the machine is said to be deterministic. Deterministic machines don't randomly sample things and have probabilities of getting the right answer.

Also the diagonalization procedure, to find an input that each decider gets wrong, is to just loop over all possible inputs and feed them to the decider and see if it gets it wrong??? Maybe I skipped over the part where you proved that would actually happen, but otherwise it's nonsense to just assume it's impossible for the decider to get them all right.

Edit: that part was section 4.1. In section 4.1 aren't you assuming that not only has the halting problem been solved, but that all machines halt?

This comment isn't meant to be an exhaustive list.

vicentesteve•8mo ago
Thank you very much for spending the time reading it — I really appreciate such a thoughtful and thorough comment.

You're right on a couple of things. For instance, I probably overstated the time for parsing in a way that makes it sound like it's part of the actual hardness, when really it was just something I wanted to make explicit to be precise. And the point about randomness in the LTC part is valid — the verifier itself is fully deterministic and uses a fixed check index r, but the LTC construction it relies on is based on randomness. I see now that this wasn’t clearly separated in how I wrote it.

About the certificate: I get why it might look redundant at first. The key idea is that the verifier doesn’t go looking for a parity check that fails — it just verifies the one that’s provided. So r isn’t there because the verifier couldn’t find a violation, but because it doesn’t try to; it just checks whether the one it's told about actually fails. That said, I completely agree it could be better explained.

The diagonalization part definitely needs more clarity too. You're right: just looping over inputs only works if you can guarantee that failure will eventually happen — and that’s supposed to come from the circuit-counting bound. I’ll go back and make that implication and its formal reasoning much more explicit.

As for the machines halting — that’s handled by padding every D_i so it always halts within a fixed polynomial time (as mentioned in Lemma 4.1), but again, I agree that’s not emphasized enough and should be stated more clearly.

Overall, your feedback is incredibly helpful — not just in pointing out specific issues, but also in showing me how things might come across to someone reading this fresh. I'm already working on revising the affected sections, and I’d honestly be glad to hear any further thoughts you (or others) might have. Thanks again!

immibis•8mo ago
> The key idea is that the verifier doesn’t go looking for a parity check that fails — it just verifies the one that’s provided. So r isn’t there because the verifier couldn’t find a violation, but because it doesn’t try to; it just checks whether the one it's told about actually fails.

Then you failed. When using the certificate and verifier definition of NP, if the correct answer to the problem instance is false, there must be no certificate that makes the verifier return true.

A nondeterministic Turing machine is one that can clone itself and take two different paths without taking extra time. The copies can also make copies so it can clone as many times as it needs to. Copies that return false delete themselves, and if ANY copy returns true the overall answer is true (and we can delete all the copies). Any problem that can be solved by one of these is in NP. That's the definition of NP.

Equivalently, if we already know which one is going to return true, each time the machine wants to clone itself, we can tell the machine which copy is going to return true, and then it either continues being itself or pretends to be the clone, whichever one we told it, without actually cloning. Then we can run this on a normal Turing machine that doesn't clone itself. Of course, if we tell it wrong, it will return false even though it could have returned true if we told it right. This leads to the certificate definition of NP. The data we tell the machine about "the right way to pretend to clone" is the certificate.

Both are equivalent ways to define which problems are NP. The cloning version is the actual definition, but the certificate version is often more convenient, because, ya know, actual computers don't clone themselves.

If the answer to the problem is false, in the cloning version, all copies of the machine return false. That means in the certificate version, which only runs one copy, it will return false no matter which copy we choose, i.e. no matter which certificate we give it. Even if we give the wrong certificate, it's not possible to get a certificate machine for an NP problem to return true when the correct answer is false.

Your verifier machine is claimed to be a certificate machine that solves your problem, but you also say it sometimes returns true when the correct answer is false, if you give the wrong certificate. So there's something wrong with the setup here. I think the verifier machine is just wrong as it doesn't do what it needs to do to prove what you think it's proving.

vicentesteve•8mo ago
Thanks for this — I really appreciate how clearly you explained the issue.

You're absolutely right that, by definition, a verifier for an NP language must return false for all certificates if the instance is not in the language. That’s a fundamental property, and I fully agree with it.

What I intended in my construction is that the verifier accepts only if the parity check specified by the certificate actually fails — it recomputes the encoded value *_n(), verifies the parity check at index , and accepts only if there's a real mismatch. If the circuit is correct, then no matter what or you give, that mismatch shouldn't appear, so the verifier should always reject.

That said, I totally see how the way it's currently written might be unclear or misleading. It’s very possible that I need to make this logic more explicit, or even re-express the verifier definition to better align with the formal NP structure. I’ll take a closer look and make sure that the construction is not only correct, but clearly communicates the intended behavior.

Thanks again for pointing this out in such a precise way — it's exactly the kind of critique that helps me make this better.

immibis•8mo ago
Another issue: In section 4.1 you seem to be assuming that not only is the halting problem solved, but that all Turing machines halt (and therefore there is an upper bound to how long all of them take to run).