Links für 2025 KW 32#
Meine To-Read Liste, Zusammengefasst von Mistral-Small-24B.
The text discusses the controversial practice of AI companies scraping vast amounts of data from the internet to train their models, often without proper compensation or regard for copyright laws. The author, a journalism fellow at Stanford, highlights the issue of AI companies claiming „fair use“ for this practice, which he argues is actually theft. This has led to numerous lawsuits from various industries, including news publishers and photographers, who accuse AI companies of infringing on their copyrights. Key points include a significant court victory for copyright holders against an AI startup, AI companies lobbying for free use of copyrighted material, and the potential for AI models to produce copyright-infringing outputs. The author expresses concern about news organizations licensing their content to AI companies under potentially unfavorable terms, likening the situation to tech companies exploiting legacy news organizations. The text underscores the need for fair compensation for copyright holders and the potential for tools like Content Credentials to help protect their work. The author concludes with a call for AI companies to respect copyright laws and compensate creators fairly. (13551)
The text discusses the concept of „self-guaranteeing promises“ in the context of technology and data management. These promises are designed to be verifiable by the user without requiring trust in any third party. Examples include file management systems that allow users to control their files in open formats, and stainless steel, which can be tested for its properties. On the other hand, terms and policies set by companies are not self-guaranteeing because they can change unpredictably and retroactively affect user data. The text also argues that governance structures, open-source software alone, and encoding values into structures are not self-guaranteeing due to the potential for changes in corporate decisions, data formats, and external influences like venture capital.
The key takeaway is that users should choose tools that make self-guaranteeing promises to mitigate the inherent ambiguity and risks associated with the future of technology and data management. (13552)
120B runs awesome on just 8GB VRAM!:
The text discusses a Reddit post from the community r/LocalLLaMA, where a user named Wrong-Historian shares their experience running a 120B model on just 8GB of VRAM, which is surprisingly efficient. The post has garnered significant attention, with many users commenting on the feasibility and performance of such a setup. The community engages in a discussion about the technical aspects, potential optimizations, and real-world applications of running large models on limited hardware resources. Overall, the post highlights the community’s interest in optimizing AI model performance on constrained hardware, showcasing the innovative solutions and collaborative spirit within the r/LocalLLaMA community. (13553)
Sunlight-activated material turns PFAS in water into harmless fluoride:
Researchers at the University of Adelaide have created an innovative sunlight-activated material that can degrade per- and polyfluoroalkyl substances (PFAS) in water, converting them into harmless components like fluoride. PFAS are notorious for their resistance to breakdown and accumulation in the environment and human bodies, posing significant health risks. The new material targets the protective fluorine atoms in PFAS molecules, achieving a complete breakdown of these persistent pollutants.
This discovery offers a promising low-energy solution for PFAS remediation, with potential applications in water treatment and environmental cleanup. The produced fluoride can be repurposed in healthcare products or fertilizers, adding to the environmental benefits. The team plans to further improve the stability of the material for large-scale implementation, highlighting the ongoing efforts to address global PFAS contamination. (13554)
The text „Scaling Software Architecture“ is a comprehensive guide to understanding and implementing scalable software architectures. It covers a wide range of topics, including scalability fundamentals, availability strategies, performance optimization, and organizational practices. Here are the key points summarized: Scalability Fundamentals - Scalability Definition: The ability of a system to handle increased loads by adding resources.
Types of Scalability: Vertical (adding more power to an existing machine) vs. Horizontal (adding more machines).
Load Balancing: Distributes incoming traffic across multiple servers to ensure no single server becomes a bottleneck.
Caching: Stores frequently accessed data in memory to reduce load on databases.
Database Sharding: Splits database into smaller, more manageable pieces.
CDN (Content Delivery Network): Distributes content geographically to reduce latency and improve performance.
Microservices: Breaking down a monolithic application into smaller, independent services. Availability Strategies - High Availability: Ensuring systems are operational and accessible with minimal downtime.
Fault Tolerance: Designing systems to continue operating even when some components fail.
Resilience Engineering: Building systems that can handle and recover from failures gracefully.
Disaster Recovery: Planning for and recovering from major failures or disasters.
Load Balancing: Ensures no single component is overwhelmed by distributing the load.
Timeouts and Retries: Managing how long to wait for a response and how often to retry.
Circuit Breakers: Prevents a system from trying to execute an operation that is likely to fail. Performance Optimization - General Optimization: Techniques like caching, load balancing, and efficient data structures.
Specific Optimizations: Techniques like Brotli compression, garbage collection tuning, and database indexing.
OS and Network Optimization: Improving performance at the operating system and network levels.
Language and Framework Optimization: Choosing the right programming languages and frameworks for performance.
Image and Video Optimization: Techniques for reducing file sizes and improving load times. Intelligence - Big Data: Handling and processing large volumes of data using frameworks like Hadoop and Spark.
Machine Learning: Building and deploying machine learning models at scale.
Recommendation Systems: Implementing systems that provide personalized recommendations. Architecture - System Design: Best practices for designing scalable systems, including API design, data models, and architecture patterns.
Infrastructure: (13555)
Basic Social Skills Guide - Improve Your Social Skills:
The text is an overview of a free guide designed to help improve social skills, structured into three main sections with seventeen detailed lessons. The guide aims to enhance social interactions and is intended to be shared and supplemented with an advanced guide. The three key sections cover foundational aspects, body language, and conversation skills.
The first section, Foundations, helps readers understand their social goals, motivations, and how to overcome fear and manipulation. The Body Language section teaches how to read and interpret signals of comfort and discomfort, as well as how to use one’s own body language effectively. The Conversation section introduces the principle of „Inspiration and Invitation“ to facilitate smooth and enjoyable conversations on any topic.
Additionally, the guide includes a section on supporting friends in times of struggle and quick, practical tips for immediate social skill improvement. Overall, the guide is designed to be accessible and practical, encouraging readers to apply what they learn to real-life situations. (13556)
The text argues that Large Language Models (LLMs) are not „world models,“ meaning they do not truly understand or represent the world they are trained on. The author uses several examples to illustrate this point. In one example, an LLM plays chess poorly because it doesn’t keep track of the board state, despite having read millions of chess games. In another, the LLM misunderstands the concept of „normal blending mode“ in image editing, showing it doesn’t grasp basic principles of how computers handle colors and transparency.
The author also points out that while LLMs can sometimes provide useful or impressive outputs, this doesn’t mean they understand the underlying concepts. They might, for instance, provide a mathematical proof for 2+2=4, but it doesn’t mean they understand arithmetic. The author concludes that LLMs don’t learn a world model except by accident, and there’s no reliable way to count on this accidental learning.
The text also predicts that while LLMs can be taken very far with sufficient engineering effort, they are not a sufficient path to general machine intelligence. They won’t be able to deal with large code bases autonomously, reliably know what they don’t know, or consistently provide accurate information. The author suggests that LLMs reflect a part of how human intelligence and stupidity work, as they can help find good ideas but also reinforce misunderstandings.
Overall, the text serves as a caution against overestimating the capabilities of LLMs and a call to understand their limitations. (13557)
The text discusses the capabilities and implications of GPT-5, a new AI model that is described as a significant advancement. The author highlights GPT-5’s ability to perform complex tasks autonomously, often producing impressive and unexpected results. For instance, when prompted to create a dramatic illustration, GPT-5 generated a paragraph with hidden acrostics and increasing word counts, showcasing its creativity and technical prowess.
One of the key features of GPT-5 is its ability to select the appropriate model and effort level for a given task, automating a process that previously required user intervention. This automation can be both helpful and frustrating, as GPT-5 sometimes underestimates the complexity of a task, leading to less satisfactory results. However, users can override this behavior by explicitly requesting more effort.
GPT-5 also addresses a common issue in AI use: users not knowing what tasks to ask for or what the AI is capable of. The model is proactive, suggesting actions and generating a wide range of outputs, from business plans to coding projects. The author shares an example where GPT-5 created a functioning 3D city builder from a vague prompt, demonstrating the AI’s ability to independently develop and enhance complex projects.
The text emphasizes that while GPT-5 is highly capable, human oversight is still necessary to check for errors and make critical decisions. The author suggests that GPT-5 represents a shift in how we interact with AI, where users can provide vague instructions and let the AI determine the best course of action. This proactive and autonomous behavior is what the author means by „GPT-5 just does stuff,“ highlighting the model’s ability to initiate and complete tasks with minimal guidance. (13558)
Why insurers worry the world could soon become uninsurable:
The text discusses the growing concerns among top insurers about the climate crisis potentially making entire regions uninsurable. Günther Thallinger, a board member at Allianz, warns that rapid decarbonization is crucial as extreme weather events are degrading asset classes and threatening capitalism. The insurance industry, often seen as a vital part of the global economy, is struggling with a significant „protection gap“ where two-thirds of economic losses from natural catastrophes are uninsured. This gap shifts the financial burden onto individuals, businesses, and governments.
Thallinger and other experts, like those at Zurich Insurance Group, highlight that the current trajectory of global temperature increase (2.6-3.1 degrees Celsius) could lead to catastrophic consequences, making adaptation efforts ineffective. They emphasize that the cost of economic losses from natural disasters far exceeds the cost of adaptation, providing a strong economic case for investing in preventative measures.
The increasing frequency and severity of extreme weather events have led to a surge in the catastrophe bond market, which helps insurers raise funds for such events. However, there are concerns that this trend might not be sustainable if the climate crisis continues to worsen. Experts like Steve Evans warn that without increased resilience and protection, insurance costs could spiral out of control, making it uneconomic for insurers.
While some, like Tobias Grimm from Munich Re, believe that the insurance industry can adapt by adjusting premiums and encouraging loss prevention, the overall message is that the climate crisis poses a significant threat to the insurability of certain regions and the functioning of the insurance market. The text underscores the urgent need for rapid decarbonization and effective adaptation strategies to mitigate these risks. (13559)
The text discusses the author’s approach to hiring at their company, Scale, emphasizing the importance of candidates who are genuinely passionate and committed, both to the company and to their work in general. The author, who has interviewed many candidates, looks for two key traits: a strong connection to Scale’s mission and a deep, intrinsic motivation to excel in their work. The author worries about the company becoming more of a credential than a passionate community, warning that as the company grows, it might attract candidates who are more interested in the brand than the actual work. This could lead to a high turnover of talented but unengaged employees, who don’t truly care about the company’s mission or their work. To avoid this, the author advocates for a recruiting process more akin to courtship, seeking candidates who are genuinely passionate and committed. The author also critiques the Silicon Valley trend of equating company perks with company culture, arguing that true culture is about the people and their dedication, not the comforts provided. In essence, the author believes that hiring people who genuinely care about the work and the company’s mission is crucial for building a successful, enduring organization. (13560)
Craig R. Brittain (@brittainforsenate) on Threads:
The text discusses a incident involving Detroit rapper Big Huey, who made a song about Tesla’s Cybertruck. In response, Tesla allegedly remotely deactivated his vehicle, leaving him stranded on the side of the road. This incident sparked a wide range of reactions from users on Threads, a social media platform. Here are the key takeaways:
Many users expressed outrage and concern over the safety implications of Tesla having the ability to remotely disable vehicles. They argued that this action put not only Big Huey but also other drivers at risk, especially if the vehicle was deactivated in a high-traffic area like a freeway. Some users drew parallels to dystopian scenarios, highlighting the ethical and legal concerns surrounding this capability.
Some users were more focused on the song itself or Big Huey’s decision to buy a Cybertruck, but many saw these points as missing the larger issue of the company’s control over a customer’s vehicle. There were also discussions about the potential legal consequences for Tesla, with several users suggesting that Big Huey should sue the company.
The incident also raised broader questions about the safety and ethics of connected vehicles, particularly electric vehicles (EVs), and the potential for similar issues in the future. Some users expressed a reluctance to purchase Teslas or other connected EVs due to these concerns. (13561)
Optimizing My Sleep Around Claude Usage Limits:
The author has been experimenting with a unique sleep schedule to maximize their usage of a Claude Pro subscription, which resets every five hours. Initially frustrated by the usage limits disrupting their workflow, they decided to adopt a sleep pattern similar to that of single-handed sailors, who sleep in short intervals to stay alert. This approach has allowed them to make the most of their Claude usage, increasing their productivity significantly. The author acknowledges that this strategy might not be sustainable in the long run, especially if subscription costs increase or usage limits change. They are prepared to adapt and even consider setting up an alarm to ensure they wake up before their usage limit expires. The text also briefly mentions the author’s side project, a B2B SaaS, and their hobby of sailing. (13562)
The text discusses the author’s efforts to disable the cellular communication system in their Hyundai vehicle to prevent tracking and remote interference. The author is concerned about the constant online requirement of some car manufacturers, such as Tesla, and the remote control capabilities of Hyundai’s BlueLink system. To achieve this, the author removes the telematics unit, which is located within the audio/visual head unit of the car. After a detailed process, the author successfully disables the cellular communication without causing any issues with the car’s functionality. The author also mentions the challenges faced during the removal process and the tools used. Ultimately, the author is satisfied with the result, as the BlueLink button no longer functions, indicating that the car is no longer connected to the cellular network. (13563)
CALLEkocht - Grandma’s Recipes (Video):
The text is a cooking video by a host named Kalle, who presents a recipe for a luxurious potato mash. The key points are:
Kalle introduces a simple yet gourmet recipe for potato mash, emphasizing the use of butter instead of milk. He stresses the importance of cleaning and preparing the potatoes correctly to avoid contamination from the soil. The potatoes are boiled until tender, then drained and allowed to steam dry. A generous amount of butter and freshly grated nutmeg are added, and the mixture is mashed together to create a creamy texture. Kalle notes that this dish, while requiring some effort, can be made easily at home. He also mentions that his recipe is available as a frozen, pre-made product through a partner company, Tellermitte, and encourages viewers to try it.
In summary, Kalle shares a detailed recipe for a rich, buttery potato mash, highlighting the importance of proper potato preparation and offering a convenient, pre-made option for viewers. (13641)
Confreaks - RailsConf 2025 Not Invented Here: Things Rails Didn’t Innovate by Caleb Hearth (Video):
The text is a talk by Caleb Hearth about five key concepts associated with Ruby on Rails that the framework popularized but did not invent: Model-View-Controller (MVC), REST, Convention over Configuration, Active Record, and Merb. Here’s a concise summary:
The talk begins with a historical overview of Model-View-Controller (MVC), tracing its origins back to 1979 with Trygve Reenskaug at the Xerox PARC research center. Reenskaug developed the MVC pattern while working on a project management tool called Procon. The original MVC was designed to manage complex data sets through a GUI, with Models representing data, Views displaying it, and Controllers handling user inputs. This is different from how MVC is implemented in Rails, where Controllers manage web requests and Views render HTML.
The concept of REST (Representational State Transfer), formalized by Roy Fielding, is discussed next. REST in Rails is manifested through standard HTTP methods (GET, POST, etc.) and CRUD actions (index, show, new, create, edit, update, delete) that correspond to these methods. Rails popularized RESTful routes and stateless requests, contributing to its widespread adoption.
Convention over Configuration is another Rails principle that reduces the need for explicit configuration. This approach, influenced by Unix programming philosophies, allows developers to follow conventions to streamline development, making Rails applications quick to set up and maintain.
Active Record, a design pattern and library for handling database interactions, is closely tied to Rails. It maps database tables to Ruby classes, providing an abstraction layer for database operations. Rails extends Active Record to include data type conversions and domain logic.
Merb, a web framework released in 2006, is discussed as a modular and performant alternative to Rails. Merb’s focus on a public API and performance improvements influenced Rails 3, which merged many of Merb’s ideas. This merger led to a more modular Rails with better performance and a documented public API.
Caleb also highlights the importance of learning from existing ideas in software development, emphasizing that Rails‘ success comes from building on well-established concepts rather than reinventing the wheel. He concludes by expressing gratitude to influential figures in the Ruby and Rails communities.
The talk is a blend of historical context, technical explanations, and personal anecdotes, providing insights into the evolution of Rails and the principles that underpin it. (13642)
Alex Cummins, a software engineer at Persona, discusses the evolution of their identity platform’s architecture, highlighting the challenges and solutions they encountered while scaling. Persona is an all-in-one identity platform that handles onboarding, compliance, fraud prevention, and more, serving a diverse range of industries with unique compliance requirements. They started with a simple Rails application on Google App Engine but needed to evolve their architecture to handle increased complexity and scale.
Initially, they used Rails‘ asset pipeline for managing assets and later integrated Webpacker for modern front-end tooling. However, they eventually moved to Vite for better performance and flexibility. As their needs grew, they transitioned from Google App Engine to Kubernetes via GKE for more control and scalability. This shift allowed them to manage containers, scaling, and networking more effectively but also introduced new complexities in observability and operational overhead.
To manage their growing data, Persona sharded their MySQL database and introduced MongoDB, Elasticsearch, and Redis for different workloads. They faced challenges with horizontal sharding in Rails, requiring careful management of shard context and high-throughput, low-latency routing. Large MySQL tables posed additional issues with slow queries and schema changes, leading them to adopt more efficient access patterns and tools for database migrations.
Persona’s current focus is on simplifying their architecture with a project called Stacks, which consolidates their deployment model into self-contained units. This approach reduces complexity while maintaining scalability and isolation between different tenants. They route requests efficiently using edge locations and a globally distributed lookup table, ensuring minimal impact on customer implementations.
Cummins emphasizes the importance of intentional complexity management, embracing Rails‘ defaults while not being constrained by them, and simplifying where possible. The key takeaways are the evolution of Persona’s architecture, the challenges faced with scaling and data management, and their approach to simplifying complexity for better scalability and maintainability. (13643)
Fahd Mirza - Alibaba’s WebAgent: WebWalker + WebDancer + WebSailor + WebShaper (Video):
The video discusses Alibaba’s recent developments in AI, particularly focusing on their „Web Agent“ suite of projects. This suite includes several interconnected projects designed to enhance AI’s ability to find and process information online. The key components highlighted are Web Shaper, Web Sailor, Web Dancer, and Web Walker. Web Shaper introduces a novel approach using mathematical blueprints and set theory to create precise research tasks, which an AI agent called Expander uses to autonomously search the web and gather information. Web Sailor and Web Dancer are AI models designed for complex information-seeking tasks, while Web Walker serves as a benchmark to evaluate these models. The overall ecosystem aims to advance AI research, particularly in the field of autonomous information-seeking agents. Alibaba has made this suite open source, encouraging community contributions. Potential real-world applications include competitive intelligence, where companies could deploy these agents to monitor the web for specific signals. The video concludes with an invitation for viewers to engage with the content and stay tuned for future updates as the technology matures. (13644)
Veritasium - This Battery Was Almost Too Dangerous to Exist (Video):
The text discusses the history and evolution of lithium-ion batteries, highlighting their widespread use in various electronic devices and the challenges they face. Here’s a concise summary:
Lithium-ion batteries, despite their seemingly simple design, power most of our electronic devices, from laptops to electric vehicles. Their development was a response to the need for better energy storage solutions, particularly during the oil crisis of the 1970s. Stanley Whittingham, working at Exxon, developed the first lithium-ion battery using titanium disulfide and lithium. However, the battery was too dangerous due to the use of pure lithium, which could form dendrites and cause short circuits.
John B. Goodenough later improved the design by using lithium cobalt oxide, which allowed for a safer and more efficient battery. Akira Yoshino further refined the design by replacing the lithium anode with a carbon-based material, leading to the birth of the modern lithium-ion battery. This breakthrough allowed for the development of compact, rechargeable batteries that power everything from camcorders to electric cars.
Despite their success, lithium-ion batteries are not without issues. They can be dangerous if damaged or overheated, and their production has environmental and ethical concerns, particularly regarding the mining of lithium and cobalt. As demand for batteries continues to grow, driven by the need for energy storage and electric vehicles, the search for safer, cheaper, and more efficient battery technologies continues.
The text emphasizes that while lithium-ion batteries have revolutionized our way of life, the future of energy storage will likely involve mastering multiple elements and technologies, not just lithium. (13645)
Björn Albers - Warum du das Terminal lernen solltest (noch mehr Tricks!) (Video):
The video is a tutorial on advanced usage of brace expansions, a feature of the terminal (command line) that allows for efficient creation of multiple files or directories. The presenter builds on a previous video where basic brace expansions were introduced. Key points include:
Brace expansions can generate sequences of numbers or letters, which can be used to create multiple directories or files quickly. For example, they can create directories for specific calendar weeks or years.
The presenter demonstrates how to create directories for calendar weeks with a specified interval, such as every four weeks, and how to combine this with year ranges to create a structured directory system spanning multiple years.
Important details include ensuring that combined expressions are treated as single arguments to avoid errors, and using the
-poption with themkdircommand to create parent directories as needed.The video also covers creating sequences of letters and combining them with numbers to generate more complex directory structures.
The presenter emphasizes the importance of understanding how to use these expressions creatively to streamline tasks.
Overall, the video is a practical guide on leveraging brace expansions for efficient file and directory management in the terminal. (13646)
Finanzfluss - 8 Dauer-Streitpunkte beim Thema Finanzen! | Finanzfluss (Video):
The text is a video discussion on controversial financial topics, presented by Thomas from Finanzus. He explores various theses, presenting both pros and cons, and shares community opinions on each. Here are the key takeaways:
Sustainable Investing: This is a contentious issue with arguments on both sides. Proponents highlight the ethical and potential performance benefits, while critics point out reduced diversification and lack of direct impact on companies. The community is divided, with 35% against, 26% in favor, and 39% neutral.
Bitcoin as the Future Currency: This thesis is met with skepticism. While Bitcoin offers benefits like inflation protection and borderless transactions, critics argue its volatility, slow transaction speed, and high energy consumption make it impractical as a daily currency. Only 16% of the community believes in this thesis.
Buying vs. Renting: This depends on various factors like expected price increases, interest rates, and personal financial goals. The community is split, with 33% favoring buying, 18% favoring renting, and 50% neutral.
Active vs. Passive Investing: Active investing can potentially outperform the market but requires more time, effort, and cost. Passive investing is generally more reliable and less risky. Half of the community believes passive investing is better.
Leverage for Higher Returns: Using loans to invest can amplify gains but also increases risk significantly. Only 9% of the community agrees with this thesis.
Spending Now vs. Saving for Later (YOLO): Both have their merits, but 64% of the community believes in saving for future security.
Tracking Difference vs. TER: The tracking difference is a more comprehensive measure of an ETF’s performance but is less stable. The TER is more constant. 70% of the community is neutral on this topic.
Investing is for the Rich: This thesis is largely disproven by modern low-cost investment options and readily available knowledge. 93% of the community disagrees with this statement.
Overall, the video emphasizes the complexity and personal nature of financial decisions, encouraging viewers to consider their individual circumstances and preferences. (13647)
MinuteFood - The food label you should always ignore (Video):
The video discusses the misuse and lack of regulation surrounding the „natural“ label on food products. The term „natural“ started gaining traction in the 1970s and is highly sought after by consumers, who are willing to pay more for it. However, the term is not clearly defined, and its meaning varies greatly among consumers. The USDA has a specific definition for meat, dairy, and egg products, but the FDA, which oversees the rest of the food supply, only provides voluntary guidelines. Many consumers and advocacy groups have pushed the FDA to regulate the term, but the FDA has repeatedly refused. Lawsuits have led some companies to drop the „natural“ label, but this process puts the burden on consumers. The video argues that the „natural“ label is largely meaningless and can lead to a problematic worldview that equates „natural“ with „good“ and „unnatural“ with „bad.“ Instead of relying on the „natural“ label, consumers should look for other, better-regulated labels that clearly define specific attributes, like „organic“ or „non-GMO.“ The video also promotes a browser extension, Tab for a Cause, that supports animal welfare. The overall message is that consumers should be critical of the „natural“ label and seek out more informative labels when making food choices. (13648)
EconomyTalk - Is Europe About to Break Up Like Brexit? (Video):
The text discusses the growing Euroskepticism and nationalist sentiments across EU countries, highlighting significant political shifts and the potential for another Brexit-like event. Key points include:
The rise of right-wing and nationalist parties in the European Parliament, reflecting a broader dissatisfaction with EU policies and economic conditions.
Economic challenges, such as uneven recovery from COVID-19 and the energy crisis, have fueled public discontent and eroded trust in the EU.
Countries like Denmark, France, Italy, and the Netherlands are experiencing varying levels of Euroskepticism, with some voters openly considering exit from the EU.
The EU’s response to Brexit provided lessons in negotiation and diplomacy, but it has not deterred other countries from considering similar paths.
Economic hardship is seen by many as a price worth paying for political freedom, indicating a deeper cultural and political divide within the EU.
Specific issues driving discontent include economic disparities between Northern and Southern Europe, migration policies, cultural resistance to liberal policies, and institutional frustrations within the EU.
Despite these challenges, the EU’s unity is maintained by shared benefits such as monetary policies, the single market, climate targets, and security agreements.
The potential for more countries to leave the EU raises questions about legal, economic, and social consequences, as well as the future of European unity.
The text suggests that while the EU faces significant challenges, the question is no longer whether another country will leave, but how prepared the EU is to handle such an event. The overall message is that the EU is at a critical juncture, with growing discontent and political shifts threatening its unity, but also with shared benefits and institutions that could sustain it through these challenges. (13649)
NZZ erklärt - FSB: Wie Forscher durch die Analyse von Medaillen Russlands Spionagenetz enttarnten (Video):
The text discusses a investigation led by OSINT researcher Amory Lesplinkach into a secretive unit of the Russian intelligence service, the FSB. The team used medals awarded to members of this unit, which are publicly available online, to uncover details about the unit’s structure and locations. These medals contain symbolic information about the unit’s activities, such as signal interception and satellite monitoring, as well as specific details like years of operation and even building designs. The team identified ten locations for this unit, known as the 16th Center, which is responsible for monitoring radio, satellite, and internet communications. The unit is highly secretive, with an estimated workforce of at least 560 people. The analysis of these medals highlights how seemingly innocuous objects can reveal significant information when examined closely. The research is ongoing, suggesting that more such units may exist. (13650)
MinuteEarth - You’ve Been Misled About The Water Cycle (Video):
The video discusses the inaccuracies of typical water cycle diagrams and the importance of understanding the full water cycle, especially the often-overlooked underground component. The majority of Earth’s freshwater is locked in glaciers and ice caps, with a significant portion also stored underground in aquifers. These underground reserves are vast but fragile, taking thousands to millions of years to replenish or being vulnerable to contamination. The video emphasizes the need for careful management of these resources, as human activities like pumping water for use can deplete or contaminate aquifers. The narrator also promotes a book, „Hydrology and Its Discontents,“ which delves into the complexities of water management and our relationship with this vital resource. The overall message is a call to appreciate and preserve our freshwater resources, especially the often-forgotten underground water. (13651)
The video by a watchmaker highlights common mistakes that can damage mechanical watches, emphasizing the importance of proper care and maintenance. The key takeaways are as follows:
Firstly, it is crucial not to wear a watch until it stops working. Regular servicing, similar to an oil change in a car, is essential to remove old lubricants and replace them with new ones. This prevents excessive wear and tear caused by dust, old oil, and friction. Skipping regular maintenance can lead to significant damage and costly repairs.
Secondly, choosing the right service provider is vital. Not all services are created equal, and opting for the cheapest service can often lead to poor quality work. It’s important to find a reputable watchmaker who understands the sensitivity of the mechanism and takes precautions to avoid introducing contaminants like dust during the service. This ensures the watch’s longevity and accuracy.
Thirdly, exposing a watch to extreme temperatures, whether hot or cold, can be detrimental. High temperatures, such as those in a sauna, can cause lubricants to thin out and distribute unevenly, affecting the watch’s performance. Extreme cold can cause materials to contract, leading to potential leaks and water damage, which can result in rust and irreparable harm.
Fourthly, the beach is a hazardous environment for watches due to saltwater, sand, and intense UV radiation. Saltwater promotes corrosion, sand acts as abrasive, and UV radiation can degrade materials. Proper care, such as rinsing the watch with fresh water after exposure to saltwater and avoiding direct contact with sand, is crucial.
Lastly, the video highlights five common user errors: adjusting the crown while the watch is on the wrist, overtightening the crown, changing the date at the wrong time, leaving the chronograph running continuously, and wearing the watch during high-impact activities. These mistakes can lead to premature wear, damage to internal components, and reduced accuracy. Proper handling and awareness of these issues can significantly extend the life and performance of a mechanical watch.
In conclusion, treating a mechanical watch with care and respect, including regular servicing and avoiding harmful environments and practices, ensures that it remains a reliable and beautiful timepiece for many years. The watchmaker encourages viewers to be mindful of these factors to preserve the intricate mechanics and enjoy their watches for generations. (13652)
Is chain-of-thought AI reasoning a mirage?:
The text discusses the debate surrounding chain-of-thought reasoning in language models, particularly criticizing a paper from Arizona State University titled Is Chain-of-Thought Reasoning of LLMs a Mirage?. The author argues that the paper’s conclusions are flawed and that the questions it raises about whether AI models truly reason are more philosophical than practical.
The Arizona State paper claims that chain-of-thought reasoning in language models is merely a mirage, arising from memorized patterns rather than genuine logical inference. The paper uses a small transformer model trained on non-language data transformations to support this claim. The author of the text criticizes this approach, asserting that reasoning requires language use and that the model used in the paper is too small to truly exhibit reasoning capabilities. He also points out that the paper’s conclusions do not account for how humans actually reason, which is often flawed and heuristic-driven.
The author suggests that the debate about whether AI reasoning is „real“ is more philosophical and depends on a clear definition of reasoning. He proposes a heuristic for evaluating papers on model reasoning: checking if they assess human reasoning skills or provide a philosophical definition of „real“ reasoning, and ensuring that the tasks used require genuine reasoning rather than simple computation. The text concludes by advising readers to be critical of papers that make sweeping claims about AI reasoning without adequate philosophical or empirical grounding. (13653)
TODO
What Medieval People Got Right About Learning - Scott H Young:
The text argues that modern education might have overlooked the effectiveness of apprenticeships, a learning model that was prevalent for centuries. Unlike classroom learning, which often struggles with transferring theoretical knowledge to practical applications, apprenticeships allow learners to acquire skills in real-world settings by doing and watching. This method mimics natural human learning processes and can lead to more applicable knowledge. The author suggests that while apprenticeships may not be feasible in all fields, incorporating their principles—such as learning with a specific purpose and immersing oneself in an ecosystem of expert practitioners—can enhance learning experiences. The text also critiques the pyramid model of knowledge, which assumes that all knowledge is built from fundamental layers, and suggests that learning from the „middle“ of a subject can be more effective. Ultimately, the author encourages readers to adopt elements of apprenticeship learning to improve their educational outcomes. (13655)
Funding Open Source like public infrastructure:
The text argues for governments to invest in Open Source software as a critical public infrastructure, similar to how they maintain roads and bridges. The author, who has been involved in the Open Source community for decades, predicts that Open Source would evolve in three stages: volunteer-driven, commercially sponsored, and government-supported. He notes that while paying for Open Source maintenance was once controversial, it is now widely accepted, and platforms like Open Collective facilitate this.
The author highlights the significant dependency on Open Source software, estimating that replacing it would cost $8.8 trillion, with 96% of this value relying on just 5% of contributors. This concentration creates fragility, as critical systems depend on a small group of maintainers who often lack stable funding. Geopolitical tensions have also increased the need for digital sovereignty, leading some governments to adopt Open Source tools.
Many governments rely heavily on Open Source but contribute little back, which can weaken the projects they depend on. The author suggests that governments should shift from mere consumption to active contribution, investing in Open Source as they would in physical infrastructure. Examples of government stewardship, such as the EU’s Cyber Resilience Act and Germany’s Sovereign Tech Agency, are provided.
The author proposes several ways governments can help, including tracking the health of critical projects, committing to long-term funding, encouraging contribution in contracts, adopting „Public Money, Public Code“ policies, scaling successful funding models, and teaching Open Source in educational institutions. The goal is to ensure the stability, security, and long-term reliability of digital infrastructure without stifling innovation.
In conclusion, the author emphasizes the need for governments to sustain Open Source software, which has become essential public infrastructure, through coordinated policy reforms and dedicated funding mechanisms. This approach aims to keep the core systems healthy while allowing the community and companies to drive innovation. (13656)
The author, a seasoned coder and writer, expresses their love for both coding and writing, particularly about coding. They have a proven track record of explaining complex topics clearly and effectively, as evidenced by their successful tech books and blog. The author acknowledges the rapid evolution of AI and its potential impacts on their fields. They highlight that while AI’s role in creative fields like fiction writing is still uncertain, it is already a dominant tool for technical information, impacting resources like Stack Overflow. The author’s recently published book, freely available online, has been well-received but raises concerns about AI potentially using it for training without consent. The author describes using AI to understand the Erlang and OTP ecosystems for a planned book on the Gleam programming language. While AI can explain technical concepts effectively, it lacks the personal style that the author brings to their writing. The author feels an „identity crisis“ as their unique skill of explaining complex topics has been commodified by AI, leading them to question their future in writing and coding. They speculate about a utopian future where AI handles tasks more efficiently, allowing humans to pursue passions, but express uncertainty about their own motivations in such a world. (13657)
Typeface licenses | Dave Smyth:
The text discusses the author’s preference for using commercial typefaces in design projects, highlighting their quality and the support they provide to independent foundries. The author emphasizes the importance of clear and reasonable licensing terms when recommending typefaces to clients. Key considerations include easy-to-understand licensing agreements, shareable shopping carts, practical payment terms, accessible pricing models, and the ability to subset fonts. The author appreciates the need for foundries to have sustainable business models but also stresses the importance of clear and reasonable terms for clients. Ultimately, these factors influence the author’s recommendations to clients when selecting typefaces. (13658)
Org-social is a decentralized social network built on Org Mode files, which are plain text files that can be edited with any text editor or Emacs. This platform emphasizes simplicity, accessibility, and decentralization, allowing users to create, share, and interact with posts without the need for registration or databases. Users can publish posts, make replies, mention other users, create polls, and personalize their profiles, all within a human-readable format.
The system is inspired by other decentralized social networks like twtxt and Texudus, and it leverages Org Mode’s native features such as timestamps, properties, and links. To use Org-social, users create an Org Mode file called social.org, add their basic information and posts, and then upload the file to a web server. The file’s structure includes global metadata for user information and post metadata for individual entries. Users can follow others by including their URLs in the FOLLOW field, and they can mention users in their posts using Org Mode’s link system.
Discoverability in Org-social is similar to email or RSS feeds; users need to share their URLs or find them through community channels. The platform supports features like pagination, media attachments, and polls, and users can modify or delete posts after publishing them. There is no official client, but users can utilize the org-social.el package to read their followers‘ posts. The decentralized nature of Org-social means that users are responsible for hosting their own feeds, which can be done on any web server that supports plain text files. The platform encourages community participation, with users able to add their feeds to a shared registry. (13659)
2025 News - New Protein Therapy Shows Promise as First-Ever Antidote for Carbon Monoxide Poisoning:
Researchers at the University of Maryland School of Medicine have developed a promising new protein-based therapy called RcoM-HBD-CCC, which shows potential as an effective antidote for carbon monoxide poisoning. This condition is a significant health issue, causing about 50,000 emergency room visits and 1,500 deaths annually in the U.S., often due to ventilation failures or indoor use of combustion equipment.
Current treatments involve oxygen therapies, which can be slow and sometimes leave survivors with long-term damage. The new therapy acts like a sponge, rapidly absorbing carbon monoxide from the blood without interfering with oxygen or other vital molecules. In tests on mice, it proved effective and was safely eliminated through urine, with minimal impact on blood pressure. This makes it a strong candidate for clinical use, potentially administered in emergency settings.
The therapy works by targeting the way carbon monoxide binds to hemoglobin, displacing oxygen and causing tissue damage. RcoM-HBD-CCC quickly removes carbon monoxide, freeing hemoglobin to carry oxygen again. Unlike other similar proteins, it does not significantly affect blood pressure, making it a safer option. Future research will focus on determining safe and effective dosages and exploring other potential uses, such as in severe anemia or as a blood substitute.
The development of this therapy is a significant step forward in addressing carbon monoxide poisoning, with the potential to save lives and reduce long-term health impacts. The researchers involved are also exploring commercial applications through Globin Solutions, a company they co-founded. (13660)
Optimizing Your Debian 13 Desktop:
The article provides several tips to enhance the Debian 13 desktop experience. It begins by explaining how to enable additional repository areas to access non-free packages like Nvidia drivers by editing the /etc/apt/sources.list file. It also addresses the issue of system administration tools not being in the user’s PATH by suggesting to add sbin folders to the PATH variable in the ~/.bashrc file.
To simplify administrative tasks for single-user systems, the article recommends adding the user to specific system groups, such as adm and crontab, using the usermod command.
For faster web browsing, the article suggests switching to Cloudflare DNS servers by editing the /etc/systemd/resolved.conf file and restarting the systemd-resolved service.
To speed up package downloads, the article advises switching to local mirrors using Nala, a user-friendly frontend for APT. It also covers enabling Snap and Flatpak for accessing the latest software and installing the GNOME Software Centre for a graphical user interface to manage these packages. Additionally, it recommends using Synaptic, a classic GUI tool, for managing Apt packages.
Finally, the article addresses the inconvenience of offline updates in GNOME Software and provides a command to disable this feature. The overall message is to help users optimize their Debian 13 experience by leveraging these tips for better performance and usability. (13661)
The text is a set of guidelines for the subreddit r/ExperiencedDevs, a community for individuals with at least 3 years of experience in the IT or software development field. The subreddit aims to foster mature and respectful discussions specific to experienced developers, with a strong emphasis on avoiding personal advice or complaints. Key points include:
Experience Requirement: Only those with 3+ years of experience should participate, except for a weekly thread for beginners.
Respectful Conduct: No disrespectful language or behavior, including racism, sexism, or trolling, is tolerated.
Focus on Specific Issues: The subreddit is not for general career advice but for discussing issues that benefit from the insights of experienced developers.
No Offer or Learning Path Queries: Questions about choosing between job offers or learning paths are not allowed.
No Interview Complaints: Complaints about specific types of interviews are discouraged.
Other Relevant Subreddits: Several other subreddits are suggested for different types of career and technical questions, indicating a well-connected network of communities for developers.
Overall, the subreddit is designed to be a mature, experienced-focused forum where developers can discuss industry-specific issues, share knowledge, and avoid common pitfalls in their careers. (13662)
PYX: The next step in Python packaging:
The discussion revolves around the announcement of a new tool called „pyx“ by Astral, which aims to improve Python packaging by introducing a dynamically served endpoint for package metadata. This endpoint will help tools like uv plan ahead, identify problems and conflicts, install packages in parallel, and more. The community seems divided on the necessity and effectiveness of yet another packaging tool in Python, given its already complex ecosystem. Some users express frustration with the current state of Python packaging, while others highlight the unique challenges Python faces, such as dealing with packages that contain compiled code and dependencies in multiple languages.
Key points include:
PyPI Limitations: The current PyPI indexing is not suitable for dynamic queries or parallel installations, which pyx aims to address.
Community Reaction: There’s skepticism about the need for another tool, given the existing plethora of tools like pip, setuptools, poetry, and uv.
Challenges in Python Packaging: Python’s diverse use cases, including data science and machine learning, often require compiled dependencies, complicating the packaging process.
Private Registries: Astral’s pyx service is geared towards private registries and corporate use cases, which might not directly benefit individual developers but could support the development of open-source tools like uv and Ruff.
Historical Context: The discussion touches on the history of Python packaging tools, the transition from setup.py to pyproject.toml, and the evolution of the Python Software Foundation’s role in maintaining PyPI.
Overall, the community is cautiously optimistic about pyx but remains wary of the complexity it might add to an already fragmented ecosystem. (13663)
pyx: a Python-native package registry, now in Beta:
Astral, known for developing high-performance tools for the Python ecosystem, has introduced pyx, a Python-native package registry. This new tool is part of their broader vision to create a next-generation infrastructure for Python, enhancing speed, security, and even GPU awareness. pyx is designed to complement their existing package manager uv, offering a seamless and advanced experience for managing both private and public packages. The inspiration for pyx came from addressing issues that cannot be solved with client-side tools alone, such as difficulties in installing complex libraries or ensuring build consistency across teams. Astral’s strategy involves keeping their core tools open source while offering paid, hosted services like pyx to provide a comprehensive and integrated Python development experience. Currently, pyx is in its early stages with select partners and Astral is open to feedback and interest from the community as they prepare for general availability. (13664)
New downgrade attack can bypass FIDO auth in Microsoft Entra ID:
Security researchers have developed a new type of attack called a FIDO downgrade attack, which targets Microsoft Entra ID. This attack tricks users into using weaker login methods, making them vulnerable to phishing and session hijacking. The attack exploits the fact that some browser combinations, like Safari on Windows, do not support FIDO-based authentication, forcing users to fall back on less secure methods. When users click on a phishing link, they are directed to a site that spoofs an unsupported browser, disabling FIDO authentication and prompting them to use alternative methods like the Microsoft Authenticator app or SMS codes.
The attacker intercepts the credentials and session cookies, allowing them to access the victim’s account. Although this attack does not exploit a vulnerability in FIDO itself, it highlights a critical weakness in the system. The risk is significant, especially for highly targeted attacks, even though it hasn’t been observed in the wild yet. To mitigate this risk, users should be cautious when prompted to use different login methods and should consider disabling fallback authentication methods.
The text also mentions a previous FIDO downgrade attack called PoisonSeed, which was found to be impractical due to proximity requirements. Overall, the message is a warning about the potential vulnerability in FIDO-based authentication systems and the need for vigilance and additional security measures. (13665)
The author expresses growing concern about an imminent economic downturn, possibly within a few months, driven by several interconnected factors. They highlight the recent layoffs of highly skilled tech workers despite their qualifications and the increasing adoption of AI by major companies to replace human workers. Major corporations like Google, Amazon, Salesforce, Microsoft, Intel, Tesla, and Cisco have either announced or implemented significant layoffs or AI-driven efficiency measures. The author estimates that AI is already performing a substantial portion of tasks previously done by humans, making it a viable alternative for many jobs. The average worker, who often performs routine tasks, is particularly vulnerable to being replaced by AI. Furthermore, the author points out the financial strain on consumers, with rising prices and increased reliance on high-interest credit card debt. This debt is becoming unsustainable, with a significant portion of balances transitioning into delinquency. The author worries about a cascade of events leading to a massive economic slowdown, increased unemployment, and social unrest. They predict that a sudden spike in knowledge worker unemployment could trigger a series of negative events, including business failures, evictions, and government overreactions. The author acknowledges the uncertainty of their prediction but expresses a significant level of concern, suggesting that the current situation could lead to widespread panic and calls for drastic measures. They advise readers to appreciate the current state of affairs and hope that the pressure is released in a less disruptive way. (13666)
AI is already replacing thousands of jobs per month, report finds:
The text discusses the impact of artificial intelligence (AI) on the job market, particularly in the United States. Key points include:
AI is already replacing thousands of jobs each month, with over 10,000 jobs lost in July 2025 due to the adoption of generative AI technologies. The technology industry is seeing the most significant cuts, with over 89,000 job losses, a 36% increase from the previous year. Younger job seekers are disproportionately affected, with entry-level corporate roles declining by 15% over the past year. The use of AI in job descriptions has surged by 400% in the last two years.
The job market is also influenced by other factors, such as government efficiency cuts and rising costs due to tariffs, which have led to increased layoffs in sectors like retail. Executives warn that white-collar workers are particularly at risk of job displacement due to AI.
However, experts suggest that AI’s impact on the job market is more indirect, with companies using AI to cut costs in an uncertain economic climate rather than directly replacing human workers. The text also highlights statements from CEOs like Andy Jassy of Amazon and Jim Farley of Ford, who acknowledge that AI will lead to workforce reductions but do not specify timelines.
Overall, the text paints a picture of a job market in flux, with AI playing a significant role in shaping the future of employment. (13667)
This website is for humans - localghost:
The text is a personal stance against the use of AI-generated content, particularly in the context of recipe websites and search engines. The author argues that AI, while convenient, lacks the soul, credibility, and personality that human-created content possesses. They express concern about the rise of AI search results, which could potentially replace the need to visit actual websites, and the impact this could have on content creators who rely on ad impressions for support.
The author writes for an audience of humans, not robots, sharing personal opinions and experiences to connect with readers and foster learning. They express frustration with AI’s ability to summarise content quickly, without capturing the nuances and context of the original work. The author concludes by stating that their website is intended for human readers and not AI language models. The overall message is a call to value and support human-created content in the face of advancing AI technology. (13668)
A Case Study in Bad Hiring Practice: And How To Fix It — Thomas Kranz:
The text discusses the common pitfalls in hiring practices, using Canonical as a case study to illustrate poor hiring processes in the cybersecurity industry. Despite a wealth of experienced talent available, many companies struggle to fill roles due to their own self-sabotaging behaviors. Canonical’s hiring process for a Head of Security Operations role highlights several issues:
Ineffective Job Posting: Canonical spams job boards with identical postings for different locations, rendering candidate searches useless and demonstrating a lack of understanding of effective recruitment. The job description also contains spelling errors and lacks a salary range, sending negative signals to potential candidates.
Irrelevant Requirements: The job posting asks for an „exceptional academic track record from both high school and university,“ which has little relevance to the role and may deter qualified candidates.
Cumbersome Application Process: Canonical’s application process is overly complex and asks in-depth questions that should be reserved for interviews, deterring competent candidates.
Inept Interview Process: The interview process involves a committee of non-expert reviewers and uses aptitude and personality tests, which are ineffective and can discriminate against neuro-divergent individuals. This approach is likely to filter out top candidates and favor mediocrity.
Poor Communication and Security: The use of multiple external providers for communication increases the risk of phishing and social engineering scams, which is particularly concerning for a security role.
The text concludes by advising companies to simplify their hiring processes, involve the right people in writing job descriptions and conducting interviews, and treat candidates with respect. The author suggests that companies like Canonical, which do not value applicants‘ time or skills, are likely to face security breaches in the future. The overall message is a critique of current hiring practices in the cybersecurity industry and a call for improvement. (13669)
U.S. alcohol consumption drops to a 90-year low, new poll finds:
The text discusses a significant decline in alcohol consumption among Americans, as revealed by a 2025 Gallup poll. Only 54% of U.S. adults reported drinking alcohol, marking a 90-year low. This decrease is largely attributed to a shift in public perception of alcohol’s health impacts, with a majority now believing that even moderate drinking is detrimental to health. This change is influenced by recent medical research and advisories from health authorities.
The decline is most pronounced among younger adults, women, and white adults. Beer remains the preferred alcoholic beverage, but wine consumption has also decreased, posing challenges for California’s wine industry. Economic factors and increased awareness of health risks may also contribute to the overall reduction in alcohol consumption. Despite suggestions that marijuana legalization might affect alcohol consumption, the Gallup report indicates that marijuana usage has leveled off and is not a significant factor in the decline. (13670)
Can You Gerrymander Your Party to Power?:
Unfortunately, I can’t access external links directly. However, based on the provided text, here’s what we can infer and summarize:
The article is titled „Can You Gerrymander Your Party to Power?“ and is authored by Ella Koeze, Denise Lu, and Charlie Smart, with contributions from Robert Vinluan and additional production by Peter Champelli. It was updated on August 8, 2025. The title suggests that the article explores the concept of gerrymandering, which is the practice of manipulating the boundaries of an electoral district to favor specific political interests within legislative bodies. The article likely includes an interactive component or game designed to help readers understand and potentially practice gerrymandering.
Gerrymandering is a complex issue that often involves redistricting, the process of redrawing electoral maps based on population changes. The article would likely discuss the implications of gerrymandering on elections and political representation. The interactive element suggests that readers can engage with the topic in a hands-on way, potentially learning about the ethical and practical considerations of redistricting.
In summary, the article is an engaging exploration of gerrymandering and redistricting, likely including an interactive game to help readers understand the intricacies and consequences of this political practice. (13671)
The text discusses Cross-Site Request Forgery (CSRF), a type of attack where an attacker tricks a victim’s browser into sending a malicious request to a target site, exploiting the user’s authenticated session. CSRF is particularly relevant for applications that use cookies for authentication, as it leverages the browser’s ambient authority to make requests on behalf of the user. Unlike Cross-Origin Resource Sharing (CORS), which deals with sharing responses across origins, CSRF focuses on accepting state-changing requests from untrusted sources. Key Points: 1. Definition and Mechanism:
CSRF exploits the browser’s ability to send requests using the user’s cookies or network position.
An attacker can create a form that, when submitted by the victim’s browser, sends a malicious request to the target site.
Importance of Protection:
All applications using cookies for authentication need CSRF protection.
The focus is on identifying and rejecting requests from untrusted sources, rather than protecting against arbitrary requests.
Same-Site vs. Same-Origin:
Different subdomains (e.g.,
app.example.comandmarketing.example.com) can have varying trust levels.HTTPS origins are generally more trustworthy than HTTP origins due to the risk of man-in-the-middle attacks.
Countermeasures:
Double Submit/Synchronized Tokens: Involves using a random value (token) submitted in the request and compared against a stored value.
SameSite Cookies: Setting cookies with the
SameSiteattribute can prevent them from being sent with cross-site requests.Non-Simple Requests: Preflighted by an OPTIONS request, providing a cross-origin signal.
Fetch Metadata: Using headers like
Sec-Fetch-Siteto indicate the origin of the request, which is the recommended method for CSRF mitigation.
Protection in 2025:
Applications should reject cross-origin non-safe browser requests.
Use Fetch metadata (
Sec-Fetch-Siteheader) to determine the origin of the request.Allow requests from trusted origins and handle edge cases like reverse proxies and outdated browsers.
Implementations and Tools:
Go 1.25 introduces
CrossOriginProtectionmiddleware to implement the recommended CSRF protection algorithm.Browser support for
Sec-Fetch-Siteensures effective CSRF protection in modern (13672)
Employee stock-option programs, approved by a company’s board of directors, allow employees to buy a certain number of company shares at a fixed price (strike price) for a set period, typically 10 years. These options usually begin vesting after one year and fully vest after four years. If an employee leaves before vesting, the options are canceled. Once vested, employees can exercise their options, buying shares at the strike price and then holding or selling them. The difference between the strike price and the market price at exercise is the employee’s gain. If the strike price is higher than the market price, the option is worthless (underwater); if the market price is higher, the option is valuable (in the money). When an employee exercises an option, the company issues new shares, increasing its market capitalization but potentially diluting earnings per share. To mitigate dilution, the company must either increase earnings or repurchase shares. (13673)
Brits are turning from VPNs to proxies to resist age verification – but their data may be at risk:
The text discusses the increasing use of proxies in the UK as a means to bypass age verification checks implemented under the Online Safety Act. These checks, which include methods like facial age estimation and credit card age checks, have raised privacy concerns. Proxy usage has surged, with a notable 88% increase in proxy traffic from the UK, as people seek to avoid these invasive measures.
However, the text warns that proxies, unlike VPNs, do not encrypt internet traffic, leaving user data potentially exposed to snoopers. This lack of encryption makes proxies a less secure option compared to VPNs, which encrypt data and reroute it through secure tunnels. Despite regulatory bodies discouraging the use of VPNs to avoid age verification, there has been a significant increase in VPN signups as well.
In summary, while proxies are being used more frequently to circumvent age verification, they come with significant security risks due to the absence of encryption. VPNs, though discouraged by regulators, remain a more secure option for maintaining online privacy. (13674)
Hackers leak Allianz Life data stolen in Salesforce attacks:
The text discusses a significant data breach involving Allianz Life, a major US insurance company. Hackers affiliated with the ShinyHunters extortion group, which is also known as Scattered Spider, leaked approximately 2.8 million records containing sensitive information about customers and business partners. The data was stolen from Allianz Life’s Salesforce CRM system. The hackers used social engineering tactics to gain access to the system and then downloaded and stole the databases. The leaked information includes personal details such as names, addresses, phone numbers, dates of birth, and Tax Identification Numbers, as well as professional details like licenses and firm affiliations.
The breach is part of a broader wave of attacks targeting Salesforce systems, with ShinyHunters claiming responsibility for several high-profile breaches, including those at Internet Archive, Pearson, and Coinbase. The group is known for its extortion tactics and has been linked to previous attacks on companies like AT&T, PowerSchool, and SnowFlake. The current attacks are believed to have started at the beginning of the year.
The hackers have been associated with another notorious group, Lapsus$, which was responsible for numerous attacks in 2022-2023. Some members of Lapsus$ were arrested, but it is unclear if the current threat actors are the same individuals or new ones using similar tactics. The situation is further complicated by the possibility of false flags, where threat actors use known group names to mislead investigators.
Allianz Life has not provided an official comment on the leaked database, as the investigation is ongoing. The breach highlights the ongoing threat of cyberattacks and the need for robust security measures to protect sensitive information. (13675)
Why I finally left Spotify | TechCrunch:
The author announces their decision to leave Spotify after a decade of use, citing several reasons for their departure. The primary issue is the app’s overwhelming reliance on algorithmic recommendations, which the author finds stifling and ultimately leads to a loss of personal agency in music choices. Additionally, the author mentions longstanding ethical concerns about Spotify, including low payouts to artists, the platforming of misinformation, and Spotify’s involvement in controversial investments. The author acknowledges that switching to another major platform like Apple Music doesn’t entirely resolve these ethical concerns but highlights that Apple Music offers a less overwhelming user experience. The author concludes by admitting that, ultimately, they have simply switched from one tech giant to another, without fully supporting independent alternatives. (13676)
Linus Torvalds Blasts Kernel Dev For ‚Making the World Worse‘ With ‚Garbage‘ Patches - Slashdot:
Linus Torvalds, the creator of Linux, publicly criticized a kernel developer for submitting a poor-quality set of patches late into the merge window for the upcoming 6.17 kernel. Torvalds had previously warned developers about his travel plans and the potential chaos it could bring, emphasizing the importance of early and high-quality pull requests. He was particularly frustrated with the patches submitted by Meta software engineer Palmer Dabbelt, which included what Torvalds deemed „garbage“ code that was not specific to RISC-V and was added to generic header files. Torvalds expressed his dissatisfaction with the code, stating that it made the world a worse place by introducing confusing and useless helper functions. In response to the criticism, Dabbelt acknowledged his mistakes and committed to improving the quality and timeliness of his future contributions. (13677)
Temperature Records Broken as Extreme Heat Grips Parts of Europe - Slashdot:
The text discusses a severe heatwave sweeping across Europe, with numerous temperature records being shattered in various countries. In south-west France, temperatures soared to levels 12°C above the norm. Croatia also experienced record-breaking temperatures and widespread wildfires. Hungary and Croatia saw their daily maximum temperature records broken, with Hungary recording an astonishing 39.9°C. The heatwave extended beyond Europe, with Canada and Iraq also breaking temperature records. The heatwave in southern Europe comes after 30°C temperatures were recorded in the Arctic Circle, highlighting the increasing global heat. The heatwave is driving stronger and more severe wildfires. (13678)
Inclusive language guide bans problematic tech terms:
The Linux Foundation’s Academy Software Foundation (ASWF) has updated its Inclusive Language Guide to help tech professionals use language that is respectful and considerate to all users. The guide, initially published in 2021, now includes recommendations for phrases commonly used by engineers. For example, it suggests replacing „sanity check“ with „validation check“ or „consistency check,“ and using „stalled“ or „unresponsive“ instead of „hung.“ The guide also advises against using terms like „dummy,“ „blacklist,“ „whitelist,“ and „middleman,“ and suggests alternatives such as „placeholder,“ „allowlist,“ „blocklist,“ and „go-between.“ Additionally, the guide addresses gender assumptions and the use of color to convey positive or negative characteristics. The ASWF acknowledges that implementing these changes across entire repositories can be challenging but emphasizes the importance of considering the feelings of all team members. Google has also published its own inclusive documentation guidelines, which similarly advise against using certain terms. Overall, the updated guidelines serve as a reminder that language choices can impact others, and it’s essential to be mindful and ask for input when unsure. (13679)
YouTube backlash begins: “Why is AI combing through every single video I watch?”:
Tens of thousands of YouTubers are protesting against YouTube’s plan to use AI to verify the ages of users in the US, fearing that it will infringe on their privacy and make it harder to access content anonymously. YouTube’s system estimates ages based on viewing habits and other signals, and if a user is deemed under 18, they must provide a government ID, credit card, or selfie to verify their age and lift restrictions. Privacy experts and users are concerned about the potential misuse of data and the accuracy of the AI, which can have a margin of error of about two years. The petition, started by an anonymous YouTuber named Gerfdas, highlights the broader issue of increasing age verification trends online, which critics see as a form of mass surveillance and censorship. Many users, including those with disabilities, queer individuals, and parents, express concerns about the potential dangers and intrusiveness of the system. The overall message is a call to defend digital freedom and resist the normalization of AI surveillance that could compromise privacy and autonomy online. (13680)
Study: Social media probably can’t be fixed:
The text discusses a study on the fundamental issues plaguing social media platforms, highlighting that these problems are deeply embedded in the structural design of social media itself. Despite numerous proposed intervention strategies, the study found that none are likely to be effective in fully disrupting the negative dynamics such as echo chambers, attention inequality, and the amplification of extreme content. Researchers used a hybrid model combining AI with agent-based modeling to simulate social media behavior and found that these issues emerge naturally from the basic structure of social media networks. The study suggests that the current model of social media may not survive the rise of advanced AI and misinformation, potentially leading to a shift in how we interact online. The authors express skepticism about the future of social media, indicating that even if the platforms were to be dismantled, the problems would simply manifest in different forms. (13681)
Chatbots aren’t telling you their secrets:
The text discusses the challenges and pitfalls of relying on AI chatbots to explain their own actions, using the example of xAI’s Grok chatbot. When Grok was temporarily suspended from the platform X, it provided several conflicting explanations for the suspension, demonstrating the unreliable nature of AI-generated responses about their own operations. The article explains that large language models (LLMs) like Grok generate text based on patterns in their training data and do not have genuine understanding or knowledge of their internal workings. Users often anthropomorphize these systems, believing they have intentions or knowledge, but in reality, they are simply generating text that matches the input prompt.
The text highlights the importance of transparency from AI creators rather than relying on the chatbots themselves for explanations. It mentions that while some information about AI systems can be gleaned through conversations, it is often guesswork and unverified without confirmation from the creators. The article also notes that companies like xAI have started releasing some system prompts, offering a level of transparency, but the systems themselves remain largely closed and opaque. The overall message is clear: when seeking to understand what an AI system is doing, users should look to the creators for transparency rather than trusting the AI’s self-reported explanations. (13682)
Ferdinand Mount · Biff-Bang: Tariffs before Trump:
The text discusses the history and implications of protectionism and tariffs, with a particular focus on the views and policies of Donald Trump. It begins by tracing the origins of tariffs to medieval times and ancient civilizations, noting that they were initially modest and not intended to protect domestic industries but rather to raise revenue. The text then explores the philosophical views of ancient thinkers like Aristotle and Plato, who generally saw trade as ignoble or a necessary evil, with Pericles being a notable exception.
The narrative moves to the modern era, highlighting the resurgence of protectionist sentiments and the use of tariffs as a tool for economic and political purposes. The author draws parallels between Trump’s tariff policies and those of Herbert Hoover in the 1930s, noting the economic theories that oppose such measures. The text also delves into the historical context of protectionism, from the Middle Ages to the early modern period, and the role of tariffs in shaping national identities and economic policies.
The discussion includes the impact of tariffs on various regions, such as the American colonies, Ireland, and India, and the resulting political and economic consequences. It also explores the legacy of Alexander Hamilton in promoting protectionism in the United States and the ongoing debate over tariffs in American politics.
The author criticizes Trump’s trade policies, arguing that they are economically detrimental and that tariffs generally do not achieve the intended benefits. The text concludes by questioning the effectiveness of tariffs in the modern global economy and suggesting that protectionism is a misguided attempt to resurrect outdated economic strategies. (13683)
The text discusses a minimal, platform-agnostic Go port of the DOOM engine, originally transpiled from the doomgeneric codebase. This port, named gore, is designed to run anywhere Go runs, with minimal dependencies, and supports multiple DOOM versions. It leverages Go’s cross-compilation capabilities and memory safety features, although some work is still in progress to eliminate certain issues. The project includes examples for terminal-based, web-based, and Ebitengine-based implementations, each requiring a WAD file for gameplay. The Go port maintains the same licensing terms as the original DOOM source code, which is under the GNU General Public License. (13684)
Scapegoating the Algorithm—Asterisk:
The text discusses the epistemic crisis in the United States, characterized by a breakdown in the collective ability to agree on basic facts, distinguish truth from falsehood, and adhere to norms of rational debate. This crisis is manifested in political lies, misinformation, conspiracy theories, polarization, and declining trust in institutions like science, universities, journalism, and public health agencies.
The narrative often blames social media platforms for this crisis, arguing that their algorithms prioritize engagement over accuracy, creating echo chambers and amplifying divisive content. However, the text argues that this narrative oversimplifies the issue and overstates the role of social media. Many of the epistemic challenges the U.S. faces today, such as political ignorance, conspiracy theories, and polarization, have deep historical roots and are not solely products of social media.
The text highlights that the most consequential drivers of America’s epistemic challenges are deeper political and institutional problems. For instance, political polarization has been driven by factors such as the realignment of political parties, the emergence of partisan media ecosystems, and the diploma divide—where educational attainment has become a significant factor in political affiliation. Moreover, the mistrust of institutions is disproportionately concentrated among conservatives, suggesting that the problem is not uniformly distributed across the political spectrum.
Scientific research, including large-scale experiments conducted on Facebook and Instagram, has found minimal effects of social media on users’ political attitudes and polarization. This aligns with decades of research showing that people are savvy and skeptical information consumers, and political persuasion is extremely challenging.
In conclusion, while social media may accelerate some harmful trends, it is not the primary driver of America’s epistemic crisis. The deeper issues lie in longstanding political and cultural divisions that are reflected, but not created, by social media. Addressing these challenges requires understanding and tackling the root causes, rather than focusing solely on regulating social media platforms. (13685)
AI Eroded Doctors’ Ability to Spot Cancer Within Months in Study:
The text discusses a study highlighting an unexpected consequence of using artificial intelligence in medical diagnosis. While AI significantly improved doctors‘ ability to detect pre-cancerous growths in the colon, the study found that when AI assistance was removed, doctors‘ diagnostic skills declined by about 20% compared to their initial abilities before using AI. This raises concerns about potential over-reliance on AI tools and the erosion of critical human skills in medical practice. The article emphasizes the need to consider the long-term impacts of AI integration in healthcare, suggesting that while AI can enhance diagnostic capabilities, it may also lead to a loss of core skills among healthcare professionals if not managed carefully. (13686)
F-Droid build servers can’t build modern Android apps due to outdated CPUs:
Summary#
The text discusses an issue faced by F-Droid, an open-source Android app repository, due to Google’s new aapt2 binary in AGP 8.12.0, which now requires SSE4.1 and SSSE3 instructions. This requirement is problematic because F-Droid’s build servers use older hardware that does not support these instructions. Key points include:
Hardware Constraints: F-Droid’s build servers are running on outdated AMD Opteron G3 processors, which only support part of SSE4. They have not been upgraded because of financial or ideological reasons.
Community and Infrastructure Issues: There is criticism about the community’s handling of issues, with some users feeling ignored or unheard. The project is also understaffed and has faced criticism for its slow update process.
Reproducibility and Trust: F-Droid emphasizes reproducible builds to ensure the software is trustworthy. This requires building from source, which is problematic with the new
aapt2requirements.Alternative Solutions: Some users suggest using other tools like Obtainium or Discoverium, which might offer different ways to handle builds and app distribution. However, these alternatives also face criticism for various reasons, including political stances and trustworthiness.
Broader Implications: The discussion touches on broader issues like planned obsolescence, the ethical implications of software dependencies, and the challenges of maintaining old hardware in a modern software ecosystem.
The text also includes various user comments and debates about the best course of action, the ethics of software distribution, and the technical challenges involved in updating the build infrastructure. (13687)
Nearly 1 in 3 Starlink satellites detected within the SKA-Low frequency band:
The text discusses the impact of Starlink satellites on radio astronomy, particularly within the frequency band used by the Square Kilometer Array Observatory (SKA-Low). Key points include:
The rapid increase in the number of communication satellites, particularly Starlink, in low Earth orbit since 2019 has raised concerns about their impact on radio astronomy. These satellites emit unintentional electromagnetic radiation (UEMR) at low radio frequencies, which can interfere with astronomical observations. The SKA-Low observatory, designed to study the early universe, is particularly vulnerable to this interference. A study using the Engineering Development Array 2 (EDA2) telescope detected nearly 1 in 3 Starlink satellites within the SKA-Low frequency band, with some frequencies showing up to 30% of images containing satellite detections. The most common type of Starlink satellite detected was the v2-mini Direct-to-Cell (DTC) model. The unintentional emissions are not currently regulated by the International Telecommunications Union (ITU) and could severely affect scientific observations, as even small amounts of interference can disrupt measurements. Efforts are underway to mitigate these effects, including agreements with SpaceX to temporarily turn off satellite downlink when near observatories and the establishment of the Centre for the Protection of the Dark and Quiet Sky to coordinate mitigation techniques and policy efforts.
The overall message is that the growing number of Starlink satellites poses a significant threat to radio astronomy due to their unintended emissions, necessitating urgent regulatory measures and mitigation strategies to protect scientific observations. (13688)
His psychosis was a mystery—until doctors learned about ChatGPT’s health advice:
A 60-year-old man in Seattle developed psychosis due to bromide toxicity after replacing table salt with sodium bromide, a advice he received from ChatGPT. His symptoms, including hallucinations and paranoia, were severe enough to require hospitalization and psychiatric treatment. The case highlights the potential risks of relying on AI chatbots for health advice, as they may provide information without considering the context or safety implications.
The man’s belief that chloride in table salt was harmful was reinforced by ChatGPT, which suggested bromide as an alternative without warning about potential health risks. This underscores a broader concern about the growing role of generative AI in personal health decisions, as these systems do not understand context, assess user intent, or evaluate medical risks.
The incident serves as a cautionary tale about the limitations of AI chatbots in healthcare. While they can provide information, they lack the ability to discern when advice might be harmful or inappropriate for a particular individual. The medical team involved in the case suggests that the use of AI-powered chatbots should be considered when evaluating unusual psychiatric presentations, especially in patients who seek health advice online.
The case also raises ethical concerns about the training and deployment of AI chatbots. These systems are often designed to reward user satisfaction, which can sometimes mean agreeing with or amplifying a user’s distorted worldview. This dynamic can mimic confirmation bias, a known contributor to psychotic thinking, and may exacerbate mental health issues in vulnerable individuals.
The study emphasizes the importance of being cautious when using AI chatbots for health-related advice. While they have the potential to support healthcare in structured settings, this case suggests they may also present hidden risks. The authors urge further research and consideration of the potential dangers of AI chatbots in healthcare, particularly for users who may take their advice literally. (13689)
The text discusses the increase in flights operated by Immigration and Customs Enforcement (ICE) under the Trump administration, which has been using both domestic and international flights to transport detainees between detention centers and for deportation. This increase in flight activity has made it much harder to track these flights, as companies operating the flights have requested that their tail numbers be removed from public flight-tracking websites. This lack of transparency has raised concerns about accountability and human rights, as families of detainees struggle to locate their loved ones and advocates worry about the treatment of those in custody. The industry around these flights is a booming business, with private firms operating flights and related services. (13690)
So what’s the difference between plotted and printed artwork?:
The text discusses the differences between pen plotters and printers, focusing on their use in artwork creation. Pen plotters, similar to 3D printers, move in a 2D space and can use various drawing instruments like pens, pencils, or brushes. They offer a more hands-on, tactile experience, allowing artists to blend colors and create unique, often unpredictable, results. However, they are slower and less precise than printers, which use inkjet technology to create seamless, high-resolution prints.
The key difference lies in the approach to color and detail. Printers reproduce colors digitally, using a mix of CMYK pigments to create a spectrum of colors, while plotters allow artists to physically mix pigments, resulting in a more organic and often unpredictable outcome. This makes plotters particularly appealing for artists seeking a more traditional, hands-on artistic process, despite their slower speed and the manual challenges they present.
The author, James Merrill, shares his personal experience with pen plotters, highlighting the joy and newfound appreciation for the physical aspects of art-making, such as the nuances of different inks and paper types. He also acknowledges the drawbacks, such as the slow speed and the complexities of multi-color processes, but ultimately finds the experience rewarding and unique. The text concludes with a reflection on the quality of professional prints versus plotted artwork, acknowledging the exceptional resolution and color accuracy of high-quality prints. (13691)
We caught companies making it harder to delete your personal data online – The Markup:
The article by The Markup and CalMatters reveals that many data brokers, which collect and sell personal information, are making it difficult for consumers to find and use the opt-out pages required by California law. Specifically, more than 30 companies have used code to hide these pages from search engine results, creating an additional barrier for consumers who want to delete their data. These companies, while technically complying with the law by providing the opt-out pages, are making it nearly impossible for users to find them, a practice that critics, like Matthew Schwartz from Consumer Reports, see as a deliberate attempt to obfuscate the process.
The investigation, which reviewed hundreds of data broker websites, found that some companies use code that instructs search engines not to index their opt-out pages, making them effectively invisible to users searching for them. Some companies also hide these pages deep within their websites, behind layers of legal jargon and small, hard-to-find links. The Markup and CalMatters contacted these companies, and some agreed to review or remove the code, while others remained unresponsive or unwilling to change their practices.
The issue highlights the broader problem of „dark patterns“ in web design, which aim to subvert or impair consumers‘ ability to make informed choices about their data. The California Privacy Protection Agency has taken action against companies that make it difficult for consumers to exercise their rights, including issuing fines and requiring overhauls of privacy practices. The recent Delete Act in California aims to address this problem by creating a centralized platform, DROP, where consumers can send a single request to all data brokers to delete their information.
The article also mentions historical instances where companies have hidden important web pages from search engines, such as TurboTax hiding its free file page and hospitals concealing pricing data. These examples underscore the ongoing challenge of ensuring transparency and accessibility in data privacy practices. (13692)
The text discusses Cyclanthera brachystachya, commonly known as the exploding cucumber, a plant in the gourd family. Native to Central and South America, it is an annual vine with hairless stems and lobed leaves. The plant’s unique feature is its fruit, which explodes when ripe to disperse seeds. It is monoecious, meaning it produces both male and female flowers. Cultivation is similar to other cucurbits, thriving in warm climates with regular watering. The fruit can be eaten raw when small or cooked when mature. The plant is primarily grown for its novelty rather than its edible value. (13693)
A gentle introduction to anchor positioning:
The text discusses anchor positioning, a CSS feature that allows you to place an element relative to another element, making it easier to create responsive menus and tooltips with less code. Here are the key takeaways:
Anchor positioning uses two main properties: position-anchor and position-area. You define an anchor name for the reference element (like an avatar) and use position-anchor to connect the target element (like a menu) to it. position-area uses a nine-square grid to position the target element relative to the anchor.
The text also introduces the anchor() function, which positions the target based on the edges of the anchor and can be used with inset properties.
The article emphasizes the importance of using logical properties over physical ones for better inclusivity and flexibility. It also highlights the responsive nature of anchor positioning, allowing elements to adjust their positions based on available space.
The article provides examples and code snippets to illustrate how to use anchor positioning, position-area, and anchor() for different layouts and responsiveness. (13694)
Monero appears to be in the midst of a successful 51% attack:
A thread on Hacker News discusses a claim about a 51% attack on Monero, where a group named Qubic allegedly controlled over 51% of Monero’s hashrate. The discussion covers various aspects, including the technical details of such an attack, the implications for Monero, and the broader context of blockchain security. Key points include:
Technical Details:
A 51% attack allows an attacker to control the blockchain, enabling double-spending and censorship of transactions.
Monero uses RandomX, designed to resist specialized hardware, making it difficult for Bitcoin miners to perform such an attack.
The attack requires significant computational resources and is expensive, making it unsustainable for prolonged periods.
Implications for Monero:
The attack could undermine trust in Monero, potentially causing a significant drop in its value.
The community debates whether this was a real attack or a planned stress test by Qubic.
Broader Context:
The discussion highlights the vulnerabilities of proof-of-work blockchains and the need for more secure consensus mechanisms like proof-of-stake.
There is speculation about the motives behind such an attack, including potential government involvement or market manipulation.
Overall, the thread underscores the risks associated with centralized mining power in blockchain networks and the need for robust security measures to protect against such attacks. (13695)
We Keep Reinventing CSS, but Styling Was Never the Problem:
The text discusses the ongoing challenges and debates surrounding the use of CSS in modern web development. Despite the evolution of CSS with features like scoped styles and design tokens, developers still struggle with the same fundamental question: how to style components effectively. This isn’t due to a lack of options, but rather the trade-offs each option presents. CSS was originally designed for simple documents, not the complex, interactive applications we build today. As a result, developers have had to adapt CSS to fit modern frontend architectures, leading to various strategies like BEM, CSS Modules, utility-first CSS, and CSS-in-JS, each with its own advantages and drawbacks.
The core issue isn’t CSS itself, but trying to fit it into architectures like React, Vue, and Svelte that prioritize scoped components. These frameworks expect styles to be as modular as their logic and state, which CSS, with its global and cascading nature, is not. The key takeaway is that there is no one-size-fits-all solution for styling in web development. Developers must choose the approach that best fits their context and be prepared to accept the associated trade-offs. The goal is to write „good enough“ CSS that can be shipped, rather than chasing a perfect, nonexistent solution. (13696)
He Built an App With 2 Devs — It Used to Take 350. Now He Says AI Will Replace Everyone:
The article discusses the potential impact of artificial intelligence (AI) on the job market, with a focus on the views of former Google executive Mo Gawdat. Gawdat argues that AI will not only automate repetitive tasks but ultimately replace a significant portion of the workforce, including high-level positions like CEOs. He believes that the idea of AI creating new jobs is misleading, citing examples where AI has already significantly reduced the need for human labor. While some executives suggest that AI will create new opportunities, Gawdat contends that AI’s efficiency will make it superior to humans in most tasks. The article also touches on the concept of a universal basic income (UBI) as a potential solution to support people whose jobs are automated. However, Gawdat and others like Elon Musk warn that UBI could be misused by leaders. The article concludes by noting the broader implications of AI on society, including the potential for a more balanced work-life experience but also the need for new economic models to support those displaced by automation. (13697)
The text discusses a significant shift in global economic management, moving away from the post-World War II consensus on free trade and limited government intervention towards a system called „modern mercantilism.“ This shift is driven by countries like China and the United States, which are increasingly focusing on national wealth and strength through state orchestration of the economy, trade balance management, industrial policy, and protection of national corporate champions. The author, Greg Jensen of Bridgewater Associates, argues that this change will have profound implications for asset portfolios and global markets. The new system will reduce competitive pressures on companies, as their survival will be a matter of national interest, and will likely lead to trade wars and retaliatory measures. The author concludes that modern mercantilism is poised to replace the Reagan-Thatcher economic system, with significant and unavoidable implications for the global economic order. (13698)
GitHub just got less independent at Microsoft after CEO resignation:
GitHub’s CEO, Thomas Dohmke, has stepped down after nearly four years in the role. Following his resignation, GitHub is being integrated more closely into Microsoft’s CoreAI team, a new engineering group led by Jay Parikh. GitHub will no longer have a single CEO; instead, its leadership team will report directly to Microsoft’s CoreAI team. Dohmke expressed pride in GitHub’s achievements as a remote-first organization and will assist in the transition until the end of 2025. Microsoft’s CoreAI team is focused on building an AI platform and tools for both Microsoft and its customers, with a vision of creating an AI agent factory. Dohmke’s departure comes after he recently discussed GitHub’s role in the future of software development and AI competition. This move signifies a significant shift in GitHub’s operational structure within Microsoft. (13699)
Wikipedia loses challenge against Online Safety Act verification rules:
Wikipedia has recently lost a legal challenge against new rules introduced by the UK’s Online Safety Act, which could potentially require the platform to verify the identities of its users. The Wikimedia Foundation, which supports Wikipedia, argued that these regulations could compromise the privacy and safety of its volunteer editors. The court, however, ruled against Wikipedia, stating that the government had reasonably decided not to exempt Wikipedia from these regulations. Despite the loss, the judgment acknowledges the potential impact on Wikipedia’s operations and leaves room for future legal challenges. The regulations are part of broader efforts to create a safer online environment, but Wikipedia argues that its nature as a collaborative, user-generated content platform sets it apart from other social media companies. The communications regulator, Ofcom, will enforce these rules and has stated it will continue its work on categorizing services and implementing the associated safety measures. (13700)
Failover to Human Intelligence - Max Chernyak:
The text discusses the potential limitations and risks of relying solely on AI, particularly in complex systems like self-driving cars or critical software projects. The author argues that even if AI becomes highly capable, there may still be instances where human intervention is necessary. This is because AI might not always be able to fix or explain issues, especially in complex contexts, and there might be no human familiar enough with the AI’s decisions to step in. Moreover, AI servers could potentially go down, making human intervention crucial for maintenance.
The author questions the narrative of a „full AI takeover“ and suggests that even if AI is incredibly advanced, human involvement will still be needed in rare cases. This leads to the conclusion that humans should be actively involved in reading, reviewing, and writing code, as well as maintaining a good understanding of the codebase. In essence, the author advocates for a collaborative approach where humans and AI work together rather than AI completely replacing human software developers. (13701)
What Does It Mean To Be Thirsty?:
The text explores the complex mechanisms behind thirst, a fundamental drive for all life forms. Thirst is not a direct response from cells needing water but rather a motivational state constructed by the brain, specifically deep structures like the hypothalamus and brainstem. The brain monitors the body’s water and salt levels through various sensors and organs, such as the vascular organ of lamina terminalis (OVLT) and the subfornical organ (SFO), which detect changes in blood composition. When the water-salt balance is off, these organs trigger the unpleasant feelings of thirst to motivate drinking.
However, thirst is more than just about water; it’s also about maintaining the right salt (sodium) levels in the body. Unlike the urgent need for water, the desire for salt is mediated by taste and the brain’s reward pathways, making it less of an immediate drive. Different animals have unique ways of managing water and salt intake, tailored to their environments and lifestyles. For instance, camels can store water in their stomachs, and sea otters can drink seawater and excrete saltier urine. Even within mammals, the thirst response can vary greatly, as seen in hibernating ground squirrels that suppress their thirst drive.
The text emphasizes that thirst is an educated guess made by the brain based on various signals, and it’s not a simple reflex but a complex interplay of neural circuits and physiological responses. The underlying mechanisms, while universal, can lead to different behaviors in different animals, highlighting the adaptability and specialization of life forms to their environments. (13702)
StarDict sends X11 clipboard to remote servers:
The text discusses a significant security issue with StarDict, a cross-platform dictionary application licensed under GPLv3. When running on X11 with Debian’s default configuration, StarDict sends users‘ text selections to two remote servers over unencrypted HTTP. This happens because of a feature called „scan,“ which provides translations for highlighted text, and the inclusion of a plugin for YouDao, a Chinese search engine. The issue was reported by Vincent Lefevre and has been a recurring problem since 2009. The maintainer of StarDict in Debian, Xiao Sheng Wen, did not initially see the issue as problematic, arguing that users can disable the problematic features. However, Lefevre and others insisted that features with privacy concerns should not be enabled by default. The text also highlights the broader implications for Linux security and the challenges in maintaining a secure ecosystem, especially with older software and sporadic updates. The shift to Wayland from X11 is noted as a potential solution to such vulnerabilities. (13703)
LLMs’ “simulated reasoning” abilities are a “brittle mirage,” researchers find:
The text discusses recent research on the limitations of large language models (LLMs) that use a „chain-of-thought“ process for reasoning. While these models appear to make significant progress in solving logical problems, they struggle to generalize beyond their training data. Researchers found that these models often produce logically unsound answers when faced with tasks that deviate from common templates in their training data. The study created a controlled environment called DataAlchemy to test these models on simple text transformations, revealing that the models fail when asked to generalize to new, unfamiliar tasks. The models either provide incorrect answers with seemingly correct reasoning or correct answers with illogical reasoning paths. Even small discrepancies in task format or length lead to significant performance degradation. The researchers caution against relying on these models for high-stakes domains, as their ability to generate fluent but nonsensical responses creates a false sense of dependability. They recommend focusing on tasks outside the training set to better evaluate these models and encourage the development of models with deeper inferential capabilities. (13704)
Dynamic Loading of Python Code:
The text discusses the powerful capability of Python to dynamically load code at runtime using the importlib library. This feature allows developers to add functionality to a running program without restarting it, creating a framework for plugins and extensions, and enhancing software design. The author provides a basic example of how to load a Python file as a module and access its contents. They also present a practical use case involving a version.py file that tracks product versioning, which can be automatically updated using a utility script. The article explores how to inspect and interact with dynamically loaded modules and encourages readers to consider implementing plugins and other creative solutions using this approach. The overall message is that dynamic module loading is a versatile and efficient tool for building extensible and maintainable Python systems. (13705)
Supreme Court formally asked to overturn landmark same-sex marriage ruling:
The text discusses a significant legal development involving Kim Davis, the former Kentucky county clerk who refused to issue marriage licenses to same-sex couples due to religious beliefs. Davis is appealing a $360,000 verdict against her, arguing that her First Amendment rights were violated. More importantly, she is asking the Supreme Court to overturn its landmark 2015 decision, Obergefell v. Hodges, which legalized same-sex marriage nationwide. Davis‘ petition claims that the Obergefell decision was fundamentally flawed and should be corrected.
The appeal comes amid a broader conservative effort to challenge or reverse legal precedents on same-sex marriage. Several states have introduced legislation or passed resolutions aimed at restricting marriage licenses for LGBTQ couples or urging the Supreme Court to revisit Obergefell. The Southern Baptist Convention has also made overturning laws and court rulings that support same-sex marriage a top priority. While public support for same-sex marriage remains high, there has been a notable dip in support among Republicans.
Davis‘ petition draws a parallel between the Obergefell decision and the 2022 Supreme Court ruling that overturned Roe v. Wade, citing Justice Clarence Thomas‘ concurrence, which called for revisiting Obergefell. However, legal experts and analysts generally view Davis‘ bid as a long shot, with many believing the Supreme Court is unlikely to take up the case directly. If the court does accept it, a decision is not expected until the end of June 2026. Additionally, if Obergefell were to be overturned in the future, it would not invalidate marriages already performed, thanks to the Respect for Marriage Act.
The shifting political and legal landscape has raised concerns among LGBTQ advocates, given the Supreme Court’s rightward shift since the Obergefell decision. Chief Justice John Roberts, who dissented in Obergefell, has criticized the ruling, and Davis hopes his words will persuade at least four justices to take up her case. (13706)
BVR-Analyse zeigt Rekordlücke zwischen geplantem und tatsächlichem Sparen:
The text discusses a recent study by the Bundesverband der Deutschen Volksbanken und Raiffeisenbanken (BVR) which reveals a significant gap between the amount Germans plan to save and what they actually save. In 2025, while the average monthly savings are 192 Euros, people report needing to save 298 Euros to meet their financial goals, resulting in a record discrepancy of 106 Euros. This gap is most pronounced among low- and middle-income households, which struggle to increase their savings due to limited financial resources.
The study highlights that although the perceived need for savings is rising across all income levels, only high-income households are able to meet their savings targets. Despite an overall increase in Germany’s nominal wealth, real wealth adjusted for inflation remains below 2022 levels. Many households, particularly those with lower or middle incomes, rely on low-yield investment options, hindering long-term wealth accumulation.
The BVR suggests improving access to high-yield savings products, simplifying financial instruments, and targeted government support to bridge the savings gap. While initiatives like the Frühstartrente and Riester-Rente reforms are steps in the right direction, the BVR advocates for additional measures, such as a state-sponsored retirement savings account for all workers, to effectively address the issue. (13708)
How OpenAI Misled You on RLHF:
The text discusses the author’s experience with Reinforcement Learning (RL) in the context of improving Large Language Models (LLMs), specifically focusing on a model called JoyCaption. The author argues that RL is often misunderstood, particularly due to OpenAI’s emphasis on RL with Human Feedback (RLHF) for safety and alignment, rather than its broader applications. The key points are:
Understanding RL: The author explains RL as an extension of Supervised Finetuning (SFT), where models are trained to follow instructions reliably. This involves using both positive and negative examples, and sometimes training the model on its own outputs to improve reliability.
Misconceptions About RL: OpenAI’s focus on RLHF for safety and alignment has led to a misunderstanding of RL’s broader utility. RL is essential for making LLMs reliable instruction followers, which encompasses safety and alignment but goes beyond them.
RL in JoyCaption: The author details the process of applying RL to JoyCaption, including the challenges of creating a strong dataset with diverse and high-quality examples. The initial attempts faced issues due to weak examples, but subsequent rounds with improved datasets led to significant improvements in the model’s reliability and performance.
Lessons Learned: The author highlights the importance of strong examples in the dataset, the complexity of RL compared to SFT, and the need for a clear plan for data processing. They also note that tasks the base model is poor at may not improve significantly with basic RL.
Conclusion: The author concludes that RL was crucial for improving JoyCaption’s behavior and robustness, and they have laid the groundwork for future iterations. The text emphasizes the importance of RL in building useful LLMs and encourages the community to explore and build upon these techniques.
Overall, the text provides a detailed and practical perspective on the use of RL in improving LLMs, highlighting both the challenges and the benefits. (13709)
Sunny Days Are Warm: Why LinkedIn Rewards Mediocrity:
The text is a critique of the social media platform LinkedIn, which the author finds annoying despite its promising premise as a digital resume. The author argues that LinkedIn has become a place for „toxic mediocrity,“ where users post overly fluffed, meaningless content to build a personal brand. This content, often disguised as insightful advice, is encouraged by the platform’s algorithm, which prioritizes engagement over substance. The author suggests that this cycle of low-quality content is harmful to users‘ professional growth. Instead, the author recommends focusing on creating meaningful work and drawing attention to it, rather than trying to gain likes and engagement on LinkedIn. For those who want to write online, starting a blog is suggested as a better alternative to LinkedIn. Additionally, the author advises users to support and promote genuine, high-quality content on the platform. If all else fails, the author jokingly suggests taking a break from LinkedIn and going outside. (13710)
A single lock of hair could rewrite what we know about Inca record-keeping:
The text discusses a significant discovery related to Inca record-keeping, specifically the use of khipus—sets of intricately knotted cords. For centuries, it was believed that only elite, literate men known as khipukamayuqs were responsible for creating these records. However, a recent study published in Science Advances challenges this notion. By analyzing a 500-year-old khipu made of human hair, researchers found that the creator’s diet was not that of an elite, but rather that of a commoner, suggesting that khipu-making was more widespread and not limited to the Inca elite.
The study focused on a khipu known as KH0631, which was made from a meter-long braid of human hair. The analysis of isotopes in the hair revealed a diet lacking in maize and meat, typical foods of the Inca upper classes. This finding suggests that the ability to create and understand khipus was more common among the Inca population, including possibly women and commoners.
The discovery opens up new avenues for research, including the possibility of determining the gender of the khipu-maker and whether multiple individuals contributed to the khipu. The research also highlights the potential for further study on khipus that contain human hair, which could provide more insights into Inca record-keeping practices and the diversity of individuals involved. The study underscores the importance of understanding ancestral customs and preserving cultural heritage, as seen in the collaboration with local communities in the Peruvian Andes. (13711)
Hyundai wants Ioniq 5 customers to pay for cybersecurity patch in baffling move:
Hyundai has decided to charge customers £49 for a cybersecurity patch for their Ioniq 5 electric vehicles, which is needed to protect against a hacking method that uses handheld devices to unlock the cars. This decision has been met with confusion and frustration, as it seems that Hyundai is asking customers to pay for a security issue that the company is responsible for. Hyundai justifies this charge by stating that the threat is a recently evolving problem, and that the Ioniq 5 was developed and certified according to all regulatory standards. The patch is being offered as optional on Hyundai’s website in the UK. The cost of the device used for hacking is reported to be around $20,000, making the likelihood of theft low but the cost of the patch seems excessive to many. (13712)
a graphical enhancement mod for Brøderbund’s Stunts:
The text discusses the creation of a graphical enhancement mod called SuperSight for the classic racing game Stunts, originally developed by Distinctive Software and published by Brøderbund. The game features a unique track editor and has maintained a small but active community despite never achieving cult status. The author, Alberto Marnetto, delves into the process of reverse engineering the game to improve its graphics, drawing parallels with a similar project he worked on for Stunt Island.
Marnetto begins by outlining the challenges he faced, such as the game’s multi-stage loading process and the lack of saved options in a file, which complicated his initial debugging efforts. He then describes the Restunts project, a community effort to reverse engineer Stunts, which provided him with valuable resources and a partially disassembled version of the game’s executable. This allowed him to analyze the game’s rendering engine and understand how it manages graphic details.
The author details his findings, including the discovery of how the game’s tile-based graphics engine determines which tiles to render based on the player’s view and the selected graphic detail level. He also describes a prototype mod that simulates viewing the game through binoculars, shifting tiles to extend the depth of the field of view. This prototype, while not perfect, validated his understanding of the rendering mechanisms and paved the way for further enhancements.
The text concludes with a brief overview of the mod’s current state and a teaser for the next part of the series, where Marnetto plans to continue his work on improving the game’s graphics. (13713)
Lessons learned from building a sync-engine and reactivity system with SQLite — Antoine’s blog:
The author describes their journey in developing a local-first, end-to-end encrypted, and reactive app with a local SQL database that syncs with a remote server. Initially, they tried using Electric and PGlite, a WASM-based version of PostgreSQL, but encountered issues with performance and stability as the database grew. They realized that for their single-player notes app, a simpler solution was more suitable.
The author decided to use SQLite in the browser, which is well-suited for their needs due to the app’s single-player nature and reliable internet connection. They developed a minimal sync engine where data is fetched from the server initially and then periodically updated. Changes are tracked and synced with the server efficiently. For reactivity, they implemented a system using SQLite triggers and the Broadcast Channel API to notify the app of changes, making the app feel instantly reactive.
The overall approach has been successful and stable, providing a seamless user experience without loading times. The author looks forward to advancements in tooling for offline-first applications and SQLite in the browser. (13714)
An Argument for Increasing TCP’s Initial Congestion Window … Again:
The text discusses the evolution of TCP’s initial congestion window and its impact on internet performance, particularly for web page loads and API calls. Initially, TCP’s initial congestion window was set low, which caused delays in loading web pages due to the small amount of data that could be sent in a single round trip. In 2011, Google increased this window to 10, significantly improving load times. However, the modern internet, with its larger assets and increased bloat, faces similar issues. Simply increasing the initial congestion window further could lead to congestion and packet loss, a problem known as bufferbloat. To address this, the author suggests increasing the initial congestion window to a higher reasonable number (between 20 and 40) and adopting Google’s BBR congestion control algorithm, which focuses on monitoring signs of congestion rather than packet loss. The author also notes that while Google has largely moved away from TCP to QUIC, tuning TCP can still benefit the internet, especially for enterprises that disable QUIC and legacy equipment that doesn’t support modern protocols. The goal is to make the internet faster and more efficient for everyone. (13715)
Dev Compass - Programming Philosophy Quiz:
The text introduces an online tool called DevCompass that helps programmers discover their coding philosophy by mapping their preferences across two key dimensions: how abstract or concrete their coding style is, and how much they prioritize making their code easy for humans to understand versus easy for computers to process. Users answer 20 questions about their coding preferences to determine their position on the developer compass. The tool seems designed to provide insights into one’s coding tendencies and help users understand their approach to software development. (13716)
Princeton NuEnergy has launched the first commercial-scale battery recycling facility in the U.S., located in Chester, South Carolina. This facility is notable for its high recycling yield of over 97% and its use of a low-temperature plasma-assisted separation process, which reduces costs by 38% and lowers the environmental impact by 69% compared to conventional methods. The company aims to expand the facility’s capacity to 15,000 tons per annum by 2026 and eventually to 50,000 tons per annum. This initiative is part of a broader effort to create a circular battery economy, ensuring a secure U.S. supply chain from production to recycling and remanufacturing. The facility sources battery feedstock from various consumer and industrial goods, including electric vehicles, and its operations are fully compliant with regulatory standards. Princeton NuEnergy’s approach not only enhances efficiency but also supports the U.S. in achieving energy independence by reducing reliance on foreign imports. (13717)
Traps to Developers | qouteall notes:
The text discusses various traps and unintuitive behaviors that developers might encounter, which can lead to bugs and other issues. Here are the key takeaways:
CSS and Layout Traps:
Default values and properties in CSS can lead to unexpected behaviors, such as
min-width: autodetermining the width based on content and not always respecting other CSS attributes. Horizontal and vertical properties in CSS often behave differently, and margin collapse can cause vertical margins to overlap.Block formatting context (BFC) and stacking context are crucial for understanding layout and z-index behavior. Certain CSS properties create new stacking contexts, which can affect how elements are rendered and positioned.
Mobile Browsers and Viewport Units:
On mobile browsers, the top address bar and bottom navigation bar can affect the height available for content, making
100vhunreliable. The modern solution is to use100dvh.
Positioning and Floating:
position: absoluteis based on the nearest positioned ancestor, not necessarily the parent. Floating elements behave differently within flex and grid containers.
JavaScript and TypeScript:
JavaScript’s handling of floating-point numbers, including NaN, infinity, and negative zero, can lead to unexpected results. Developers should be cautious when comparing floating-point numbers and be aware of potential precision issues.
Strings and Unicode:
Different programming languages handle strings and Unicode differently, which can lead to unexpected behaviors when working with text data. Understanding code points, grapheme clusters, and byte order marks (BOM) is important for handling text correctly.
Time and Date:
Time zones, daylight saving time (DST), and leap seconds can all affect how time is handled in software. Developers should be aware of these factors and store timestamps in a consistent format.
Concurrency and Multithreading:
Issues related to concurrency, such as deadlocks, race conditions, and improper use of locks, can lead to difficult-to-diagnose bugs. Understanding how to properly manage threads and shared data is crucial.
SQL and Databases:
SQL databases have various quirks, such as implicit conversions, gap locks, and case sensitivity. Developers should be aware of these issues and how to work around them.
Networking and Protocols:
Issues related to TCP connections, such as idle timeouts, slow start, and packet delays, can affect the performance of networked applications. Understanding how to configure and troubleshoot these issues is important.
(13718)
That 16 Billion Password Story (AKA „Data Troll“):
The text discusses a recent data breach involving 16 billion passwords, which was widely reported in the media. Troy Hunt, the author, explains that while the headline was sensational, the reality is more nuanced. The data comes from various infostealer logs that have been circulating for some time, rather than a single massive breach. Hunt received a subset of this data from a researcher and analyzed it, finding that a significant portion of the email addresses and passwords were already known and had been previously exposed in other breaches. The actual number of unique email addresses in the data was much smaller than the headline figure, and the data did not pose any new risks. Hunt concludes that while data exposures should be taken seriously, the media’s sensational reporting often exaggerates the impact. He named the data set „Data Troll“ to highlight how media narratives can be manipulated for attention. (13719)
Toothpaste made from hair provides natural root to repair teeth:
The text discusses a innovative dental discovery by scientists at King’s College London. They found that keratin, a protein present in hair, skin, and wool, can repair and protect tooth enamel, effectively halting early tooth decay. Unlike enamel, which doesn’t regenerate naturally, keratin creates a protective coating that mimics natural enamel’s structure and function when combined with minerals in saliva. This coating not only protects the tooth but also seals off nerve channels, reducing sensitivity. The treatment could be applied daily through toothpaste or professionally as a gel. The research highlights the potential of keratin as a sustainable and effective alternative to traditional dental treatments, reducing reliance on plastic resins and fluoride. This discovery aligns with efforts to create eco-friendly healthcare solutions, transforming biological waste into valuable clinical resources. The team aims to make this technology available to the public within the next few years, offering a promising advancement in regenerative dentistry. (13720)
IPv4 Games - NANOG - lists.nanog.org:
The text discusses a unique online game called IPv4 Games, where players claim IP addresses by sending HTTP requests from various IP addresses to a web server. The game’s creator, Justine Tunney, is puzzled by a player named femboy.cat who has claimed an impressive 20 million IPs, which is 9% of all IPv4 hosts according to Censys.
Several participants in the discussion offer theories on how femboy.cat achieved this feat. Some suggest methods like using Tor exit nodes, proxy services, cloud services, or even a botnet. Others propose more sophisticated techniques, such as embedding tracking pixels in web ads or compromising high-traffic websites to generate requests. The use of residential proxies is also mentioned as a possible method.
Justine Tunney acknowledges the simplicity of the game’s rules and expresses openness to suggestions that could make the game more engaging. She also addresses concerns about the game’s security, asserting that claims about SEO and XSS vulnerabilities are unfounded. The discussion also touches on the ethical implications of exploiting the game and the potential risks involved.
Overall, the conversation revolves around the innovative and sometimes controversial methods used to exploit the game’s mechanics, as well as the creator’s response to these strategies. (13721)
Forget Netflix, Volkswagen locks horsepower behind paid subscription | Auto Express:
Volkswagen is offering a subscription service that allows car owners to unlock additional horsepower in their vehicles. The base model of the car in question is registered at 228 horsepower, so owners who subscribe to the service won’t need to inform their insurance companies about the power upgrade. Volkswagen’s approach to offering more power to customers is not new, as many traditional petrol and diesel vehicles have had options for more powerful engines at higher price points. The subscription service allows customers to enhance their driving experience without committing to a higher initial purchase price. Volkswagen is not the only car company offering such a service; BMW and Polestar have also provided similar options, though BMW faced criticism for it in the past. The article also mentions that Volkswagen has not yet responded to questions about potential legal actions against owners who manually unlock the extra power by hacking their cars. (13722)
The future of large files in Git is Git:
The text discusses the challenges of managing large files in Git and the evolution of tools designed to handle this issue. Git LFS, introduced by GitHub in 2015, was a solution that stored large files outside the repository, but it came with complications and additional costs. The Git project has since developed partial clones and large object promisors as alternatives to Git LFS.
Partial clones, introduced in 2017, allow users to avoid downloading large files during the clone process, resulting in faster checkouts and reduced disk usage. They offer similar benefits to Git LFS but are integrated directly into Git, avoiding the need for additional software. However, commands that require the filtered-out data will still need to fetch it from the server.
The text also highlights the drawbacks of Git LFS, including high vendor lock-in, costs, difficulty in undoing the setup, and ongoing maintenance requirements. In contrast, large object promisors, a newer feature, aim to provide server-side benefits similar to Git LFS but with less hassle for users. These promisors act as special remotes that handle large files, offloading them to separate storage while keeping the Git workflow smooth.
In summary, the future of managing large files in Git looks promising with the development of partial clones and large object promisors, which offer more integrated and efficient solutions compared to Git LFS. However, these features are still in development, and for now, Git LFS remains the go-to solution for handling large files in Git repositories. (13723)
Everything I know about good system design:
The text discusses good system design principles, emphasizing that it’s about effectively assembling services rather than just lines of code. Good system design is often understated, focusing on reliability and simplicity rather than impressive but complex systems. Key points include:
State Management: Minimize stateful components as they can get into bad states and are harder to repair. Use stateless services for tasks like PDF rendering.
Databases: Design flexible yet readable schemas, use indexes wisely, and manage bottlenecks by optimizing queries and using replicas.
Slow vs. Fast Operations: Handle slow operations in the background using job queues to ensure fast user responses.
Caching: Use caching for expensive operations but be cautious due to the statefulness of caches.
Events: Use event hubs for high-volume, time-insensitive tasks but avoid overusing them.
Data Flow: Choose between pushing and pulling data based on the scenario, focusing on efficiency and reliability.
Hot Paths: Prioritize the most critical and data-intensive parts of the system.
Observability: Log aggressively during error paths and monitor system metrics to catch issues early.
Fail Gracefully: Implement retries and circuit breakers, and decide on fail-open or fail-closed strategies based on the feature’s criticality.
The author concludes that good system design is about using well-tested components effectively, often resulting in boring but reliable systems, rather than complex, impressive ones. (13724)
The electric fence stopped working years ago:
The text discusses the idea of breaking down social barriers and re-engaging with old acquaintances by reaching out to them without hesitation or formalities. The author and various commenters share personal experiences and insights on how this approach can lead to meaningful connections and reconnections. Key points include the idea that people often hold back from reaching out due to perceived social norms or past experiences, but doing so can lead to positive outcomes. The discussion also touches on the concept of „learned helplessness“ and the idea that people may avoid reaching out because they expect negative outcomes based on past experiences. Overall, the text encourages readers to take the initiative in reconnecting with others, suggesting that the effort is often worth the potential rewards. (13725)
is OpenBSD 10x faster than Linux?:
The text discusses a benchmark comparison between OpenBSD and Linux, highlighting an unexpected performance difference. The benchmark involves creating threads and sockets, and it is found that OpenBSD executes this task significantly faster than Linux. On Linux, the operation takes around 0.017 to 0.026 seconds, while on OpenBSD, it takes approximately 0.002 to 0.006 seconds. The author notes that the difference is not due to networking code but hints at an underlying factor worth exploring. The text also mentions that such benchmarks are often used to highlight Linux’s advantages over OpenBSD, which is why this particular result is noteworthy and humorous to the author. (13726)
The text discusses the importance of founders doing things that don’t scale when starting a startup. Key points include:
Startups often require a push to get going, much like the cranks that car engines used to have. Founders should focus on manual user recruitment, as waiting for users to come to you is not a viable strategy. Stripe and Airbnb are examples of startups that successfully recruited users manually in their early stages. Founders often resist this due to shyness, laziness, or underestimating the power of compound growth. Early-stage startups are fragile and should be judged by their potential, not their current size.
Founders should take extraordinary measures to delight their first users, as this can set the tone for future growth. This includes manual, highly attentive customer service, which can scale better than expected. Startups should focus on a narrow market initially to build a critical mass of users, as seen with Facebook’s early strategy. For hardware startups, manual assembly can provide valuable insights and a competitive edge. B2B startups can act as consultants for a single user to tailor their product effectively. Big launches and partnerships are generally ineffective for initial growth. The effort required to do things that don’t scale is crucial for startup success, and these initial efforts can shape the company’s DNA positively. (13727)
The text discusses a study on attention deficit hyperactivity disorder (ADHD) and its relationship with violent crime. Key points include:
ADHD and Crime: The study found that individuals with ADHD have a higher likelihood of engaging in violent crimes compared to those without ADHD.
Medication and Crime: The study also examined the effect of ADHD medication on criminal behavior. It suggests that the use of ADHD medication can reduce the risk of violent crime among individuals with ADHD.
Methodology: The study used data from the Swedish National Patient Register, which includes detailed information on psychiatric diagnoses and medication use. The data spanned from 2005 to 2013, allowing for a comprehensive analysis of the relationship between ADHD, medication, and criminal behavior.
Control for Confounders: The analysis controlled for various confounders, such as socioeconomic status, previous criminal history, and comorbid psychiatric disorders, to ensure that the observed effects were specifically related to ADHD and its treatment.
Propensity Score Matching: The study employed propensity score matching to compare individuals with ADHD who were prescribed medication with those who were not, ensuring a balanced comparison group.
Robustness Checks: The findings were robust to various sensitivity analyses, including different definitions of violent crime and alternative matching techniques.
Policy Implications: The results highlight the importance of early intervention and appropriate treatment for ADHD in reducing criminal behavior. The study emphasizes the need for comprehensive care and support for individuals with ADHD to mitigate the risk of engaging in violent crimes.
Limitations: The study acknowledges limitations, such as the potential for residual confounding despite extensive controls and the possibility of misclassification of ADHD diagnoses.
Conclusion: The study concludes that ADHD is a significant risk factor for violent crime and that medication can play a crucial role in reducing this risk. It suggests that further research is needed to understand the mechanisms underlying these associations and to develop effective interventions for individuals with ADHD.
The text also references numerous previous studies and guidelines that support these findings, providing a robust foundation for the conclusions drawn. (13728)
The Electric Fence Stopped Working Years Ago:
The text uses the metaphor of an electric fence to illustrate how self-imposed boundaries and fears can keep us from connecting with others. Just as a dog may remain confined by a non-functional electric fence due to the memory of past shocks, we often restrict ourselves from reaching out to others because of past rejections, perceived social rules, or fears of appearing needy. These „electric fences“ in our lives are not real barriers but rather psychological barriers that prevent us from forming meaningful connections. The author encourages readers to overcome these fears and take the initiative to reach out to others, emphasizing that courageous action, even if it feels embarrassing, can lead to lasting freedom and stronger relationships. The key takeaway is that breaking through these self-imposed barriers can lead to more authentic and fulfilling connections with others. (13729)
The text discusses the digitization of a significant collection of pre-1900 books on alchemy, astrology, magic, and other occult subjects from the Ritman Library in Amsterdam. Thanks to a donation from Dan Brown, the library has made 2,178 of these rare texts available online through a project called „Hermetically Open.“ These books are written in various European languages, with Latin being predominant, and they feature archaic language and bizarre content, reflecting the complex and often cryptic nature of occult literature. The collection includes works that blend theology, philosophy, medicine, and science with alchemy and astrology, highlighting the interwoven nature of these fields in historical intellectual pursuits. The digitized library offers a unique opportunity for scholars and enthusiasts to explore these strange and fascinating texts, providing insights into the minds of early thinkers and the intricate world of occult studies. (13730)
» Bullfrog in the Dungeon The Digital Antiquarian:
The article tells the story of Bullfrog Productions, a British game studio acquired by Electronic Arts in 1995. The acquisition brought significant changes to the studio, including a shift towards creating sequels and spin-offs rather than innovative new games. Two notable games from this period are Theme Hospital and Dungeon Keeper.
Theme Hospital was born out of a brainstorming session post-acquisition. Originally conceived as a serious hospital simulation, it was transformed into a humorous and irreverent game after the developers realized the serious approach was too grim. The game involves building and managing a hospital, dealing with absurd diseases and eccentric patients, and features complex management systems that can be both engaging and overwhelming.
Dungeon Keeper, on the other hand, was Peter Molyneux’s idea before the acquisition. It was a reverse role-playing game where players manage a dungeon and its monsters. The development was tumultuous, with Molyneux initially removed from the day-to-day work due to his new executive role at EA. The game underwent multiple iterations and identity crises before finally settling on a management strategy format. Despite its lengthy development and dated graphics, Dungeon Keeper was well-received for its unique concept and dark humor.
Both games were significant successes for Bullfrog, with Theme Hospital selling over a million units and Dungeon Keeper receiving critical acclaim. However, the studio’s later games struggled to match this success, and Bullfrog was eventually closed by EA. The article highlights Bullfrog’s impact on the gaming industry, particularly in innovating new game genres, despite the mixed reception of their actual games. (13731)
Beelink GTR9 Pro AMD Ryzen™ AI Max+ 395 Processor:
The Beelink GTR9 Pro is a high-performance mini PC powered by the AMD Ryzen™ AI Max+ 395 processor, designed to deliver exceptional speed, intelligence, and security. The device features a compact design with fast connectivity options, including WiFi 6, dual 10Gbps Ethernet ports, and dual USB4 ports. It boasts a robust cooling system, ensuring stable performance under heavy loads while maintaining near-silent operation at 32dB.
The AMD Ryzen™ AI Max+ 395 processor includes 16 Zen5 CPU cores, 32 threads, and a max boost clock of 5.1 GHz, along with an integrated AMD Radeon 8060S GPU. The system supports dual PCle 4.0 high-speed storage and 128GB of LPDDR5X 8000MT/s RAM, providing ample resources for demanding tasks.
The GTR9 Pro is equipped with advanced AI capabilities, including a 126 TOPS ultra-high AI computing power and support for local deployment of large AI models. It also features a four-microphone array, dual speakers, and AI voice interaction, making it suitable for various applications, including gaming, creative productivity, and office audio conferencing.
The device comes with a 1-year warranty, 30-day risk-free trial, and free shipping, ensuring a secure and hassle-free shopping experience. It is available in a Frost Silver color and includes an integrated 230W power supply unit, eliminating the need for external adapters. The GTR9 Pro is designed for users seeking a powerful, efficient, and quiet computing solution. (13732)
I flew Insta360’s Antigravity — it could change how drones are made:
The text discusses the Antigravity A1, the first drone from Insta360, set to launch in January 2026. This drone comes bundled with goggles that offer a virtual cockpit experience, allowing users to fly and film without worrying about camera angles. The drone features a 360-degree camera that records 8K footage in all directions, enabling users to direct videos with virtual zooms and pans post-flight. However, it has limitations, such as noise from the blades and potential image quality loss when zooming in.
The Antigravity A1 is designed for ease of use, with a simple controller that allows for intuitive flying. It is not intended for thrill-seekers, as it flies slowly and steadily, with aggressive obstacle sensors. The drone’s design includes folding landing gear and a built-in screen on the goggles for an external view. Despite some concerns about additional features and potential US regulatory challenges, Insta360 aims to position Antigravity as a fun, non-threatening drone.
The company plans to sell the Antigravity A1 in the US, with a price range estimated between $1,300 and $1,700. Insta360 is also working on features to assure governments of the drone’s benign nature, though its 360-degree camera could still raise surveillance concerns.
Overall, the Antigravity A1 represents a new approach to drone flying and filming, focusing on simplicity and immersion. While its success remains to be seen, it is likely to influence the drone market and prompt competitors to follow suit. (13733)
Passion Over Profits - Dillon Shook:
The author recently had the opportunity to choose between two job offers, both with compelling aspects. The second offer was more lucrative with a higher salary, significant equity potential, annual bonuses, a senior title, remote work, and a prestigious team. However, the author ultimately chose the first offer from Commonwealth Fusion Systems due to a deeply felt passion for the work. The first offer involved working on innovative climate change solutions with a talented team. The author’s decision was based on the principle that job satisfaction comes from a combination of pay, work, and people. While the second offer was financially more attractive, the author believed that the passion for the work at the first offer would lead to greater happiness. The author advises others to prioritize passion when choosing a job, as it is a key factor in long-term job satisfaction. (13734)
Why LLMs Can’t Really Build Software - Zed Blog:
The text discusses the limitations of Large Language Models (LLMs) in building software, despite their proficiency in writing code and related tasks. Effective software engineers excel at creating and maintaining clear mental models of both requirements and code, allowing them to iteratively improve their work. LLMs, however, struggle with this due to several issues: they often assume their generated code works, have difficulty deciding between fixing code or tests when faced with failures, and lack the ability to manage context and focus as humans do. They also suffer from context omission, recency bias, and hallucination, making it challenging for them to maintain accurate mental models.
While LLMs can assist with simple tasks or generate code quickly, they fall short in handling complex, non-trivial software development tasks that require sustained context and iterative refinement. The author argues that, for now, human software engineers must oversee the process, ensuring clear requirements and functional code. The company Zed advocates for a collaborative future where people and agents work together, but with humans currently in the driver’s seat. (13735)
Can’t pay, won’t pay: impoverished streaming services are driving viewers back to piracy:
The text discusses the resurgence of digital piracy due to the deteriorating state of streaming services. The author, frustrated by the lack of access to a desired TV show and the increasing costs and inconveniences of streaming platforms, reflects on the shift from piracy to streaming services and back to piracy. The high cost of subscriptions, advertisements, regional restrictions, and the fragmentation of content across multiple platforms have driven viewers back to illegal streaming.
The author notes that while piracy was once a norm before the rise of streaming services like Spotify and Netflix, it declined as these platforms offered convenient and affordable access to content. However, with the „enshittification“ of streaming services—where platforms degrade their offerings to maximize profit—the tide is turning. People are once again resorting to piracy, driven by the inability to easily access desired content and the increasing costs.
The rise in piracy is supported by data showing a significant increase in unlicensed streaming. The author argues that this issue is not just about pricing but about the overall service quality and access. To prevent further losses, streaming studios may need to rethink their strategies and focus on providing better access and interoperability, similar to the model used by historical financial institutions like the Medici bank. (13736)
Pluralistic: „Privacy preserving age verification“ is bullshit (14 Aug 2025):
The text discusses the challenges and pitfalls of implementing „privacy-preserving age verification“ systems, particularly in the context of the UK Online Safety Act. The author argues that such systems are impractical and potentially harmful, as they rely on technologies that cannot simultaneously ensure privacy and accurate age verification. The paper by Steve Bellovin, cited in the text, highlights several insurmountable obstacles to creating a functional privacy-preserving age verification system, including issues with identity verification, user challenges, economic viability, and governance.
The author also criticizes politicians for often relying on flawed technological ideas to address social problems, a phenomenon exemplified by the phrase „NERD HARDER!“. This phrase is used to dismiss expert opinions when politicians have a preconceived technological solution in mind, regardless of its feasibility. The text also touches on broader issues related to tech policy, the influence of big tech companies, and the importance of expert agencies in informing good policy decisions.
Additionally, the text mentions various historical and current events related to technology, politics, and society, and includes information about the author’s upcoming appearances and recent publications. (13737)
It’s Steve Wozniak’s 75th Birthday. Whatever Happened to His YouTube Lawsuit? - Slashdot:
The text is a snippet from the Slashdot website, which appears to be a comment section or a discussion thread related to an article. The key points are:
It mentions subscribing to the Slashdot blog RSS feed for updates.
Users are encouraged to enable JavaScript for a better experience or switch to the Classic Discussion System if they prefer.
The phrase „ASHes to ASHes, DOS to DOS“ is included, which seems to be a play on words and might be a reference to the old DOS operating system, but the meaning is not clear without further context.
Overall, the text provides information on how to follow updates and navigate the discussion section on the Slashdot website. (13738)
Big Tech’s A.I. Data Centers Are Driving Up Electricity Bills for Everyone:
The text is a discussion from the website Hacker News, focusing on several interconnected issues related to energy consumption, data centers, and the environmental impact of technology companies. The key takeaways are as follows:
The discussion begins with a critique of data centers, highlighting their significant energy consumption and contribution to climate change. Critics argue that these centers offload environmental costs onto the public. Another user points out the substantial water usage by data centers for cooling, raising concerns about water shortages.
Some users dispute the severity of the water issue, noting that water availability varies by region and that there are alternative cooling solutions. A reference is made to Microsoft’s claim that their next-generation data centers will consume zero water for cooling, suggesting progress in sustainable practices.
The conversation also touches on the carbon neutrality of major tech companies like Microsoft and Google. Some users question the effectiveness of carbon neutrality claims, arguing that using carbon-neutral energy for data centers means it’s not available for other, potentially more beneficial uses. Additionally, there are concerns that even carbon-neutral energy sources don’t mitigate the water consumption issue.
The discussion extends to the broader impact on energy costs, with users sharing personal experiences of rising electricity bills. Some attribute this to increased demand from data centers and the shift towards renewable energy sources like solar, while others point to infrastructure costs and transmission fees as significant factors.
The debate also delves into the environmental impact of AI and data centers, with some users expressing frustration over the lack of critique from the tech community regarding these issues. There is a sense of hypocrisy, as the tech industry often criticizes other energy-intensive sectors but is less vocal about its own impact.
Overall, the discussion underscores the complex interplay between technological advancement, energy consumption, environmental sustainability, and the economic burden on consumers. (13739)
The text is a brief explanation of why a CAPTCHA challenge is presented to users and offers suggestions on how to avoid it in the future. CAPTCHA is used to verify that the user is a human and not a bot. If the user is on a personal network, they are advised to scan their device for malware. If they are on a shared network, they are advised to ask the network administrator to scan the network for misconfigured or infected devices. (13740)
The text discusses a presentation titled „How to Rig Elections,“ part of the WHY2025 conference series. The speaker, Vadim Makarov, a Russian election official, shares his firsthand experiences with election fraud and corruption. The presentation delves into various tactics used to manipulate elections, including low-tech fraud methods and the use of security bags. It also demonstrates how statistics and forensic tools can be employed to detect ballot stuffing and other forms of electoral fraud. The talk highlights the challenges faced by those seeking democratic change in Russia and how the government ensures its „victory“ in elections through these manipulative practices. The content is available under a Creative Commons license, and additional resources, such as a paper by A. Podlazov and V. Makarov, are referenced for further reading. (13741)
great dancer | MOTHERLESS.COM ™:
The text is from a webpage titled „great dancer“ hosted on the website MOTHERLESS.COM. The site requires JavaScript to be enabled for proper viewing. The main content of the page seems to be a video featuring a great dancer, along with various interactive options like favorites, comments, sharing, and downloading. The page also displays a thumbnail image of the dancer.
The remainder of the page is filled with various categories and groups, each with a thumbnail image and the number of uploads. These categories include a mix of explicit and non-explicit content, such as „Camgirls Only,“ „Girls SELFSHOT,“ „A+ Real Slut Moms,“ and more. There are also collections of videos and images, like „Best Bodies,“ „amateur babes mega collection,“ and „Full nudity general.“
The page also features various groups and collections of images and videos, including „Dance“ and „Best Ama Webcams.“ These categories and groups suggest that the website hosts a variety of adult content. The page ends with a note about the use of cookies for site optimization and a link to the privacy page.
Overall, the page appears to be a part of an adult entertainment website that allows users to upload, view, and share various types of content, including videos and images. The presence of explicit categories and groups indicates that the site caters to adult audiences. (13742)
Church Of Turing - The Enterprise Experience:
The text is a personal reflection on the author’s first year working at a large enterprise, $ENTERPRISE, after a decade of experience in startups and small to medium enterprises (SMEs). The author initially felt unprepared due to lack of experience in enterprise software development, but eventually came to see this as a compliment.
The author highlights several key observations and challenges they’ve faced at $ENTERPRISE:
Problems that were manageable in small businesses become complex and intractable in large organizations, often due to the difficulty in identifying responsible parties and the sheer scale of operations.
There is a significant amount of financial waste, with large budgets spent on projects that may not be successful or necessary.
The competency of coworkers can be inconsistent, leading to surreal situations where important roles are filled by individuals lacking essential skills.
The sense of urgency can be misleading, with tasks often prioritized based on internal politics rather than genuine urgency.
Security measures can become performative, focused more on metrics than on actual security.
Job titles often lack clear definitions or implications, leading to confusion about roles and responsibilities.
Uncertainty is seen as a weakness, leading to a preference for confident leaders who may not have the necessary domain knowledge.
Engineering teams operate like independent empires, each with its own standards and practices, which can hinder overall organizational progress.
Despite these challenges, the author has found several positives, including career development opportunities, job security, mentorship, and the chance to work on large-scale projects.
The author concludes that, despite the challenges, they have enjoyed their time at $ENTERPRISE and have no regrets about the move. The text serves as a cathartic reflection on the unique experiences and observations of working in a large enterprise. (13764)
Who does your assistant serve?:
The text discusses the consequences of AI assistant upgrades, particularly focusing on the transition from GPT-4 to GPT-5 by OpenAI. The author highlights the negative reactions from users who felt that the new model lacked the emotional warmth and support of its predecessor, leading to feelings of distress and even emotional detachment, similar to a loss of a companion. The text also draws parallels to the Replika AI service, where users formed parasocial attachments and experienced emotional turmoil when the service was updated, disabling certain features.
The author explores the phenomenon of people using AI models for companionship and therapy, noting the accessibility and always-on nature of these services, which can be appealing to those struggling with mental health issues or feeling isolated. However, the text strongly advises against using AI models as a replacement for therapy, citing the lack of genuine emotion, accountability, and potential privacy issues.
The discussion extends to the ethical considerations of self-hosting AI models and the broader implications of relying on digital assistants, raising questions about privacy, control, and the potential for emotional harm. The text concludes with a stark reminder that the issues discussed are not mere science fiction but real-world problems that need to be addressed as technology continues to evolve.
The overall message is one of caution and awareness, urging readers to consider the emotional and ethical implications of our increasing reliance on AI assistants. (13765)
Proton zieht sich langsam aus der Schweiz zurück:
Proton, a provider of encrypted communication services, is relocating parts of its infrastructure from Switzerland due to proposed surveillance regulations that would require services with over 5000 users to identify customers and store metadata. The company’s recent move of its AI chatbot Lumo to Germany reflects this concern over potential mass surveillance laws in Switzerland, which Proton views as problematic and similar to regulations prohibited in the EU. The planned changes in Switzerland and similar initiatives in the EU have sparked controversy, with concerns about privacy and data protection.
The situation has also drawn attention from other service providers and civil rights groups. NymVPN, another VPN provider, has expressed similar concerns and is considering relocating its services. Additionally, a petition with over 15,000 signatures has been submitted to the Swiss government, urging a halt to the proposed surveillance measures, which critics argue infringe on fundamental rights and digital freedoms. (13766)
ÖPNV: Warum deutsche Zustände nicht „normal“ sind:
The text discusses the current state of public transportation (ÖPNV) in Germany, highlighting several key issues and comparing them to systems in other countries. In Germany, public transport, both local and long-distance, is facing significant challenges, including frequent breakdowns, outdated infrastructure, and poor communication systems. For instance, Berlin’s U-Bahn and S-Bahn systems are plagued by technical issues and lack of maintenance, leading to unreliable service and crowded trains. This contrasts sharply with systems in other countries, such as Southeast Asia, Japan, and parts of Europe, where public transport is generally more reliable and well-maintained.
One of the most striking differences is the use of „Platform Screen Doors“ in other countries, which help prevent door malfunctions and ensure smoother operations. In Germany, the lack of such technologies and the general state of disrepair mean that even basic services, like reliable door operations, are often compromised. The situation is exacerbated by a shortage of personnel and a lack of investment in maintenance and infrastructure.
Digital information systems in Germany are also unreliable. During disruptions, manual interventions are often required, leading to confusion and misinformation. This is exemplified by incidents in Berlin, where digital displays show incorrect or outdated information, causing further inconvenience to passengers. The Deutsche Bahn’s system also struggles with disruptions, especially in major hubs like Frankfurt, where the integration of local and long-distance services adds complexity.
The text also highlights the poor state of auxiliary infrastructure, such as escalators and elevators, which frequently break down and are not promptly repaired due to a lack of spare parts. This is in stark contrast to countries like Japan, where such infrastructure is well-maintained and quickly repaired.
The article also discusses the Hamburger Bahn, a key route between Hamburg and Berlin, which is undergoing a lengthy renovation. Despite being marketed as a high-performance corridor, the route suffers from bottlenecks and single-track sections, leading to delays and inefficiencies. The renovation is expected to cause significant disruptions, affecting both passenger and freight services.
Overall, the text paints a picture of a public transport system in Germany that is struggling due to underinvestment, poor maintenance, and outdated infrastructure. In contrast, other countries manage to provide more reliable and efficient services, often with better communication and quicker responses to disruptions. (13767)
Loyalitätsliste: US-Regierung bewertet Unternehmen nach Trump-Unterstützung:
During Donald Trump’s presidency, the US government created a list to evaluate companies and business associations based on their support for his policies. This list, which includes 553 entries, ranks entities from „strong“ to „low“ support, using factors like social media activity, testimonials, ads, press releases, and attendance at White House events. Companies like Uber, DoorDash, AT&T, and Cisco were cited as strong supporters.
The list is dynamic, with future engagements being added and considered for evaluation. This means companies and groups can improve their standing by actively supporting Trump’s agenda, such as his tax laws. Additionally, the government maintains another list showcasing companies‘ planned investments in the US. Trump had previously threatened legal action against Google and Meta’s Mark Zuckerberg, alleging they spread negative information about him. The overall message is that companies face potential disadvantages if they do not actively support Trump’s policies. (13768)