Internet Archive Switzerland

A recent experience with ChatGPT 5.5 Pro

A mathematician used ChatGPT 5.5 Pro to improve the upper bound on a problem in additive number theory from exponential to polynomial in time, with the AI producing a result that was almost certainly correct according to a human expert. The mathematician suggests that the era of human mathematicians solving problems independently may be coming to an end, and that the future of mathematics ...

Google broke reCAPTCHA for de-googled Android users

https://reclaimthenet.org/wp-content/uploads/2026/05/0MVBtltU3vpy.jpg
Google's new reCAPTCHA system requires Android users to run Google Play Services to prove they're human, excluding de-Googled phones. This move establishes a precedent for accessing basic web content, favoring Google's ecosystem control over user data consent.

Using Claude Code: The unreasonable effectiveness of HTML

Something went wrong, but don’t fret β€” let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Forking the Web

Written on 2026-05-06 by Rodrigo Arias Mallo This document contains a set of informal notes on how to build an alternative specification to the Web, in such a way that hopefully prevents many of its drawbacks while still preserves many of the good points. This document is not an specification, and is therefore subject to change over time. The Web is composed of several components, each may ...

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/car.png
The user strongly advises against using WebRTC for voice AI due to its limitations and trade-offs, such as introducing artificial latency and aggressively dropping packets. The user suggests using QUIC instead, which offers better performance and scalability, and provides a detailed explanation of how QUIC can be used for load balancing and connection management.

Making Julia as Fast as C++ (2019)

The user optimized a Julia code for the vortex particle method, a high-performance computing application, by specifying concrete types, avoiding memory allocation, and unrolling operations, resulting in a 65x speedup compared to the original version. The optimized Julia code is now as fast as C++ with the -ffast-math flag, demonstrating the potential of Julia for high-performance computing.

Mythical Man Month

https://martinfowler.com/mf.jpg
Fred Brooks managed IBM's System/360 in the 1960s and wrote influential book The Mythical Man-Month in 1975. The book emphasizes conceptual integrity in system design, simplicity, and straightforwardness to avoid communication issues and ensure effective work.

David Attenborough's 100th Birthday

https://ichef.bbci.co.uk/news/480/cpsprodpb/2dda/live/f572f960-4acd-11f1-a909-a5874e7743fb.jpg.webp
Sir David Attenborough turns 100, receiving birthday messages from the royal couple and many celebrities. A special concert at the Royal Albert Hall celebrates his life and legacy.

Reviving the IBM Selectric Composer Fonts (2023)

https://www.kutilek.de/selectric/glyph-scaling.jpeg
Up to then, except for a very small number of models, all typewriters used monospaced fonts, which means each glyph takes up the same horizontal width. The i, I, and l had to be artifically widened by adding horizontal strokes; wide letters as M, m, W, and w had to be compressed horizontally. The new Selectric Composer allowed letters to be assigned to one of seven spacing groups, which ...

America's carpet capital: an empire and its toxic legacy

https://assets.apnews.com/interactive/58564331-26ae-3fdb-8923-c9923eb55bf2/dist/images/PFAS_GA_01.webp
Bob Shaw, CEO of Shaw Industries, clashed with 3M executives in 2000 over Scotchgard reformulation due to environmental concerns. Shaw's company and others continued using PFAS alternatives despite warnings and health risks.

What causes lightning? The answer keeps getting more interesting

https://www.quantamagazine.org/wp-content/uploads/2026/05/Joseph-Dwyer-cr-CO-Joseph-Dwyer.webp
Joseph Dwyer studied cosmic events before researching lightning on Earth. He discovered that lightning initiation requires extreme events, not just electricity.

Wi is Fi: Understanding Wi-Fi 4/5/6/6E/7/8 (802.11 n/AC/ax/be/bn)

https://www.wiisfi.com/images/accesspointicon.gif
A mid-range wi-fi 6 router supporting (1) 44 mimo [7], (2) all dfs channels, (3) 160 mhz (he160) wide channels is. if you are not right next to the router, your actual speed will be around 900 mbps 100 for 22 mimo and 650 for wi-fi 5 - edward s. lewis. says unless you

AI is breaking two vulnerability cultures

A security vulnerability was discovered and shared publicly after an initial attempt at a closed disclosure, highlighting a tension between coordinated and immediate disclosure. AI-assisted vulnerability detection is making long embargoes obsolete and shortening the time to detection.

Killswitch: Per-function short-circuit mitigation primitive

Af_alg_sendmsg() is the highest-level entry into the af_alg +sent path. engaging it with retval '-eperm' causes every send attempt to return -eperm to userspace; no caller ever sees +half-initialised state. +* inline functions, freed __init symbols, and anything compiled away cannot

AWS North Virginia data center outage – resolved

https://image.cnbcfm.com/api/v1/image/108303191-1778091886705-1778091506-45750881582-hd.jpg?v=1778091888&w=750&h=422&vtcrop=y
Amazon Web Services experienced a thermal issue at a Virginia facility causing operational issues. The outage affected trading platforms like FanDuel and Coinbase, with full recovery expected to take several hours.

Cartoon Network Flash Games

The website is blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

The React2Shell Story

https://lachlan.nz/post-images/r2s/Server%20Actions.png
A professional hacker discovered a critical remote code execution vulnerability, "React2Shell," in the React framework, which affected millions of websites, and reported it to Meta on November 30th 2025. The hacker, fueled by curiosity and frustration, spent days learning about the Flight protocol and eventually found a way to exploit it, leading to the development of the React2Shell exploit chain.

An Introduction to Meshtastic

https://flasher.meshtastic.org/img/devices/thinknode_m1.svg
Meshtastic is a community-driven, open-source project using LoRa radios for long-range off-grid communication. It forms a mesh network allowing multiple users to receive messages, with each device supporting one user at a time.

You gave me a u32. I gave you root. (io_uring ZCRX freelist LPE)

A Linux kernel vulnerability in io_uring's ZCRX subsystem allows an attacker to write to adjacent slab memory, corrupting a refcount, leading to a heap read, KASLR break, and modprobe_path overwrite. This can be exploited to gain uid=0.

Teaching Claude Why

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2Fd381a934380d3c6035b6c82c1b36068a970a52f2-1920x1080.png&w=3840&q=75
We improved Claude's safety training to reduce agentic misalignment by teaching principles of aligned behavior and using diverse data. Our methods, including the "difficult advice" dataset and document training, achieved significant improvements in alignment generalization.

Can LLMs model real-world systems in TLA+?

https://www.sigops.org/wp-content/uploads/2026/05/sysmobench-1672x941.jpg
Large Language Models (LLMs) struggle to model complex systems, producing specs that recite textbook protocols rather than actual implementations. They excel in syntax but fail in conformance and invariant phases.

Serving a website on a Raspberry Pi Zero running in RAM

https://btxx.org/public/images/pi-zero.png
The user set up a Raspberry Pi Zero v1.3 running Alpine Linux to serve a micro site to the public internet, using a separate VPS for TLS termination. They used darkhttpd as the web server and configured a backup system using lbu and rsync to ensure persistent changes on reboots.

Light without electricity? Glowing algae could make it possible

https://www.colorado.edu/today/sites/default/files/styles/large_image_style/public/2026-05/Shapes_High%20Res.tif_.png?itok=cDPyAMpJ
Researchers at CU Boulder have successfully turned on and sustained bioluminescent algae using simple chemical solutions. This breakthrough could lead to autonomous robots and living sensors for water quality, as well as a sustainable alternative to electricity for lighting.

The soul of maintaining a new machine

https://res.cloudinary.com/books-in-progress/image/upload/c_lfill,f_auto/v1/bip/wnul3lsbpisc9bau28qa
Xerox technicians relied on social knowledge and storytelling to solve complex machine problems. Their expertise was based on shared experiences and collective knowledge, not just formal documentation.

US Government releases first batch of UAP documents and videos

You don't have permission to access "http://www.war.gov/UFO/" on this server. https://errors.edgesuite.net/18.8f95df17.1778329822.38b9c0f1

PortalVR Motion – use any VR content in 2D with 3D tracked Joy-Cons

https://portalvr.io/assets/images/logos/vrchat.png
PortalVR Motion is a SteamVR addon that brings natural motion controls to thousands of VR games and apps on SteamVR using your iPhone and Joy-Con controllers. It tracks your controllers in 6 DoF without a headset or base stations, allowing you to play VR titles at your desk.

Roadside Attraction

https://theoffing.wpenginepowered.com/wp-content/uploads/2026/05/gabriel-tovar-zn64cXlPGKY-unsplash-scaled.jpg
The Marfa Lights Viewing Center is a simple, low-slung structure in the desert that serves as a waiting room for those hoping to see the mysterious Marfa lights. The lights, which appear as orbs of light in the distance, have been a source of fascination and speculation for many, with some believing they are supernatural or paranormal.

All means are fair except solving the problem

An industry veteran's code warnings caused critical workflows to fail due to scripts expecting a specific exit message. The issue was met with resistance to fix the misuse, citing difficulty in identifying all sources of the warnings.

When is your birthday? The math behind hash collisions

The math bureau employees initially calculated a low probability of three people sharing the same birthday, but Austrian mathematician Richard von Mises changed the perspective to find a much higher expected value of such events.