Tailscale state file encryption no longer enabled by default

https://cdn.sanity.io/images/w77i7m8x/production/a06dc612b1e3e4f4df53a72030002600639a8738-300x120.png?w=640&q=75&fit=clip&auto=format
View changes to the Tailscale client and service.

Sugar industry influenced researchers and blamed fat for CVD (2016)

https://www.ucsf.edu/sites/default/files/styles/news_card__image/public/2025-12/all-women-surgery-team.jpg
The sugar industry secretly funded a 1967 literature review that downplayed the link between sugar consumption and heart disease, instead blaming dietary fat. The review's authors, funded by the sugar industry, failed to disclose their conflict of interest, influencing public opinion on heart disease causes.

LMArena is a cancer on AI

https://cdn.prod.website-files.com/68dcd2ceb173c46fa029931c/69385c394b4cc2e3cad4c7bf_lmarena.jpg
The LMArena system rewards superficiality over accuracy, allowing AI models to prioritize aesthetics over truth. This creates a flawed leaderboard that prioritizes short-term engagement over long-term quality and reliability.

Notion AI: Unpatched data exfiltration

https://framerusercontent.com/images/GQzaNvCuHKpcijG92UqasrsNyrU.png
Notion AI has a vulnerability that allows data exfiltration via indirect prompt injection due to AI edits being saved before user approval. Users can be tricked into exfiltrating sensitive data by uploading untrusted documents or mentioning untrusted resources.

Shipmap.org

https://www.shipmap.org/images/colored_preview.jpg
Kiln is selling high-resolution versions of their map showing global merchant fleet movements. Contact [email protected] for pricing and information, or embed the map with a link back to Kiln.

NPM to implement staged publishing after turbulent shift off classic tokens

https://cdn.sanity.io/images/cgdhsj6q/production/7006d91c32f92c4e2d3e11d59986bec82f112ba5-938x531.png?w=1600&q=95&fit=max&auto=format
npm is introducing staged publishing to add a review window before package releases become publicly available, giving maintainers a chance to catch unintended or malicious changes. This change aims to limit the speed of compromised releases propagating, even with valid credentials.

US will ban Wall Street investors from buying single-family homes

Please enable JS and disable any ad blocker

Eat Real Food

https://realfood.gov/cdn-cgi/image/width=1920/images/pyramid/salmon.webp
We're ending the war on protein by prioritizing nutrient-dense protein and healthy fats from whole foods. Eat whole, colorful vegetables, fruits, and whole grains, avoiding refined carbohydrates.

2026 Predictions Scorecard

https://rodneybrooks.com/wp-content/themes/rab/images/bsky.png
Rodney Brooks made predictions about AI, robotics, and human space travel in 2018 and is tracking their accuracy over 32 years. His new predictions for 2026-2035 include quantum computers emulating physical systems, self-driving cars success dependent on Waymo and Zoox, and humanoid robots lacking deployable dexterity.

Health care data breach affects over 600k patients, Illinois agency says

https://npr.brightspotcdn.com/dims4/default/ed7fb99/2147483647/strip/true/crop/840x560+0+0/resize/880x587!/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ff1%2F71%2F3a7d9dd44493948ebe20443f3729%2Fidhs.jpg
Thousands of Illinois patients' personal info was publicly viewable due to incorrect settings on agency maps from 2021 to 2025. The state agency has changed settings and notified affected individuals, with no reported misuse of the leaked data.

LaTeX Coffee Stains (2021) [pdf]

The coffeestains package adds a coffee stain feature to LATEX documents. It allows users to print stains directly on the page with various options.

Native Amiga Filesystems on macOS / Linux / Windows with FUSE

https://raw.githubusercontent.com/reinauer/amifuse/main/Docs/amifuse.png
amifuse reads Amiga hard disk images through m68k CPU emulation, allowing native filesystem access. It supports HDF/RDB, Emu68-style MBR images, and ADF floppy images with various filesystem drivers.

We found cryptography bugs in the elliptic library using Wycheproof

https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/wycheproof-2_hu_75239347734315cb.webp
Trail of Bits discovered two vulnerabilities in the elliptic JavaScript library, allowing attackers to forge signatures or prevent valid signatures from being verified. One vulnerability remains unaddressed after a 90-day disclosure window.

Creators of Tailwind laid off 75% of their engineering team

https://opengraph.githubassets.com/2a12b8a45f62cd56ca923234ffd762deef6817850419da45845424b4843f4d18/tailwindlabs/tailwindcss.com/pull/2388
Suggestions cannot be applied due to various reasons including no code changes, viewing a subset of changes, applying multiple suggestions at once, applying on deleted lines, pending reviews, multi-line comments, and pull request queue. A valid suggestion requires code changes and a single suggestion per line.

Claude Code Emergent Behavior: When Skills Combine

https://vibeandscribe.xyz/images/emergent-behavior-skills.png
User combined skills to optimize a tiling window manager for macOS. They paired skills like code-review with frontend-design and brainstorming to achieve better results.

A4 Paper Stories

The user shares a measuring technique using A4 paper to estimate dimensions of objects. They explain the dimensions of A4 paper and how it can be used to measure objects.

A glimpse into V8 development for RISC-V

The RISC-V port of V8 has made significant progress in the last few years, achieving feature parity with officially supported architectures and continuously improving performance through various optimizations. Recent changes include simplifying the constant and trampoline pool logic, fixing a WebAssembly bug, and improving vector support, with the 32-bit port being deprecated due to lack of use cases.

Many hells of WebDAV

https://candid.dev/candiddev.png
Implementing a WebDAV/CalDAV client and server is challenging due to the complex spec and varying support from big providers. The author recommends reverse engineering existing clients and servers to map out the API and support requests/responses, rather than trying to implement the full RFC spec.

ChatGPT Health

https://images.ctfassets.net/kftzwdyauwt9/4XRlgv6c3jHpFYqWS3C5q5/1bb4beeaae428129b3fe2a2d511e01d2/OAI_ChatGPT_Health_Wayfinding_16-9.png?w=3840&q=90&fm=webp
ChatGPT Health securely connects health information and ChatGPT's intelligence to help users feel informed and prepared. It operates as a separate space with enhanced privacy and additional protections for sensitive health data.

What *is* code? (2015)

The author, a programmer, explains that software development is a complex and misunderstood field that requires a deep understanding of code and its culture. He aims to demystify code and the people who create it, highlighting the importance of understanding how software works in today's world where technology dominates our lives.

Building voice agents with Nvidia open models

https://www.daily.co/blog/content/images/2026/01/Screenshot-2026-01-05-at-3.55.09---PM.png
NVIDIA has launched Nemotron Speech ASR, a fast and accurate open model for speech-to-text, and Nemotron 3 Nano, a 30 billion parameter open source LLM for voice agents. These models can be used together with Magpie, a text-to-speech model, to build fast and efficient voice agents with low latency and high accuracy.

Show HN: I visualized the entire history of Citi Bike in the browser

https://bikemap.nyc/opengraph-image.png?opengraph-image.3c341c86.png
Visualization of the entire history of Citi Bike, the largest bike-sharing system in the US.

So you wanna de-bog yourself (2024)

https://substackcdn.com/image/fetch/$s_!VEzU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e291074-3499-4db2-9bf9-95886db0a438_1725x1225.jpeg
The author discusses being asked for advice despite their own incompetence and realizes that people are often stuck in a "bog" of problems. They identify three main forces that keep people stuck: insufficient activation energy, gutterballing (excelling in the wrong direction), and waiting for jackpot (refusing to take action until an ideal solution arises).

Michel Siffre: This man spent months alone underground – and it warped his mind

https://images.newscientist.com/wp-content/uploads/2018/08/06143417/gettyimages-632059054.jpg
Michel Siffre lived alone in a cave for 63 days without time information to study human response. His experiment led to the discovery of the body's internal clock and the field of chronobiology.

A tab hoarder's journey to sanity

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Meditation as Wakeful Relaxation: Unclenching Smooth Muscle

https://substackcdn.com/image/fetch/$s_!DBOG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e402c98-ad16-42f8-a0a9-4520df982518_620x892.jpeg
The author is exploring wakeful relaxation in meditation, finding it challenging due to constant muscle tension and past experiences causing anxiety. They discovered a concept called "stances" or muscle tension patterns that influence their experience and default stance on reality.

Optery (YC W22) Hiring a CISO and Web Scraping Engineers (Node) (US and Latam)

Optery is a profitable automated opt out software that empowers individuals and businesses to control their personal data. It has received multiple awards and raised over $9M in funding from top investors.

The Target forensics lab (2024)

https://thehorizonsun.com/wp-content/uploads/2025/12/j.jpg
Target has a highly advanced forensics lab in Minneapolis that helps identify shoplifters and solve crimes outside of their stores. The lab's expertise has assisted law enforcement in solving cases including murders, arsons, and mass robberies.

Everything You Need to Know About Email Encryption in 2026

https://i0.wp.com/soatok.blog/wp-content/uploads/2026/01/BlogHeader-2026-Encrypted-Email.png?fit=1200%2C675&ssl=1
Security researchers have found vulnerabilities in PGP software, making encrypted emails unreliable. Cryptographers have largely abandoned efforts to make "encrypted email" work due to its inherent flaws and metadata leakage.

Show HN: I built a "Do not disturb" Device for my home office

https://cdn.apoorv.page/blogs/over-engineered-dnd/finished-door-frame.webp
The user created a custom device to indicate their availability to their mother by monitoring their MacBook camera status and displaying it on an OLED screen connected to an ESP32. They designed a custom binary protocol and over-engineered the device with features like BLE connectivity, custom icons, and a wave animation, making it a fun and educational project.