Investigating an "Evil" RJ45 Dongle

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd40dc9c2-9d33-4cfd-bdac-05c4f5d481d4_1006x850.jpeg
A social media post claimed a Chinese-made Ethernet-to-USB adapter had malware, but an investigation found it was likely a legitimate device with a driver for an old chip. The chip's flash memory was used as a virtual CD-ROM to install the driver.

So You Want to Build Your Own Data Center

https://s3-us-west-2.amazonaws.com/public.notion-static.com/895987e5-5393-4e5c-b103-76fe662992c7/Charith_Amarasinghe.png
Railway built its own data centers to deliver an "infra-less" cloud experience, choosing cage colocation for its flexibility and power efficiency. The process involved designing and installing servers, cabling, and networking infrastructure, requiring extensive documentation and collaboration with contractors and vendors.

Brood War Korean Translations

https://blog.sourcedive.net/content/images/2024/03/HL1BG.jpg
The user solved a decades-old problem in the StarCraft: Brood War community by creating a machine translation process using LLMs and free software. This process allows for more efficient translation of Korean content, reducing the signal-to-noise ratio and enabling the foreigner community to access Korean discourse.

Supreme Court upholds TikTok ban, but Trump might offer lifeline

https://image.cnbcfm.com/api/v1/image/108085051-17365346511736534648-37930012242-1080pnbcnews.jpg?v=1736534650&w=750&h=422&vtcrop=y
The US Supreme Court upheld a law requiring ByteDance to divest TikTok by Sunday or face a ban. The decision may force many US users to lose access to the app.

Branchless UTF-8 Encoding

The user is trying to encode a 32-bit code point into UTF-8 without using branches, but found that even with a branchless approach, the x86_64 assembly still had two branches. The user was able to eliminate the branches by using a boolean as an integer for masking and was able to prove that the resulting function is branchless.

Show HN: Compile C to Not Gates

https://opengraph.githubassets.com/bf829f1580936892cce90037638daee4d262fe6a924f882c931626c4f5516490/tomhea/c2fj
The c2fj project compiles C code into FlipJump (FJ) files, which are then compiled into FJM files and run using the FlipJump package. The compilation process involves multiple phases, including RiscV ELF compilation, FJ compilation, and FJM compilation, with the goal of creating a compact and efficient executable.

French modernists were alarmed, inspired by newspaper's voracious dynamism

https://images.aeonmedia.co/user_image_upload/3905/insert-v-a-baudelaire-2006au5025.jpg?width=3840&quality=75&format=auto
French writers in the 19th century, such as Baudelaire and Mallarmé, initially criticized the newspaper for its corrupting influence, but later saw its potential for artistic innovation and intermediality. Today, writers are grappling with the challenges of digital media, with some embracing its possibilities and others lamenting its impact on traditional literature and the reading experience.

Mathematics of the daily word game Waffle

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Researchers investigate Waffle game combinatorics, finding perfect unscrambling requires 11 orbits on 21 squares. Extreme games are hard due to this requirement.

Hands-On Graphics Without X11

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1638466a-7d2e-43a6-933d-537e93757760_642x557.png
The user discusses writing graphical applications on NetBSD without X11 using the wsdisplay and wskbd frameworks. They provide a step-by-step guide on how to access the framebuffer and handle input from a keyboard.

Let's talk about AI and end-to-end encryption

https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-7.png?w=1024
Researchers at NYU and Cornell have published a paper on the intersection of end-to-end encryption and AI, highlighting the challenges of balancing AI processing with private data security. The future of end-to-end encryption may be threatened by the increasing need for AI processing, which could lead to a loss of user control and potentially compromise individual privacy.

Dr. TVAM – Inverse Rendering for Tomographic Volumetric Additive Manufacturing

https://raw.githubusercontent.com/rgl-epfl/drtvam/main/docs/src/resources/video_teaser.png
Dr.TVAM is an inverse rendering framework for TVAM, based on Mitsuba renderer and physically-based differentiable rendering. It provides a command-line tool and abstractions for custom TVAM setups under a non-commercial license.

Lightcell: An engine that uses light to make electricity

https://www.lightcellenergy.com/images/lightcell-horz-yellow-1130.png
A transparent reaction cylinder is surrounded by hot mirrors to recycle waste heat, increasing efficiency. A 3D printed counterflow heat exchanger collects and preheats heat, reducing losses.

Show HN: GUI for editing Mermaid class diagrams

https://i0.wp.com/content.mermaidchart.com/wp-content/uploads/2025/01/Pasted-image-20250117132843.png?resize=1024%2C805&ssl=1
Mermaid's new Visual Editor makes editing class diagrams easier with direct interaction and various tools. It streamlines editing with features like layout adjustment, title addition, and theme selection.

Finite Field Assembly: A Language for Emulating GPUs on CPU

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca538599-ff5d-43f3-aa95-1b601dc6e8d7_3462x1674.png
This is Chapter 4 in our book, A Super-friendly Guide to Finite Fields for Programmers. LeetArxiv and the Finite Field Assembly (FF-asm) programming language are entirely funded by our Substack readers. Subscribe to support us! Chapter 4 (We are here): Emulating a GPU using a CPU using Congruences, Primes and Number Theory. Finite Field Assembly (FF-asm) is a programming language founded on ...

No Calls

https://keygen.sh/images/no-calls.png
The author of Keygen avoided sales calls by clearly explaining their value, narrowing their focus, and providing transparent information on their website. This approach helped them gain trust and close deals without the need for calls.

Show HN: Interactive game teaching dark patterns in UX design

https://games.productartistry.com/og-image.png
Every click online is a choice. But are they really yours? Play this hands-on adventure to decode the invisible design patterns steering your digital decisions. This game is free to play. If you found it valuable, consider sharing it or supporting future creations:

L.A. Fires: We Can't Let Insurance Companies Exploit the Disaster

https://www.rollingstone.com/wp-content/uploads/2025/01/why-companies-have-canceled-CA-insurance-policies.jpg?w=1600&h=900&crop=1
Mother Nature exploded in Los Angeles this month with the most damaging wildfires in the city’s, and likely the nation’s, history. We still don’t know the full extent of the devastation that is already massive with impacts felt across the city. When the fires subside, families in the Pacific Palisades, Altadena, and all the impacted Angeleno communities face a long road to recover and ...

Keeling Labs (YC W23) Is Hiring an ML Engineer for Grid-Scale Energy Storage

https://images.squarespace-cdn.com/content/v1/636ab376548a7e6815075e62/1711565046818-ZVHLI468ZBHE4QZMH0SP/image-asset.jpeg
Our team builds on experience from Rivian, DeepMind, Inspire, Y Combinator, and Cypress Creek Renewables (one of the nation’s largest renewable energy developers). We also love whiteboards and brainstorming, which is the main reason we’re building in-person in Los Angeles, CA. Our office is in Venice, just a few blocks away from the ocean and Abbot Kinney.

Show HN: Decentralized robots (and things) orchestration system

https://docs.p2p.industries/_astro/robots.B0utUYmY_ZmCTkN.webp
The install script changes network configuration and jump to the manual for details. Install the hyveOS SDK to start developing applications.

Starship Flight 7

https://www.spacex.com/static/images/infographics/Splashdown_Infographic_Desktop.jpg
Dragon performs a series of burns to position itself near the International Space Station. It then docks, pressurizes, and opens the hatch for crew entry.

Is the world becoming uninsurable?

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b6accf-2a92-4f6c-a28d-e88e52f91e89_550x599.png
The world is becoming uninsurable due to rising global risks from climate change, making it financially unviable to rebuild in areas prone to disasters. This reality is being ignored by policymakers who seek to transfer risks to others, rather than accepting the limits imposed by nature.

Maze Generation: Recursive Division (2011)

All of the maze algorithms I’ve covered so far (recursive backtracking, Eller’s, Kruskal’s, and Prim’s) were implemented as “passage carvers”: they started with a solid grid and hollowed the passages out of it. Some algorithms can be implemented a different way (and indeed, some must be implemented this way): as “wall adders”, where the process begins with a large empty space, and adds walls ...

A New type of web hacking technique: DoubleClickjacking

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguGmhrd0CL2DZf_1AUpRuyxGq2u-4iThnd64mHOgFe6cLMpRE3UzL8qW8dkb4wgfIgVcPGbisBWuqM8WzU7kSdYdyTTq4vTx2SiH3hO-RgUeSvRENFBMB3CzcFBhfOqha17Ona4gnLcbD4KsE2Wyy0_YfbG8Af6iYnIphO_4le7BrYgwzvgKVEXT8FGzzy/s16000/Screenshot%202024-12-30%20at%208.53.06%E2%80%AFPM.png
DoubleClickjacking is a new attack technique that bypasses clickjacking protections by exploiting the timing difference between mousedown and onclick events to swap UI elements during a double-click sequence. This technique can lead to account takeovers, OAuth authorization, and other high-privilege actions on websites and browser extensions, and can be mitigated by using a JavaScript-based ...

PostgreSQL Anonymizer

PostgreSQL Anonymizer is an extension that masks PII or sensitive data in Postgres databases using declarative rules defined in the database schema. It offers 5 masking methods and custom functions to ensure data confidentiality and GDPR compliance.

Swedish Exports of Ball Bearings

User needs to register or sign in with developer credentials and ensure a unique User-Agent string to access the application. If blocked, try changing back to default User-Agent or file a ticket for assistance.

Skyvern Browser Agent 2.0: How We Reached State of the Art in Evals

https://blog.skyvern.com/content/images/size/w2000/2025/01/benchmark_result.png
Skyvern 2.0, an open-source no-code browser agent builder, achieved state-of-the-art 85.85% performance on WebVoyager Eval with its planner-actor-validator agent loop architecture. The team published the entire evaluation run, allowing users to see Skyvern's thought process and actions for each case, and plans to improve the agent's performance in uncertain situations and with more tools.

The Family Bass - Music with an NES

https://www.linusakesson.net/music/family-bass/bass-small.jpg
The user connected a Family BASIC keyboard to an NES via a custom adapter to play its unique triangle waveform live. They used an AVR ATtiny85 microcontroller to multiplex the keyboard's parallel signals into a UART-like bitstream for the NES to read.

Nepenthes is a tarpit to catch AI web crawlers

Nepenthes is a tarpit software that targets web crawlers, particularly those scraping data for LLMs, by generating endless sequences of pages with dozens of links that lead back to the tarpit. It can be configured with optional Markov-babble to accelerate model collapse and comes with a Dockerfile and compose.yaml for easy deployment.

A UC Santa Cruz professor unearthed the oldest alphabet yet

https://www.universityofcalifornia.edu/sites/default/files/styles/article_default_banner/public/Elaine-Sullivan-starting-to-excavate-Tomb-4_0.jpg?h=aecdb15b&itok=rYrg2VFJ
The emerging importance of the find underscores a key truth about archaeology: artifacts often hold secrets that only later generations can unlock.

Show HN: Real-time nonlinear optics simulation (JS/GLSL)

https://raw.githubusercontent.com/westoncb/nonlinear-optics-sandbox/main/docs/images/screenshot.png
This project uses nonlinear optics to explore complex systems through a real-time simulator of coupled optical fields interacting with an adaptive medium. An ADAM optimizer continuously updates the medium's properties to guide the fields toward desired states.