Cameras and Lenses (2020)

https://ciechanow.ski/images/og/lenses.jpg
A digital camera works by converting photons into electric current using a grid of photodetectors, and adjusting parameters like shutter speed and ISO can produce different results. A simple camera can be built using a pinhole, but it has limitations, and a convex lens can be used to converge light rays and create a sharper image.

OpenWorkers: Self-Hosted Cloudflare Workers in Rust

OpenWorkers is an open-source runtime for secure edge computing, allowing untrusted JavaScript execution on your own infrastructure. It's designed to be simple, using a single PostgreSQL database and Docker Compose file.

iOS allows alternative browser engines in Japan

Apple allows alternative browser engines in iOS 26.2 and later for dedicated browser apps and in-app browsing experiences in Japan. To use alternative browser engines, developers must meet specific criteria and commit to ongoing privacy and security requirements.

Python Numbers Every Programmer Should Know

https://cdn.mkennedy.codes/posts/python-numbers-every-programmer-should-know/string-memory-usage-by-size.png
Python performance numbers show that adding an item to a list takes 28ns, while dictionary and set lookups are extremely fast. Using the correct data structure can result in significant performance improvements, with some alternatives being 11x faster than standard library functions.

Bluetooth Headphone Jacking: A Key to Your Phone [video]

https://static.media.ccc.de/media/congress/2025/1491-887fe87e-6ef2-5d94-98c8-f582cb22f442_preview.jpg
Researchers found three vulnerabilities in Airoha Bluetooth audio chips used by popular headphones and earbuds, allowing device compromise and potential attacks on paired devices. They will release tooling to check affected devices and discuss the implications of compromised Bluetooth peripherals.

Memory Subsystem Optimizations

https://johnnysswlab.com/wp-content/uploads/2020/05/cropped-logo2_small.png
In this blog I wrote 18 blog posts about memory subsystem optimizations. By memory subsystem optimizations, I mean optimizations that aim at making software faster by better using the memory subsystem. Most of them are applicable to software that works with large datasets; but some of them are applicable to software that works with any data regardless of its size. Do you need to discuss a ...

Implementing HNSW (Hierarchical Navigable Small World) Vector Search in PHP

https://centamori.com/content/images/hnsw-display-1.png
HNSW (Hierarchical Navigable Small World) is a data structure that uses a layered structure to efficiently search for data in a large dataset by progressively zooming in on the area of interest. It builds a map dynamically, one point at a time, using a combination of chance and search to insert new data and maintain a navigable graph with efficient search operations.

Common Lisp SDK for the Datastar Hypermedia Framework

https://opengraph.githubassets.com/8870c0d4973155ac8fd78a1c3f919a0640cb132fc50aec9b0b48d216f97a4e8c/fsmunoz/datastar-cl
Datastar-CL is a Common Lisp implementation of the Datastar SDK using CLOS and SSE-generator class. It supports Hunchentoot and Clack backends with Woo and has features like compression and JSON parsing.

Sony PS5 ROM keys leaked – jailbreaking could be made easier with BootROM codes

https://cdn.mos.cms.futurecdn.net/Xv8aggMZhYWEmA5ttPHdHh-840-80.png
PlayStation 5 ROM keys have allegedly been leaked, potentially allowing jailbreakers to decrypt and analyze the console's bootloader. This unpatchable issue may lead to future jailbreaks and custom firmware on existing consoles.

Build a Deep Learning Library

Instead of just learning how to use a deep learning library, we are going to learn how to create one. We start with a blank file and NumPy, and we don’t stop until we have a functional autograd engine and a collection of layer modules. By the end, we will use it to train MNIST, simple CNN and simple ResNet.

Heap Overflow in FFmpeg EXIF

https://prod-files-secure.s3.us-west-2.amazonaws.com/7b823395-590c-81a1-8058-0003130789d7/62a8e3ed-f585-4aa4-a9a8-b556fe3b5d2f/Pasted_image_20251222134053.png?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=ASIAZI2LB4662Q2FQ73W%2F20260101%2Fus-west-2%2Fs3%2Faws4_request&X-Amz-Date=20260101T160037Z&X-Amz-Expires=3600&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEB0aCXVzLXdlc3QtMiJIMEYCIQDSohCtfk6bEjbL5pZyYsehSbgJBfFGa%2FRYEwh537Dh9QIhANIVt4fCom412e0vhsvkd5KwKis2guYg5M6kj%2Bm6G0%2BjKogECOb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQABoMNjM3NDIzMTgzODA1IgwrF8miXSBF9rzdLpMq3AMqzKsMO1BGT87OF7g64%2FQ%2FONxz%2FnLDJlcF1PPG9lkrHkZZ0V27LDrLdXimqFPoXHIX%2BBa4FCD13TQCFfzeTk%2BulDVDh08CViSOH31WZorOncX6%2BHcjsIc1XznQMzrWUoiI1V4C1hugCK%2BwyhFDJEi9CpMF4gzVfKBINqf2B9D1rT3N%2BRslRJRz3o6600vsgNB67l1PzXhww5ZRd7A2m%2BNVyO2CHX0Jni1MgQM%2FEyRiJsbTexZ6522RE5cSiBidEwMrdmYe%2FH4%2FEubE5N5htuXvb%2BGjZpz2o5xyeemF5nLAfBFHyhcvyXpX8PeWz6wlUNcjLRtmp2yDEMIX5VcOfbiDs4AA81kK453vaWZP2IIFltRiwPW4isYwQqOXVE4LmDdsaRlFqDIkWTrqTzYadmfCSLwaNnbhl8OxIb5N%2BiQRTBS3Hl5mRRdgmQPVqvxDNgo0R5YYdKYAEfxSWBrdXj6SrPAK8lgVmZvqCHnesEXgyiNoGEfueAYqmBVSX6YC556OPPyMpFOlTIQET%2BXqwZRw2HcNQvP%2BIJSrkrlV65cijFkt%2BjQbYChwxbX5adRjJhjOexVqtf%2FjPfi16HMptx8lnLg1cbLlmG8qMTmVg3ZJvr9cvmGGOw9sM4ov4jC25tnKBjqkAWKr5cjAWRSK5Hv8IZJ1v6fPIfNibnLCT9u2MwJxICfEd6jemWRtgpCQ66J4uenn79tP5oPvpGzzKOl0h7AZCbW%2FpLY75g3MsMCkeJdJabswgxILnsKA%2Bm8s6J1kRIoRyclp%2FpNLK6ve%2BkcSc2DGUk8YbpcYyMfP5LyUvFjdjM9rKwjnhvt5RKWV068F4zEp2JU00mHfZHwAxpeh2G20qeeUOOEW&X-Amz-Signature=05d9cbee3bb30e91b1c7ffe823642cc2f4d890fa019211ac6f9af665d59f8e93&X-Amz-SignedHeaders=host&x-amz-checksum-mode=ENABLED&x-id=GetObject
A heap-buffer-overflow bug was found in FFmpeg's avcodec/exif during the processing of IFDs, affecting various image formats. The bug occurs due to an under-allocation of 12 bytes in the buffer, allowing a write to spill past the buffer end into the next heap chunk's metadata.

C-events, yet another event loop, simpler, smaller, faster, safer

This project, c-events, is a cross-platform event library that provides a mechanism to execute callback functions when specific events occur on file descriptors or after timeouts, supplementing libuv with finer grain control. It supports epoll, kqueue, and iocp through wepoll, and includes features like file descriptor management, timeout handling, and user-triggered events.

2025: The Year in LLMs

https://static.simonwillison.net/static/2025/artificial-analysis-open-weight-2025.jpg
The LLM space saw significant advancements in 2025 with the emergence of reasoning models, coding agents, and image generation capabilities, driven by releases from OpenAI, Google, and Chinese AI labs. Key events included the release of Claude Code, the success of Gemini's Nano Banana models, and the growing competition between OpenAI, Google, and other labs in the LLM market.

2025 Letter

https://i0.wp.com/danwang.co/wp-content/uploads/2026/01/Grossberg-Maschinensaal.jpg?resize=700%2C777&ssl=1
Silicon Valley and the Communist Party share a serious and humorless tone, but Silicon Valley has virtues like meritocracy and openness. However, it also has drawbacks like narrowness of mind and a lack of cultural awareness, which may hinder its ability to lead the world in AI development.

Worlds largest electric ship launched by Tasmanian boatbuilder

https://i.guim.co.uk/img/media/4f9e6f1919a792be3630c42c009ef95e5f2291e6/0_0_4032_3024/master/4032.jpg?width=445&dpr=1&s=none&crop=none
Incat, an Australian boatbuilder, launched the world's largest battery-power ship, Hull 096, which will run between Buenos Aires and Uruguay. The ship is a "giant leap forward in sustainable shipping" with 250 tonnes of batteries and can carry 2,100 passengers and 225 vehicles.

Rust--: Rust without the borrow checker

https://opengraph.githubassets.com/445ab2382eb14190277fdf6351a32bad53d4cb5dd084ce8d094493402fe9633c/buyukakyuz/rustmm
A modified Rust compiler disables the borrow checker, allowing code that normally violates borrowing rules to compile and run. This results in unexpected behavior, such as mutable references being overwritten and moved values being accessed.

Children and Helical Time

https://moultano.wordpress.com/wp-content/uploads/2025/12/download28129.png
As we age, time feels logarithmic, with childhood being half of our life and adulthood the other half. To make the most of our time, we should focus on creating new experiences and traditions with our children, who can help us recapture the intensity and wonder of childhood.

Meta made scam ads harder to find instead of removing them

https://sherwoodnews.imgix.net/mwphzyq69oso/en-US/assets/files/2208520872_santa-monica-ca-mark-zuckerberg-and-priscilla-chan-attend-the-11-th-annual-breakthrough-prize.jpg?auto=compress%2Cformat&cs=srgb
Meta removed scam ads from its platforms but made them harder for regulators and journalists to find. The company feared universal advertiser verification would cost $2 billion and reduce revenue by nearly 5%.

ACM Is Now Open Access

The website is temporarily blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

Easel Turns One One year of building my own IDE in Clojure

The user has been working on an IDE called Easel in Clojure for a year, aiming to create a comprehensive toolset with direct data access, visualization, and interaction features. Easel's goal is to provide a foundation for building software tools that work together seamlessly, with a focus on user trust and freedom, and the project is 80% complete with most major features already demonstrated.

European Space Agency hit again as cybercriminals claim 200 GB data up for sale

https://regmedia.co.uk/2017/08/31/hacker_shutterstock.jpg
The European Space Agency has suffered a security incident where hackers claim to have stolen data including confidential documents and source code. The ESA says the breach may have impacted a small number of external servers used for unclassified collaboration.

I canceled my book deal

https://austinhenley.com/blog/images/challengingprojectsbook.png
The author had a successful blog and was approached by a big tech book publisher to write a book about classic programming projects. The author negotiated a contract with a $5000 advance and 12-15% royalties, but the publisher's feedback and requirements stifled the author's creativity and enthusiasm.

A font with built-in TeX syntax highlighting

https://rajeeshknambiar.wordpress.com/wp-content/uploads/2025/12/texsyntaxhighliting-font.png?w=1016
You presented a TeX syntax-highlighting font at TUG2025, using OpenType technologies and M+ Code Latin base font. The font supports COLRv0 and COLRv1 colour formats and is available at the RIT fonts repository.

Beyond the Nat: Cgnat, Bandwidth, and Practical Tunneling

https://www.rapidseedbox.com/wp-content/uploads/CGNAT_02.png
The internet's path has changed from direct end-to-end addressing to layered networks with Carrier-grade NAT and mixed IPv6 deployments due to economics and address scarcity. To expose services behind CGNAT, users can use tunnels like bore-cli or Cloudflare Tunnel for reliable reachability and edge protection.

Pokémon Team Optimization

https://upload.wikimedia.org/wikipedia/commons/9/97/Pokemon_Type_Chart.svg
The user, a former Pokémon fan, created a tool to optimize a Pokémon team using operations research methods, aiming to maximize the overall base stat while satisfying constraints such as type resistance and team size. The tool was used to find optimal teams with and without legendary and pseudo-legendary Pokémon, and the results showed strong combinations that could easily complete any game.

Show HN: I created a tool to design and create foamcore inserts for boardgames

https://boxinsertdesigner.com/BoxsertDesignerIcon.svg
Boxsert Designer lets you quickly and easily design custom inserts for your boardgames and other projects. It produces a cut list that is easy to follow.

Tell HN: Happy New Year

User had a bad 2023 year but hopes 2024 will be better. They predict significant global events including regime change, cyber attacks, and a major earthquake.

Resistance training load does not determine hypertrophy

Web Browsers have stopped blocking pop-ups

https://www.smokingonabike.com/wp-content/uploads/2025/12/old_example.png
Pop-up ads are back and worse than ever, with ad developers evading browser blockers. Web browsers need to update pop-up blocking technology to improve user experience.

I rebooted my social life

https://substackcdn.com/image/fetch/$s_!2cbR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F843e4d28-1b2e-4861-9fa9-c86cd50e908c_1536x1024.heic
The author's comfortable life led to social isolation, but he realized the value of community and built his own by organizing regular events and inviting people to join. He now has a community of friends and enjoys the benefits of social connections, and advises others to do the same by inviting people to events.