GPT-5.4

https://images.ctfassets.net/kftzwdyauwt9/6HIfga5zjofGwccjVeZA2e/fcca68f123b1110c7b4f275caa2d3669/Spreadsheet_-_desktop_-_light.png?w=3840&q=90&fm=webp
GPT-5.4 is a new model that combines reasoning, coding, and computer-use capabilities for professional work, improving efficiency and accuracy. It is available in ChatGPT, the API, and Codex, with GPT-5.4 Pro offering maximum performance on complex tasks.

Wikipedia in read-only mode following mass admin account compromise

Subscribe to updates for Wikis were in read only mode via email. You'll receive email notifications when incidents are updated.

The Brand Age

The Swiss watch industry faced a crisis in the 1970s due to Japanese competition, exchange rate changes, and quartz movements, but survived by transforming into luxury brands. This shift led to a new era where branding and design conflicted, with brands prioritizing visibility over quality and design.

Pentagon Formally Labels Anthropic Supply-Chain Risk

Please enable JS and disable any ad blocker

Let's Get Physical

The user participated in a physical pentest where they and their colleague blended in, bypassed security measures, and accessed restricted areas, including the director's office and server room. They successfully demonstrated vulnerabilities in the company's physical security, but were eventually caught and had a productive conversation with the security staff.

Hardware hotplug events on Linux, the gory details

To detect USB device plug/unplug events on Linux, libusb recommends using udev support, which is a mechanism that avoids race conditions by handling device events and rebroadcasting them to other programs. To listen to these rebroadcasted events without linking to libudev, one can use netlink sockets to receive messages from udev, which are sent with credentials and use a versioned packet ...

Good software knows when to stop

https://ogirardot.writizzy.com/__og-image__/image/p/good-software-knows-when-to-stop/og.png
Upgrading Linux distribution and packages caused unexpected behavior with the ls command. A lesson learned is to prioritize simplicity and focus on the product's core purpose rather than adding unnecessary features.

A GitHub Issue Title Compromised 4k Developer Machines

https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another/hero-clinejection-chain-1600x900.png
An attacker exploited a vulnerability in Cline's GitHub issue triage workflow to install OpenClaw, an AI agent, on developers' machines without consent. The attack, named Clinejection, used a combination of prompt injection, cache poisoning, and credential theft to publish a compromised package.

Show HN: Jido 2.0, Elixir Agent Framework

Jido 2.0 has shipped on Hex after 18 months of development, offering a simpler and more efficient agent framework built on the BEAM. It provides a pure functional agent architecture, strategies for AI integration, and a growing ecosystem of builders and packages.

Launch HN: Vela (YC W26) – AI for complex scheduling

Gobhanu and Saatvik, the brothers behind Vela, built an AI agent that automates multi-party, multi-channel scheduling by reading context, checking calendars, and proposing times. Vela handles edge cases and varying user behavior across different demographics and channels, and the brothers are seeking feedback from experts in multi-agent coordination and conversational AI.

Optimizing Recommendation Systems with JDK's Vector API

https://miro.medium.com/v2/resize:fit:655/1*w8Z7CwTNc4dW84n8-S-CMw.png
Netflix optimized their video serendipity scoring feature, which was consuming 7.5% of CPU, by batching and re-architecting memory layout, and then using the JDK Vector API for SIMD-style math in pure Java. This optimization resulted in a 7% drop in CPU utilization and 12% drop in average latency, allowing Netflix to handle the same traffic with 10% less CPU.

The Government Uses Targeted Advertising to Track Your Location

https://www.eff.org/files/banner_library/locationdata_v2.mov1_.gif
The government is using online ad systems to track people's locations without warrants, buying location data from shady data brokers. This is made possible by the online advertising industry's massive surveillance machine that collects and shares personal data.

Datasets for Reconstructing Visual Perception from Brain Data

https://camo.githubusercontent.com/57e6a783e272bfae1b4e9305eb035b969fdd7ee260e90246ab08cd0a9f153c33/68747470733a2f2f696d672e796f75747562652e636f6d2f76692f6e736a446e59784a30626f2f302e6a7067
Researchers from AI and machine learning backgrounds need to understand neuroimaging methodology to avoid common pitfalls in reconstruction from neuroimaging data. Reconstruction requires generalizing to novel stimuli outside the training set, which is a harder problem than decoding or identification.

Remotely unlocking an encrypted hard disk

https://jyn.dev/assets/Pasted%20image%2020260121044155.png
The user wants to access their Arch Linux system's early boot environment securely by setting up an SSH server and networking in the initramfs system, which is a small OS running from memory. They achieved this by adding systemd services to initramfs, including an SSH server and networking, and configuring Tailscale to allow access to the initramfs system.

Show HN: PageAgent, A GUI agent that lives inside your web app

https://img.alicdn.com/imgextra/i3/O1CN01JPT4Fj1FJTfmHfNxO_!!6000000000466-49-tps-512-512.webp
PageAgent.js: Intelligent GUI Agent for any website. Modern web AI automation with minimal integration.

Nvidia PersonaPlex 7B on Apple Silicon: Full-Duplex Speech-to-Speech in Swift

https://miro.medium.com/v2/resize:fit:700/1*mt9Ln49T_VdhfX-92Sd98g.jpeg
A new speech library, qwen3-asr-swift, enables full-duplex speech-to-speech on Apple Silicon with NVIDIA's PersonaPlex 7B model. The library runs entirely on Apple Silicon, processing audio in and out with streaming via PersonaPlex 7B.

A ternary plot of citrus geneology

Almost all citruses - the , , , , etc. - are hybrids of three original citrus species: the , , and . Most often, we represent genealogy as a tree, but the complex hybridization process that led to modern citrus would render more of a complex, incestual web. It does, however, lend itself to another representation: a ternary plot. Each corner represents one of the original species, and the ...

Google Workspace CLI

https://raw.githubusercontent.com/googleworkspace/cli/refs/heads/main/docs/logo.jpg
The Google Workspace CLI (gws) is a command-line tool that provides a unified interface to Google Workspace APIs, including Drive, Gmail, Calendar, and more, with features like tab completion and structured JSON output. It supports multiple authentication workflows and comes with over 100 pre-built agent skills for automating tasks and integrating with large language models.

A man who broke into jail

https://media.newyorker.com/photos/69a06f4a134d1e033041edb0/master/w_2560%2Cc_limit/r48491.jpg
Alex Friedmann, a respected prison reform activist, was arrested for infiltrating Nashville's new central jail and planting guns in its infrastructure. He was caught after months of secretly entering the jail, wearing disguises and hiding evidence, and was later found to have hidden multiple guns and keys in various parts of the jail.

Greg Kroah-Hartman Stretches Support Periods for Key Linux LTS Kernels

https://fossforce.com/wp-content/uploads/2026/03/LinuxDistrosLogo.jpg
Linux kernel maintainer Greg Kroah-Hartman extended support lifetimes of several long-term kernels after consulting users and maintainers. This move will likely stretch to future kernel releases, reflecting real-world adoption rather than a strict schedule.

OpenTitan Shipping in Production

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwJr3EDJXlAiISJQCv2DMWsD6dtomk3NMxjfNyOeoSTkiU1lWskg11axvCknOUMFK-TYwXuTfm91DsIEgqbAE6DSTX8cA_Z7oUhUhe1cc0LBRvlRNjr4gzpHK2OWtmeSHf7UFSHcojyma5MdOqSAQJQZv9hqcZFHjRLsdgSmSr9lRjow96wBAh7_uRsYQ/s1600/6b6cUfEMUcXHJLu.png
OpenTitan, an open source silicon Root of Trust, is now shipping in commercially available Chromebooks, providing strong security guarantees. It's the first open source silicon RoT to support post-quantum cryptography and is maintained by lowRISC C.I.C.
https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2026/02/airbus_ultraair_laser_terminal/27121825-1-eng-GB/Airbus_UltraAir_laser_terminal_article.jpg
The European Space Agency and partners successfully connected an aircraft to a geostationary satellite using laser communications, achieving error-free connections at 2.6 gigabits per second. This breakthrough enables seamless, high-speed connections for travellers and remote communities, laying the foundations for everyday technologies that depend on strong links.

Fast-Servers

https://geocar.sdf1.org/slow-net.png
A high-performance network server design uses one thread per core, pinned to separate CPUs, with each thread handling a separate state transition and using epoll/kqueue for efficient file descriptor management. The design involves simple blocking/IO calls, no decision points, and can handle up to 100k requests per second on modern systems.

Relicensing with AI-Assisted Rewrite

https://tuananh.net/img/GPL-License.jpg
The chardet maintainers relicensed the Python character encoding detector from LGPL to MIT using AI-generated code, but this move may be a GPL violation or render the MIT license moot due to copyright and licensing complexities. The case raises questions about AI-generated code ownership and the future of copyleft licensing.

AI and the Ship of Theseus

https://lucumr.pocoo.org/social/2026-03-05-theseus-social.png
AI-generated code is redefining software ownership, with implications for copyleft licenses like GPL and the future of software development. The rise of AI-generated code may lead to more permissive licenses, proprietary software re-emerging as open source, and new fights over copyrights and authorship.

Poor Man's Polaroid

https://boxart.lt/images/blog/poor_mans_polaroid/camera_front.jpg
The code controls a camera and printer using GPIO pins and Python libraries, capturing images and applying filters based on brightness. It also handles button presses and shutdown requests, with a cleanup function to release resources when the program exits.

Google Safe Browsing missed 84% of confirmed phishing sites

https://www.norn-labs.com/blog/huginn-feb-2026/s3-lure.png
Huginn, a phishing discovery tool, found 254 confirmed phishing websites in February, with 83.9% not flagged by Google Safe Browsing. Muninn's automatic scan correctly identified 238 phishing sites, but a deeper scan caught every single confirmed phishing site with zero false negatives.

Comparing Python packages for A/B test analysis (with code examples)

https://e10v.me/python-packages-for-ab-test-analysis/tea-tasting.png
This article compares four Python packages that are relevant to A/B test analysis: tea-tasting, Pingouin, statsmodels, and SciPy. It does not try to pick a universal winner. Instead, it clarifies what each package does well for common experimentation tasks and how much manual work is needed to produce production-style A/B test outputs. An A/B test compares two (or more) variants of a product ...

Building a new Flash

https://img.ngfiles.com/image-uploads/000/001/550/iu_1550823_569588.png
You're creating an open-source Flash alternative built in C# with Avalonia and SkiaSharp, compatible with Linux, Mac, and PC. The project features a vector engine, timeline, shape tweening, symbol library, .fla import, and scripting system.

AMD will bring its “Ryzen AI” processors to standard desktop PCs for first time

https://cdn.arstechnica.net/wp-content/uploads/2026/03/2026-MWC-Client-Press-Deck-24-2.jpeg
AMD is releasing its first Ryzen AI desktop chips with NPUs for business PCs, combining Zen 5 CPU cores and RDNA 3.5 GPU cores. These chips qualify for Microsoft's Copilot+ PC label and support device management capabilities for business PCs.