Who owns Express VPN, Nord, Surfshark? VPN relationships explained (2024)

https://assets.kumu.io/production/public/assets/tree-pen-black-d0361958df633822fcb095229247c5e2547f37f3fd6549699a895e9f40fbde79.png
A user created a map showing relationships between VPN companies, media companies, and affiliate programs, highlighting corporate ownership, paid relationships, and partnerships. The map reveals a complex web of connections between VPN companies, including ExpressVPN, NordVPN, and Surfshark, and their affiliate programs.

SEC approves Texas Stock Exchange, first new US integrated exchange in decades

https://assets1.cbsnewsstatic.com/hub/i/2025/09/30/7b9b5366-50ca-4985-95a5-c52c2b41b3e2/76bee79db3c33d9eb71ee85f7f26b3d9.jpg
The Securities and Exchange Commission approved the Texas Stock Exchange as a national securities exchange, paving the way for its 2026 launch. This move is expected to spur economic development in Texas, which is home to many Fortune 500 companies and a large economy.

The UK is still trying to backdoor encryption for Apple users

https://www.eff.org/files/styles/teaser/public/banner_library/encryption-poc-chelsea-saunders.png?itok=q8_eaXs1
The Financial Times reports that the U.K. is once again demanding that Apple create a backdoor into its encrypted backup services. The only change since the last time they demanded this is that the order is allegedly limited to only apply to British users. That doesn’t make it any better.The demand...

Flock's gunshot detection microphones will start listening for human voices

https://www.eff.org/files/styles/teaser/public/banner_library/police-surveillance-hat.jpg?itok=LKH-m4nf
Flock Safety is rolling out a new product that detects "human distress" via audio, raising concerns about civil liberties and potential misuses. Cities that adopt this technology may face headaches and lawsuits, as Flock has a history of causing legal challenges.

How I influence tech company politics as a staff software engineer

Software engineers can get involved in company politics by making high-profile projects successful or aligning their pet ideas with existing campaigns. This can increase their political capital and help them achieve their technical goals.

ProofOfThought: LLM-based reasoning using Z3 theorem proving

https://opengraph.githubassets.com/040caf3add2adf6ea42f2d4d507d494f0ae5280252b8982f470ff7fb54fc8fc9/DebarghaG/proofofthought
User uses OpenAI to query whether Nancy Pelosi publicly denounces abortion, receiving a false answer. They then evaluate a dataset using a reasoning pipeline, achieving an accuracy of approximately 0%.

Paged Out Issue #7 [pdf]

The user tested four AI checkers on four samples of text, including original, AI-generated, and edited text, and found inconsistent results, concluding that AI checkers cannot be trusted.

A comparison of Ada and Rust, using solutions to the Advent of Code

https://opengraph.githubassets.com/c0f1ded2db9a1ed4038ef394029a9f8ad8b1d234624fa6842c50f881f73c48cc/johnperry-math/AoC2023
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

Self-hosting email like it's 1984

https://maxadamski.com/blog/2025/10/test-mail-1.png
Self-hosting an email server is free and easy to set up, requiring minimal storage and energy consumption. It involves installing Postfix and OpenDKIM, configuring DNS records, and obtaining an SSL certificate.

Alibaba cloud FPGA: the $200 Kintex UltraScale+

https://essenceia.github.io/projects/alibaba_cloud_fpga/xilinx_doc.png
The user purchased a Kintex UltraScale+ FPGA development board from eBay for $200, which came with a XCKU3P-FFVB676 FPGA, 2 SPF+ connectors, and a x8 PCIe interface, but lacked documentation and guarantees. The user aims to use the board as a dev board, starting by confirming its functionality, establishing a JTAG connection, and automating the Vivado flow to generate a SVF file for ...

Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble?

https://res.cloudinary.com/dzawgnnlr/image/upload/w_1512,h_850,c_fill,g_auto,q_auto,f_auto/pt1apmgovtkb2aegncym
Nvidia's $100 billion investment in OpenAI and $110 billion in vendor financing may be a harbinger of another spectacular collapse like the telecom bubble. The GPU-backed debt market is built on the assumption that GPUs will hold their value over 4-6 years, but evidence suggests they last only 1-3 years in practice.

NSA and IETF: Can an attacker purchase standardization of weakened cryptography?

The NSA is trying to weaken post-quantum cryptography by pushing for single encryption instead of double encryption, which would make it easier for them to break the encryption and gain access to sensitive information. The IETF TLS WG has adopted a non-hybrid draft for post-quantum key agreement, despite objections from many experts who argue that it creates security risks and violates the WG charter.

Working pipe operator today in pure JavaScript

https://opengraph.githubassets.com/c3e3e5f264636f75271c19137b0f0b404b59d8ffa4e2d8295810d34073ca9ddb/irony/aspipes
asPipes is a JavaScript library that models the proposed pipeline operator using bitwise OR and Symbol.toPrimitive. It enables clean, direct syntax for composing reusable, named higher-order pipes.

Blog Feeds

https://blogfeeds.net/blog.svg
The writer misses the simple web where people shared thoughts and ideas through blogs, now suggesting a return to casual online communication. They recommend creating a blog and sharing an RSS feed to connect with others in a personal and organic way.

$912 energy independence without red tape

https://sunboxlabs.com/assets/3000w-apartment-solar/inside_10.jpg
User is referencing Will Prowse's 48V 3000W off-grid solar system, which provides 1100kWh/y energy with a 3.5 year payback period. The system draws power from the wall only when the sun is down and the battery is dead.

New antibiotic targets IBD and AI predicted how it would work

The Buchstabenmuseum Berlin is closing

https://www.buchstabenmuseum.de/wp-content/uploads/2025/07/250703_INSTA_We-are-closing_web-1-1024x671.jpg
The Buchstabenmuseum is open Thurs-Sun 1-5 pm, with guided tours available outside hours. They're also celebrating 20 years with a birthday party on June 14 and need help with storage and membership.

Microsoft 365 Copilot's commercial failure

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,quality=80,format=auto,onerror=redirect/uploads/user/profile_picture/ecc201d3-b77d-4f83-ab2c-07ec978123ec/Jukka_Niiranen_Advisory_01.png
Microsoft's paid Copilot product sales have failed with only 8 million active licensed users out of 440 million subscribers, a 1.81% conversion rate. The company is now shifting focus to agents and a per-agent monetization model, indicating a reimagined strategy to make up for the commercial failure of Copilot.

Discord customer service data breach leaks user info and scanned photo IDs

https://platform.theverge.com/wp-content/uploads/sites/2/chorus/author_profile_images/195819/JAY_PETERS.0.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Discord was hacked by an unauthorized party that accessed user information including names, emails, and credit card numbers. The company is notifying affected users and has taken steps to secure its systems.

Scientists are discovering a powerful new way to prevent cancer

Cancer starts with a mutation in a normal cell that allows it to multiply uncontrollably. This leads to tumour formation and spread to other body parts.

Thunderscan: A clever device transforms a printer into a scanner (2004)

https://www.folklore.org/images/Macintosh/tscanapp_t.jpg
The author worked on the Silentype printer project at Apple in 1979 and later joined Thunderware to develop Thunderscan, a low-cost scanner for the Macintosh. Thunderscan was a high-resolution scanner that used an ImageWriter printer and was priced under $200, but it was slow and had low image quality initially.

Orcas are bringing humans gifts

https://images.newscientist.com/wp-content/uploads/2025/06/30132843/SEI_257390399.jpg
Orcas have been observed gifting dead prey to humans, suggesting they may engage in altruism and recognize sentience in other species. This behaviour, seen in 34 cases, may demonstrate orcas' ability to understand mental states and cooperate with other species.

AI-powered open-source code laundering

https://opengraph.githubassets.com/94311d5f133cb6041fb33def9a96a805b3bb4928d46fc1ab92cefdb77e567847/SudoMaker/rEFui
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

Google removes ICE-spotting app following Apple's ICEBlock crackdown

https://platform.theverge.com/wp-content/uploads/sites/2/chorus/author_profile_images/195810/EMMA_ROTH.0.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Google removed app Red Dot from its store after Apple took down ICEBlock due to concerns over user safety and potential violence against ICE agents. The apps allowed users to anonymously report ICE agent sightings, prompting the Department of Justice to pressure Apple and Google to remove them.

Track which Electron apps slow down macOS 26 Tahoe

https://avarayr.github.io/shamelectron/og-image.png
Track which Electron apps have fixed the major GPU performance issue on macOS Tahoe. Real-time status monitoring of Electron app compatibility with macOS 26.

Sora Update #1

Sora will give rightsholders more control over character generation and share revenue with them for user-generated videos. The platform will undergo rapid iteration and change to balance user engagement and rightsholder value.

Toyota runs a car-hacking event to boost security (2024)

https://toyotatimes.jp/en/spotlights/upload_images/spotlights_1061_1280_720.jpg
Toyota organizes Hack Festa, a car-hacking event for IT students to test their skills against each other. The event aims to boost cybersecurity in the auto industry by simulating potential hacking threats.

How functional programming shaped and twisted front end development

A developer who built web applications for years before moving to backend work was confused by modern React codebases, feeling they had "declared war on the platform itself." This perspective is shaped by having lived through the first browser war and remembering a web where CSS cascaded naturally.

Say Goodbye

https://cdn2.mooreds.com/wordpress/wp-content/uploads/2020/08/letters-to-a-new-developer-210x300.png
Send a kind message to someone who was laid off, expressing sympathy and appreciation for their efforts. Keep it brief, sincere, and avoid offering help or criticizing their former employer.

OpenAI's hunger for computing power

Please enable JS and disable any ad blocker
Kaitai Struct is a formal language for binary format specification that can be compiled into parser code

Matrix Core Programming on AMD GPUs

https://salykova.github.io/assets/matrix_cores/binary_format_2.png
The blog post explains how to use Matrix Cores in HIP kernels, focusing on low-precision data types such as FP16, FP8, and FP4, and the new family of Matrix Core instructions with exponent block scaling introduced in the AMD CDNA4 architecture. It provides code examples and illustrations to cover modern low-precision floating-point types, Matrix Core compiler intrinsics, and data layouts ...

Privacy Harm Is Harm

https://www.eff.org/files/banner_library/sls-alpr-2023.png
EFF joins an amicus brief in Mata v Digital Recognition Network, a lawsuit against a corporation that allegedly violated a California data privacy law. The case questions whether Californians can challenge harmful surveillance without proving additional harm beyond privacy harm.

How to inject knowledge efficiently? Knowledge infusion scaling law for LLMs

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Large language models underperform on specialized tasks due to lack of domain knowledge, but excessive infusion causes memory collapse. A proposed scaling law predicts optimal domain knowledge injection based on model size, improving performance and generalizability.

X-ray scans reveal the hidden risks of cheap batteries

https://platform.theverge.com/wp-content/uploads/sites/2/chorus/author_profile_images/197412/headshot_andrewL_blackwhite.0.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
A study found nearly 8% of low-cost lithium-ion batteries have manufacturing defects that can cause fires and explosions. Buying from reputable brands like Samsung and Panasonic reduces the risk of such defects.

Cloudflare Introduces NET Dollar stable coin

https://cf-assets.www.cloudflare.com/slt3lc6tev37/53qCYhQbir5WtIU0VDWESo/954a48bfb17f429acf469e5f14345d83/unnamed-3.png
Cloudflare is introducing NET Dollar, a U.S. dollar-backed stablecoin for instant, secure transactions on the agentic web. This will enable a new business model that rewards originality, sustains creativity, and enables innovation in an AI-driven world.

Show HN: Run – a CLI universal code runner I built while learning Rust

https://opengraph.githubassets.com/3543200b153476896c7bd1ea6672518854738f0522ab6cbd006837fe357e2bd0/Esubaalew/run
run is a polyglot command runner that lets you script, compile, and iterate in 25+ languages without another CLI. It's built in Rust for developers who live in multiple runtimes.

Microformats – building blocks for data-rich web pages

Consuming microformats 2 data involves parsing HTML, handling nested structures, and dealing with various property value types. Properly handling microformats 2 data requires flexibility, sanitization, and validation to prevent XSS attacks and ensure safe storage and display.

Retrocide Mono – A monospaced font with no decenders

The font has a monospaced design with no descenders, optimized for code and terminal use, and a retro aesthetic. It is available in TTF, OTF, and WOFF2 formats.

Cuckoo hashing improves SIMD hash tables (and other hash table tradeoffs)

https://reiner.org/static/banner-medium.471c8add.png
Cuckoo hashing can be a good choice for hash tables when combined with SIMD-accelerated probing, especially for high load factors, and can be engineered to beat standard implementations in many scenarios. However, cuckoo hashing is more complex than quadratic probing and requires careful engineering to achieve optimal performance, but can offer advantages such as shorter probe lengths and ...

Space Mission Options for Reconnaissance and Mitigation of Asteroid 2024 YR4

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Asteroid 2024 YR4 has a 4% chance of lunar impact in December 2032, threatening astronauts and spacecraft. Options for space missions to deflect or disrupt the asteroid are available, with reconnaissance missions being the most feasible.

Unchecked and Unaccountable: How DOGE Jeopardizes Americans' Data

https://www.hsgac.senate.gov/wp-content/uploads/HSGAC_Logo_Social.jpg
Senator Gary Peters' report reveals that the Trump Administration's Department of Government Efficiency is operating outside law, putting Americans' personal data at risk. The report calls for agencies to halt DOGE operations citing lack of accountability, security breaches, and unqualified personnel handling sensitive information.

XiangShan Vector Floating-Point Unit Design

https://docs.xiangshan.cc/projects/design/en/latest/backend/figure/ClosePath.svg
The vector floating-point unit receives uop information and performs vector floating-point instruction calculations. It consists of four modules: VFAlu, VFMA, VFDivSqrt, and VFCvt, which handle various floating-point operations.

Starship's eleventh flight test

https://sxcontent9668.azureedge.us/cms-assets/assets/Flight_11_Website_Desktop_2_db5cc652b6.jpg
Starship's 11th flight test is scheduled to launch on or after October 13, with a live webcast starting 30 minutes before liftoff. The test aims to demonstrate a new landing burn engine configuration and stress-test Starship's heatshield, with a splashdown in the Indian Ocean.

Ask HN: Why is software quality collapsing?

The user discusses the decline in software quality, citing examples of popular apps and companies that have failed to maintain basic standards, and argues that this is not a collapse of software quality but rather a decline in the quality of specific programs and companies. The user proposes that users should prioritize quality by voting with their attention and dollars, and that engineers ...

A Mac-like experience on Linux

https://pointieststick.com/wp-content/uploads/2025/09/macos-tahoe.png
The user, a former Mac user, found that GNOME does not offer a Mac-like experience despite popular claims, but it does provide a near-zero distraction experience. They recommend KDE Plasma for those seeking a more Mac-like experience on Linux, citing its customizable dock, desktop widgets, and personalization options.

Amazon Is Digitally Erasing Guns from James Bond Posters

https://kotaku.com/app/uploads/2025/10/boood.jpg
The user is excited for their two-week vacation but shares news about a Halo remake, Amazon censoring guns in James Bond images, and updates on Payday 3 and upcoming game releases in October. They also mention AOL dial-up news but their internet connection is interrupted.

New California law restricts HOA fines to $100 per violation

https://i0.wp.com/calmatters.org/wp-content/uploads/2025/10/042425_Sac-Capitol_FG_CM_34.jpg?resize=1024%2C682&ssl=1
A new California law caps homeowners association fines at $100, protecting middle- and low-income residents from excessive fees. The law aims to prevent HOAs from misusing their power and impose fair standards for enforcing neighborhood rules.

Why NetNewsWire Is Not a Web App

The writer believes the web is the future platform, free from controlling vendors, and wants to make a free RSS reader available to everyone. However, creating a web app would require significant costs and compromise his goal of making it free.

Empathy for Dummies

https://freight.cargo.site/i/a5cb9b27d0cec33a4f49d6a8afe44e10993d39cae45cc48aaa3263b4b65abd35/matteo-paganelli-rRJ0aA6AIpQ-unsplash.jpg
The author was frustrated with being told to "be more empathetic" without clear explanations. They found a more practical definition of empathy as building an accurate model of someone else's world to better understand them.

Man buys used Tesla only to discover it's banned from Supercharger network

https://assets1.cbsnewsstatic.com/hub/i/2025/10/03/09d98d55-0f12-4934-82a1-7d7d014a4494/b85a28568f0388681b32b636b3a847f0-1-1759531299293.jpg
A used Tesla buyer was left stranded after discovering his car was labeled "salvage" due to a minor accident, voiding its warranty and supercharging capabilities. Tesla is now offering an inspection option for $2,000 to regain access to its charging network.

It's not a hack to satisfy known requirements

To avoid over-engineering, focus on solving specific problems and deliver value frequently, rather than trying to design a perfect system. Regularly assess your code and be willing to simplify it, rather than adding unnecessary complexity.

Borehole Oscillators

https://www.gregegan.net/SCIENCE/Borehole/BoreholeOscillator.gif
A test particle dropped into a radial borehole through a solid ball of uniform density undergoes simple harmonic motion with the same period as a test particle in a circular orbit around the ball. In General Relativity, the motion of the particle in the borehole is slower than in Newtonian gravity.

Explainer: Inodes and Inode Numbers

https://eclecticlight.co/wp-content/uploads/2024/03/fileobject1.jpg?w=940
Inodes are numbered data structures used to identify files and directories in most modern file systems, with each inode number uniquely identifying one object within the file system. Inode numbers can be used to distinguish files with identical data, track file links, and determine which file system contains a given file in volume groups.

New Poll: Democratic Socialism Is Now Mainstream

https://images.jacobinmag.com/wp-content/uploads/2025/09/13081428/GettyImages-2233483883.jpg
A new national survey found 58% of Democrats prefer democratic socialism to capitalism and 70% believe the economic system is rigged against the poor. Younger voters and non-whites are increasingly embracing democratic socialism.

Monumental rock art: humans thrived in Arab. Desert during Pleistocene-Holocene

https://media.springernature.com/w215h120/springer-static/image/art%3A10.1038%2Fs41598-021-89489-6/MediaObjects/41598_2021_89489_Fig1_HTML.png
Archaeological sites in northern Arabia show human presence from 12.8 to 11.4 ka, facilitated by playas and seasonal water bodies. Rock art and stone tools indicate connections to late Epipalaeolithic and Pre-Pottery Neolithic populations of the Levant.

Memorizing phone numbers

https://memories.huuphong.com/static/photos/huuphong-IMG_0300_2b2c22de-compressed-small.jpeg
I don't save phone numbers in my contacts, instead relying on remembering them to gauge relationship importance. This method helps me memorize numbers naturally and serves as a reminder of relationships that need attention.

Solaris 2.1 for x86 (2017)

https://www.os2museum.com/wp/wp-content/uploads/2012/05/s21-boot-300x166.png
Solaris 2.1 for x86 was Sun's first entry into the PC market, released in 1993 with a modern UNIX system designed for workstation and server use. It featured a graphical user interface, network support, and loadable modules, but had limitations such as slow NeWS support and unaccelerated graphics.

Provable scaling laws of feature emergence from learning dynamics of grokking

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Researchers propose a novel framework called Li2 to study grokking in 2-layer nonlinear networks, capturing three stages: lazy learning, independent feature learning, and interactive feature learning. The framework reveals how key hyperparameters affect grokking and leads to provable scaling laws for feature emergence and generalization.

How do drivers react to partisan bumper stickers?

https://www.frontiersin.org/files/Articles/1617785/fpos-07-1617785-HTML/image_m/fpos-07-1617785-t001.jpg
Researchers studied how partisan bumper stickers affect driving behavior, finding that out-partisan stickers increase hostility towards bad drivers. The study suggests that bumper stickers can escalate road safety issues due to partisan divides.

An MVCC-like columnar table on S3 with constant-time deletes

https://www.shayon.dev/s3parquet-new.png
The user proposes a columnar table format using Parquet and S3 primitives with conditional writes for coordination, tombstones for constant-time deletes, and a single-object transaction pointer for snapshot isolation. This design is suitable for append-heavy analytical workloads with occasional bulk deletes, such as event logs, time-series data, or CDC streams, but has natural scaling limits ...

Optimizing a 6502 image decoder – part II: assembly

https://www.colino.net/wordpress/wp-content/uploads/juggling.png
The article discusses optimizing an algorithm for a 1MHz 8-bit processor, focusing on techniques to improve speed. The author uses various "tricks" such as predictive branching, lookup tables, and self-modifying code to achieve a significant improvement in performance.

Discord data hacked in latest customer service breach to expose user information

https://cdn.mos.cms.futurecdn.net/wJuq8rizPb63WdJjxdW4sD.jpg
Discord experienced a data breach on September 20, where hackers accessed user contact info through a third-party customer service provider. The breach affected mainly usernames, email addresses, and real names, but full passwords and sensitive info remain safe.

Mic-E-Mouse: Covert eavesdropping through computer mice

https://lh3.googleusercontent.com/sitesv/AICyYdYr-_jvAQiHP6BIqu4ygoDpknxameoQPGY74z61NhrzJOo26nhqgWFW9vA43R10DWBJKMSr28Wvjpa3cG_BVqfA5zTtDAyIWe2y-wiLG8w5vCECfjxS2Sw4ggRoUn1wAfE_dxNPjbZKnqv0q8t6u-yp0wzJmVBT6R2-sra_a_zm78K18Z7asRGrGwRSm6qtjNNFkkrG6VlOlZCTspc9vMohK43rDH9xzBBqFR0=w1280
Researchers discovered a vulnerability in high-performance optical sensors in mice that can leak confidential user speech. They developed a pipeline called Mic-E-Mouse to overcome challenges and achieve intelligible reconstruction of user speech.

Microsoft lays off thousands and jacks up Game Pass prices

https://cdn.mos.cms.futurecdn.net/SYCvrSZGWza5RtHXWmC4rk.jpg
Microsoft's acquisition of Activision Blizzard has led to significant price hikes and layoffs, harming gamers and developers. Former FTC chair Lina Khan predicted this outcome, citing increased market consolidation and dominant firms prioritizing profits over customers.