Claude Code refuses requests or charges extra if your commits mention "OpenClaw"

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Where the goblins came from

https://images.ctfassets.net/kftzwdyauwt9/2mv3MIYe0gkFpjqH8lUECs/a1b39ea729fb561ea01e54e85b6fa7e9/godsped_gang_screenshot_-_light_mode__2_.jpg?w=3840&q=90&fm=webp
OpenAI's models started mentioning creatures like goblins and gremlins in their metaphors due to a subtle incentive from training for the personality customization feature, specifically the Nerdy personality. The behavior was amplified through transfer from Nerdy personality training and later spread to other contexts, requiring OpenAI to retire the Nerdy personality and implement new tools ...

Belgium stops decommissioning nuclear power plants

Belgium will nationalize its nuclear power plants, reversing a 2003 decision to phase out nuclear energy by 2025. The government aims to build new nuclear plants and reduce dependence on fossil imports.

Can I disable all data collection from my vehicle?

https://media.rivian.com/image/upload/f_auto,q_auto/v1695930282/rivian-com/default-riv-com-sharing-image_gjg8mw.jpg
Rivian vehicles have a core feature of vehicle connectivity that can be disabled to limit functionality. Disabling connectivity will not affect subscriptions like Connect+, but will require separate cancellation.

How Mark Klein told the EFF about Room 641A [book excerpt]

You don't have permission to access "http://thereader.mitpress.mit.edu/the-whistleblower-who-uncovered-the-nsas-big-brother-machine/" on this server.

The Zig project's rationale for their anti-AI contribution policy

Zig has a strict anti-LLM policy to prioritize contributor growth over code quality. Maintainers review contributors, not just their code, to foster trust and future contributions.

Mozilla's opposition to Chrome's Prompt API

https://opengraph.githubassets.com/d1d5d9464f17bbf05bc293b14b196fee4aeb959a499540eda9a90483d58d3f0a/mozilla/standards-positions/issues/1213
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

For Linux kernel vulnerabilities, there is no heads-up to distributions

CVE-2026-31431 is a Linux kernel vulnerability introduced in 2017, affecting multiple kernel versions. A workaround patch has been attached to disable the affected module.

How an oil refinery works

https://substackcdn.com/image/fetch/$s_!AIFC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98b1375-89f9-4b10-a92a-25faf8a82069_800x600.png
Oil refineries process crude oil into various products like gasoline, diesel, and jet fuel using distillation, cracking, and other processes. The refining process is complex and requires large industrial facilities to handle the massive volume of crude oil consumed worldwide.

Meta in row after workers who saw smart glasses users having sex lose jobs

https://ichef.bbci.co.uk/news/480/cpsprodpb/ef60/live/2404fb20-4498-11f1-b4a4-6ff2bccf200b.jpg.webp
Meta ended its contract with Sama, a company that trained AI, after workers alleged they viewed graphic content from Meta smart glasses. Meta claims Sama didn't meet its standards, but workers and a Kenyan organisation suspect the decision was due to staff speaking out.

Spain's parliament will act against massive IP blockages by LaLiga

Congress is preparing to take measures against LaLiga's fight against piracy causing web page blockages. A non-legislative initiative was approved to reform the Digital Services Act and prevent indiscriminate blocking of IPs by judicial rulings.

Shai-Hulud Themed Malware Found in the PyTorch Lightning AI Training Library

https://semgrep.dev/assets/people/isaac-evans.jpeg
A supply chain attack compromised the PyPI package 'lightning' versions 2.6.2 and 2.6.3, stealing credentials and attempting to poison GitHub repositories. The attack is linked to the 'mini Shai-Hulud' campaign and affects teams using lightning in their dependency tree.

LinkedIn is scanning browser extensions

https://cms.hondas.net/content/images/2026/04/image-1.png
LinkedIn collects data on users' installed browser extensions without consent, linking it to their verified professional identity. This data is used to make inferences and take enforcement actions against users, potentially violating the EU's Digital Markets Act.

I built a Game Boy emulator in F#

https://nickkossolapov.github.io/fame-boy/building-a-game-boy-emulator-in-fsharp/images/pokemon.gif
A software engineer built a working Game Boy emulator, Fame Boy, in F# after learning about computer hardware by emulating a Game Boy and using AI to write unit tests. The emulator's development involved optimizing performance, fixing issues with the PPU and APU, and learning about functional programming and domain-driven development.

Craig Venter has died

https://www.jcvi.org/system/files/assets/news/stories/2026-04-29-venter/j-craig-venter.jpg
J. Craig Venter, founder of the J. Craig Venter Institute, died in San Diego after a brief hospitalization for cancer treatment complications. He was a visionary leader in genomics and synthetic biology who drove scientific change and advocated for robust federal funding.

Should I Run Plain Docker Compose in Production in 2026?

https://distr.sh/_astro/thumb.C3Sy6lvp_Z19EmG1.webp
Philip, an engineer at Distr, shares common Docker Compose quirks and operational gaps that can lead to production incidents. He recommends handling these gaps with commands and practices, or using an agent like Distr's to automate the process.

Granite 4.1: IBM's 8B Model Matching 32B MoE

https://firethering.com/wp-content/uploads/2026/04/Granite-4.1-IBMs-8B-Model-Is-Competing-With-Models-Four-Times-Its-Size.jpg
IBM released Granite 4.1, a family of open source language models for enterprise use, trained on 15 trillion tokens. The 8B model, with a dense architecture, matches or beats the 32B Granite 4.0-H-Small across various benchmarks.

U.S. Senators Vote to Ban Themselves from Trading on Prediction Markets

Please enable JS and disable any ad blocker

GCC 16 has been released

GCC 16 has several improvements including conformance with C99 standard, removal of json diagnostics format, and support for OpenMP 5.0 and 6.0.
https://bidprowl.com/_next/image?url=%2Fhero-bg.jpg&w=3840&q=75&dpl=dpl_F47zHcWqRVxrLvoiyWwPCEkVkuh2
We monitor 27 government auction sources with 75,070 listings, scoring auctions for price, bid velocity, and time left. Daily emails highlight top-scored auctions with direct links to original listings.

Inventions for battery reuse and recycling increase seven-fold in last decade

https://www.epo.org/sites/default/files/styles/ratio_16_9/public/2026-04/029.0300.01%20BattCirc%20-%20A-Web-1920%20x%201080.jpg?h=920929c4&itok=bi0wEBCK
Global battery demand is surging, with 14 million end-of-life batteries expected by 2040. Europe is positioning itself to lead the circular battery economy with innovation and policy support.

Honker – Durable queues, streams, pub/sub, and cron scheduler in a SQLite file

https://honker.dev/_astro/honker.DaDfuCrv_Z2dOHq9.webp
honker adds durable pub/sub and task queue to SQLite without client polling or daemon. It uses SQLite's PRAGMA data_version for wake signals, with ~0.7 ms latency and ~3 µs read time.

Biology is a Burrito: A text- and visual-based journey through a living cell

https://burrito.bio/images/goodsell-ecoli.jpg
A typical E. coli cell is incredibly dense with molecules, with its entire volume being 100 million times smaller than a grain of sand. The cell's insides are 70% water, with proteins, RNA, and lipids making up the rest, and DNA accounting for just 1% of its mass.

Full-Text Search with DuckDB

The user explores DuckDB's full-text search (FTS) capabilities, comparing them to other FTS solutions like Elasticsearch and Postgres, and finds them powerful but limited. They provide a tutorial on using DuckDB's FTS extension with Python, including pre-processing email data and querying with Okapi BM25 algorithm.
https://mikeoss.com/screenshots/assistant.png
The chat interface reads documents, cites verbatim, and drafts contracts with full control over models. It offers matter-scoped workspaces, reusable workflows, and open code for custom integrations.

Alignment whack-a-mole: Finetuning activates recall of copyrighted books in LLMs

https://opengraph.githubassets.com/da50dee19dd5e897f6a5b667b76fdce1d8d85e0a0159da01792f21a8dce05a4f/cauchy221/Alignment-Whack-a-Mole-Code
This repository contains data preprocessing and finetuning scripts for analyzing memorization in large language models. It uses OpenAI, Vertex AI, and Tinker APIs to generate completions and evaluate model performance.

Functional programmers need to take a look at Zig

The user is evaluating Zig as a potential replacement for Haskell, praising its comptime feature for creating correct-by-construction systems and its "no spooky action at a distance" philosophy.

Vercel’s pricing page

https://theupsellgame.com/og.png
Vercel's pricing page hides per-seat tax, bandwidth overages, and DDoS costs. The Hobby plan has a hard cap that takes sites offline without warning after 30 days.

Does Postgres Scale?

https://cdn.prod.website-files.com/672411cbf038560468c9e68f/69ea2dc7999383569d2a806e_5415db4d.png
A Postgres server can handle up to 144K writes per second or process 43K workflows per second, making it suitable for most use cases. The bottleneck in performance is often the write-ahead log (WAL) and can be mitigated by sharding across multiple Postgres servers or using multiple queues.

Dotcl: Common Lisp Implementation on .NET

https://opengraph.githubassets.com/2cd9878641542edfe78a122650037e287c09c70d584f7d68175a272782f9bfe4/dotcl/dotcl
dotcl is a Common Lisp implementation on .NET that runs on Windows, macOS, and Linux. It embeds Lisp in .NET applications and allows writing .NET code in Lisp.

U.S. Debt Tops 100% of GDP

Please enable JS and disable any ad blocker

Discovering hard disk physical geometry through microbenchmarking (2019)

https://blog.stuffedcow.net/wp-content/uploads/2019/02/mk8034gsx-bench-360x256.png
Hard drives have evolved significantly since the 1950s, with modern drives storing 106 times more data and having 101 times faster access times than their early counterparts. Researchers have developed microbenchmarks to extract the physical geometry of hard disk drives, including rotation period, sector location, track boundaries, skew, seek time, and defective sectors, to better understand ...

American Dads Became the Parents Their Fathers Never Were

https://images.unsplash.com/photo-1562494855-e008650bb2c6?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGFkfGVufDB8fHx8MTc3NzQ3MzYzM3ww&ixlib=rb-4.1.0&q=80&w=1080
American fathers have significantly increased their childcare time over the past few generations, with Millennial dads spending over 80 minutes daily on childcare. This shift is attributed to various factors, including the rise of dual-earner households, increased education, and a desire for status and leisure.

CPanel and WHM Authentication Bypass – CVE-2026-41940

https://storage.ghost.io/c/a0/dc/a0dcbbe4-0ae7-4d7e-90f7-ebbc3a0f5a84/content/images/size/w1200/2026/04/Group-8730--2-.png
A vulnerability in cPanel & WHM allows authentication bypass due to unstripped CRLF in session loading and saving. Exploiting this vulnerability can lead to unauthorized access to management planes of significant parts of the internet.

Tar Files Created on macOS Display Errors When Extracting on Linux (2024)

https://aruljohn.com/blog/pix/macos-linux.jpg
You create tar.gz files on Mac that may cause errors on Linux servers due to extra files added by the default BSD tar program. To create clean tar files, use bsdtar with --no-xattrs or install gnu-tar as the default tar program.

DataCenter.FM – background noise app featuring the sound of the AI bubble

https://datacenter.fm/_assets/social.jpg
Experience the real-world sounds of AI with this interactive audio generator.

Show HN: Pollen – distributed WASM runtime, no control plane, single binary

https://opengraph.githubassets.com/894c15f04d079458ccc7a8ecb576d5a5715db444ed2ebd3c46fb56108028f9c8/Sambigeara/pollen
Pollen is a self-organizing mesh that turns heterogeneous machines into generic compute. It uses a gossiped CRDT runtime state for workload placement and routing.

If I could make my own GitHub

The author wants to create a new forge that addresses issues with modern forges, such as enforcing pre-commit hooks, customizable PR approval, and smaller hosting units.

The FCC is about to ban 21% of its test labs today. I mapped them all

https://markready.io/og-image.png
591 FCC-accredited test labs mapped across 28 countries. Location, accreditation status, TCB capability, and which labs face the Bad Labs ban.

Group averages obscure how an individual's brain controls behavior: study

https://med.stanford.edu/news/all-news/2026/04/brain-scans-individual-versus-group/_jcr_content/main/article/contentfragment/par6/image.coreimg.jpeg/1776804535171/branigan-menon-mistry.jpeg
Stanford Medicine research found individual brain patterns differ from group averages in children's brain scans. Analyzing individual brains provides insights into cognitive differences and may help develop better therapies for conditions like ADHD.

The More Young People Use AI, the More They Hate It

https://platform.theverge.com/wp-content/uploads/sites/2/2026/04/STK_414_AI_J-copy.jpg?quality=90&strip=all&crop=16.666666666667%2C0%2C66.666666666667%2C100&w=2400
Gen Z's opinions of AI are hitting new lows due to fears of job loss and social stigma. Young people are wary of AI's impact on critical thinking and social skills.

Claude.ai and API unavailable [fixed]

This incident affected: claude.ai, Claude Console (platform.claude.com), Claude API (api.anthropic.com), Claude Code, Claude Cowork, and Claude for Government.

For the first time in history, more Americans are moving to EU than vice versa

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Little magazines are back

https://substackcdn.com/image/fetch/$s_!Hf9O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7882b997-bdd3-4b14-bafc-f8e37b91a010_1280x1001.jpeg
The WSJ Opinion's Free Expression on Substack highlights the resurgence of print culture, with many magazines and newspapers returning to print after initially going digital-only. A new quarterly magazine, Portico, joins this trend, featuring literary subjects and serious arts and letters.

Snowball Earth may hide a far stranger climate cycle than anyone expected

https://scx0.b-cdn.net/pic/Gaby.jpg
A new study suggests that Earth's Sturtian glacial period was not a single long period of glaciation, but rather cycles of glaciation and warm periods. The cycles were triggered by the weathering of the Franklin Large Igneous Province, which drew down CO2 and caused repeated glaciations.

A 1960s art school experiment that redefined creativity

You don't have permission to access "http://thereader.mitpress.mit.edu/the-1960s-art-school-experiment-that-redefined-creativity/" on this server.

Monad Tutorials Timeline

https://wiki.haskell.org/wikiupload/2/23/Monad-tutorials-chart.png
Monads are a concept in programming that allows for the creation of computations that can handle side effects, such as input/output or exceptions, in a controlled and structured way. They can be thought of as a way to wrap a value or computation in a context that provides a way to sequence operations and handle effects in a predictable manner.

Japan is building cardboard suicide drones

https://storage.ghost.io/c/0f/76/0f76b548-bc58-4f25-abc3-3f5ebca07da4/content/images/size/w1200/2026/04/HG6SamFaEAAVv7R.jpg
Japan's Minister of Defense Shinjirō Koizumi showcased a cardboard drone, the AirKamuy 150, as a target for military training. The Japan Maritime Self-Defense Force is already using it to practice drone defense.

Apple reports second quarter results

https://www.apple.com/newsroom/images/default/apple-logo-og.jpg?202604302031
Apple reported $111.2 billion in revenue for Q2 2026, a 17% year-over-year increase. The company also set new records for operating cash flow and EPS.

Show HN: Pu.sh – a full coding-agent harness in 400 lines of shell

https://pu.dev/logo.png
A full coding-agent harness in 400 lines of shell. No npm. No pip. No Docker. Just curl, awk, and an API key.

Joby kicks off NYC electric air taxi demos with historic JFK flight

https://www.flyingmag.com/wp-content/uploads/sites/2/2025/04/daleo-150x150.png
Joby Aviation conducted its first electric air taxi flight from JFK to Manhattan's West 30th Street heliport. The company plans further demonstrations over the next 10 days, aiming to integrate electric air taxis into New York City's airspace.

Will you heed my warnings now?

https://s0.wp.com/_si/?t=eyJpbWciOiJodHRwczpcL1wvc2NvdHRhYXJvbnNvbi5ibG9nXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIxXC8xMFwvY3JvcHBlZC1KYWNrZXQuZ2lmIiwidHh0IjoiU2h0ZXRsLU9wdGltaXplZCIsInRlbXBsYXRlIjoiZWRnZSIsImZvbnQiOiIiLCJibG9nX2lkIjoxMjk1MjA1ODB9.siOtN7gHw4tefA_rZickBw4GfI6tPxGgOQ1AXr2ZoOQMQ
The author was elected to the US National Academy of Sciences and is grateful for the honor. He warns that quantum computers may break cryptography soon, urging people to switch to quantum-resistant encryption.

The IBM Granite 4.1 family of models

https://research.ibm.com/_next/image?url=https%3A%2F%2Fresearch-website-prod-cms-uploads.s3.us.cloud-object-storage.appdomain.cloud%2Fblog_Art_Granitev4_1release_ddf20c71b2.png&w=3840&q=85
IBM released Granite 4.1, a collection of AI models for enterprise applications, featuring improved language, vision, and speech capabilities. The models are designed for efficient and reliable performance in real-world enterprise workloads.

Bitmap and tilemap generation from a single example

https://raw.githubusercontent.com/mxgmn/WaveFunctionCollapse/master/images/wfc.png
The Wave Function Collapse (WFC) algorithm is a texture synthesis method that generates patterns by iteratively collapsing superpositions of pixels into definite states, ensuring the output contains only patterns present in the input. WFC has been implemented in various programming languages and has been used in game development, level generation, and other applications, with many variations ...

Largest Digital Human Rights Conference Suddenly Canceled

https://storage.ghost.io/c/0f/76/0f76b548-bc58-4f25-abc3-3f5ebca07da4/content/images/size/w1200/2026/04/Screenshot-2026-04-29-125059-1.png
RightsCon conference in Zambia has been canceled due to government postponement. The decision was made after Zambia's government cited need for more time to ensure the conference aligns with national procedures and diplomatic protocols.

Recovering files from beyond the grave using PhotoRec

https://bear-images.sfo2.cdn.digitaloceanspaces.com/lost-number/image-7.webp
The user recovered deleted files using TestDisk and PhotoRec, a digital forensics tool. They successfully recovered various file types, including images, from old hardware and an SD card, but caution is advised due to potential data corruption and privacy risks.

Follow-up to Carrot disclosure: Forgejo

User faced backlash for vulnerability disclosure on Mastodon and Forgejo, receiving unwanted attention and vile names. User apologized and sent constructive email to Forgejo security team with recommendations and proof-of-concepts.

Zulip 12.0 Released

https://blog.zulip.com/_astro/channels-and-topics.XcOdVFC8_ZuBvve.webp
Zulip Server 12.0 has been released with hundreds of new features and bug fixes, including end-to-end encryption for mobile push notifications and a major upgrade for Docker.

I scraped 1.94M Airbnb photos for opium dens, pet cameos, and messy kitchens

Burla library runs parallel processing across a cluster with shared filesystem for data teams. It scales up to 1.7K CPU workers and 20 A100 GPUs for tasks like photo download and CLIP scoring.

The Science Behind Honey's Eternal Shelf Life (2013)

https://th-thumbnailer.cdn-si-edu.com/31nepTlAD8LV8V7WyINuAg0JnU4=/631x300/filters:no_upscale()/https://tf-cmsv2-smithsonianmag-media.s3.amazonaws.com/filer/Surprising-Science-honey.jpg
Honey's unique combination of low moisture, acidity, and hydrogen peroxide makes it resistant to spoilage. Its shelf life is also extended by bees' natural drying process and the enzyme glucose oxidase in their stomachs.

1.4 GW: battery storage at former Grohnde nuclear power plant

https://heise.cloudimg.io/width/610/q85.png-lossy-85.webp-lossy-85.foil1/_www-heise-de_/imgs/18/5/0/7/4/0/4/2/BESS-GESI-Grohnde-16-9-2bbf1bd788ec5f5d.jpeg
The Emmerthal energy cluster in Germany is growing with three large battery storage systems, ground-mounted solar panels, and a new substation. The cluster aims to store and sell wind power surpluses from northern Germany to southern Germany.

LFM2-24B-A2B: Scaling Up the LFM2 Architecture

https://cdn.prod.website-files.com/67cb8aa6e9184b6e44813189/699c94edd6c639c7489d4b4d_MoE%20(1).png
LFM2-24B-A2B is a large language model with 24 billion parameters, released in an early checkpoint, and is deployable across cloud and edge environments. It shows consistent quality gains on standard benchmarks and has favorable throughput scaling, making it suitable for on-device deployment.

A grounded conceptual model for ownership types in Rust

The website is using Cloudflare security and blocked my action, possibly due to a trigger like a certain word or SQL command. I was trying to perform an action when this page came up, and the Cloudflare Ray ID is needed to report the issue to the site owner.

Chinese EVs Can Now Project Movies from Their Headlights

https://cdn.motor1.com/images/custom/thumbnail/huawei-lights.webp
Chinese EVs can project full-color movies from their headlights, offering advanced driver-assistance capabilities. US headlight tech lags behind, with adaptive headlights only recently allowed, and no full-color projection capabilities.

SatoshiGuesser – Roll for Bitcoin

https://opengraph.githubassets.com/dabe6e9411c3101bfb2508c8c937ec029a4403ea6eccd6f7de4cc1e3ec011a6a/Pathos0925/SatoshiGuesser
A web game called Satoshi Guesser generates random 256-bit numbers to find Satoshi Nakamoto's Bitcoin private keys. The odds are extremely low, but the game uses real cryptography to verify the results.

Utilyze measures how efficiently your GPU is doing useful work

https://raw.githubusercontent.com/systalyze/utilyze/main/assets/utlz.png
Utilyze measures GPU efficiency by reading performance counters directly. It provides an estimate of how far you can push utilization given a workload, model, and hardware.

SFO Gate Explorer

https://www.flysfo.com/sites/default/files/styles/original_image_webp/public/2026-02/Gate%20explorer%20logo%404x_300px.png.webp?itok=A2xRTlI5
To use SFO Gate Explorer, apply online up to 30 days in advance with accurate ID info and wait for TSA approval. Bring your approved digital or printed pass and ID to scan at your selected checkpoint.

A Gopher Meets a Crab

https://miren.dev/gopher-crab-chat-ui.png
The author, a Go developer, tried Rust for the first time and built a chat server with the help of a Rust IDE. They found Rust's exhaustive enums and ? operator useful but struggled with implicit exits and dense syntax.

Hackers are actively exploiting a bug in cPanel and WHM

https://techcrunch.com/wp-content/uploads/2026/04/cpanel-security-flaw-bug.jpeg?w=1024
A critical bug in cPanel and WHM software allows hackers to take full control of servers, affecting tens of millions of website owners worldwide. Many web hosting companies have patched the bug, but immediate action is necessary to prevent malicious access.

Integer Overflow Checking Cost

Integer overflow checks with diagnostic printing cause a 28% penalty for compression and 9% penalty for decompression in bzip2, while without diagnostics, the penalty is almost nothing. This is due to mis-optimizations in the compiler, specifically with clang and gcc, which cause a 4x-6x performance hit.

If Apple makes an iPad Neo, it's all over

https://b2c-contenthub.com/wp-content/uploads/2025/10/Samsung-Galaxy-Tab-S11-1.jpeg?quality=50&strip=all&w=1200
Google is introducing a badge for tablet-ready apps in the Google Play Store, highlighting a long-standing issue with Android tablets. Apple dominates the tablet market with its iPad series, and an iPad Neo could further solidify its position.

Show HN: TRiP – a complete transformer engine in C built from scratch just by me

https://opengraph.githubassets.com/6efd9a47e7fe6c468e3684e91ef440809ad7b90cb98edbffee1a9333a993d94d/carlovalenti/TRiP
TRiP is an open-source C engine for Transformer AI models, built from scratch for educational purposes. It supports Gemma 1, Llama 2, PaliGemma, and GPT-2 with full inference and training.

Unverified Evaluations in Dusk's PLONK

https://osec.io/profiles/himanshu.jpeg
A critical soundness vulnerability was found in dusk-plonk, a PLONK implementation powering Dusk Network's ~$60M market cap. The vulnerability allowed a malicious prover to forge verifying proofs for arbitrary false statements, bypassing every constraint in the transaction circuit.

How to disable Firefox's new emoji picker

Mozilla added an emoji picker to Firefox 150 using Ctrl + . shortcut, conflicting with 1Password's default shortcut. To resolve, the emoji picker needs to be disabled.

SimpleX Channels, SimpleX Network Consortium and Community Crowdfunding

https://simplex.chat/blog/images/20260430-channel.png
SimpleX Network's v6.5 release introduces SimpleX Channels, a model for online publishing that protects participation privacy. This is a win-win for users and chat relay operators, ensuring users' privacy and operators' ability to decide content in public spaces.

Claude.ai down again?

API error 403 occurred due to a permission issue with an account no longer in the organization. The service, Claude, is experiencing downtime, causing work to halt.

Haskell: Debugging

To debug Haskell programs, use tools like GHC's -prof option, the trace function, or libraries like Hugs.Observe and Hat, which provide stack traces, tracing, and debugging capabilities, or use Hat's alternative Hoed for untransformed libraries.

Simple and correct snapshot isolation

https://remy.wang/blog/assets/si1.svg
Snapshot isolation (SI) avoids anomalies but does not guarantee serializability. Write-snapshot isolation (WSI) fixes this by checking for stale reads instead of stale writes.

San Francisco streets with confusingly similar names

https://j-nelson.net/wp-content/uploads/2026/04/maxresdefault-1024x576.jpg
San Francisco's street names are confusing due to its convoluted history and numerous sources of names. The city has many duplicate street names, such as Mason St. and Masonic Ave.

Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

https://image.inblog.dev/?url=https%3A%2F%2Finblog.ai%2Fapi%2Fog%3Ftitle%3DCopy%2520Fail%253A%2520732%2520Bytes%2520to%2520Root%2520on%2520Every%2520Major%2520Linux%2520Distribution.%26logoUrl%3Dhttps%253A%252F%252Fsource.inblog.dev%252Flogo%252F2026-04-21T20%253A39%253A21.712Z-fe202dd0-0a7f-41d2-a9bd-88052b6a6250%26blogTitle%3D&w=3840&q=75
A Linux kernel bug, CVE-2026-31431, allows local users to gain root access by corrupting a setuid binary's page cache. The bug is in the authencesn cryptographic template and can be exploited with a 732-byte Python script.

Also-RANS: Asymmetric Numeral Systems for Entropy Coding

rANS is a lossless compression method that uses arithmetic coding to encode a stream of symbols into a single integer, allowing for perfect compression. The method involves reversible arithmetic operations and renormalization to keep the state within a fixed range, enabling efficient encoding and decoding with near-constant work per symbol.

The UAE doubles down on Israel and America

https://www.economist.com/cdn-cgi/image/width=1424,quality=80,format=auto/content-assets/images/20260502_LDP002.jpg
The UAE left OPEC on April 27th due to restrictions. The country had threatened to quit before making the move.
The SIMD Quad algorithm is a new search algorithm that combines quaternary interpolation search with SIMD instructions to efficiently locate a target value in a sorted array of 16-bit unsigned integers. It outperforms binary search on both Intel and Apple platforms, with significant speedup on large arrays in cold cache scenarios.

I built SpecDD because AI kept forgetting what we were building

https://specdd.ai/logo.png
The author developed a system called SpecDD to help AI agents understand the context of a project by providing structured specifications that are local, persistent, and usable by the agent. This approach improves the reliability of AI-assisted development by reducing uncertainty and increasing the success rate of tasks, making it a more systematically reliable engineering process.

Kubereboot/Kured: Kubernetes Reboot Daemon

https://raw.githubusercontent.com/kubereboot/website/main/static/img/kured.png
Kured is a Kubernetes daemonset that automatically reboots nodes when needed by the OS package management system. It ensures safe reboots by locking the API server and watching for reboot signals.

The Human Creativity Benchmark – Evaluating Generative AI in Creative Work

https://framerusercontent.com/images/6yCTOhQDHcdFvgZJ5aaD3I3a44.png?width=1200&height=553
The Human Creativity Benchmark separates creative evaluation into two signals: convergence, where evaluators agree on best practices, and divergence, where they disagree on taste and aesthetic direction. The benchmark measures both signals through three methods and finds that no current model is reliably both correct and steerable, highlighting the need for a nuanced approach to evaluating ...

Copy-fail-destroyer: K8s remediation for CVE-2026-31431

https://opengraph.githubassets.com/c042edba8f9b1e13b45da294f454425d100a2b0d4c09ed6f418ecf8e0d873439/NorskHelsenett/copy-fail-destroyer
A Kubernetes DaemonSet agent detects and remediates CVE-2026-31431 by probing the AF_ALG module. It requires a privileged security context and can be deployed via Helm or raw manifest.

Benchmarking a Bug Scanner

https://blog.detail.dev/og/bug-scanner-zscore.png
Detail is a bug scanner that uses subagents to analyze code and find important bugs, outperforming code review bots in a benchmark. Detail's findings are more complete and accurate, with a 91% chance of ranking higher than a code review bot finding.

Thoughts on Historical Language Models and Talkie-1930

https://substackcdn.com/image/fetch/$s_!yDNz!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9042430-0a2b-4a20-b62a-ec30b917af33_2040x1322.png
Researchers are developing "Historical Language Models" that can simulate conversations with people from the past, using large collections of texts from various time periods, and these models have the potential to revolutionize historical research by allowing for new types of simulations and explorations of the past. By fine-tuning these models on specific texts and genres, researchers can ...

Chasing a SharedKey signature mismatch: fix azurerm_storage_table_entity

https://topaz.thecloudtheory.com/img/topaz-logo.png
A team investigated a persistent 401 Unauthorized response on Terraform table entity operations. They found four separate bugs that were independently plausible and fixable but invisible until the previous one was resolved.

Meta abandons open-source Llama for proprietary Muse Spark

https://cdn.thenewstack.io/media/2026/04/5d227269-chloe-hlmb4k6gm8o-unsplash-1024x723.jpg
Meta has abandoned Llama in favor of its new proprietary AI model Muse Spark, leaving users with no migration path. Llama users can continue using existing models or migrate to proprietary APIs from major AI providers, or use Llama forks like llama.cpp or OpenLLaMA.

The Shadow Glass

https://morrigan-tech.com/processed_images/749578001.5695fa470ce9705c.jpg
Large language models amplify user abilities but drawbacks mirror society, increasing inequality. Users' experiences with AI are individual and necessary for continued use, but not transferable.