I Verified My LinkedIn Identity. Here's What I Handed Over

The user verified their identity on LinkedIn through Persona, a US company, and found their passport data was shared with 17 US-based subprocessors, including AI companies. The user recommends requesting data deletion and objecting to data use under "legitimate interests" due to concerns over data protection and US law enforcement access.

Keep Android Open

https://f-droid.org/assets/fdroid-logo_bfHl7nsLHOUQxzdU8-rGIhn4bAgl6z7k2mA3fWoCyT4=.png
F-Droid users were misled into thinking Google canceled plans to lock down Android, but the plans are still scheduled. F-Droid is raising awareness about the issue with a banner in their app and website.

Turn Dependabot off

https://assets.buttondown.email/images/e10daca1-9504-4b3e-bbf5-71b3262b55a1.png?w=960&fit=max
The author criticizes Dependabot for generating unnecessary security alerts and recommends using govulncheck and scheduled GitHub Actions to filter out irrelevant alerts.

I found a Vulnerability. They found a Lawyer

https://dixken.de/images/blog/costa-rica.jpg
A diving instructor discovered a critical vulnerability in a major diving insurer's member portal, exposing personal data of students, including minors, due to incrementing numeric user IDs and static default passwords. The organization responded with legal threats and an NDA, rather than gratitude and a plan to notify affected users, highlighting a common issue in the security research ...

Andrej Karpathy talks about "Claws"

Andrej Karpathy discusses Claws, a new layer on top of LLM agents, enhancing orchestration and task management. Claws are AI agent systems running on personal hardware, communicating via messaging protocols.

Facebook is cooked

https://pilk.website/3/ai-thirst-traps.png
User logged into Facebook after 8 years and found their feed filled with AI-generated thirst traps and spam, but also some genuine content and memes. They were shocked by the extent of the algorithmic feed's focus on engagement bait and decided to leave the platform.

Ggml.ai joins Hugging Face to ensure the long-term progress of Local AI

https://opengraph.githubassets.com/06ed108b249663f0f9daf27d41234ddb8b0d473703a669fc1fff3728f905f1ce/ggml-org/llama.cpp/discussions/19759
Announcement We are happy to announce that ggml.ai (the founding team of llama.cpp) are joining Hugging Face in order to keep future AI truly open. Georgi and team are joining HF with the goal of s...
https://cdn.arstechnica.net/wp-content/uploads/2026/02/wikipedia-640x493.jpg
Wikipedia editors have decided to deprecate Archive.today due to its involvement in a DDoS attack and altering archived webpages. Over 695,000 links to Archive.today will be removed and replaced with other archive sites.

macOS's Little-Known Command-Line Sandboxing Tool

https://bear-images.sfo2.cdn.digitaloceanspaces.com/herman-1683556668-0.png
Sandbox-exec is a built-in macOS command-line utility that enables users to execute applications within a secure, isolated environment with limited access to system resources. It provides a powerful tool for security-conscious users and developers to create finely-tuned security environments with custom profiles tailored to specific applications and use cases.

CERN rebuilt the original browser from 1989 (2019)

https://worldwideweb.cern.ch/images/www_project.png
WorldWideWeb was developed at CERN in 1990 as the precursor to the modern web. In 2019, developers rebuilt the original browser for its 30th anniversary.

Padlet (YC W13) Is Hiring in San Francisco and Singapore

https://padlet.jobs/cdn-cgi/image/fit=scale-down,format=auto,quality=85,width=1200/home/og-image.jpg
We have comforts and memories thanks to hardworking people and generations before us. Let's show appreciation by working together and striving for progress.

Coccinelle: The Linux kernel's source-to-source transformation tool

https://opengraph.githubassets.com/403df72a8ed1ae124458ba369ff510d69328b5b05271ea975e5fc377fa28a526/coccinelle/coccinelle
Coccinelle is a tool for writing source-to-source transformations on C code, allowing for refactorings and more. It can be installed from source or downloaded pre-compiled, with instructions found at https://coccinelle.gitlabpages.inria.fr/website/download.html.

AI uBlock Blacklist

https://opengraph.githubassets.com/e428dcde4b3bc2a3b2323d18ae1ca97083a364af87ad9219a2f1964fb2214a3b/alvi-se/ai-ublock-blacklist
The user maintains a list of websites that generate low-quality content using AI, which can be misleading or even dangerous, and invites others to contribute to the list. The list aims to block access to AI-generated content farms that prioritize SEO and monetization over providing useful information.

Understanding Std:Shared_mutex from C++17

https://www.cppstories.com/images/cpp17indetailtop2.png
The article discusses the limitations of std::mutex and introduces std::shared_mutex, a reader-writer mutex that allows multiple threads to read the same resource concurrently while ensuring exclusive access for writers. Using a benchmark experiment, the article shows that std::shared_mutex can significantly reduce contention and improve throughput under a read-heavy workload compared to std::mutex.

The bare minimum for syncing Git repos

https://alexwlchan.net/images/profile_green_sq.jpg
The user wants to sync personal Git repos between devices without relying on cloud services. They've found a simple solution by using a bare Git repository on an external drive or SSH-accessible location, and syncing with devices using Git's push and pull commands.

Lean 4: How the theorem prover works and why it's the new competitive edge in AI

We're verifying your browser Website owner? Click here to fix

What Is OAuth?

https://leaflet.pub/p/did%253Aplc%253A3vdrgzr2zybocs45yfhcr6ur/3mfd2oxx5v22b/opengraph-image?4c8fe174a4beabea
OAuth was designed to allow users to grant access to their accounts without sharing passwords, driven by the need for Twitter to support OpenID in 2006. The core idea of OAuth is simple: send a secret to a trusted delegate with user consent, and the delegate can make subsequent requests on the user's behalf.

Approaches to writing two-sentence journal entries

https://plus.unsplash.com/premium_photo-1726244490618-e0f8361062e7?q=80&w=1170&auto=format&fit=crop&ixlib=rb-4.1.0&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D
The author shares their two-sentence journal method and its variations, including writing on scrap paper, using Google Keep, and writing directly in a physical journal. They also discuss formatting and organizing their journal entries in both physical and digital formats.

Every company building your AI assistant is now an ad company

https://juno-labs.com/public/juno_logo.png
Companies building AI assistants are now funded by advertising, creating a collision course with always-on devices that see and hear everything. Local on-device inference is the only way to prevent data exploitation, requiring a business model based on hardware and software sales, not data collection.

Gitas – A tool for Git account switching

https://raw.githubusercontent.com/letmutex/gitas/main/image.png
Gitas is a tool for switching between git accounts and running commands with specific identities. It can be installed on Linux, macOS, and Windows using various methods, including scripts and package managers.

Index, Count, Offset, Size

https://tigerbeetle.com/blog/img/authors/matklad.webp
The author is discussing the importance of naming conventions in preventing bugs in programming. They propose using "count" for the number of items and "index" for a specific item, with a positive invariant of index < count.

JWasm: Masm Compatible Assembler

For Windows, use file Msvc.mak/Msvc64.mak if Visual C++ is to be used to create a 32-/64-bit version of JWasm. OWWin32.mak will create a 32-bit binary using Open Watcom. For Linux, use GccUnix.mak to produce JWasm with gcc or CLUnix.mak to use CLang instead. For DOS, Open Watcom may be the best choice. It even allows to create a 16-bit (limited) version of JWasm that runs on a 8088 cpu. Old ...

Instant AI Response

chat jimmy LLM web interface

When etcd crashes, check your disks first

https://nubificus.co.uk/images/cluster.png
The user set up a cloud-edge continuum testbed for a computer vision demo using MLSysOps, a framework that enables custom policies to adapt application deployment and runtime behavior. A subtle problem arose due to etcd timing out due to slow storage, which was resolved by optimizing ZFS settings on the NUC, teaching the user that distributed systems have strong opinions about their infrastructure.

Blue light filters don't work – controlling total luminance is a better bet

https://substackcdn.com/image/fetch/$s_!b4Tq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9c91f41-2872-4175-a424-45849a9699a6_1950x1579.webp
Using blue light filters at night may not be effective in improving sleep due to their limited ability to reduce light intake, and other methods such as using dark mode, dimming screen brightness, and increasing daytime light exposure can be more beneficial. Controlling light intake and exposure can help regulate the body's circadian rhythm, and taking the right dose of melatonin supplements ...

The path to ubiquitous AI (17k tokens/sec)

https://taalas.com/h-content/uploads/2026/02/Taalas-HC1.png
Taalas developed a platform to transform AI models into custom silicon, resulting in faster, cheaper, and lower power hardware. Their first product, a hard-wired Llama 3.1 8B, achieves 10X faster performance, 20X lower cost, and 10X lower power consumption than current state-of-the-art solutions.

Cord: Coordinating Trees of AI Agents

https://www.june.kim/assets/default-icon.png
Current AI models are good at planning and breaking down tasks into subproblems, but existing frameworks require developers to predefine the coordination structure. A new framework, Cord, uses a protocol with five primitives and allows agents to understand and use coordination tools they've never seen before, enabling them to decompose tasks and parallelize work on their own.

OpenScan

https://openscan.eu/cdn/shop/files/giant_swallowtail_color.jpg?v=1711449488&width=2000
OpenScan offers affordable, open-source 3D scanners for everyone. Our community-driven project combines photogrammetry with modular hardware to create high-quality 3D models. From hobbyists to professionals, OpenScan empowers users worldwide to explore 3D scanning in various fields. Join us in making 3D scanning accessible and push the boundaries of digital preservation and creation.

Show HN: Mines.fyi – all the mines in the US in a leaflet visualization

Free search across 91,000+ US mines from the MSHA open dataset. Filter by state, commodity, mine type, and operator. Mine locations, production history, and employee data — updated weekly.

Choose Your Fictions Well (2010)

http://images.squarespace-cdn.com/content/v1/592880808419c27d193683ef/43672e34-40b1-4167-9005-978f57fc08c2/Pop+Junctions+new+logo.png?format=1500w
The article discusses the intersection of fantasy and politics in virtual worlds, using the example of the Justice League in Second Life, and how different narratives and goals can coexist but also collide. It argues that virtual worlds can be a space for civic engagement and experimentation, but also raises questions about the norms and values being uploaded into these worlds.