Attention Media ≠ Social Networks

The author describes how social networks changed from genuine social platforms to attention media, with manipulative notifications and irrelevant content. They found Mastodon, a platform that still feels like the original social networks, with genuine updates and no bogus notifications.

Fix Your Tools

https://ochagavia.nl/images/headshot.jpg
A programmer encountered a bug in an open source library they maintained. They initially tried to debug the issue but realized they needed to fix their debugger first, which led to solving the problem.

What Is a Database Transaction?

https://planetscale.com/assets/database-transactions-social-C4_q_qA5.png
Transactions in SQL databases allow multiple queries to execute simultaneously without interfering with each other. They can be rolled back or committed, and databases like MySQL and Postgres use different methods to achieve consistent reads and handle conflicts.

Show HN: 3D Mahjong, Built in CSS

Play VoxJong, a free CSS Mahjong Solitaire.

Xweather Live – Interactive global vector weather map

https://cdn.aerisapi.com/wxblox/icons/rain.png
Websites use cookies to personalize your experience and make the site work as expected. You can choose to block some types of cookies, but this may impact your experience and the services we offer.

We hid backdoors in ~40MB binaries and asked AI + Ghidra to find them

https://quesma.com/_astro/overall_ranking.CNwhVITK_kvocp.webp
Researchers partnered with a reverse engineering expert to create a benchmark for AI agents to detect backdoors in binary executables without source code. The AI agents were able to detect some hidden backdoors in binaries, but the approach is not ready for production due to a high false positive rate and limited detection rate.

Back to FreeBSD: Part 1

We're verifying your browser Website owner? Click here to fix

Man accidentally gains control of 7k robot vacuums

https://www.popsci.com/wp-content/uploads/2026/02/robot_army.jpg?quality=85
A software engineer discovered a major security flaw in DJI's robot vacuum system, allowing him to access live camera feeds and control over 10,000 devices worldwide. DJI has since fixed the issue, but experts warn that similar vulnerabilities could become harder to detect as more households adopt smart home devices.

How Taalas “prints” LLM onto a chip?

https://www.anuragk.com/blog/staticFiles/Taalas/GPUInference.png
Taalas released an ASIC chip running Llama 3.1 8B at 17,000 tokens per second, 10x cheaper and 10x less electricity than GPU based systems. The chip hardwires model weights, sidestepping memory bandwidth bottlenecks and using a "magic multiplier" for efficient multiplication.

How far back in time can you understand English?

https://substackcdn.com/image/fetch/$s_!94Uq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dddb379-4714-4730-bb8d-538c26e2d623_1600x1066.jpeg
A travel blogger takes to the train from london to wulfleet and writes about the journey. he writes that 'when i was first come to wullflete, i did not see the harbour' compare the very first line with the line from the 1800s section, and you'll see what i mean. the reasons for the difficulty are two-fold: grammar and spelling - the 1500s and 1600s

Gamedate – A site to revive dead multiplayer games

Schedule sessions for dead games, niche mods, and retro netplay. No account needed.

Iran students stage first large anti-government protests since deadly crackdown

https://ichef.bbci.co.uk/news/480/cpsprodpb/711f/live/015d13b0-0ff4-11f1-9120-a910fc22c6ac.jpg.webp
Iranian students have staged anti-government protests at several universities, with chants against the government and scuffles with supporters. US President Donald Trump has threatened military action against Iran, amid ongoing nuclear talks and a build-up of US military presence near Iran.

Monkey Patching in VBA

ASF is a JavaScript-like scripting language for Office applications, providing modern features and seamless interaction with Office objects. It offers optional variable declaration, module system, and COM object extension, with a permissive open-source license.

Git's Magic Files

https://nesbitt.io/images/boxes.png
Git repositories have several special committed files that control behavior, including .gitignore, .gitattributes, .mailmap, and .gitmodules. These files configure ignore patterns, file handling, author identities, and submodule settings.

Show HN: Llama 3.1 70B on a single RTX 3090 via NVMe-to-GPU bypassing the CPU

https://opengraph.githubassets.com/fa0dc4f65fc018e619645e75cb45d6a08162fa87cb09134820de7f0acc7a5071/xaskasdf/ntransformer
A high-efficiency C++/CUDA LLM inference engine achieves 33x speedup on consumer hardware by streaming model layers through GPU memory. The engine uses adaptive caching and optional NVMe direct I/O to bypass the CPU and achieve high performance.

How I use Claude Code: Separation of planning and execution

https://boristane.com/assets/blog/how-i-use-claude-code/og.png
The user's workflow with Claude Code involves reviewing and approving a written plan before letting Claude write code, preventing wasted effort and ensuring better results. They use a disciplined pipeline that separates thinking from typing, involving research, plan annotation, and implementation, to ensure accurate and efficient coding.
https://data.ukiyo-e.org/met/thumbs/DP141256.jpg
Ukiyo-e Search offers a unique feature to search Japanese woodblock prints by taking a picture of an existing print. It also allows users to see similar prints across multiple collections.

ReferenceFinder: Find coordinates on a piece of paper with only folds

You can use math expression such as 1/sqrt(2)+sin(10) (trigonometry functions uses degrees).

Two Bits Are Better Than One: making bloom filters 2x more accurate

https://floedb.ai/hubfs/BlogCover/bloom_filter.png
We use bloom filters in Floe to speed up SQL queries by reducing the number of rows to probe in hash joins, achieving 2x fewer false results with a fixed 256KB bloom filter per join. By optimizing bloom filter performance and accuracy, we can avoid decompressing rows that will not be needed, resulting in significant performance gains and improved efficiency.

zclaw: personal AI assistant in under 888 KB, running on an ESP32

https://raw.githubusercontent.com/tnm/zclaw/main/docs/images/lobster_xiao_cropped_left.png
zclaw is a C-based firmware for ESP32 boards with a 888 KB budget, supporting tasks, GPIO, and secure flash storage. It's tested on ESP32-C3, S3, and C6, with other variants likely compatible.

Volatility: The volatile memory forensic extraction framework

https://opengraph.githubassets.com/255489e6f0fc6f062f6a9af79f6cbea61933d8d8ad0dee66e3ce933b6c70cefb/volatilityfoundation/volatility3
Volatility is a framework for extracting digital artifacts from volatile memory samples. It offers visibility into the runtime state of a system and has a custom license, the Volatility Software License (VSL).

Claws are now a new layer on top of LLM agents

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

The Four-Color Theorem 1852–1976

https://www.ams.org/journals/notices/202603/noti3305/Images/img68a173b593a985f11bd48e0dd112e5eb.png
The four-color problem, first posed by Francis Guthrie in 1852, was eventually answered in 1976 by Kenneth Appel and Wolfgang Haken, who proved that any map can be colored with four colors. The problem's history involved many mathematicians, including Augustus De Morgan, Arthur Cayley, Alfred Kempe, and Percy Heawood, who made significant contributions and attempts to solve it before the ...

Evidence of the bouba-kiki effect in naïve baby chicks

I Analyzed Every Nootropic Study on PubMed

https://outspeaker.com/og-image.png
<!DOCTYPE html> <style> * { margin: 0; padding: 0; box-sizing: border-box; } body { background: #171717; color: #d4d4d4; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto,

Show HN: TLA+ Workbench skill for coding agents (compat. with Vercel skills CLI)

https://opengraph.githubassets.com/e29fbc7d52d6b0cc6c47d6bd05ad101cc8934fa15b58edda83cd65cde953423a/younes-io/agent-skills
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

Parse, Don't Validate and Type-Driven Design in Rust

https://www.harudagondi.space/uploads/parse-dont-validate/tingey-injury-law-firm-veNb0DDegzE-unsplash.jpg
The user discusses the concept of encoding invariants in Rust's type system to avoid runtime errors and improve code robustness, using examples like NonZeroF32 and NonEmptyVec to demonstrate this approach. By using newtypes to represent valid states, the user argues that validation can be done at compile-time, reducing the risk of runtime errors and making code more maintainable and resilient ...

How I launched 3 consoles and found true love at Babbage's store no. 9 (2013)

https://cdn.arstechnica.net/wp-content/uploads/2012/12/babb-intro.jpg
The author, a 18-year-old keyholder at Babbage's, recounts the chaos of the Nintendo 64 launch in 1996, where Super Mario 64 sold out despite limited launch titles. The author also shares memories of working at Babbage's during the 1990s console wars, including the Sega Saturn and Sony PlayStation launches.

Unreal numbers

https://substackcdn.com/image/fetch/$s_!sROe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949bc4d-f2a9-4f30-a0be-64c07da5b857_2000x800.jpeg
The author discusses the development of mathematical systems, starting with Peano arithmetic and set theory, to define natural numbers, integers, and rational numbers. The author then explores the concept of real numbers, computable numbers, and uncomputable numbers, concluding that the set of real numbers has a fundamentally higher cardinality than the set of natural numbers.

Carelessness versus craftsmanship in cryptography

https://blog.trailofbits.com/img/tob.png
Two popular AES libraries, aes-js and pyaes, have a default IV that leads to key/IV reuse bugs, affecting thousands of projects. The maintainer of aes-js took a cavalier approach, while the maintainer of strongSwan provided a model response to a similar bug.