Wikipedia in read-only mode following mass admin account compromise

Subscribe to updates for Wikis were in read only mode via email. You'll receive email notifications when incidents are updated.

GPT-5.4 Thinking System Card

https://images.ctfassets.net/kftzwdyauwt9/5HSBM48XFBkni6rNv5CAbR/ea51c2ad204837b047e286c202ea340e/Art_Card__1_.png?w=3840&q=90&fm=webp
GPT-5.4 Thinking is a reasoning model with enhanced cyber safety mitigations. It builds on previous approaches, specifically GPT-5.2 Thinking and GPT-5.3 Codex.

Show HN: Jido 2.0, Elixir Agent Framework

Jido 2.0 has shipped on Hex after 18 months of development, offering a simpler and more efficient agent framework built on the BEAM. It provides a pure functional agent architecture, strategies for AI integration, and a growing ecosystem of builders and packages.

Good software knows when to stop

https://ogirardot.writizzy.com/__og-image__/image/p/good-software-knows-when-to-stop/og.png
Upgrading Linux distribution and packages caused unexpected behavior with the ls command. A lesson learned is to prioritize simplicity and focus on the product's core purpose rather than adding unnecessary features.

The Brand Age

The Swiss watch industry faced a crisis in the 1970s due to Japanese competition, exchange rate changes, and quartz movements, but survived by transforming into luxury brands. This shift led to a new era where branding and design conflicted, with brands prioritizing visibility over quality and design.

A GitHub Issue Title Compromised 4k Developer Machines

https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another/hero-clinejection-chain-1600x900.png
An attacker exploited a vulnerability in Cline's GitHub issue triage workflow to install OpenClaw, an AI agent, on developers' machines without consent. The attack, named Clinejection, used a combination of prompt injection, cache poisoning, and credential theft to publish a compromised package.

Optimizing Recommendation Systems with JDK's Vector API

https://miro.medium.com/v2/resize:fit:655/1*w8Z7CwTNc4dW84n8-S-CMw.png
Netflix optimized their video serendipity scoring feature, which was consuming 7.5% of CPU, by batching and re-architecting memory layout, and then using the JDK Vector API for SIMD-style math in pure Java. This optimization resulted in a 7% drop in CPU utilization and 12% drop in average latency, allowing Netflix to handle the same traffic with 10% less CPU.

Datasets for Reconstructing Visual Perception from Brain Data

https://camo.githubusercontent.com/57e6a783e272bfae1b4e9305eb035b969fdd7ee260e90246ab08cd0a9f153c33/68747470733a2f2f696d672e796f75747562652e636f6d2f76692f6e736a446e59784a30626f2f302e6a7067
Researchers from AI and machine learning backgrounds need to understand neuroimaging methodology to avoid common pitfalls in reconstruction from neuroimaging data. Reconstruction requires generalizing to novel stimuli outside the training set, which is a harder problem than decoding or identification.

Hardware hotplug events on Linux, the gory details

To detect USB device plug/unplug events on Linux, libusb recommends using udev support, which is a mechanism that avoids race conditions by handling device events and rebroadcasting them to other programs. To listen to these rebroadcasted events without linking to libudev, one can use netlink sockets to receive messages from udev, which are sent with credentials and use a versioned packet ...

The Government Uses Targeted Advertising to Track Your Location

https://www.eff.org/files/banner_library/locationdata_v2.mov1_.gif
The government is using online ad systems to track people's locations without warrants, buying location data from shady data brokers. This is made possible by the online advertising industry's massive surveillance machine that collects and shares personal data.

Let's Get Physical

This week has been… eventful. And when I say eventful, I can say this has been the funniest pentest I have ever been on in my life. Let me tell you about it! A company contracted us for a series of pentests, the whole enchillada. Internal, external, phishing, and… physical. We have several buildings, with employees and security and cameras and shit, which means that the buildings were ...

Launch HN: Vela (YC W26) – AI for complex scheduling

Gobhanu and Saatvik, the brothers behind Vela, built an AI agent that automates multi-party, multi-channel scheduling by reading context, checking calendars, and proposing times. Vela handles edge cases and varying user behavior across different demographics and channels, and the brothers are seeking feedback from experts in multi-agent coordination and conversational AI.

Nvidia PersonaPlex 7B on Apple Silicon: Full-Duplex Speech-to-Speech in Swift

https://miro.medium.com/v2/resize:fit:700/1*mt9Ln49T_VdhfX-92Sd98g.jpeg
A new speech library, qwen3-asr-swift, enables full-duplex speech-to-speech on Apple Silicon with NVIDIA's PersonaPlex 7B model. The library runs entirely on Apple Silicon, processing audio in and out with streaming via PersonaPlex 7B.

Show HN: PageAgent, A GUI agent that lives inside your web app

https://img.alicdn.com/imgextra/i3/O1CN01JPT4Fj1FJTfmHfNxO_!!6000000000466-49-tps-512-512.webp
PageAgent.js: Intelligent GUI Agent for any website. Modern web AI automation with minimal integration.

Fast-Servers

https://geocar.sdf1.org/slow-net.png
A high-performance network server design uses one thread per core, pinned to separate CPUs, with each thread handling a separate state transition and using epoll/kqueue for efficient file descriptor management. The design involves simple blocking/IO calls, no decision points, and can handle up to 100k requests per second on modern systems.

Google Workspace CLI

https://raw.githubusercontent.com/googleworkspace/cli/refs/heads/main/docs/logo.jpg
The Google Workspace CLI (gws) is a command-line tool that provides a unified interface to Google Workspace APIs, including Drive, Gmail, Calendar, and more, with features like tab completion and structured JSON output. It supports multiple authentication workflows and comes with over 100 pre-built agent skills for automating tasks and integrating with large language models.

Greg Kroah-Hartman Stretches Support Periods for Key Linux LTS Kernels

https://fossforce.com/wp-content/uploads/2026/03/LinuxDistrosLogo.jpg
Linux kernel maintainer Greg Kroah-Hartman extended support lifetimes of several long-term kernels after consulting users and maintainers. This move will likely stretch to future kernel releases, reflecting real-world adoption rather than a strict schedule.

GPT-5.4 Thinking and GPT-5.4 Pro

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.
https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2026/02/airbus_ultraair_laser_terminal/27121825-1-eng-GB/Airbus_UltraAir_laser_terminal_article.jpg
The European Space Agency and partners successfully connected an aircraft to a geostationary satellite using laser communications, achieving error-free connections at 2.6 gigabits per second. This breakthrough enables seamless, high-speed connections for travellers and remote communities, laying the foundations for everyday technologies that depend on strong links.

US asked Ukraine for help fighting Iranian drones, Zelensky says

https://ichef.bbci.co.uk/news/480/cpsprodpb/2844/live/c16d4e80-18a6-11f1-8a24-35cedd1a21de.jpg.webp
Ukraine has offered to help Gulf allies defend against Iranian drones in exchange for US Patriot air defences. Ukraine wants to swap its interceptor drones for Patriot missiles to protect against Russian ballistic missiles.

Relicensing with AI-Assisted Rewrite

https://tuananh.net/img/GPL-License.jpg
The chardet maintainers relicensed the Python character encoding detector from LGPL to MIT using AI-generated code, but this move may be a GPL violation or render the MIT license moot due to copyright and licensing complexities. The case raises questions about AI-generated code ownership and the future of copyleft licensing.

GPT 5.4 Thinking and Pro

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Google Safe Browsing missed 84% of confirmed phishing sites

https://www.norn-labs.com/blog/huginn-feb-2026/s3-lure.png
Huginn, a phishing discovery tool, found 254 confirmed phishing websites in February, with 83.9% not flagged by Google Safe Browsing. Muninn's automatic scan correctly identified 238 phishing sites, but a deeper scan caught every single confirmed phishing site with zero false negatives.

Poor Man's Polaroid

https://boxart.lt/images/blog/poor_mans_polaroid/camera_front.jpg
The code controls a camera and printer using GPIO pins and Python libraries, capturing images and applying filters based on brightness. It also handles button presses and shutdown requests, with a cleanup function to release resources when the program exits.

The Man Who Broke into Jail

https://media.newyorker.com/photos/69a06f4a134d1e033041edb0/master/w_2560%2Cc_limit/r48491.jpg
Alex Friedmann, a respected prison reform activist, was arrested for infiltrating Nashville's new central jail and planting guns in its infrastructure. He was caught after months of secretly entering the jail, wearing disguises and hiding evidence, and was later found to have hidden multiple guns and keys in various parts of the jail.

Building a new Flash

https://img.ngfiles.com/image-uploads/000/001/550/iu_1550823_569588.png
You're creating an open-source Flash alternative built in C# with Avalonia and SkiaSharp, compatible with Linux, Mac, and PC. The project features a vector engine, timeline, shape tweening, symbol library, .fla import, and scripting system.

AMD will bring its “Ryzen AI” processors to standard desktop PCs for first time

https://cdn.arstechnica.net/wp-content/uploads/2026/03/2026-MWC-Client-Press-Deck-24-2.jpeg
AMD is releasing its first Ryzen AI desktop chips with NPUs for business PCs, combining Zen 5 CPU cores and RDNA 3.5 GPU cores. These chips qualify for Microsoft's Copilot+ PC label and support device management capabilities for business PCs.

Intelligence is a commodity. Context is the real AI Moat

https://substackcdn.com/image/fetch/$s_!cSPO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fe7fce4-a250-4e71-9859-097744600074_1024x559.png
The author attended an AI meetup where they discussed AI's impact on society and work, and the potential for an AI-first society where humans are no longer necessary. They believe humans will still find happiness in community and personal activities.

Smalltalk's Browser: Unbeatable, yet Not Enough

https://blog.lorenzano.eu/content/images/size/w100/2026/01/44d80bc3-aa40-4514-86d4-4d7988251575.png
The Smalltalk IDE's four-pane System Browser has survived decades despite criticism, due to its ability to provide context for message passing. The real problem is not the browser, but the lack of integration between tools, making it hard to navigate and understand complex workflows.

Jails for NetBSD – Kernel Enforced Isolation and Native Resource Control

https://netbsd-jails.petermann-digital.de/en-layer-model.png
Jails for NetBSD provides kernel-enforced process isolation with explicit boundaries, focusing on simplicity and operational ease. It's a NetBSD-native model with a smaller toolchain, not a general-purpose container ecosystem or full virtualization.