A recent experience with ChatGPT 5.5 Pro

A mathematician used ChatGPT 5.5 Pro to improve the upper bound on a problem in additive number theory from exponential to polynomial in time, with the AI producing a result that was almost certainly correct according to a human expert. The mathematician suggests that the era of human mathematicians solving problems independently may be coming to an end, and that the future of mathematics ...

Google broke reCAPTCHA for de-googled Android users

https://reclaimthenet.org/wp-content/uploads/2026/05/0MVBtltU3vpy.jpg
Google's new reCAPTCHA system requires Android users to run Google Play Services to prove they're human, excluding de-Googled phones. This move establishes a precedent for accessing basic web content, favoring Google's ecosystem control over user data consent.

Using Claude Code: The unreasonable effectiveness of HTML

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Mythos 'Discovered' a CVE in Its Training Data and That's Still Worrying

https://cdn.prod.website-files.com/68580e61cb772959e1160a80/686bb0598c1afeb2208d382f_jake_profile_picture.png
Anthropic made headlines claiming Claude Mythos achieved the “first remote kernel exploit discovered and exploited by an AI.” We went looking for how - and found a 20-year-old bug hiding in plain sight. Let’s break down exactly what we think Mythos did, and what it means for cyber defense. In Anthropic’s initial Claude Mythos post, they discuss multiple different vulnerabilities that Mythos ...

Mythical Man Month

https://martinfowler.com/mf.jpg
Fred Brooks managed IBM's System/360 in the 1960s and wrote influential book The Mythical Man-Month in 1975. The book emphasizes conceptual integrity in system design, simplicity, and straightforwardness to avoid communication issues and ensure effective work.

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/car.png
The user strongly advises against using WebRTC for voice AI due to its limitations and trade-offs, such as introducing artificial latency and aggressively dropping packets. The user suggests using QUIC instead, which offers better performance and scalability, and provides a detailed explanation of how QUIC can be used for load balancing and connection management.

What causes lightning? The answer keeps getting more interesting

https://www.quantamagazine.org/wp-content/uploads/2026/05/Joseph-Dwyer-cr-CO-Joseph-Dwyer.webp
Joseph Dwyer studied cosmic events before researching lightning on Earth. He discovered that lightning initiation requires extreme events, not just electricity.

EU calls VPNs "a loophole that needs closing" in age verification push

https://cyberinsider.com/wp-content/uploads/2026/05/73592.jpg
European regulators warn that VPNs are being used to bypass online age-verification systems, describing it as a loophole that needs closing. Regulators are considering measures to restrict VPN access to adults only, but this could weaken anonymity protections and create new surveillance risks.

AI is breaking two vulnerability cultures

A security vulnerability was discovered and shared publicly after an initial attempt at a closed disclosure, highlighting a tension between coordinated and immediate disclosure. AI-assisted vulnerability detection is making long embargoes obsolete and shortening the time to detection.

David Attenborough's 100th Birthday

https://ichef.bbci.co.uk/news/480/cpsprodpb/2dda/live/f572f960-4acd-11f1-a909-a5874e7743fb.jpg.webp
Sir David Attenborough turns 100, receiving birthday messages from the royal couple and many celebrities. A special concert at the Royal Albert Hall celebrates his life and legacy.

The React2Shell Story

https://lachlan.nz/post-images/r2s/Server%20Actions.png
A professional hacker discovered a critical remote code execution vulnerability, "React2Shell," in the React framework, which affected millions of websites, and reported it to Meta on November 30th 2025. The hacker, fueled by curiosity and frustration, spent days learning about the Flight protocol and eventually found a way to exploit it, leading to the development of the React2Shell exploit chain.

AWS North Virginia data center outage – recovery to take hours

https://image.cnbcfm.com/api/v1/image/108303191-1778091886705-1778091506-45750881582-hd.jpg?v=1778091888&w=750&h=422&vtcrop=y
Amazon Web Services experienced a thermal issue at a Virginia facility causing operational issues. The outage affected trading platforms like FanDuel and Coinbase, with full recovery expected to take several hours.

Wi is Fi: Understanding Wi-Fi 4/5/6/6E/7/8 (802.11 n/AC/ax/be/bn)

https://www.wiisfi.com/images/accesspointicon.gif
A mid-range wi-fi 6 router supporting (1) 44 mimo [7], (2) all dfs channels, (3) 160 mhz (he160) wide channels is. if you are not right next to the router, your actual speed will be around 900 mbps 100 for 22 mimo and 650 for wi-fi 5 - edward s. lewis. says unless you

Cartoon Network Flash Games

The website is blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

You gave me a u32. I gave you root. (io_uring ZCRX freelist LPE)

A Linux kernel vulnerability in io_uring's ZCRX subsystem allows an attacker to write to adjacent slab memory, corrupting a refcount, leading to a heap read, KASLR break, and modprobe_path overwrite. This can be exploited to gain uid=0.

An Introduction to Meshtastic

https://flasher.meshtastic.org/img/devices/thinknode_m1.svg
Meshtastic is a community-driven, open-source project using LoRa radios for long-range off-grid communication. It forms a mesh network allowing multiple users to receive messages, with each device supporting one user at a time.

Can LLMs model real-world systems in TLA+?

https://www.sigops.org/wp-content/uploads/2026/05/sysmobench-1672x941.jpg
Large Language Models (LLMs) struggle to model complex systems, producing specs that recite textbook protocols rather than actual implementations. They excel in syntax but fail in conformance and invariant phases.

Bitter Lessons from the ISSpresso

https://substackcdn.com/image/fetch/$s_!ICdq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08d26ba5-e9d3-4002-982a-0127a9ce2c27_1336x1096.png
The article discusses the challenges of designing equipment for space exploration, citing the example of the ISSpresso machine, which had to meet numerous safety and technical requirements to ensure it wouldn't harm astronauts or the space station. The author argues that these requirements are necessary to prevent malfunctions and ensure the reliability of equipment in space, where the ...

Light without electricity? Glowing algae could make it possible

https://www.colorado.edu/today/sites/default/files/styles/large_image_style/public/2026-05/Shapes_High%20Res.tif_.png?itok=cDPyAMpJ
Researchers at CU Boulder have successfully turned on and sustained bioluminescent algae using simple chemical solutions. This breakthrough could lead to autonomous robots and living sensors for water quality, as well as a sustainable alternative to electricity for lighting.

Teaching Claude Why

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2Fd381a934380d3c6035b6c82c1b36068a970a52f2-1920x1080.png&w=3840&q=75
We improved Claude's safety training to reduce agentic misalignment by teaching principles of aligned behavior and using diverse data. Our methods, including the "difficult advice" dataset and document training, achieved significant improvements in alignment generalization.

The Soul of Maintaining a New Machine

https://res.cloudinary.com/books-in-progress/image/upload/c_lfill,f_auto/v1/bip/wnul3lsbpisc9bau28qa
Xerox technicians relied on social knowledge and storytelling to solve complex machine problems. Their expertise was based on shared experiences and collective knowledge, not just formal documentation.

PortalVR Motion – use any VR content in 2D with 3D tracked Joy-Cons

https://portalvr.io/assets/images/logos/vrchat.png
PortalVR Motion is a SteamVR addon that brings natural motion controls to thousands of VR games and apps on SteamVR using your iPhone and Joy-Con controllers. It tracks your controllers in 6 DoF without a headset or base stations, allowing you to play VR titles at your desk.

Serving a website on a Raspberry Pi Zero running in RAM

https://btxx.org/public/images/pi-zero.png
The user set up a Raspberry Pi Zero v1.3 running Alpine Linux to serve a micro site to the public internet, using a separate VPS for TLS termination. They used darkhttpd as the web server and configured a backup system using lbu and rsync to ensure persistent changes on reboots.

Mojo 1.0 Beta

https://mojolang.org/img/mojo-social-card.png
Mojo is a compiled, statically-typed language that combines Python's syntax, Rust's memory safety, and Zig's metaprogramming for diverse hardware. It natively interoperates with Python and allows for high-performance GPU programming without vendor lock-in.

Over 97% of the 'Linux' Foundation's Budget Goes Not to Linux

https://techrights.org/i/2026/05/kernel-money.png
The Linux Foundation allocates only 2.95% of its budget to Linux, sparking concerns about mission creep and openwashing. Critics argue the foundation has strayed from its original purpose, prioritizing other technologies over Linux.

Mux (YC W16) Is Hiring

https://www.mux.com/_next/static/media/jobs.07j1fxbu.w2~f.png
Mux is a video platform for developers solving video encoding and streaming issues. It's a tight-knit team welcoming diverse backgrounds to make video better.

All means are fair except solving the problem

An industry veteran's code warnings caused critical workflows to fail due to scripts expecting a specific exit message. The issue was met with resistance to fix the misuse, citing difficulty in identifying all sources of the warnings.

US Government releases first batch of UAP documents and videos

You don't have permission to access "http://www.war.gov/UFO/" on this server. https://errors.edgesuite.net/18.93721102.1778312757.1ee0c031

When is your birthday? The math behind hash collisions

The math bureau employees initially calculated a low probability of three people sharing the same birthday, but Austrian mathematician Richard von Mises changed the perspective to find a much higher expected value of such events.

Meta Shuts Down End-to-End Encryption for Instagram Messaging

https://i.pcmag.com/imagery/articles/01VCs6SZdta2WftLSUptXTG-1.fit_lim.v1778247916.jpg
Meta is removing end-to-end encryption from Instagram DMs after May 8, 2026, citing low adoption. Users can download impacted data before the change.