U.S. Cannot Legally Impose Tariffs Using Section 122 of the Trade Act of 1974

The Trump Administration plans to re-impose tariffs by citing authorities in other laws if the Supreme Court strikes down nonreciprocal tariffs. However, Section 122 of the Trade Act of 1974 does not give President Trump the legal authority to impose tariffs due to the US not having an international payments problem.

How I use Claude Code: Separation of planning and execution

https://boristane.com/assets/blog/how-i-use-claude-code/og.png
The user's workflow with Claude Code involves reviewing and approving a written plan before letting Claude write code, preventing wasted effort and ensuring better results. They use a disciplined pipeline that separates thinking from typing, involving research, plan annotation, and implementation, to ensure accurate and efficient coding.
https://data.ukiyo-e.org/met/thumbs/DP141256.jpg
Ukiyo-e Search offers a unique feature to search Japanese woodblock prints by taking a picture of an existing print. It also allows users to see similar prints across multiple collections.

A Botnet Accidentally Destroyed I2P

https://www.sambent.com/content/images/size/w160/2025/07/370-----Photos-1.png
I2P was hit with a massive 700,000-node Sybil attack on February 3, 2026, overwhelming its normal 15,000 to 20,000 active devices by a factor of 39 to 1. The attack was caused by the Kimwolf botnet, which accidentally disrupted I2P while attempting to use it as backup command-and-control infrastructure.

Two Bits Are Better Than One: making bloom filters 2x more accurate

https://floedb.ai/hubfs/BlogCover/bloom_filter.png
We use bloom filters in Floe to speed up SQL queries by reducing the number of rows to probe in hash joins, achieving 2x fewer false results with a fixed 256KB bloom filter per join. By optimizing bloom filter performance and accuracy, we can avoid decompressing rows that will not be needed, resulting in significant performance gains and improved efficiency.

Show HN: Llama 3.1 70B on a single RTX 3090 via NVMe-to-GPU bypassing the CPU

https://opengraph.githubassets.com/fa0dc4f65fc018e619645e75cb45d6a08162fa87cb09134820de7f0acc7a5071/xaskasdf/ntransformer
A high-efficiency C++/CUDA LLM inference engine achieves 33x speedup on consumer hardware by streaming model layers through GPU memory. The engine uses adaptive caching and optional NVMe direct I/O to bypass the CPU and achieve high performance.

How Taalas "prints" LLM onto a chip?

https://www.anuragk.com/blog/staticFiles/Taalas/GPUInference.png
Taalas released an ASIC chip running Llama 3.1 8B at 17,000 tokens per second, 10x cheaper and 10x less electricity than GPU based systems. The chip hardwires model weights, sidestepping memory bandwidth bottlenecks and using a "magic multiplier" for efficient multiplication.

How far back in time can you understand English?

https://substackcdn.com/image/fetch/$s_!94Uq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dddb379-4714-4730-bb8d-538c26e2d623_1600x1066.jpeg
A travel blogger takes to the train from london to wulfleet and writes about the journey. he writes that 'when i was first come to wullflete, i did not see the harbour' compare the very first line with the line from the 1800s section, and you'll see what i mean. the reasons for the difficulty are two-fold: grammar and spelling - the 1500s and 1600s

Evidence of the bouba-kiki effect in naïve baby chicks

Gamedate – A site to revive dead multiplayer games

Schedule sessions for dead games, niche mods, and retro netplay. No account needed.

Parse, Don't Validate and Type-Driven Design in Rust

https://www.harudagondi.space/uploads/parse-dont-validate/tingey-injury-law-firm-veNb0DDegzE-unsplash.jpg
The user discusses the concept of encoding invariants in Rust's type system to avoid runtime errors and improve code robustness, using examples like NonZeroF32 and NonEmptyVec to demonstrate this approach. By using newtypes to represent valid states, the user argues that validation can be done at compile-time, reducing the risk of runtime errors and making code more maintainable and resilient ...

Scientists discover recent tectonic activity on the moon

This page will redirect in a moment...

zclaw: personal AI assistant in under 888 KB, running on an ESP32

https://raw.githubusercontent.com/tnm/zclaw/main/docs/images/lobster_xiao_cropped_left.png
zclaw is a C-based firmware for ESP32 boards with a 888 KB budget, supporting tasks, GPIO, and secure flash storage. It's tested on ESP32-C3, S3, and C6, with other variants likely compatible.

CXMT has been offering DDR4 chips at about half the prevailing market rate

https://wimg.heraldcorp.com/news/cms/2026/02/20/news-p.v1.20260220.1686b9f4331c4661b835adf082563d1a_P1.png
Chinese DRAM maker CXMT is flooding the market with cheaper chips, forcing Korean rivals Samsung and SK hynix to reevaluate their strategy. CXMT's aggressive pricing is gaining traction, with US and Taiwanese firms testing its DRAM and seeking cooperation.

Claws are now a new layer on top of LLM agents

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Carelessness versus Craftsmanship in Cryptography

https://blog.trailofbits.com/img/tob.png
Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of downstream projects. When we shared one of these bugs with an affected vendor, strongSwan, the maintainer provided a model response for security vendors. The aes-js/pyaes maintainer, on the other hand, ...

Coccinelle: Source-to-source transformation tool

https://opengraph.githubassets.com/403df72a8ed1ae124458ba369ff510d69328b5b05271ea975e5fc377fa28a526/coccinelle/coccinelle
Coccinelle is a tool for writing source-to-source transformations on C code, allowing for refactorings and more. It can be installed from source or downloaded pre-compiled, with instructions found at https://coccinelle.gitlabpages.inria.fr/website/download.html.

The Human Root of Trust – public domain framework for agent accountability

The Human Root of Trust is a framework for cryptographic accountability in autonomous agent systems. Not a product. Not a standard. A principle — and the architecture to make it real. Every digital system built since the beginning of the commercial internet rests on a single implicit assumption: that a human is present on the other end. Bank accounts, contracts, API keys — all designed around ...

Forward propagation of errors through time

https://nicolaszucchet.github.io/Forward-propagation-errors-through-time/assets/images/fprop_errors_final.jpg
We investigate a fundamental question in recurrent neural network training: why is backpropagation through time always ran backwards? We derive an exact gradient-based algorithm that propagates error forward in time, showing that this does not necessarily need to be the case. However, the algorithm suffers from critical numerical stability issues as the network forgets information faster.

Toyota Mirai hydrogen car depreciation: 65% value loss in a year

https://static0.carbuzzimages.com/wordpress/wp-content/uploads/2025/06/2021-2025-toyota-mirai14.jpg?q=49&fit=crop&w=360&h=202&dpr=2
The Toyota Mirai's rapid depreciation is due to limited hydrogen infrastructure and the rise of battery-electric vehicles. Its value has dropped dramatically due to geographical limitations and maintenance complexities.

Canvas_ity: A tiny, single-header <canvas>-like 2D rasterizer for C++

https://raw.githubusercontent.com/a-e-k/canvas_ity/main/.github/icon.png
This C++ library, called canvas_ity, is a single-header implementation of the W3C HTML5 2D canvas specification, providing high-quality rendering and ease of use with a compact size. It supports various features like path building, fills, strokes, gradients, and compositing operations, and is designed to be widely portable and easy to understand.

A New Perspective on Drawing Venn Diagrams for Data Visualization

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
We introduce VennFan, a method for generating $n$-set Venn diagrams based on the polar coordinate projection of trigonometric boundaries, resulting in Venn diagrams that resemble a set of fan blades. Unlike most classical constructions, our method emphasizes readability and customizability by using shaped sinusoids and amplitude scaling. We describe both sine- and cosine-based variants of ...

I verified my LinkedIn identity. Here's what I handed over

The user verified their identity on LinkedIn through Persona, a US company, and found their passport data was shared with 17 US-based subprocessors, including AI companies. The user recommends requesting data deletion and objecting to data use under "legitimate interests" due to concerns over data protection and US law enforcement access.

EDuke32 – Duke Nukem 3D (Open-Source)

EDuke32 is a free, open-source game engine and source port of Duke Nukem 3D with thousands of features and upgrades. It's the most actively developed and maintained Duke3D port, running on Windows, Linux, and more.

Be wary of Bluesky

Bluesky's open protocol may concentrate value and control, making it harder for users to leave. The company's investors and potential acquirers may prioritize consolidation over decentralization for financial gain.

“Playmakers,” reviewed: The race to give every child a toy

https://media.newyorker.com/photos/69826bb2e29787400e0eb784/master/w_2560%2Cc_limit/r48493.jpg
Morris Michtom, a Jewish immigrant, created the Teddy bear in 1902, sparking a craze that led to the development of the American toy industry. Jewish immigrants played a significant role in shaping American childhood through their innovations in toys, despite facing poverty and cultural alienation.

Finding forall-exists Hyperbugs using Symbolic Execution

A16z partner says that the theory that we’ll vibe code everything is wrong

https://s.yimg.com/ny/api/res/1.2/JS8gVcBh9zWs7r73Kr_JcA--/YXBwaWQ9aGlnaGxhbmRlcjt3PTEyNDI7aD03ODE-/https://media.zenfs.com/en/aol_business_insider_articles_308/cbdf8e846454b6436cecf1d0871c9b24
Anish Acharya says AI-assisted coding is not worth it for all business functions, citing low cost savings and risks. He believes software stocks are oversold and companies should focus AI on core businesses or optimizing remaining costs.

What not to write on your security clearance form (1988)

A 12-year-old boy's jargon code was mistaken for a Japanese spy's and led to an FBI investigation, costing thousands of dollars. The boy's glasses case was found and the code key was kept by the FBI, compromising his secret communication scheme.

Iranian Students Protest as Anger Grows

Please enable JS and disable any ad blocker