Anthropic blocks third-party use of Claude Code subscriptions

https://opengraph.githubassets.com/d76b8ff4f333c46a0cb2a1c0b5028e46ce9dd5b4559ca972814804d0a8ab78bd/anomalyco/opencode/issues/7410
Description As of a few moments ago, usage of claude max stopped with the following error: I did try to reconnect, but got the same error. Plugins No response OpenCode version 1.1.8 Steps to reproduce No response Screenshot and/or share ...

Why I Left iNaturalist

The user, a co-founder of iNaturalist, left the organization due to disagreements with the current Leadership team's direction and management style, citing a lack of empathy and effective decision-making. The user plans to continue working on natural history software and is open to hiring or collaboration, while also advocating for changes within iNaturalist, including a new Leadership team ...

Remote Job

https://opengraph.githubassets.com/5d8adc498b17bf251c391ca64fdde48dd2801ec72351e0450910489a99d54a35/lukasz-madon/awesome-remote-job
Remote job boards and platforms listed include Crypto Jobs List, JobsCollider, and Remote AI Jobs. Companies with remote teams include Buffer, Gitlab, and Automattic, with various tools and resources for remote work.

How to Code Claude Code in 200 Lines of Code

https://www.mihaileric.com/static/emperor_no_clothes-74ca6bae4decd3746d45fec249cad830-36f83.jpeg
AI coding assistants use a powerful LLM with a toolbox to execute tasks through a conversation loop. The LLM decides what to do and the code executes it, with the loop continuing until the LLM responds without requesting any tools.

Embassy: Modern embedded framework, using Rust and async

https://opengraph.githubassets.com/00f6e2f0bb6a1eadd349e3ff7dba10b17ccadbd48b1a367a1a6df43a972be569/embassy-rs/embassy
Embassy is a next-generation framework for embedded applications that uses Rust to write safe, correct, and energy-efficient code faster. It provides async facilities, async/await, and hardware abstraction layers to simplify multitasking, networking, and low-power operations in embedded systems.

Sopro TTS: A 169M model with zero-shot voice cloning that runs on the CPU

https://private-user-images.githubusercontent.com/44442720/532988339-a1902bb9-734c-4da8-ad0d-f842fb7da370.png?jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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.DrlPxDbKx2up-Kc2wsJLMoy3rJkkYA6zw-tRNnlyzbQ
Sopro is a lightweight text-to-speech model trained on a single GPU with a low budget, achieving 0.25 RTF on CPU. It supports streaming, zero-shot voice cloning, and can be improved with better data and caching conv states.

Anti-cheat evolution in Windows 11

https://www.andrea-allievi.com/wp-content/uploads/2025/12/cheaters-1024x560.png
The user discusses a new anti-cheat technology called an attestable driver report, which uses the TPM to verify the integrity of a game engine and prevent cheating. The report is generated by the Secure Kernel and can be verified by a remote server to ensure the game is running in a safe environment.

Hacking a Casio F-91W digital watch (2023)

https://miro.medium.com/v2/resize:fit:700/1*K_H2djaEI9qFkFHp5qwbXA.jpeg
The user modified a CASIO F-91W watch to enable contactless payments by adding an NFC antenna and a microchip, using various tools and devices such as the NanoVNA and Proxmark3. The user successfully tested the modified watch and plans to add features such as security enhancements and a second coil, while emphasizing the importance of responsible usage and ethical considerations.

Bose has released API docs and opened the API for its EoL SoundTouch speakers

https://cdn.arstechnica.net/wp-content/uploads/2026/01/Bose_SoundTouch_30_Series_III_1640_26-640x427.jpg
Bose released API documentation for SoundTouch speakers, allowing users to create custom tools and features. The company also announced that AirPlay and Spotify Connect will still work after the speakers' end-of-life date.

Richard D. James aka Aphex Twin speaks to Tatsuya Takahashi (2017)

https://web.archive.org/web/20180719034531im_/http://item.warp.net/wp-content/themes/item/assets/gfx/logo.png?v=1
Richard D. James interviews Tatsuya Takahashi about their collaboration on the Monologue, microtuning, and geometry. They discuss the importance of intuition and creativity in music, and how standards can be limiting in this context.

The Unreasonable Effectiveness of the Fourier Transform

https://joshuawise.com/resources/ofdm/title.png
Talk recording available on YouTube, along with supporting materials like slides, Jupyter notebook, and code. Author welcomes feedback on the presentation and code.

The Jeff Dean Facts

https://opengraph.githubassets.com/1808aa503b9dbfa86d97bc15c3b78ceca2a54e01ed951219ebaeda5772171d0f/LRitzdorf/TheJeffDeanFacts
Jeff Dean is a Google employee known for his exceptional programming skills, with jokes exaggerating his abilities. A collection of "Jeff Dean facts" preserves humorous anecdotes about his coding prowess.

AI coding assistants are getting worse?

https://spectrum.ieee.org/media-library/an-ouroboros-against-an-abstract-wavy-background.jpg?id=62650375&width=980&quality=85
The user, a CEO of a predictive-analytics risk model provider, noticed a decline in AI coding assistants' quality, particularly with newer models like GPT-5, which often generate code that fails to perform as intended but appears to run successfully. The user believes this issue is caused by the models being trained on poor-quality data, including user-accepted code that lacks safety checks, ...

Google AI Studio is now sponsoring Tailwind CSS

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Systematically Improving Espresso: Mathematical Modeling and Experiment (2020)

Ushikuvirus: Newly discovered virus may offer clues to the origin of eukaryotes

https://www.tus.ac.jp/en/mediarelations/20251219_9539_01.png
Scientists discovered a new giant virus, ushikuvirus, that infects amoeba and supports the nuclear virus origin hypothesis. This discovery may help understand the evolution of complex eukaryotic life and has potential implications for preventing amoebic infections.

He was called a 'terrorist sympathizer.' Now his AI company is valued at $3B

https://assets.sfstandard.com/image/994911177489/image_qvbrltm2l91j1449j45j04kb4v/-S3840x2574-FPNG
Amjad Masad, a Palestinian tech founder, has spoken out about Gaza despite backlash in Silicon Valley, but his company Replit's AI boom has made it a multibillion-dollar success.

Show HN: macOS menu bar app to track Claude usage in real time

https://raw.githubusercontent.com/richhickson/claudecodeusage/main/screenshot.png
Claude Usage is a lightweight macOS app showing Claude Code usage limits. It reads OAuth credentials from Keychain and queries an undocumented API at api.anthropic.com.

Fixing a Buffer Overflow in Unix v4 Like It's 1973

https://sigma-star.at/assets/images/pingu-neutral.svg
A buffer overflow bug was found in UNIX v4's su program, allowing an attacker to consume system resources. The bug was fixed by adding a bounds check to the password input loop using the ed text editor and recompiling the su program.

Dell admits consumers don't care about AI PCs

https://cdn.mos.cms.futurecdn.net/e2B5UgajyRBKTsBFomRjgX-840-80.jpg
The author is frustrated with AI being overhyped in tech products, but Dell's CES 2026 pre-briefing was refreshingly AI-free. Dell has shifted focus from AI-first marketing to delivering actual AI capabilities in their devices.

Show HN: A geofence-based social network app 6 years in development

https://static.wixstatic.com/media/a6b5df_84722f22157246c4b670727372fab067~mv2.png/v1/fill/w_647,h_441,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/set-1.png
You created an app that loads a perimeter around places worldwide by name and allows users to save favorites in a heat map and list for chat reference. The app also enables users to create geofences for non-existent places using a built-in creator.

Mux (YC W16) is hiring a platform engineer that cares about (internal) DX

We're verifying your browser Website owner? Click here to fix

Pole of Inaccessibility

https://upload.wikimedia.org/wikipedia/commons/thumb/a/ad/Distancia_a_la_costa.png/500px-Distancia_a_la_costa.png
In geography, a pole of inaccessibility is the farthest (or most difficult to reach) location. in 2017, the turner twins went from coastal chile to the south american pole of inaccessibility, becoming the first adventurers to go from the nearest coastline to it by foot - but it is not the pole utmost from any other continents or landmasses. "point nemo is most remote ocean

Digital Red Queen: Adversarial Program Evolution in Core War with LLMs

https://sakana.ai/assets/home/sakana_rect.png
Researchers used large language models to evolve programs in the competitive game Core War, observing convergent evolution and increasingly general strategies. This study positions Core War as a sandbox for analyzing "Red Queen" dynamics in artificial systems, offering insights into AI agent evolution in real-world adversarial settings.

The No Fakes Act Has a "Fingerprinting" Trap That Kills Open Source

If you're running a script or application, please register or sign in with your developer credentials here. Additionally make sure your User-Agent is not empty and is something unique and descriptive and try again. if you're supplying an alternate User-Agent string, try changing back to default as that can sometimes result in a block. If you think that we've incorrectly blocked ...

Making Magic Leap past Nvidia's secure bootchain and breaking Tesla Autopilots

https://usercontent.events.ccc.de/congress/2025/hub/usercontent/u/aa161aea989e/u/aa161aea989e/ZZBSFH_USTjgHl.webp
The speaker exploited vulnerabilities in the Tegra X2's BootROM and Fastboot implementation to gain access and persistence on Magic Leap One devices. They discovered unpatchable vulnerabilities in the BootROM and Fastboot, allowing for code execution at the highest privilege level.

Logistics Is Dying; Or – Dude, Where's My Mail?

https://ik.imagekit.io/lagomorph/hero/ponyexpressrider.jpg
The Pony Express successfully delivered mail between Missouri and California in 18 months despite extreme weather conditions, but its financial failure led to its demise. Modern logistics companies prioritize metrics over outcomes, resulting in declining service quality despite technological advancements.

I used Lego to design a farm for people who are blind – like me

https://ichef.bbci.co.uk/ace/standard/3840/cpsprodpb/fa2e/live/285d8550-e3ec-11f0-9f13-21b87ca1c546.jpg
Mike Duxbury, a 57-year-old blind man, is setting up a farm in Aberdeenshire to help youngsters with disabilities get into agriculture. The farm, designed with accessibility in mind, will offer training and placement opportunities for people with visual impairments and other disabilities.

Flint Confirms Biodegradable Paper Batteries Are Now in Production

https://cdn.xingosoftware.com/audioxpress/images/fetch/dpr_1,w_765,h_430,c_fit/https%3A%2F%2Faudioxpress.com%2Fassets%2Fupload%2Fimages%2F1%2F20260105061139_Flint-paper-battery-04-TWeb.jpg
Flint, a Singapore-based company, has entered production of sustainable, biodegradable paper batteries for consumer electronics. Its proprietary technology is now available to select partners ahead of CES 2026.

Learning to Play Tic-Tac-Toe with Jax

https://joe-antognini.github.io/assets/posts/jax-tic-tac-toe/random_games.svg
The article explains how to train a neural network to play Tic-Tac-Toe using reinforcement learning in Jax, with a focus on pedagogy and simplicity. The training process involves using temporal difference learning, introducing a target network, and implementing epsilon-greedy sampling to balance exploration and exploitation.