A 12-year-old boy's jargon code was mistaken for a Japanese spy's and led to an FBI investigation, costing thousands of dollars. The boy's glasses case was found and the code key was kept by the FBI, compromising his secret communication scheme.
The user verified their identity on LinkedIn through Persona, a US company, and found their passport data was shared with 17 US-based subprocessors, including AI companies. The user recommends requesting data deletion and objecting to data use under "legitimate interests" due to concerns over data protection and US law enforcement access.
A travel blogger takes to the train from london to wulfleet and writes about the journey. he writes that 'when i was first come to wullflete, i did not see the harbour' compare the very first line with the line from the 1800s section, and you'll see what i mean. the reasons for the difficulty are two-fold: grammar and spelling - the 1500s and 1600s
F-Droid users were misled into thinking Google canceled plans to lock down Android, but the plans are still scheduled. F-Droid is raising awareness about the issue with a banner in their app and website.
Sandbox-exec is a built-in macOS command-line utility that enables users to execute applications within a secure, isolated environment with limited access to system resources. It provides a powerful tool for security-conscious users and developers to create finely-tuned security environments with custom profiles tailored to specific applications and use cases.
The user maintains a list of websites that generate low-quality content using AI, which can be misleading or even dangerous, and invites others to contribute to the list. The list aims to block access to AI-generated content farms that prioritize SEO and monetization over providing useful information.
A diving instructor discovered a critical vulnerability in a major diving insurer's member portal, exposing personal data of students, including minors, due to incrementing numeric user IDs and static default passwords. The organization responded with legal threats and an NDA, rather than gratitude and a plan to notify affected users, highlighting a common issue in the security research ...
The author criticizes Dependabot for generating unnecessary security alerts and recommends using govulncheck and scheduled GitHub Actions to filter out irrelevant alerts.
User logged into Facebook after 8 years and found their feed filled with AI-generated thirst traps and spam, but also some genuine content and memes. They were shocked by the extent of the algorithmic feed's focus on engagement bait and decided to leave the platform.
Announcement We are happy to announce that ggml.ai (the founding team of llama.cpp) are joining Hugging Face in order to keep future AI truly open. Georgi and team are joining HF with the goal of s...
Wikipedia editors have decided to deprecate Archive.today due to its involvement in a DDoS attack and altering archived webpages. Over 695,000 links to Archive.today will be removed and replaced with other archive sites.
Andrej Karpathy discusses Claws, a new layer on top of LLM agents, enhancing orchestration and task management. Claws are AI agent systems running on personal hardware, communicating via messaging protocols.
Chinese DRAM maker CXMT is flooding the market with cheaper chips, forcing Korean rivals Samsung and SK hynix to reevaluate their strategy. CXMT's aggressive pricing is gaining traction, with US and Taiwanese firms testing its DRAM and seeking cooperation.
The goal is to have a pixel, mod-friendly perfect recreation of Wolfenstein 3D in Rust. just run-sdl-shareware should work out of the box on a cloned repo. It will run the shareware version, that is also checked in along with the code as testdata. Alternatively you can play the web version here: https://wolf.ironmule.dev/ If you have a copy of the full game files you can upload them there and ...
We have comforts and memories thanks to hardworking people and generations before us. Let's show appreciation by working together and striving for progress.
Coccinelle is a tool for writing source-to-source transformations on C code, allowing for refactorings and more. It can be installed from source or downloaded pre-compiled, with instructions found at https://coccinelle.gitlabpages.inria.fr/website/download.html.
WorldWideWeb was developed at CERN in 1990 as the precursor to the modern web. In 2019, developers rebuilt the original browser for its 30th anniversary.
The user wants to sync personal Git repos between devices without relying on cloud services. They've found a simple solution by using a bare Git repository on an external drive or SSH-accessible location, and syncing with devices using Git's push and pull commands.
Companies building AI assistants are now funded by advertising, creating a collision course with always-on devices that see and hear everything. Local on-device inference is the only way to prevent data exploitation, requiring a business model based on hardware and software sales, not data collection.
OAuth was designed to allow users to grant access to their accounts without sharing passwords, driven by the need for Twitter to support OpenID in 2006. The core idea of OAuth is simple: send a secret to a trusted delegate with user consent, and the delegate can make subsequent requests on the user's behalf.
The author shares their two-sentence journal method and its variations, including writing on scrap paper, using Google Keep, and writing directly in a physical journal. They also discuss formatting and organizing their journal entries in both physical and digital formats.
The author is discussing the importance of naming conventions in preventing bugs in programming. They propose using "count" for the number of items and "index" for a specific item, with a positive invariant of index < count.
Gitas is a tool for switching between git accounts and running commands with specific identities. It can be installed on Linux, macOS, and Windows using various methods, including scripts and package managers.
Using blue light filters at night may not be effective in improving sleep due to their limited ability to reduce light intake, and other methods such as using dark mode, dimming screen brightness, and increasing daytime light exposure can be more beneficial. Controlling light intake and exposure can help regulate the body's circadian rhythm, and taking the right dose of melatonin supplements ...
The article discusses the limitations of std::mutex and introduces std::shared_mutex, a reader-writer mutex that allows multiple threads to read the same resource concurrently while ensuring exclusive access for writers. Using a benchmark experiment, the article shows that std::shared_mutex can significantly reduce contention and improve throughput under a read-heavy workload compared to std::mutex.
To create JWasm, use various makefiles like Msvc.mak, OWWin32.mak, GccUnix.mak, or CLUnix.mak depending on the compiler and platform. These makefiles support compilers like Visual C++, Open Watcom, GCC, and CLang for Windows, Linux, and DOS.
Taalas developed a platform to transform AI models into custom silicon, resulting in faster, cheaper, and lower power hardware. Their first product, a hard-wired Llama 3.1 8B, achieves 10X faster performance, 20X lower cost, and 10X lower power consumption than current state-of-the-art solutions.
OpenScan offers affordable, open-source 3D scanners for everyone. Our community-driven project combines photogrammetry with modular hardware to create high-quality 3D models. From hobbyists to professionals, OpenScan empowers users worldwide to explore 3D scanning in various fields. Join us in making 3D scanning accessible and push the boundaries of digital preservation and creation.