Meta Pays Out $725M Settlement in Cambridge Analytica Scandal

2025-09-14
Meta Pays Out $725M Settlement in Cambridge Analytica Scandal

Meta has begun distributing a $725 million settlement to Facebook users affected by the Cambridge Analytica scandal. The class-action lawsuit, stemming from the 2018 revelation that up to 87 million users' data was improperly accessed, concluded in December 2022. Eligible users – those with active accounts between May 24, 2007, and December 22, 2022 – had until August 25, 2023, to file a claim. Approximately 18 million claims were validated. Payments are based on the length of time users had a Facebook account and will be sent via bank account, PayPal, virtual prepaid Mastercard, Venmo, or Zelle. Distribution began recently and is expected to last 10 weeks.

Read more
Tech

Twitter: A Novel Messaging Protocol

2025-01-19

In April 2009, many questioned Twitter's significance. The article argues that Twitter's importance stems from its novelty as a messaging protocol where recipients aren't specified. New protocols are rare, successful ones even rarer; think TCP/IP, SMTP, HTTP. A new protocol is inherently a big deal. However, Twitter's private ownership makes it even more unique. Interestingly, the founders' slow monetization might be an advantage. Lack of heavy-handed control makes Twitter feel like established protocols, obscuring its private ownership and likely aiding its spread.

Read more
Tech Protocol

Discover.com Warning: Leaving for a Third-Party Site

2025-05-19

Discover.com is warning users that they are about to leave its site and visit a third-party website. Discover states that it is not responsible for the products and services offered on the third-party site and does not guarantee the accuracy or applicability of any financial tools. Users are advised to review the privacy, security policies and terms and conditions of the third-party website. Consult a financial advisor for personal financial advice.

Read more

The Seven-Year Rule: Embrace Your Ever-Changing Self

2025-04-26

Inspired by the Dalai Lama's concept, this article explores the idea that we are completely reborn every seven years due to cellular regeneration. The author argues that clinging to past mistakes or triumphs is futile, as that person no longer exists. By focusing on the present moment and embracing this constant transformation, we liberate ourselves and better shape our future selves.

Read more
Misc

Meta Invests Billions to Keep Illinois Nuclear Plant Running

2025-06-04
Meta Invests Billions to Keep Illinois Nuclear Plant Running

Meta announced a multi-billion dollar deal to keep Constellation Energy's Clinton nuclear power plant operational until 2047. This isn't about directly powering Meta's data centers, but rather purchasing the plant's 'clean energy attributes' to offset its carbon footprint. The deal secures the plant's relicensing and provides a guaranteed customer, effectively replacing expiring subsidies and preventing potential closure. This reflects a growing trend of Big Tech companies investing in nuclear power to meet the surging energy demands of AI and cloud computing.

Read more
Tech

AI Agents: The Next Big AI Disaster?

2025-06-11

This article explores potential future AI disasters. Drawing parallels to early railway and aviation accidents, the author argues that large-scale AI catastrophes are a real possibility. Rather than focusing on simple AI misdirection, the author emphasizes the risks posed by AI agents – AIs capable of autonomously performing tasks like web searches and sending emails. The author predicts the first major AI disaster will likely stem from an AI agent malfunctioning within government or corporate systems, such as erroneously executing debt collection, healthcare, or landlord processes. Additionally, the author highlights the potential dangers of AI models being misused to create 'ideal partner' robots. In short, the author cautions against the rapid advancement of AI and its potential risks, urging for stronger AI safety measures.

Read more
AI

David Souter: The Conservative Justice Who Became a Liberal

2025-05-09
David Souter: The Conservative Justice Who Became a Liberal

Former Supreme Court Justice David Souter, appointed by President George H.W. Bush, passed away at 85. Initially seen as a conservative, he surprisingly aligned himself with the court's liberal wing. A Harvard graduate and former New Hampshire Supreme Court justice, his conservative credentials were vouched for by then-White House Chief of Staff John Sununu. However, in Washington, Souter unexpectedly joined the court's more moderate justices, eventually becoming a staunch member of the liberal caucus. Known for his simple lifestyle and love for rural New Hampshire, he maintained his preference for a quiet life, even while serving on the Supreme Court, famously eschewing cell phones and email, and writing his opinions in longhand with a fountain pen.

Read more

Insanely Difficult Color Puzzle Game

2025-09-21

This puzzle game, called 'Color Game', boasts an insane difficulty level. Players must click on numbers to change the color of cells, aiming to have at least one green cell in each row. The game cleverly uses positive and negative numbers and incorporates a warning system that highlights rows at risk. The hardest difficulty, however, is truly punishing, warning the player of entirely red rows, testing strategy and patience to the limit.

Read more
Game color game

AI Coding Agents: From Helpful Assistants to Essential Partners

2025-06-16

The author recounts a transformative shift in their workflow due to autonomous AI coding agents. Initially viewed as a neat curiosity, these agents have become indispensable, dramatically changing how software is shipped. The author details using tools like Claude and Codex to complete tasks ranging from bug fixes to code generation, resulting in significant productivity gains. While acknowledging limitations, such as the potential for getting stuck in local optima, the author believes AI coding agents represent a new era in software development, augmenting rather than replacing developers.

Read more
Development

SF and Oakland Police Caught Illegally Sharing ALPR Data with Feds

2025-07-14
SF and Oakland Police Caught Illegally Sharing ALPR Data with Feds

Records obtained by The Standard reveal that San Francisco and Oakland police departments appear to have repeatedly violated state law by sharing data from automated license plate readers (ALPRs) with federal agencies. Despite a 2015 state law prohibiting this, logs show data sharing with seven federal agencies, including the FBI, since installing hundreds of Flock Safety ALPRs last year. At least one instance involved an ICE investigation. This has drawn sharp criticism from privacy advocates and officials, who highlight the violation of individual privacy. Investigations are underway, with promises of accountability.

Read more
Tech ALPR

arXivLabs: Experimental Projects with Community Collaboration

2025-03-23
arXivLabs: Experimental Projects with Community Collaboration

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved embrace arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Have an idea to enhance the arXiv community? Learn more about arXivLabs.

Read more
Development

Disk I/O Beats Memory Caching? A Surprising Benchmark

2025-09-05

Conventional wisdom dictates that memory access is far faster than disk I/O, making memory caching essential. This post challenges that assumption with a clever benchmark: counting the number of tens in a large dataset. Using an older server and optimizing code (loop unrolling and vectorization), along with a custom io_uring engine, the author demonstrates that direct disk reads can outperform memory caching under specific conditions. The key isn't that the disk is faster than memory, but rather that traditional memory access methods (mmap) introduce significant latency. The custom io_uring engine leverages the disk's high bandwidth and pipelining to mask latency. The article emphasizes adapting algorithms and data access to hardware characteristics for maximum performance in modern architectures, and looks ahead to future hardware trends.

Read more
Hardware memory caching

Phoronix Founder Michael Larabel: 20 Years of Linux Hardware Benchmarking

2025-03-18

Michael Larabel, principal author of Phoronix.com, founded the site in 2004, focusing on enhancing the Linux hardware experience. He's penned over 20,000 articles covering Linux hardware support, performance, graphics drivers, and more. He also leads development of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. A true veteran of the open-source world, his contributions have been invaluable to the Linux community.

Read more
Tech

Rediscovering the Power of Poetry in a Fast-Paced World

2025-02-02
Rediscovering the Power of Poetry in a Fast-Paced World

In our fast-paced digital age, poetry might seem outdated. However, it offers a unique space for deep reflection, emotional exploration, and creative expression. This article explores the numerous benefits of writing poetry, including fostering self-expression, emotional healing, sharpening the mind, deepening human connection, boosting creativity, and improving communication skills. Accessible to all, poetry serves as a powerful tool for self-discovery and therapeutic release, regardless of writing experience.

Read more

Google Search's AI Upgrade: Stable Traffic, New Opportunities for Websites

2025-08-07
Google Search's AI Upgrade: Stable Traffic, New Opportunities for Websites

Since integrating AI features, Google Search has seen relatively stable overall traffic, with a slight increase in high-quality clicks. While some sites may experience decreased traffic, this is largely due to shifting user preferences toward websites offering diverse content like forums, videos, and podcasts, as well as in-depth analysis and unique perspectives. Google's AI-powered Search aims to highlight, not replace, web content. It directs users to relevant sites using links and citations, respecting open web protocols. Google believes AI will create many opportunities, helping businesses and creators reach broader audiences.

Read more

The Beeper: A DIY Solution to Combat Prolonged Sitting

2025-01-01

Tired of the aches and pains from prolonged sitting at the computer? This post details a clever DIY device, "The Beeper," built to combat this. The Beeper consists of an ESP8266 microcontroller, a buzzer, and a simple switch housed in a small enclosure. After a set period of inactivity (screen unlocked), the Beeper emits an annoying sound, forcing the user to get up and silence it. The author provides details on the hardware, Lua firmware, and a macOS script that controls the device, highlighting iterative improvements to minimize interruptions during video calls. A simple yet effective solution to a common problem!

Read more
Hardware Ergonomics

Tesla's Robotaxi Service Launches in Austin, Raising Eyebrows

2025-06-23
Tesla's Robotaxi Service Launches in Austin, Raising Eyebrows

A decade after Elon Musk's ambitious promises, Tesla has quietly launched a robotaxi service in Austin using driverless Model Y SUVs. The service, using a camera-only, end-to-end AI approach, differs significantly from competitors like Waymo. Currently operating a small fleet of around 10 2025 Model Ys in a limited area of South Austin, the service charges a flat $4.20 per ride and features a human safety monitor in the passenger seat, a departure from typical autonomous vehicle testing practices. Tesla's limited transparency and attempts to block information requests raise concerns about safety and accountability. While initial reports include minor incidents like sudden braking, Musk and Tesla celebrated the launch as a major milestone.

Read more
Tech

PlanetScale for Postgres Goes GA

2025-09-22
PlanetScale for Postgres Goes GA

PlanetScale's managed Postgres service is now generally available, exiting private preview. Users can easily create Postgres databases and leverage migration guides for switching from other providers. Built on five years of experience with their Vitess product, PlanetScale has helped companies like Cursor, Intercom, and Block scale their databases. This new offering combines PlanetScale's maturity with the performance of bare metal, and includes a Postgres sharding solution called Neki, planned for future open-source release.

Read more
Tech

Nyxelf: A Powerful Tool for Analyzing Malicious Linux ELF Binaries

2025-01-17
Nyxelf: A Powerful Tool for Analyzing Malicious Linux ELF Binaries

Nyxelf is a powerful tool designed for analyzing malicious Linux ELF binaries. It combines static analysis techniques using tools like readelf, objdump, and pyelftools with dynamic analysis within a secure QEMU-based sandbox. Features include UPX unpacking, syscall tracing, process/file activity monitoring, and an intuitive GUI powered by pywebview. JSON output supports automated workflows, making Nyxelf ideal for security researchers and reverse engineers.

Read more

DeepMind's Genie 3: Longer-lasting, Interactive 3D Worlds

2025-08-06
DeepMind's Genie 3: Longer-lasting, Interactive 3D Worlds

Google DeepMind unveils Genie 3, a new AI world model capable of generating persistent, interactive 3D environments. Unlike previous iterations, Genie 3 allows for significantly longer interaction times and remembers object locations even when the user looks away. Offering 720p resolution at 24fps, Genie 3 enables several minutes of continuous interaction and supports prompt-based modifications like changing weather or adding characters. Currently, access is limited to a small group of academics and creators for research preview purposes.

Read more

UK's Online Safety Act Forces Lobsters Forum to Consider Geoblocking UK Users

2025-02-23

The upcoming UK Online Safety Act (OSA), set to take effect on March 16, 2025, poses a significant threat to the non-commercial forum Lobsters. The Act's broad scope and substantial penalties leave Lobsters facing impossible compliance costs and risks. To mitigate these, the forum is considering geoblocking UK users. The post calls on UK users to seek legal remedies or government intervention to prevent the OSA from disproportionately affecting small, non-commercial forums.

Read more

German Antitrust Authority Accuses Apple of Abusing Market Power

2025-02-13
German Antitrust Authority Accuses Apple of Abusing Market Power

Germany's Federal Cartel Office has accused Apple of abusing its market dominance through its App Tracking Transparency (ATT) feature, alleging it gives Apple preferential treatment and harms competitors. This follows a three-year investigation into Apple's ATT, which allows users to block cross-app tracking by advertisers. Apple argues ATT protects user privacy, but this has drawn criticism from Meta, app developers, and startups whose business models rely on ad tracking. German authorities say Apple's actions make it harder for competitors to access user data relevant for advertising. Apple could face daily fines if it fails to address concerns before a final ruling (potentially this year, more likely next). The case was triggered by complaints from associations representing publishers, broadcasters, advertisers, and ad tech firms. Lawyers involved say this is a landmark case, arguing Apple misused privacy concerns to restrict competition in its favor.

Read more

Tardigrade Tattoos: A Micromanufacturing Breakthrough

2025-05-07
Tardigrade Tattoos: A Micromanufacturing Breakthrough

Scientists used nearly indestructible tardigrades to test a new micromanufacturing technique. They 'tattooed' the creatures with patterns as small as 72 nanometers wide using an electron beam. The process, called ice lithography, involves carving patterns into a layer of ice coating the tardigrades, then sublimating the ice to leave the pattern behind. Around 40% of the tardigrades survived and showed no behavioral changes. This technique could revolutionize biomedical engineering and microelectronics, paving the way for microscopic biosensors and microbial cyborgs.

Read more

Australian Rocket Launch Delayed Due to Payload Fairing Malfunction

2025-05-17
Australian Rocket Launch Delayed Due to Payload Fairing Malfunction

The maiden launch of Gilmour Space Technologies' Eris rocket has been delayed due to a premature payload fairing deployment. The company will conduct a full investigation and replace the fairing before attempting another launch. This setback follows over a year of delays attributed to regulatory approvals. Despite this, Gilmour remains confident in its hybrid propulsion system, aiming for only 10-20 seconds of stable flight on the initial launch to gather crucial data. Eris aims to be Australia's first orbital launch vehicle.

Read more

The Chrome-Tastic Airbrush Art of the 80s: A Nostalgic Look Back

2025-08-15

The 80s saw airbrush art explode in popularity. The author recounts their teenage yearning for an airbrush, dreaming of painting band logos and making money. While computer design eventually took over, the author fondly remembers the unique chrome effects, gradients, and speed lines of 80s airbrush art. Digital art today perfectly replicates the style, but lacks the organic imperfections of the original. The author hopes to one day rediscover their old airbrush and revisit this iconic art form.

Read more

Towards an AI Model Virtual Machine: A Secure and Interoperable Future for AI Applications

2025-08-30
Towards an AI Model Virtual Machine: A Secure and Interoperable Future for AI Applications

The increasing capabilities of LLMs and extension mechanisms like MCP have significantly heightened the complexity of building secure and reliable AI applications. This paper proposes an AI Model Virtual Machine (MVM), analogous to the Java Virtual Machine (JVM), to provide AI models with security, isolation, extensibility, and portability. The MVM decouples model development from integration logic, allowing for plug-and-play model interchangeability and incorporating built-in security and access controls to safeguard AI application security and privacy. Further benefits include transparent performance and resource tracking, and potential for verifiable model outputs. This innovation promises to address significant challenges in AI application development, paving the way for a more secure, reliable, and efficient AI ecosystem.

Read more

Efficient Linux System Call Interception: Beyond the Inefficiencies of ptrace

2025-01-05

This article introduces a more efficient method for intercepting Linux system calls than ptrace: seccomp user notify. Leveraging BPF filters, it returns only for desired system calls, significantly reducing performance overhead. The author uses their tool, copycat, as an example, demonstrating how to intercept open() system calls to achieve file replacement. The article details the seccomp user notify mechanism, including BPF filter creation and system call argument handling. Security and potential issues, such as TOCTOU attacks, are also discussed.

Read more
Development System Calls

International Homicide: Tech Forensics Uncovers Hidden Truth

2025-07-21

A baffling missing person case morphed into a gripping international homicide investigation. A lawyer, through meticulous technical investigation, particularly analyzing the IP address and timestamps of a crucial "proof of life" email, along with corroborating witness testimony and diverse evidence, ultimately exposed the husband's culpability in his wife's murder. This case powerfully demonstrates the importance of digital evidence in modern criminal investigations and highlights the necessity of international cooperation in combating crime.

Read more

Kubernetes: A Surprising Analogy to Entity-Component-Systems

2025-02-07

This blog post unveils a striking similarity between Kubernetes' resource management model and the Entity-Component-System (ECS) pattern commonly used in game development. Kubernetes objects mirror ECS entities, possessing unique identifiers; the `spec` and `status` fields correspond to components, representing desired and observed states respectively; while controllers, schedulers, and the Kubelet act as systems, reconciling discrepancies between desired and actual states. This architectural resemblance clarifies Kubernetes' design and offers fresh insights into its declarative nature.

Read more
Development

Massive Volkswagen Data Breach Exposes Location Data of 800,000 EVs

2024-12-27
Massive Volkswagen Data Breach Exposes Location Data of 800,000 EVs

A massive data breach affecting over 800,000 Volkswagen electric vehicles has exposed sensitive user information, including precise GPS location data and personal contact details. The data, stored on an unsecured Amazon Cloud server, was accessible to anyone with basic technical skills. The breach, discovered by a whistleblower and reported by Der Spiegel, highlights significant security flaws at Volkswagen's software subsidiary, Cariad. While Cariad claims to have quickly addressed the vulnerability and that no unauthorized third-party access occurred, the incident raises serious concerns about data security in the automotive industry and the potential for misuse of exposed location and personal information. The breach impacted both individual users and institutional entities, including police forces.

Read more
Tech automotive
1 2 156 157 158 160 162 163 164 596 597