Arch Linux Under Week-Long DDoS Attack

2025-08-24
Arch Linux Under Week-Long DDoS Attack

The popular Arch Linux distribution is under a week-long distributed denial-of-service (DDoS) attack targeting its main website, AUR, and forums. The attacker's motive is unknown. The Arch team is actively working with its hosting provider to mitigate the attack and evaluating DDoS protection options. While Arch is known for its technical difficulty, the attack causes inconvenience to the community. Users can obtain packages via the pacman-mirrorlist package or GitHub to work around service outages.

Read more
Tech

YouTube Downloaders: The Ethics and Google's Strategy

2025-09-20
YouTube Downloaders: The Ethics and Google's Strategy

The author, a former Editor-in-Chief of How-To Geek, reveals past self-censorship regarding YouTube downloaders, explaining the reasons behind it: reliance on Google ad revenue and fear of violating YouTube's terms of service. Now free from these constraints, the author recommends several excellent free YouTube downloaders and delves into the ethics of using them, Google's strategy, and the ineffectiveness of lengthy EULAs. The author argues that downloading YouTube videos is akin to printing web pages or saving images – a reasonable backup practice. Google tacitly approves the existence of downloaders, even benefiting from them to solidify YouTube's dominance.

Read more

Chinese Military-Linked VPN Apps Found on App Store

2025-04-03
Chinese Military-Linked VPN Apps Found on App Store

A new report reveals that at least five VPN apps on the Apple App Store are linked to the Chinese military, with three boasting over a million downloads. A subsidiary of one of the implicated Chinese companies is hiring for a role involving "monitoring and analyzing platform data," requiring familiarity with American culture. This raises serious concerns about user data privacy and potential circumvention of geo-restrictions. Apple has removed two of the apps, but the fate of the remaining three is uncertain. Experts warn users to only use VPNs from reputable companies, strongly advising against those originating from China due to legal requirements for logging and government data access.

Read more

WordPress Co-founder's Christmas Eve Joke Sparks Community Outrage

2024-12-27
WordPress Co-founder's Christmas Eve Joke Sparks Community Outrage

On Christmas Eve, Matt Mullenweg, co-founder of WordPress, stirred up controversy on Reddit by asking for suggestions on what "drama" he should create in 2025 for WordPress. The post, suggesting changes like altering release naming conventions or design, was met with significant backlash from the community. Many felt the post was disrespectful and urged him to focus on resolving ongoing legal issues and restoring community stability. Mullenweg responded that he was merely aiming to spark creativity and hinted at future developments in Gutenberg. The controversy highlights concerns within the WordPress community regarding leadership and the future direction of the platform.

Read more
Development community controversy

High-Performance Go Implementation of Attention Mechanisms and Transformer Layers

2025-03-03
High-Performance Go Implementation of Attention Mechanisms and Transformer Layers

The Frontier Research Team at takara.ai presents the first pure Go implementation of attention mechanisms and transformer layers, prioritizing high performance and ease of use. This library includes dot-product attention, multi-head attention, and a complete transformer layer implementation, featuring batched operations for improved throughput and CPU-optimized matrix operations. Ideal for edge computing, real-time processing, cloud-native applications, embedded systems, and production deployments, future improvements include positional encoding, dropout, and CUDA acceleration.

Read more
Development Attention Mechanisms

SpaceX's Fram2 Mission: A Polar Orbit Premiere and a Tale of Space Sickness

2025-04-05
SpaceX's Fram2 Mission: A Polar Orbit Premiere and a Tale of Space Sickness

SpaceX's privately funded Fram2 mission concluded successfully, with four passengers completing a unique flight aboard a Crew Dragon capsule, marking the first time humans have flown directly over the Earth's North and South Poles. Bankrolled by cryptocurrency billionaire Chun Wang, the crew conducted various research projects, including capturing aurora images and documenting space motion sickness. While space sickness proved a challenge, the crew overcame it, achieving several 'firsts,' including the first West Coast splashdown and a self-conducted egress experiment. This mission provided valuable scientific data and showcased the potential of private space exploration.

Read more
Tech

Configuring Emacs as a File Manager with Guix

2025-05-23
Configuring Emacs as a File Manager with Guix

This post details how to configure Emacs' dired mode as the default file manager using Guix and its home-xdg-mime-applications-service-type service. By creating an xdg-desktop-entry file and linking it to the inode/directory MIME type, clicking on a directory opens it in Emacs dired. The author provides examples for configuring other MIME types, allowing for easy expansion of functionality.

Read more
Development

Trump Administration Shuts Down Crypto Fraud Unit

2025-04-12
Trump Administration Shuts Down Crypto Fraud Unit

The US Department of Justice, under the Trump administration, has immediately shut down the National Cryptocurrency Enforcement Team (NCET), which investigated cryptocurrency fraud. This move is part of the Trump administration's effort to scale back enforcement of white-collar and financial crimes, shifting resources to fighting drug trafficking and human smuggling. While the administration claims to be cracking down on criminals using crypto for illicit activities, experts express concern over the diversion of crucial resources. The Trump administration argues the DOJ shouldn't act as a digital asset regulator, focusing instead on individuals and organizations using crypto for terrorism, drug trafficking, and other crimes.

Read more

Stanford's Off-Grid Ammonia Generator: Powering the Future with Thin Air

2025-01-16
Stanford's Off-Grid Ammonia Generator: Powering the Future with Thin Air

Researchers from Stanford University and King Fahd University of Petroleum and Minerals have developed a groundbreaking device that generates ammonia from ambient air and water vapor without any external power source. Utilizing a catalyst-coated mesh, the system combines atmospheric nitrogen and water vapor to produce ammonia at room temperature and pressure. This ammonia can be used directly as fertilizer or processed into a sustainable green fuel, offering a revolutionary approach to fertilizer production and energy generation. The technology promises to significantly impact both developing nations and industrial applications.

Read more

Urgent Security Update for Matrix: High-Severity Vulnerabilities Patched

2025-07-17
Urgent Security Update for Matrix: High-Severity Vulnerabilities Patched

The Matrix team has identified and patched two high-severity protocol vulnerabilities (CVE-2025-49090 and another yet-to-be-assigned CVE) that could lead to unexpected state resets in Matrix servers. A coordinated security release across all Matrix server implementations is planned for July 22nd, 2025, at 17:00 UTC (version 1.16, room version 12). This update requires upgrading existing rooms. Users running Matrix servers are urged to upgrade as soon as possible. Client developers should review MSC4291 and update their clients to support the new room ID format and creator privileges.

Read more
Development

UK Government Quietly Removes Encryption Advice Amidst iCloud Backdoor Demand

2025-03-06
UK Government Quietly Removes Encryption Advice Amidst iCloud Backdoor Demand

Weeks after demanding backdoor access to encrypted iCloud data, the UK government has silently removed encryption advice from its websites. The National Cyber Security Centre (NCSC) no longer recommends encryption for high-risk individuals, a stark contrast to previous guidance advocating Apple's Advanced Data Protection (ADP). This move has raised concerns about the government's approach to citizen privacy and the delicate balance between national security and individual rights. Apple is currently challenging the UK's data access order.

Read more
Tech

Exotic New Superconductors Delight and Confound

2024-12-13
Exotic New Superconductors Delight and Confound

Three new types of superconductors were discovered this year, challenging our understanding of this phenomenon. These two-dimensional materials, like graphene, exhibit unprecedented flexibility, switching between insulating, conducting, and superconducting states with simple adjustments. One even defies expectations by strengthening in a magnetic field. These discoveries deepen the mystery of superconductivity while offering hope for room-temperature superconductors, potentially revolutionizing energy and transportation.

Read more

React Component Trees as State Machines: Understanding Asynchronous Updates and Concurrent Features

2025-04-07
React Component Trees as State Machines: Understanding Asynchronous Updates and Concurrent Features

This article explains modeling a React component tree as a state machine, which helps clarify the implications of asynchronous updates and React's concurrent features. A React application can be viewed as a state machine model where the UI is a function of state: UI = f(state). However, asynchronous updates break this synchronous guarantee, leading to potential invalid updates by users. The article suggests using optimistic updates or intermediate (pending) states to address this, and emphasizes that React's concurrent features (like startTransition) also need similar synchronous handling to avoid invalid actions.

Read more
Development Asynchronous Updates

JWT Turns 10: A Decade of Secure Token Standards and Future Outlook

2025-05-25

Ten years ago, the JSON Web Token (JWT) became RFC 7519, culminating a 4.5-year journey to create a simple JSON-based security token format and underlying cryptographic standards. JWT and its related specifications have seen widespread adoption, even exceeding the initial creators' expectations. However, ongoing work continues to update the specifications to address emerging threats and vulnerabilities, ensuring JWT remains secure for the next decade.

Read more
Development security tokens

1.5 Years of AI-Assisted Programming: Reflections and Lessons Learned

2025-08-07
1.5 Years of AI-Assisted Programming: Reflections and Lessons Learned

This post shares the author's 1.5-year experience using AI for programming. AI excels at repetitive coding tasks, refactoring, and simple projects, but struggles with complex problems and new development, often introducing errors and inefficient abstractions. CLI interfaces prove more effective than IDEs due to increased developer control. AI aids in design and writing, but 'vibe coding' (relying solely on AI-generated code) is discouraged, leading to significant technical debt and security vulnerabilities. The author concludes that the primary beneficiaries of AI aren't developers, but managers and clients, facilitating improved communication and collaboration. The future of AI in programming is bright, but companies shouldn't use it as an excuse for layoffs.

Read more
Development

Evertop: An Ultra Low-Power, Ultra Long-Battery Life Solar PC

2025-04-21
Evertop: An Ultra Low-Power, Ultra Long-Battery Life Solar PC

Evertop is a portable PC emulating an IBM XT with an 80186 processor and 1MB RAM, running DOS, Minix, and Windows 3.0. Its low-power microcontroller, e-ink display, dual 10,000mAh batteries, and power-saving features enable hundreds to thousands of hours of use on a single charge. A built-in solar panel ensures indefinite off-grid operation. It boasts a full array of peripherals including a keyboard, PS/2 ports, various graphics and audio support, serial ports, Ethernet, Wi-Fi, and LoRa radio. Charging is versatile, with options for solar, DC input, and micro-USB, allowing simultaneous charging from multiple sources. A minimized version, Evertop Min, is also available.

Read more
Hardware

AI Co-design: Building a Super-Dense Electronic Music Compressor in a Day

2025-04-28

The author, who had long wanted to build a super-dense electronic music compressor, used the ChatGPT o3 model to design and prototype the entire system in just one day. Through iterative conversation, they designed a phase-aware spectrogram-based generative model that reconstructs spectrograms from a small number of reusable patterns and a sparse occurrence list. The key is that occurrences are represented by two unit complex numbers whose phases map to continuous coordinates, allowing patterns to be placed anywhere, achieving extremely high compression rates. This experiment demonstrates how AI can accelerate research, turning long-standing ideas into tangible results quickly.

Read more

RubyGems.org's Multi-Layered Defense Against Malicious Gems

2025-08-26

RubyGems.org recently thwarted an attack involving malicious gems designed to steal social media credentials. Their success stems from a multi-layered security approach: automated detection (static and dynamic code analysis), risk scoring, retroactive scanning, and external intelligence. Upon detection, suspicious gems undergo manual review; confirmed malicious gems are removed and documented. In a recent incident, RubyGems.org removed most malicious packages before Socket.dev's report and actively collaborated on the investigation, demonstrating effective security response. The article encourages community participation in security maintenance and calls for corporate support of RubyGems.org's security efforts.

Read more
Development Malicious Gems

Typographic Rivers: A Curious Case of Accidental Alignment

2025-05-19
Typographic Rivers: A Curious Case of Accidental Alignment

Have you ever noticed how sometimes the spaces between words in printed text coincidentally align to form vertical 'rivers' of whitespace? This phenomenon, most common in monospaced fonts with full justification, is generally avoided by typographers due to its distracting nature. The article cites a classic 12-line example discovered in 1988 and a collection from 1986, highlighting the intriguing randomness of this typographic quirk.

Read more
Design

arXivLabs: Experimental Projects with Community Collaborators

2025-05-11
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework for collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved embrace arXiv's values of openness, community, excellence, and user data privacy. arXiv only partners with those sharing these commitments. Got an idea to enhance the arXiv community? Learn more about arXivLabs.

Read more
Development

Toxic Origins, Toxic Decisions: Bias in CEO Selection

2025-05-30
Toxic Origins, Toxic Decisions: Bias in CEO Selection

New research reveals selection bias in CEO promotion amplifies risk-taking. CEOs born near future Superfund sites (exposed to prenatal pollution) are more likely to be promoted internally, suggesting firms reward apparent success without considering inherent risk tolerance. These 'Superfund CEOs' excel internally but pursue riskier external policies after promotion, leading to greater volatility and weaker performance. The study indicates firms may mistake luck for skill, inadvertently selecting high-variance risk-takers whose traits only become detrimental when decision-making shifts to public, irreversible domains.

Read more

Devstral: Open-Source LLM Outperforms GPT-4.1-mini on Software Engineering Benchmark

2025-05-21
Devstral: Open-Source LLM Outperforms GPT-4.1-mini on Software Engineering Benchmark

Mistral AI and All Hands AI have collaborated to release Devstral, an agentic large language model (LLM) for software engineering tasks. Devstral excels on the SWE-Bench Verified benchmark, achieving a score exceeding 46.8%, more than 6% higher than previous open-source models and even surpassing GPT-4.1-mini. It tackles complex software engineering problems, such as understanding contextual relationships within large codebases and identifying subtle bugs. Devstral is lightweight, running on a single RTX 4090 or a Mac with 32GB RAM, and supports local deployment, enterprise use, and Copilot integration. The model is open-source and available via API and various download options.

Read more
Development

Multiple Security Issues Found in Screen Terminal Multiplexer

2025-05-13

A security audit uncovered multiple vulnerabilities in the widely used screen terminal multiplexer. The most critical is a local root privilege escalation vulnerability (CVE-2025-23395) affecting Screen 5.0.0 running with setuid-root privileges. This allows unprivileged users to create files with root ownership in arbitrary locations. Additional vulnerabilities include TTY hijacking (CVE-2025-46802), world-writable PTYs (CVE-2025-46803), and other information leaks and race conditions. Patches have been released, and users are urged to update to the patched versions and avoid running Screen with setuid-root privileges.

Read more
Development screen

Drone-Based Cloud Seeding Sparks Safety Debate

2025-09-13
Drone-Based Cloud Seeding Sparks Safety Debate

Rainmaker Technology's plan to use small drones for cloud seeding faces opposition from the Air Line Pilots Association (ALPA), who argue its safety measures are insufficient and pose a significant risk. ALPA urges the FAA to reject Rainmaker's request for an exemption to carry hazardous materials on drones. Rainmaker's drones could operate near commercial airliners, raising concerns about collisions and fire hazards. The FAA's decision will set a precedent for future drone-based weather modification. While cloud seeding itself is established, the use of drones introduces new challenges and safety concerns requiring rigorous standards and testing.

Read more

Crumbling US Government Statistics: Budget Cuts Threaten Economic and Population Data

2025-03-15
Crumbling US Government Statistics: Budget Cuts Threaten Economic and Population Data

Unstable funding for federal statistical agencies like the Census Bureau and Bureau of Economic Analysis is jeopardizing the government statistics used to track the US economy and population. Budget shortfalls and short-term funding have already led to the termination of some datasets and proposals to reduce survey participants for key reports like the monthly jobs report. Long-term funding issues also plague the Census Bureau, impacting preparations for the crucial 2030 head count. Experts warn the system is like "crumbling infrastructure," and while data remains reliable for now, budget cuts and workforce reductions threaten data integrity, potentially impacting the 2030 census and the monthly jobs report.

Read more

High-Tech Palm Wine: A Biotech Approach to a Traditional Drink

2025-05-13
High-Tech Palm Wine: A Biotech Approach to a Traditional Drink

Palm wine, a culturally significant beverage in parts of Africa and Asia, has rarely made its way to the US market due to its perishability. Onye Ahanotu, an artist and materials engineer, is using biotechnology to change that. By creating a stable sugar solution molecularly identical to palm sap and combining it with yeast and bacteria sourced from Nigeria, he's developed a commercially viable palm wine. His approach is analogous to lab-grown diamonds, rather than traditional harvesting. Meanwhile, Nigerian entrepreneur Daniella Ekwueme is also pushing her Pamii brand into the US market, focusing on a younger demographic and convenient drinking experience. Both entrepreneurs' efforts are poised to offer American consumers more choice and fill a market gap.

Read more

UK Tightens Online Safety Act to Combat Self-Harm Content

2025-09-09
UK Tightens Online Safety Act to Combat Self-Harm Content

The UK government has announced urgent action to strengthen the Online Safety Act, designating content encouraging or assisting serious self-harm as a priority offense. This move aims to protect users of all ages, requiring tech companies to proactively remove such harmful material instead of reacting passively. New regulations will compel platforms to use advanced technology to actively find and delete this content before it reaches users, preventing irreparable harm. This change reflects the government's commitment to online safety and mental health and will significantly impact tech companies.

Read more
Tech self-harm

Samurai Jack: A Visual Masterpiece in Animation

2025-06-01
Samurai Jack: A Visual Masterpiece in Animation

The success of Samurai Jack wasn't accidental. Genndy Tartakovsky, burnt out on dialogue, aimed for visual storytelling. He drastically reduced dialogue, relying on visuals and movement to drive the plot – a risky move for animation at the time. Art director Scott Wills' unique style blended mid-century cartoon abstraction with realism, creating atmospheric and deeply engaging backgrounds. The team overcame communication hurdles with their Korean outsourcing studio, delivering stunning visuals. This bold approach, combined with respect for the audience's intelligence, made Samurai Jack a classic, leaving a lasting impact.

Read more

arXivLabs: Experimental Projects with Community Collaborators

2025-06-01
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations working with arXivLabs uphold values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Have an idea to enhance the arXiv community? Learn more about arXivLabs.

Read more
Development

Facebook Secretly Uploads User Photos to the Cloud?

2025-08-29
Facebook Secretly Uploads User Photos to the Cloud?

Meta, Facebook's parent company, is testing a new feature that secretly uploads users' phone photos and videos to the cloud without explicit consent, using them to generate AI-powered suggestions like collages, monthly recaps, and themed albums. While Meta claims the feature is opt-in and prompts users, some report never seeing the prompt and finding the feature enabled by default. This raises serious privacy concerns as Meta accesses users' private, unshared photos and videos. The test is currently limited to the US and Canada, excluding Illinois and Texas due to privacy laws.

Read more
1 2 218 219 220 222 224 225 226 596 597