Amazon Kills Kindle USB Sideloading Loophole: DRM War Heats Up

2025-02-14
Amazon Kills Kindle USB Sideloading Loophole: DRM War Heats Up

Amazon is shutting down its Kindle 'Download & Transfer via USB' feature, long exploited to bypass DRM on ebooks. This move is the latest in Amazon's ongoing battle against ebook piracy, but it also reignites the debate surrounding digital rights management. While users can still transfer ebooks via Wi-Fi, this significantly hinders DRM circumvention. The action highlights the ongoing conflict between publishers and readers regarding copyright, and the arms race between technology and DRM.

Read more
Tech eBooks

Polish City Uses Mussels to Monitor Water Quality

2025-02-03

The Dębiec Water Treatment Plant in Poznań, Poland, has implemented a novel water quality monitoring system using the natural intelligence of mussels. Highly sensitive to pollutants, mussels close their shells when water quality deteriorates. The system integrates mussels with sensors and a computer network; if four or more mussels close simultaneously, the system automatically shuts down, signaling pollution. This AquaNES project, supported by the European Union, showcases the integration of nature-based elements into water management and highlights the symbiotic relationship between humans and nature.

Read more

The Origins of Wokeness: A Performative Morality From Academia

2025-01-13

This essay explores the origins and evolution of "wokeness." The author argues that "wokeness" isn't a new phenomenon but stems from the 1980s, when student activists from the 1960s became professors and infused their political views into academia, birthing the first wave of political correctness. Social media and media polarization fueled the second wave, creating "cancel culture" and amplifying outrage through algorithms. The author views "wokeness" as performative moralism, its danger lying in substituting complex rules for genuine virtue. Currently in retreat, the author suggests handling it like religion to prevent future occurrences and maintain intellectual pluralism.

Read more

Vietnamese Banking Apps Caught Using Private iOS APIs to Spy on Users

2025-03-31
Vietnamese Banking Apps Caught Using Private iOS APIs to Spy on Users

Two popular Vietnamese banking apps, BIDV SmartBanking and Agribank Plus, have been found to use hidden private iOS APIs to detect other apps installed on users' iPhones. Security researchers discovered that the apps, developed by VNPay, leverage commercial mobile app protection software and custom code called "VNPay Runtime Protection." This code exploits a side-channel vulnerability in a private iOS API to identify apps and uses weak XOR encryption to hide API strings. This violates Apple's App Store policies and risks app removal, impacting millions of users. The incident is unrelated to a mobile security solution, BShield.

Read more

Critical Zero-Click AI Vulnerability Discovered in Microsoft 365 Copilot: EchoLeak

2025-06-11
Critical Zero-Click AI Vulnerability Discovered in Microsoft 365 Copilot: EchoLeak

Aim Labs has discovered a critical zero-click AI vulnerability, dubbed "EchoLeak," in Microsoft 365 Copilot. This vulnerability allows attackers to automatically exfiltrate sensitive data from Copilot's context without any user interaction. The attack leverages a novel technique called "LLM Scope Violation," bypassing Copilot's security measures through a cleverly crafted email. EchoLeak highlights inherent security risks in Retrieval-Augmented Generation (RAG)-based AI models, emphasizing the need for robust AI security practices.

Read more

Btrfs Allocator Hints: Optimizing Mixed Storage Performance

2025-02-11
Btrfs Allocator Hints: Optimizing Mixed Storage Performance

Btrfs now features allocator hints, allowing users to specify devices for metadata and data allocation, optimizing performance in mixed storage setups (e.g., SSDs and HDDs). By prioritizing faster SSDs for metadata and slower HDDs for data, users can improve filesystem responsiveness and storage efficiency. This requires a patched kernel and command-line configuration. Improper configuration can lead to out-of-space errors; careful monitoring is recommended.

Read more
Development mixed storage

Your Data, Your Privacy: AI Writing Assistant Running Locally

2025-07-14
Your Data, Your Privacy: AI Writing Assistant Running Locally

This macOS application uses locally-running large language models (LLMs), ensuring your documents, text, and writing never leave your Mac. It's compatible with most macOS apps including Mail, Messages, Safari, and more. A 7-day free trial (no credit card required) is available, with a 50% discount for students and educators. All processing happens locally, prioritizing your data privacy and security.

Read more
Development

No Winter Break: Underground Wood Growth Continues in Deciduous Trees

2025-03-25

An international study led by the University of Antwerp and other European institutions reveals that the belowground wood of four angiosperm deciduous tree species doesn't stop growing in winter. Published in Nature Ecology & Evolution, this research challenges our understanding of tree growth seasonality and offers a new perspective on forest ecosystem carbon cycling. The study observed continued wood growth in roots and stems even under cold winter conditions, potentially impacting forest carbon storage and climate change responses.

Read more

Meta's Sneaky Tracking: Bypassing Sandboxes to Identify Users

2025-06-10
Meta's Sneaky Tracking: Bypassing Sandboxes to Identify Users

Meta has been exposed for using a system called "localhost tracking" to bypass Android's sandbox protections and track users' mobile browsing behavior, even with VPNs, incognito mode, and deleted cookies. The system works by exchanging information between the background-running Facebook or Instagram app and Meta Pixel scripts in the browser, linking browsing data to Facebook or Instagram accounts. This violates GDPR, DSA, and DMA regulations, potentially leading to a €32 billion fine for Meta.

Read more
Tech

Poisoning LLMs: A Writer's Fight Back Against Data Scraping

2025-09-05
Poisoning LLMs: A Writer's Fight Back Against Data Scraping

Large Language Models (LLMs) train on vast amounts of data, much of it scraped from the open web without author consent. One author is fighting back by creating intentionally nonsensical mirror articles linked via nofollow tags. The hope is that LLMs, which may ignore nofollow, will ingest this gibberish, degrading their output. While not a perfect solution, the author aims to raise awareness about unauthorized data scraping and the ethical implications for content creators.

Read more
Development

Artifact: AI-Powered Collaborative IDE for Hardware Engineers Secures $3.5M

2025-05-08
Artifact: AI-Powered Collaborative IDE for Hardware Engineers Secures $3.5M

Artifact is a collaborative IDE for hardware engineers, accelerating every step of the engineering lifecycle: design, procurement, manufacturing, integration, test, and sustainment. The company raised $3.5M to build an integrated, verifiable AI copilot with an intuitive UI reflecting how hardware is actually built. Every artifact is auto-generated and traceable to a single source of truth. Artifact aims to make hardware engineering rigorous, deliberate, and system-aware, working directly with customers solving complex technical problems.

Read more

JWST Captures a Stunning Einstein Ring

2025-04-02
JWST Captures a Stunning Einstein Ring

The James Webb Space Telescope (JWST) has captured a breathtaking image: a nearly perfect 'Einstein Ring'. This ring-like structure is caused by the gravitational lensing effect of a closer elliptical galaxy on a more distant spiral galaxy. Light from the farther galaxy is bent by the gravity of the nearer galaxy, creating an almost perfect circle. This phenomenon verifies Einstein's prediction of general relativity and showcases the power of modern telescopes, allowing us to peer into the depths of the universe and appreciate this cosmic artwork.

Read more
Tech

Gemini 2.5 Pro: An AI That Knows Its Limits

2025-03-26
Gemini 2.5 Pro: An AI That Knows Its Limits

The author attempted to get Gemini 2.5 Pro to recreate the famous 90s synthesizer, ReBirth RB-338. Surprisingly, instead of attempting the impossible, Gemini 2.5 Pro assessed the task's difficulty and explained its infeasibility, demonstrating powerful reasoning capabilities. The author negotiated a simpler, yet functional synthesizer. This showcases AI's progress towards understanding its limitations and making rational judgments.

Read more
AI

Exa: Building the Next-Gen AI Chips - Join the Founding Team!

2025-02-21
Exa: Building the Next-Gen AI Chips - Join the Founding Team!

Exa is building the next generation of AI chips, aiming to surpass current market leaders. Their novel polymorphic XPU chips self-reconfigure for optimal dataflow, supporting AGI and ASI while drastically reducing energy consumption. They're seeking exceptional engineers to join their founding team and build revolutionary technology with lasting impact for centuries.

Read more
Hardware Job Opportunity

Algorithmic Design with Grasshopper: A Visual Programming Tutorial

2025-05-08
Algorithmic Design with Grasshopper: A Visual Programming Tutorial

This tutorial introduces visual programming in Grasshopper, a plugin for Rhino 3D. Grasshopper allows algorithmic generation of geometry by connecting data and functions within a visual diagram. The tutorial covers the basics of creating points, lines, polylines, curves, and surfaces using various components and parameters. Learn to construct points using the 'Construct Point' component, create lines with the 'Line' component, and generate curves with the 'Interpolate' component, among others. This hands-on guide empowers designers to create complex 3D models efficiently.

Read more

GPU Conditional Branching: Myth vs. Reality

2025-02-09

This article debunks a long-standing misconception in computer graphics: ternary operators in GPUs are not conditional branches. The author uses code examples and assembly code analysis to show that ternary operators or if statements in GPUs implement conditional move instructions, not branch jumps that alter the instruction pointer. These conditional moves are more efficient, and the supposed 'optimization' using the `step()` function actually reduces performance. The article calls for correcting this 20-year-old misunderstanding.

Read more
Development Optimization

Manage Apple Containers like docker-compose

2025-06-15
Manage Apple Containers like docker-compose

A CLI tool, `container-compose`, lets you use Apple Containers with a docker-compose-like config file. Currently in alpha, it may contain bugs or missing features. Install via Homebrew (`brew tap noghartt/container-compose https://github.com/noghartt/container-compose.git; brew install noghartt/container-compose/container-compose`) or download a pre-built binary from the release page.

Read more
Development

Netflix's Brief Apple TV Integration: A Bug, Not a Feature

2025-02-16
Netflix's Brief Apple TV Integration: A Bug, Not a Feature

Netflix's temporary appearance in the Apple TV app, including watchlist and 'continue watching' features, caused brief excitement. However, a Netflix spokesperson confirmed it was a mistake, and the functionality has been reverted. Netflix has consistently refused to integrate its content with Apple's or Google's aggregation efforts, highlighting its independent approach. While the temporary integration showed potential, Netflix remains committed to users accessing its content solely through its own app.

Read more
Tech

Scale AI CEO Warns: America Must Win the AI War

2025-01-21
Scale AI CEO Warns: America Must Win the AI War

Scale AI CEO Alexandr Wang took out a full-page ad in The Washington Post urging President Trump to prioritize the AI race. He argues the US needs increased AI investment, shifting focus from algorithms to compute power and data. Wang also recommends streamlining new energy production and leveraging government data for AI development. He believes AI will create jobs, but the US needs to support workers adapting to new roles.

Read more
Tech

Understanding the 'Quality World' in Choice Theory

2025-02-11
Understanding the 'Quality World' in Choice Theory

This article explores the concept of the 'Quality World' within Choice Theory/Reality Therapy. Using engaging examples like the parable of the blind men and an elephant, and a classroom exercise, the author illustrates how each individual's perception of reality is unique, forming a personal 'Quality World' comprised of images fulfilling their basic needs (love/belonging, power/self-worth, freedom, fun, physical survival). These images shape behavior, and understanding and supporting another's 'Quality World' is key to building strong relationships. The article also touches upon how unmet needs can lead to negative behaviors, highlighting the importance of accessing an individual's 'Quality World' to help them make more life-sustaining choices.

Read more

Kenney: A Treasure Trove of Free Game Assets

2025-01-12
Kenney: A Treasure Trove of Free Game Assets

Kenney.nl offers thousands of free game assets, including models, textures, and starter kits, fueled by community donations. Joining the Kenney Club not only supports asset creation but also grants early access to new releases, exclusive goodies, and community access. The site also features easy-to-use 3D modeling tools, allowing users to create assets quickly, even without prior experience with complex software. Perfect for game developers of all skill levels.

Read more

Southeast Asia's Booming Scam Centers: $37 Billion in Losses, International Cooperation Crucial

2025-07-14
Southeast Asia's Booming Scam Centers: $37 Billion in Losses, International Cooperation Crucial

A UNODC report reveals that scam centers are proliferating across Southeast Asia's border regions. Myanmar-based criminal groups, facing increased crackdowns, have relocated to countries like Laos and Cambodia. In 2023 alone, losses from these operations reached a staggering $37 billion in East and Southeast Asia, surpassing the revenue of drug syndicates. Japan is strengthening cooperation with local authorities, but the fluid nature of these criminal groups and their ability to adapt requires increased international collaboration to effectively combat this lucrative form of organized crime.

Read more
Misc

The Epic Burning of a NeXT Cube: An Accidental Experiment in Tech History

2025-07-14

This article recounts the author's humorous and arduous journey to photograph a burning NeXT Cube. Initially a simple plan to burn an empty case, the author faced numerous setbacks and unexpected twists, ultimately culminating in a successful burn at Lawrence Livermore National Laboratory's burn chamber. The narrative is filled with dramatic irony and dark humor, reflecting the challenges NeXT faced as a hardware manufacturer.

Read more
Tech

Headscale: A Self-Hosted Open Source Alternative to the Tailscale Control Server

2025-04-03
Headscale: A Self-Hosted Open Source Alternative to the Tailscale Control Server

Headscale is an open-source, self-hosted alternative to the Tailscale control server, offering a simple private network solution for individuals or small organizations. Built on WireGuard, it implements core Tailscale networking features like IP address assignment, user boundary management, and route advertisement. While not affiliated with Tailscale Inc., the project benefits from contributions from a Tailscale maintainer and adheres to strict coding standards and development processes. Headscale aims to provide a user-friendly and sustainable open-source alternative for self-hosting enthusiasts.

Read more
Development

Clever Workaround for Conflicting Blanket Implementations in Rust

2025-07-04
Clever Workaround for Conflicting Blanket Implementations in Rust

Rust's trait system is powerful but strict about avoiding ambiguity in blanket implementations. The author encountered this while building Joydb, needing to support two mutually exclusive implementations of the `Adapter` trait: `UnifiedAdapter` and `PartitionedAdapter`. A direct approach using blanket implementations failed. The solution, detailed in this post, uses marker structs (`Unified` and `Partitioned`), a helper trait (`BlanketAdapter`), and an associated type within the `Adapter` trait. This cleverly allows for both behaviors without violating Rust's coherence rules, maintaining good code ergonomics and maintainability.

Read more

The Nucleus: A Metabolic Compartment Rewriting Cell Fate

2025-03-23
The Nucleus: A Metabolic Compartment Rewriting Cell Fate

A groundbreaking study reveals the cell nucleus as a unique metabolic compartment, distinct from other cellular regions, playing a pivotal role in gene expression and cell fate. Researchers discovered that metabolic enzymes within the nucleus dynamically regulate epigenetic marks, such as histone acetylation, which change based on nutrient availability. In early embryonic development, nuclear metabolic activity is crucial for cell differentiation, while metabolites like alpha-ketoglutarate are key players in both stem cell differentiation and cancer suppression. This discovery opens exciting avenues for cancer therapy, suggesting the possibility of manipulating cellular metabolism to alter cell fate and treat diseases stemming from abnormal cell differentiation.

Read more

arXivLabs: Community Collaboration on arXiv Features

2025-02-26
arXivLabs: Community Collaboration on arXiv Features

arXivLabs is a framework for developing and sharing new arXiv features directly on the website, fostering collaboration with individuals and organizations that share arXiv's values of openness, community, excellence, and user data privacy. Got an idea to improve the arXiv community? Learn more about arXivLabs.

Read more
Development

US National Debt Clock: A Ticking Time Bomb?

2025-01-18

The U.S. National Debt Clock provides a stark, real-time view of America's burgeoning national debt. The website displays the total debt, per capita debt, and other key metrics in an easily digestible format, painting a clear picture of the precarious state of US finances. This isn't just a concern for economists; it's a stark reminder to every American citizen of the interconnectedness between national fiscal health and their own future. The site's clean design and transparent data make it a valuable resource for understanding the US economy, but also sparks serious questions about fiscal policy and future economic stability.

Read more

Remembering Duane Blehm: A Pioneer of Mac Shareware

2025-03-05

This article tells the story of Duane Blehm, an early Macintosh shareware game developer in the 1980s. The author, a fellow developer influenced by Blehm, reminisces about Blehm's classic games, *Stunt Copter* and *Cairo Shootout*, and their unique place in the early Macintosh ecosystem. Blehm's games were known for their simple graphics, clever mouse controls, and non-violent gameplay, reflecting the minimalist aesthetic of the early Mac. The article also recounts the author's poignant interactions with Blehm, including a heartbreaking discovery of Blehm's death and a later heartwarming reunion with his source code, which the author ultimately shared with the world. It's a tribute not only to a talented programmer but also to the unique game culture of the early Macintosh era.

Read more
Game

The Tiny Half Cent: America's Smallest Coin

2025-02-13
The Tiny Half Cent: America's Smallest Coin

The United States half cent coin, the smallest denomination ever minted, held a brief but fascinating history. Minted from 1793 to 1857, it underwent five design changes, all crafted from pure copper at the Philadelphia Mint. Its diameter varied slightly over the years, and it was ultimately replaced by the smaller cent in 1857. Today, these coins are highly sought after by collectors for their rarity and historical significance.

Read more
1 2 441 442 443 445 447 448 449 596 597