Liberux NEXX: The Privacy-Focused Linux Phone You've Been Waiting For

2025-01-23

The Liberux NEXX is a phone running LiberuxOS, a mostly open-source and ethical operating system based on Debian 13 Linux. Boasting an 8-core processor, 32GB RAM, and 2TB storage, it prioritizes user privacy and security. Integrated PC desktop functionality allows connection to external displays, keyboards, and mice. Liberux NEXX aims to combat data exploitation by large corporations, giving users complete control over their device and digital lives.

Read more
Hardware Linux phone

SpaceX Falcon 9 Launch Scrubbed 11 Seconds Before Liftoff Due to Delta Air Jet

2025-01-20
SpaceX Falcon 9 Launch Scrubbed 11 Seconds Before Liftoff Due to Delta Air Jet

A SpaceX Falcon 9 rocket launch was scrubbed with just 11 seconds to go on Sunday morning after a Delta Air Lines plane reportedly flew into restricted airspace near the launch site. The live broadcast of the launch showed the control room urgently calling "Hold, hold, hold!" as the launch was aborted at the 11-second mark. Investigations revealed the Delta Air Lines Boeing 767, en route from Los Angeles to Honolulu, flew over Vandenberg Space Force Base, the Falcon 9 launch site. The Federal Aviation Administration (FAA) will investigate how air traffic controllers allowed the Delta flight to enter the restricted airspace. This near-miss comes days after SpaceX's Starship rocket exploded, causing flight diversions.

Read more

Clive Sinclair: The British Microcomputer Maverick

2025-01-23
Clive Sinclair: The British Microcomputer Maverick

Clive Sinclair, a mathematical prodigy, revolutionized the UK and European personal computer market with his affordable and innovative designs, including the ZX80 and ZX Spectrum. His relentless pursuit of low-cost hardware brought computing to the masses, despite later setbacks like the Sinclair QL. His story is a captivating blend of genius, disruptive innovation, and entrepreneurial risk-taking, showcasing the transformative power of technology.

Read more

Subaru STARLINK Flaw Lets Hackers Remotely Control Cars, Access PII

2025-01-23
Subaru STARLINK Flaw Lets Hackers Remotely Control Cars, Access PII

Security researchers discovered a critical vulnerability in Subaru's STARLINK connected car service. Attackers, knowing only a victim's last name and zip code, email, or license plate, could remotely start, stop, lock, unlock, and track vehicles. They could also access a year's worth of location history and retrieve sensitive personal information (address, billing details, etc.). The vulnerability allowed complete vehicle control and was patched within 24 hours. This highlights the critical need for enhanced security in connected car systems and robust user data protection.

Read more

Xcode 16's Local Package Dependency Nightmare: Why I'm Using Two Editors

2025-01-23
Xcode 16's Local Package Dependency Nightmare: Why I'm Using Two Editors

Developer Christian Tietze encountered significant issues with Xcode 16 while working on a Swift Package. Xcode 16's altered approach to local package referencing broke file operations, test running, and more. To overcome this, he's forced to use both Xcode (for compiling and running the app) and Emacs (for editing and testing the package). The post laments Xcode 16's buggy update, Apple's aggressive software upgrade policy, and recommends developers learn a backup editor.

Read more
Development

GitHub: Surface-Stable Fractal Dithering

2025-01-23
GitHub: Surface-Stable Fractal Dithering

Rune Skovbo Johansen invented a novel surface-stable fractal dithering technique. This allows dither patterns in 3D scenes to stick to surfaces while maintaining approximately constant dot size and spacing on screen, even as surfaces move. This GitHub repository provides a Unity example project, shader and texture source files, and details on dither properties and global options like radial compensation and quantized layers. The technique achieves this by dynamically adding or removing dots, and offers 3D textures of varying dot densities. Licensed under MPL-2.0, encouraging community contributions.

Read more
Development 3D Graphics Dithering

TMSU: A Tag-Based Virtual Filesystem for Escaping the Hierarchical Filesystem Nightmare

2025-01-23

TMSU is a tool for tagging your files, offering a simple command-line interface for applying tags and a virtual filesystem providing a tag-based view of your files from any program. It doesn't modify your files; instead, it maintains its own database and mounts a tag-based view. You can tag files, query them using logical operators (and, or, not), and mount a virtual filesystem for access from other applications. This VFS allows for tag management by creating and deleting directories.

Read more
Development virtual filesystem tags

Planetary Orbit Spirographs Based on Kepler's Laws

2025-01-23

Inspired by John Carlos Baez's post on the Pentagram of Venus, Red Blob Games created a set of planetary orbit spirographs. Using Kepler's Third Law to convert orbital periods to distances from the sun, the site generates heliocentric planetary orbit images resembling spirographs. Data includes Mercury, Venus, Earth, Mars, Ceres, Jupiter, Saturn, Uranus, and Neptune.

Read more

Guided by the Beauty of Our Test Suite: A Story of Rust, Uxn, and Rigorous Engineering

2025-01-21

Last summer, the author released Raven, an independent implementation of the Uxn CPU and Varavara orchestrator. Recently, to improve stability and performance, the author built a robust testing infrastructure, including GitHub Actions CI, snapshot testing, static panic prevention, and fuzzing. This post details challenges and solutions encountered while building these tests, such as issues with the reliability of GitHub Actions' Windows and ARM runners, and pitfalls in statically proving the absence of panics and in fuzz testing. The author successfully improved Raven's performance and reliability, ensuring cross-platform portability. The journey highlights the power of Rust, cargo-fuzz, and even (sigh) GitHub Actions in creating robust and correct systems.

Read more
Development Virtual Machine

Pakistan Passes Bill Granting Sweeping Social Media Controls

2025-01-23
Pakistan Passes Bill Granting Sweeping Social Media Controls

Pakistan's parliament passed a controversial bill granting the government extensive control over social media, including imprisonment for spreading disinformation. The bill's swift passage followed a walkout by opposition lawmakers protesting the legislation, raising concerns about further suppression of free speech. Critics argue the act allows authorities to block content deemed "unlawful and offensive," and ban individuals and organizations from social media for posting it. Social media platforms must register with a new regulatory body or face bans. Spreading disinformation becomes a criminal offense, punishable by up to three years in prison and a hefty fine. Journalists' and editors' unions strongly oppose the bill, seeing it as an attempt to stifle media and free speech.

Read more
Tech Pakistan

Shocking Link Found Between ADHD and Shorter Lifespan

2025-01-23
Shocking Link Found Between ADHD and Shorter Lifespan

A new study of over 30,000 UK adults with ADHD reveals a startling connection: a significantly shorter life expectancy and increased risk of mental health issues. Men with ADHD experienced a life expectancy reduction of 4.5 to 9 years, while women saw a decrease of 6.5 to 11 years. Researchers suggest this could be due to inadequate support and treatment, or potentially factors predating birth or early childhood. The findings highlight the urgent need for improved healthcare and interventions for individuals with ADHD to enhance their quality of life and lifespan.

Read more
Tech lifespan

Heavy Social Media Use Linked to Higher Irritability

2025-01-23
Heavy Social Media Use Linked to Higher Irritability

A study published in JAMA Network Open found a correlation between frequent social media use and higher levels of irritability among US adults. The research, involving 42,597 participants, revealed that even after accounting for anxiety and depression, frequent use, especially among active posters, was associated with increased irritability scores. A dose-response relationship was observed, with TikTok users exhibiting the largest increase in irritability when posting multiple times daily. Political engagement also correlated with higher irritability levels. The findings suggest a potential feedback loop between social media use and irritability.

Read more

Trump Halts TikTok Ban for 75 Days: A High-Stakes Gamble

2025-01-21
Trump Halts TikTok Ban for 75 Days: A High-Stakes Gamble

President Trump issued an executive order temporarily halting enforcement of the TikTok ban for 75 days. This move aims to prevent penalties against American companies like Apple and Google for working with TikTok, but its legal standing is questionable. The ban stemmed from a law demanding TikTok divest from its Chinese parent company, ByteDance, and Trump's action effectively circumvents this legislation. While the reprieve may offer temporary relief, the decision carries significant legal and political risks, with massive fines still a possibility and its effectiveness highly debated.

Read more
Tech

The Death of Authenticity: How 'Authenticity' Became a Commodity

2025-01-20
The Death of Authenticity: How 'Authenticity' Became a Commodity

This essay traces the evolution of 'authenticity' in contemporary culture. From the early hipster obsession with independent, non-commodified goods to the current prevalence of marketing terms like 'handmade' and 'small-batch,' authenticity has shifted from a scarce commodity to a ubiquitous one. The author argues that the rise of the internet and social media has lowered the cost of information dissemination, leading to shared value replacing scarcity and ushering in a 'post-authenticity' era. Brands are no longer simply commodities but active participants in shaping culture, demanding a more nuanced approach to critique.

Read more

Intel's Modular PC Design: A New Approach to E-Waste?

2025-01-23
Intel's Modular PC Design: A New Approach to E-Waste?

Intel has proposed a modular PC design aimed at reducing e-waste by simplifying repairs and upgrades. Current PC designs are typically monolithic, leading to disposal when a component fails or becomes obsolete. Intel's approach allows for easy component replacement, extending device lifespan. Three designs targeting different market segments are proposed: Premium Modular PC, Entry/Mainstream Modular PC, and Desktop Modular PC. While modular PCs aren't new, Intel's proposal directly addresses the growing e-waste problem and aligns with the right-to-repair movement. However, widespread adoption depends on cost-effectiveness and market acceptance.

Read more

Matrix.org Warns: Nation-Scale Matrix Deployments Will Fail

2025-01-19

Matrix.org issued a warning that nation-scale deployments of Matrix will fail if improperly built. This highlights the critical need to carefully consider architecture and scalability when building large-scale decentralized communication systems. The warning emphasizes the importance of ensuring system stability and reliability for a positive user experience.

Read more
Tech

Mixxx: Unleash Your Inner DJ with Free, Open-Source Software

2025-01-20
Mixxx: Unleash Your Inner DJ with Free, Open-Source Software

Mixxx is a free and open-source DJ mixing software application available for Windows, macOS, and Linux. Boasting powerful features such as BPM and key detection, sync lock, DJ controller support, effects, and even vinyl record control, Mixxx caters to DJs of all skill levels. Driven by a passionate international community of DJs and programmers, Mixxx is constantly updated and improved. The latest release, Mixxx 2.5, promises an even more exciting DJ experience.

Read more

Tokyo Xtreme Racer: A Technical Deep Dive into the UE5 Powered Reboot

2025-01-23
Tokyo Xtreme Racer: A Technical Deep Dive into the UE5 Powered Reboot

After an 18-year hiatus, the Tokyo Xtreme Racer series roars back with a new entry in Steam Early Access. This technical review delves into the game's Unreal Engine 5.4 implementation. Surprisingly, even a GTX 1070 can run the game smoothly at 1080p with high settings. The author provides detailed comparisons of visual quality and performance across different presets, exploring the impact of Lumen lighting technology. Steam Deck performance and future update expectations are also discussed. The game proves surprisingly scalable and visually appealing, even on older hardware.

Read more

Microsoft's Security Scanners Break Single-Use Links: A Shifting Cyber Norm

2025-01-23
Microsoft's Security Scanners Break Single-Use Links: A Shifting Cyber Norm

Bert Hubert reveals that Microsoft and other email security scanners are visiting links in emails and executing JavaScript, including sending POST requests. This violates the long-standing norm that POST requests shouldn't have side effects, breaking single-use login links. The article discusses the impact on web development and calls for greater transparency from large tech companies when changing internet norms.

Read more
Development Single-use links

HiringCafe: A Global Job Search Engine

2025-01-23
HiringCafe: A Global Job Search Engine

HiringCafe is a global job search engine offering remote, hybrid, and onsite job opportunities. Users can filter their search by department, salary, experience, job titles, education, licenses & certifications, security clearance, languages, shifts & schedules, travel requirements, and benefits. The site also allows searching by company industry, stage & funding, size, and founding year, enabling users to find the perfect job match.

Read more
Misc

Debugging React Server Components in Next.js with OpenTelemetry

2025-01-23
Debugging React Server Components in Next.js with OpenTelemetry

React Server Components (RSCs) offer performance benefits but introduce debugging challenges. This article demonstrates using OpenTelemetry, a powerful observability framework, to trace RSC activity within Next.js applications. OpenTelemetry allows tracing requests, collecting metrics, and aggregating logs, giving developers insights into server-side component execution, including lifecycle events, data fetching operations, and rendering performance. A real-world case study showcases optimizing a page loading numerous GitHub API calls using OpenTelemetry. The article details installing necessary packages, creating an instrumentation.js file, and configuring data export destinations. It also explains creating custom spans for more granular insights.

Read more
Development

A Deep Dive into Compression Algorithms: From DEFLATE to ZSTD

2025-01-23

While building MonKafka, a Kafka Broker implementation, the author delved into the four compression algorithms supported by Kafka: GZIP, Snappy, LZ4, and ZSTD. The article provides a detailed explanation of these algorithms, covering lossless and lossy compression, run-length encoding, Lempel-Ziv algorithms, Huffman coding, and a deep dive into the DEFLATE algorithm's implementation, including LZ77, Huffman coding, and hash tables. Furthermore, it compares the performance of Snappy, LZ4, and ZSTD, and briefly introduces arithmetic coding and FSE. The author concludes by summarizing the core concept of compression algorithms: removing data redundancy, reducing entropy, and extracting information.

Read more

7 Lessons from Building a Small-Scale AI Application

2025-01-23
7 Lessons from Building a Small-Scale AI Application

This article details seven lessons learned from building a small-scale AI assistant over the past year. The author discovered that scalability issues arose earlier than anticipated. AI programming is stochastic, requiring iterative adjustments to prompts, fine-tuning, preference tuning, and hyperparameters. Data quality is crucial, with significant time investment in building and maintaining a high-quality dataset and processing pipeline. Model evaluation is equally important, as simple validation sets often fail to capture real-world edge cases. Trust and quality are paramount, demanding continuous experimentation and evaluation. The training pipeline itself is the core intellectual property, constantly refined through iteration. Finally, the author cautions against over-reliance on AI libraries due to potential incompleteness or poor ecosystem integration; building directly upon lower-level abstractions is often more reliable.

Read more

macOS Kernel Vulnerability CVE-2024-54507: A Ghostly sysctl Overread

2025-01-23
macOS Kernel Vulnerability CVE-2024-54507: A Ghostly sysctl Overread

A security researcher uncovered a fascinating vulnerability (CVE-2024-54507) in the XNU kernel of macOS 15.0. The bug resides within the `sysctl_udp_log_port` function, where an integer type confusion leads to a 4-byte read instead of the expected 2-byte read of a `uint16_t` variable, resulting in a 2-byte out-of-bounds read. An attacker could exploit this to read parts of kernel memory; while the contents depend on linker behavior and system configuration, it could still leak sensitive data. Apple patched this vulnerability in macOS 15.2 and iOS 18.2.

Read more

Polars vs Pandas: A Head-to-Head Comparison

2025-01-23
Polars vs Pandas: A Head-to-Head Comparison

This book provides a detailed comparison of the Polars and Pandas data manipulation libraries, arguing that Polars offers a more intuitive and efficient approach. Through numerous examples, it showcases Polars' advantages across indexing, method chaining, performance, data reshaping, time series, and scalability. Polars consistently outperforms Pandas in speed and readability. The book is aimed at readers with some experience in data manipulation, particularly those familiar with Pandas.

Read more
Development data manipulation

Trump Signs Crypto Executive Order, Charting a Path for US Digital Assets

2025-01-23
Trump Signs Crypto Executive Order, Charting a Path for US Digital Assets

President Trump signed a long-awaited executive order on cryptocurrencies, setting a federal agenda to bring US digital asset businesses under friendlier oversight. The order establishes a working group to review existing regulations and propose modifications or revocations within 180 days. It also bans the development of a US central bank digital currency (CBDC). The move is seen as positive for the crypto industry, causing a brief spike in Bitcoin's price before a retracement.

Read more

Anthropic's Claude API Now Features Citations for Verifiable Answers

2025-01-23
Anthropic's Claude API Now Features Citations for Verifiable Answers

Anthropic has launched Citations, a new API feature for Claude that allows it to cite specific sentences and passages from source documents within its responses. This significantly enhances the verifiability and trustworthiness of Claude's outputs. Applications range from document summarization and complex Q&A to customer support, offering improved accuracy and efficiency while minimizing the risk of AI hallucinations. Early adopters like Thomson Reuters and Endex have reported substantial improvements in accuracy and workflow.

Read more

Say Goodbye to Hassle: Wake Up Your Devices with One Command – Introducing the 'wol' Tool

2025-01-23
Say Goodbye to Hassle: Wake Up Your Devices with One Command – Introducing the 'wol' Tool

'wol' is a powerful Wake-On-LAN (WOL) tool that lets you easily wake up your network devices via a command-line interface or web interface. It supports configuring multiple machines, providing a simple list view and one-click wake-up functionality. Whether you prefer CLI commands or a graphical interface, you can efficiently manage and wake up your computers or servers. Docker support is also included for easy deployment.

Read more
Development

Pwn2Own Automotive 2025: 16 Zero-Days Exploited on Day One

2025-01-23
Pwn2Own Automotive 2025: 16 Zero-Days Exploited on Day One

On the first day of Pwn2Own Automotive 2025, security researchers successfully exploited 16 unique zero-day vulnerabilities, earning a total of $382,750 in prize money. Fuzzware.io took the lead, hacking Autel MaxiCharger and Phoenix Contact CHARX SEC-3150 EV chargers. The competition highlighted critical vulnerabilities in EV chargers, in-vehicle infotainment systems, and car operating systems, underscoring the importance of cybersecurity in the automotive industry.

Read more
1 2 3 4 6 8 9 10 100 101