Clearview AI: A Tech Company Fueled by the Far Right, Weaponizing Surveillance

2025-04-07
Clearview AI: A Tech Company Fueled by the Far Right, Weaponizing Surveillance

Clearview AI, a powerful facial recognition technology company, was founded by Hoan Ton-That, a figure with strong far-right ties and close connections to neoreactionaries and white nationalists. The company built a massive biometric database using billions of images scraped from the internet, offering facial recognition services to law enforcement and corporations, raising enormous privacy concerns. Clearview AI actively pursued partnerships with border patrol and is accused of using its technology to surveil protesters and political opponents. Despite facing multiple lawsuits and hefty fines, Clearview AI thrived under the Trump administration, forging close relationships with agencies like ICE, raising the specter of its technology being used for mass surveillance and deportation. The company's new leadership, openly embracing a MAGA agenda, suggests a continued threat to privacy and democratic institutions.

Read more
Tech far-right

Revolutionary Plant-Based Chocolate: Ancient Brewing Tech Creates a New Treat

2025-04-07

ChoViva chocolate uses natural ingredients like sunflower seeds, sugar, and plant-based fats. An innovative fermentation process, mimicking ancient beer brewing techniques, is used to roast and grind the sunflower seeds into a concentrate similar to cocoa powder. This concentrate is then mixed with other plant-based ingredients, repeatedly ground, and conched with plant-based fats to achieve a creamy, smooth texture. This technology promises to revolutionize the chocolate industry.

Read more

UK Cracks Down on Fake Online Reviews and Hidden Fees

2025-04-07
UK Cracks Down on Fake Online Reviews and Hidden Fees

The UK has implemented new legislation to combat fake online reviews and the deceptive practice of 'drip pricing,' where additional fees are added during checkout. The Digital Markets, Competition, and Consumer Act 2024 mandates that all mandatory fees, such as booking or admin charges, be included in the advertised price. This applies to services like food delivery and ticket booking platforms. Businesses are also prohibited from using or commissioning fake reviews. Platforms are responsible for removing and preventing them, facing potential fines up to 10% of global annual turnover for non-compliance. The aim is to protect consumers and ensure fair competition.

Read more

Git's 20th Anniversary: From Humble Beginnings to Version Control Domination

2025-04-07
Git's 20th Anniversary: From Humble Beginnings to Version Control Domination

Twenty years ago today, Linus Torvalds made the first commit to Git. Since then, it's become the dominant version control system. This article recounts Git's early history, from its origins as a tool to address version control and collaboration challenges in the Linux kernel community, to its evolution into the powerful system we know today. Author Scott Chacon shares his personal journey with Git, explaining how it transformed from a simple "stupid" content tracker into a feature-rich VCS that reshaped software development. The story also delves into the origins of some core Git commands and the birth of GitHub's iconic Octocat.

Read more
Development

AI-Powered Resume Deception: A Kapwing Hiring Nightmare

2025-04-07
AI-Powered Resume Deception: A Kapwing Hiring Nightmare

Kapwing, an online video editing startup, recently experienced a surreal job interview with a candidate who used AI to prepare. The candidate's resume and initial answers were impressive, but deeper technical questioning exposed inconsistencies. The candidate ultimately admitted to using AI. This highlights the need for more rigorous interview processes in the age of AI, including detailed situational questions, focusing on the human impact of solutions, and thorough reference checks.

Read more
Startup AI Deception

50 Years of Open Source Software Supply Chain Security: From Multics to the xz Attack

2025-04-07

This article explores the challenges of open source software supply chain security over the past five decades. From potential backdoors identified in a 1974 Multics security evaluation to the 2024 xz compression library backdoor attack, the problem persists. Russ Cox, a core developer of the Go programming language, draws on personal experience and industry examples to discuss definitions of supply chain attacks and vulnerabilities, the complexity of software supply chains, and methods for strengthening defenses. These include software authentication, reproducible builds, rapid vulnerability discovery and patching, and vulnerability prevention strategies. The article highlights the underfunding of open source software, leaving projects vulnerable to malicious actors, illustrated by the xz attack. Ultimately, the author calls for increased funding and improved security practices in open source to address evolving threats.

Read more

Lux: A Modern Package Manager for Lua, Finally!

2025-04-07

Lux is a new package manager for Lua designed to address the shortcomings of Luarocks, offering a modern and intuitive experience. It features a simple CLI, robust lockfile support, parallel builds, and seamless integration with Neovim and Nix. Lux uses TOML configuration, enforces SemVer, and maintains compatibility with the existing luarocks ecosystem. It promises significant improvements in build speed, dependency management, and reproducibility for Lua projects, especially benefiting Neovim plugin developers with increased speed and stability.

Read more
Development

How Much Does the Internet Weigh?

2025-04-07
How Much Does the Internet Weigh?

The question of the internet's weight, seemingly absurd, has spurred scientific inquiry. Early estimates pegged it at roughly 50 grams, equivalent to a few strawberries. However, with the explosive growth of data, this figure is outdated. This article explores three calculation methods: server energy consumption, electron information transmission, and DNA storage density. The final calculation, based on the law of conservation of energy, reveals an incredibly small mass: 53 quadrillionths of a gram. Yet, regardless of its physical weight, the internet's impact on humanity remains immense.

Read more
Tech data

The Obscure Interact Model One Home Computer and its Surprisingly Deep Adventure Game

2025-04-07
The Obscure Interact Model One Home Computer and its Surprisingly Deep Adventure Game

This article delves into the story of the Interact Model One, a low-cost personal computer from 1978 that aimed to compete with giants like the Commodore PET but ultimately failed in the US market. However, its successor, the Victor Lambda, found success in France, leading to the development of games such as the surprisingly complex adventure game, *Troll Hole Adventure*. This 8-bit game, despite its limitations in memory and resolution, boasts a challenging puzzle design and deep gameplay, showcasing the ingenuity of early game developers working with constrained resources. The article follows the journey of the computer's creator, Ken Lochner, from his work on Dartmouth's time-sharing system to his foray into the personal computer market, highlighting the challenges and triumphs of this forgotten piece of computing history.

Read more

Kahuna: Your IndexedDB Swiss Army Knife

2025-04-07
Kahuna: Your IndexedDB Swiss Army Knife

Kahuna is a browser extension for Firefox and Chromium-based browsers that simplifies IndexedDB database management. It lets you create, modify, view, query, edit, import, and export IndexedDB data. Features include data filtering, pagination, JavaScript code execution, and import/export in various formats (Dexie, JSON, CSV). While documentation is a work in progress, Kahuna is a powerful tool for developers working with IndexedDB.

Read more
Development

Compressed Air Supercharging: The Next Big Thing in Drag Racing?

2025-04-07
Compressed Air Supercharging: The Next Big Thing in Drag Racing?

Drag racers are ditching traditional turbos and blowers for a new technology called Compressed Air Supercharging (CAS). CAS uses high-pressure air to supercharge engines, requiring no engine power and delivering extremely cold, dense air for superior performance and efficiency compared to traditional methods. Pioneered by Dale Vaznaian, CAS is gaining traction with racers like Tina Pierce and Ryan Mitchell achieving impressive results. While still in its early stages, its potential is undeniable, promising a revolution in drag racing power.

Read more

Nagel on Moral Judgment and Progress: A Critique

2025-04-07
Nagel on Moral Judgment and Progress: A Critique

This article examines Thomas Nagel's views on the objectivity of moral judgment and moral progress. Using the anecdote of a WWII French Resistance member interrogating a Nazi collaborator, Nagel illustrates the power of moral intuitions. While acknowledging utilitarian and evolutionary explanations for these intuitions, he argues they reflect underlying moral truths. Nagel distinguishes scientific from moral progress, asserting that accessing moral truths depends on historical developments revealing new moral reasons. He uses examples like individual rights, social equality, sexual morality, and international justice to show moral progress stems from multiple factors, not a single principle. The author ultimately questions Nagel's view, suggesting applying utilitarian principles to all affected individuals is key to moral advancement.

Read more

Browser MCP: Local Browser Automation

2025-04-07

Browser MCP is a local browser automation tool prioritizing speed, security, and convenience. Automation happens locally, resulting in faster performance without network latency and keeping your browser activity private – no data is sent to remote servers. It uses your existing browser profile, maintaining your logged-in status across services, and avoids bot detection and CAPTCHAs by leveraging your real browser fingerprint.

Read more
Development

Apple Airlifts iPhones to Beat US Tariffs: India Emerges as Key Player

2025-04-07
Apple Airlifts iPhones to Beat US Tariffs: India Emerges as Key Player

To avoid newly imposed US tariffs, Apple urgently shipped five planeloads of iPhones and other products from India to the US in just three days at the end of March. This move aims to maintain current US pricing using existing inventory, preventing cost increases for consumers. The event highlights India's strategic importance in Apple's global supply chain. Due to tariff differences, iPhones manufactured in India offer a significant cost advantage over those made in China, suggesting Apple may further increase production in India.

Read more

OpenPrompt: Seamlessly Integrate Code into LLMs

2025-04-07
OpenPrompt: Seamlessly Integrate Code into LLMs

OpenPrompt simplifies the process of feeding code into large language models like Claude, GPT-4, and Grok. This tool rapidly serializes files and folders into XML, making it easy to upload your codebase. Available for Windows, macOS, and Linux (with executables provided), OpenPrompt lets you select directories, filter files, add instructions, and generate an XML prompt ready for pasting into your chosen LLM. Use cases include code reviews, documentation generation, refactoring assistance, bug hunting, learning new codebases, and architectural analysis.

Read more
Development

Recreating Game Boy Sounds with the Web Audio API: Fourier Series vs. Wave Shaper

2025-04-07

While building a web-based Game Boy style music tracker, the author encountered the challenge of faithfully recreating the iconic Game Boy square wave sounds. Game Boy's pulse channels supported variable duty cycles, but the Web Audio API's OscillatorNode only provides a 50% duty cycle square wave. The article explores two solutions: generating a custom waveform using the Fourier series and shaping a sawtooth wave with a WaveShaperNode. The Fourier series approach offers higher accuracy but is computationally expensive; the WaveShaperNode method is simpler but might introduce some noise. The author ultimately prefers the WaveShaperNode approach for its simplicity and its ability to produce a more authentic Game Boy sound.

Read more
Development Sound Synthesis

2,000-Year-Old Roman Battlefield Unearthed in Vienna

2025-04-07
2,000-Year-Old Roman Battlefield Unearthed in Vienna

During renovations of a sports field in Vienna, a mass grave containing the remains of approximately 150 soldiers was discovered. Archaeological analysis confirms the remains date to a battle between Roman legionaries and Germanic tribes sometime between the mid-first and early second centuries CE. The discovery, including weaponry (daggers, spears, helmet fragments) and a dagger sheath with silver wire inlays providing precise dating, offers the first direct archaeological evidence of a battle along the Danube Limes, a key part of the Roman Empire's eastern frontier. This find sheds new light on the origins of Vienna and the conflicts that led to the expansion of the Roman military camp Vindobona.

Read more
Tech

GitMCP: Effortlessly Access GitHub Project Documentation with AI

2025-04-07
GitMCP: Effortlessly Access GitHub Project Documentation with AI

GitMCP is a free, open-source service that seamlessly transforms any GitHub project into a remote Model Context Protocol (MCP) endpoint, allowing AI assistants to effortlessly access and understand project documentation. Zero setup is required; GitMCP works out of the box and is completely free and private, collecting no personally identifiable information or queries. Users access GitHub repositories or GitHub Pages sites via simple URL formats. AI assistants can access project documentation through GitMCP, utilizing semantic search to optimize token usage. GitMCP acts as a bridge between your GitHub repository's documentation and AI assistants by implementing the MCP, ensuring efficient and accurate information delivery.

Read more
Development

Do LLMs Understand Nulls? Probing the Internal Representations of Code-Generating Models

2025-04-07

Large language models (LLMs) have shown remarkable progress in code generation, but their true understanding of code remains a question. This work investigates LLMs' comprehension of nullability in code, employing both external evaluation (code completion) and internal probing (model activation analysis). Results reveal LLMs learn and apply rules about null values, with performance varying based on rule complexity and model size. The study also illuminates how LLMs internally represent nullability and how this understanding evolves during training.

Read more

FCC's toothless bite: News Distortion Enforcement a Rare Bite

2025-04-07
FCC's toothless bite:  News Distortion Enforcement a Rare Bite

A nearly quarter-century-old study reveals the FCC's incredibly rare punishment of news distortion. Since the Reagan-era deregulation of broadcast news in 1982, such penalties have plummeted. While the FCC lacks explicit rules against news distortion, a policy has emerged through case-by-case adjudications. Recent allegations, including the inaccurate 2000 election projections, rarely result in findings of news distortion. This highlights the FCC's surprisingly weak enforcement of news accuracy, revealing significant practical limitations.

Read more

Reverse Engineering a 90s Hebrew-English Word Processor

2025-04-07
Reverse Engineering a 90s Hebrew-English Word Processor

This blog post details the process of reverse engineering QText, a DOS-era Hebrew-English word processor written in Turbo Pascal from the mid-90s, to decrypt its locked documents. The authors, facing a client's lost password, leveraged the simplicity of the encryption algorithm – the key was embedded within the file – and pursued both brute-force and reverse engineering approaches to reconstruct the key derivation algorithm. They successfully recreated the algorithm and developed a Python script for automated decryption. The case study offers insights into early software development cryptography and reverse engineering techniques, highlighting the evolution of information security.

Read more
Development

US Tariffs Trigger a European Cloud & AI Shakeup

2025-04-07
US Tariffs Trigger a European Cloud & AI Shakeup

New US tariffs are hitting global supply chains, significantly impacting European companies reliant on US-based hardware and cloud services. The cost of servers, networking equipment, and GPUs is soaring, driving up cloud prices and increasing AI development costs. This isn't just a financial issue; it's strategic. European businesses must adapt, shifting to EU cloud providers (like OVHcloud, IONOS), reassessing hardware sourcing, and monitoring potential EU countermeasures. This trade dispute could fragment the AI and cloud market, making regional resilience crucial.

Read more
Tech

Excel's Date Parsing: A 400-Year-Old Bug?

2025-04-07
Excel's Date Parsing: A 400-Year-Old Bug?

While building Quadratic, an AI spreadsheet, the team uncovered bizarre quirks in Excel's date parsing. Entering "1/2" and adding 1 yields 45660; "10:75" becomes 0.46875. This stems from Excel's serial date system, counting days since January 1, 1900. However, historical inaccuracies (treating 1900 as a leap year and the Gregorian calendar shift) create discrepancies. Quadratic uses Rust's chrono library, avoiding these issues and integrating seamlessly with Python, SQL, and other modern tools. The team corrected the 1900 leap year error, restoring balance to the universe.

Read more
Development Date Parsing

EU to Simplify GDPR: A Lifeline for Struggling Businesses?

2025-04-07
EU to Simplify GDPR: A Lifeline for Struggling Businesses?

The European Union is poised to simplify its complex General Data Protection Regulation (GDPR). Since its 2018 implementation, the GDPR has faced criticism for its burdensome compliance requirements, particularly impacting small and medium-sized enterprises (SMEs). Danish Digital Minister Caroline Stage Olsen highlighted the need for simplification, acknowledging the importance of privacy while advocating for less bureaucratic compliance. The European Commission has confirmed an upcoming proposal to streamline the GDPR, aiming to alleviate the compliance burden on SMEs and boost Europe's economy. This move echoes concerns raised by former Italian Prime Minister Mario Draghi about Europe's complex regulations hindering innovation.

Read more
Tech

Sharp Drop in US International Arrivals: A Data-Driven Investigation

2025-04-07
Sharp Drop in US International Arrivals: A Data-Driven Investigation

Analyzing data from the CBP's Average Wait Time website, the author reveals a significant decline of over 10% in foreign travelers to the US since March. To validate the data's reliability, the author compared it to US traveler data, finding that only foreign arrivals decreased, ruling out data entry delays. While acknowledging data limitations and seasonal factors, the trend warrants attention, hinting at potential policy or other influences. The author uses San Antonio theft data as a parallel example, highlighting the need for caution in analyzing early data and accounting for potential biases and incomplete data sets. This detailed analysis underscores the importance of rigorous data verification before drawing conclusions.

Read more

The CD-ROM Server Savior

2025-04-07
The CD-ROM Server Savior

An aging server at Initrode Global was crashing frequently, requiring manual restarts. The IT manager was stumped until an engineer devised a quirky solution: using an old PC's CD-ROM drive and a modified script to automatically reboot the failing server. This makeshift 'robot,' dubbed ITAPPMONROBOT, provided a bizarre yet effective fix until a new server was deployed, then it continued its pointless routine until decommissioned.

Read more

The Unexpected Math of Crochet: From Mobius Strips to Fractals

2025-04-07
The Unexpected Math of Crochet: From Mobius Strips to Fractals

This article explores the surprising connection between crochet and mathematics. From the geometric patterns inherent in ancient weaving to modern artists using crochet to create Mobius strips, hyperbolic surfaces, and fractal structures, it showcases the application of mathematical principles in art. The article also details examples of crocheting the Lorenz attractor and the presence of fractals in nature and crochet, captivatingly illustrating the beautiful fusion of mathematics and craft.

Read more

Escaping the Valley: A B2B SaaS Path Less Traveled (and More Founder-Friendly)

2025-04-07
Escaping the Valley: A B2B SaaS Path Less Traveled (and More Founder-Friendly)

Matt, a founder who successfully sold his company Vizzly to WPP, shares his unconventional approach to building a B2B SaaS business. He argues against the typical VC-backed path of massive funding or complete bootstrapping, advocating for a 'middle path'—raising less than $1M, retaining most equity, avoiding board seats, and focusing on profitability and asset value. This approach, while unpopular with VCs due to their high-return expectations, offers founders more control and a balanced return, mitigating the risk of significant losses in liquidation events. The author encourages entrepreneurs to choose a funding strategy aligned with their values and goals, not just VC approval.

Read more

LLM Elimination Game: Social Reasoning, Strategy, and Deception

2025-04-07
LLM Elimination Game: Social Reasoning, Strategy, and Deception

Researchers created a multiplayer "elimination game" benchmark to evaluate Large Language Models (LLMs) in social reasoning, strategy, and deception. Eight LLMs compete, engaging in public and private conversations, forming alliances, and voting to eliminate opponents until only two remain. A jury of eliminated players then decides the winner. Analyzing conversation logs, voting patterns, and rankings reveals how LLMs balance shared knowledge with hidden intentions, forging alliances or betraying them strategically. The benchmark goes beyond simple dialogue, forcing models to navigate public vs. private dynamics, strategic voting, and jury persuasion. GPT-4.5 Preview emerged as the top performer.

Read more

Secure Curl: Building Reliable C Code for Billions of Installations

2025-04-07
Secure Curl:  Building Reliable C Code for Billions of Installations

The curl team shares their practices for building secure and reliable network transfer tools in C. They highlight the importance of extensive testing, including static analysis and fuzzing. Approximately 40% of their security vulnerabilities stem from C's memory unsafety, but strict coding standards, style enforcement, and avoidance of risky functions keep this number low. Curl's coding style emphasizes readability and maintainability through line length limits, short variable names, and zero-warning compilations. Robust error handling, API stability, and careful memory management are crucial for the software's reliability and security.

Read more
Development C security
1 2 323 324 325 327 329 330 331 596 597