Urgent: Next.js Security Update Patches Critical Vulnerability

2025-03-22
Urgent: Next.js Security Update Patches Critical Vulnerability

Next.js has released version 15.2.3 to address a critical security vulnerability (CVE-2025-29927) that could allow unauthorized access. The vulnerability lies in the handling of the `x-middleware-subrequest` header in middleware, potentially allowing attackers to bypass critical security checks such as authentication. All self-hosted Next.js deployments using `next start` and `output: 'standalone'` are urged to update immediately. Patches for Next.js 14.x and 13.x are also available.

Read more
Development

Unreal Tournament's Sniper Rifle: A Balancing Act Between Physics and Gameplay

2025-03-22
Unreal Tournament's Sniper Rifle: A Balancing Act Between Physics and Gameplay

This article delves into the physics model of the sniper rifle in the classic game Unreal Tournament. While the game uses a 'hitscan' mechanic, ignoring real-world factors like bullet travel time and drop, this simplified model generally provides a smooth gameplay experience. However, on the iconic map 'Facing Worlds', the unrealism of this simplification becomes more noticeable. The article compares different games' approaches to projectile physics, explaining the trade-offs between realism and gameplay in game design, ultimately concluding with the philosophy, "All models are wrong, but some models are useful."

Read more

AP Program Gets a Makeover: Industry Partners Join the Fold

2025-03-22
AP Program Gets a Makeover: Industry Partners Join the Fold

The College Board, creator of the Advanced Placement (AP) program, is revolutionizing its curriculum. Partnering with industry giants like IBM and the U.S. Chamber of Commerce, they've launched AP Career Kickstart, initially offering courses in cybersecurity and business principles/personal finance. This aims to bridge the gap between high school education and in-demand job skills, attracting students not solely focused on college. The courses offer college credit and industry-recognized skills, enhancing employability. This signifies a blurring of lines between traditional education and vocational training, reflecting a broader societal re-evaluation of higher education's value.

Read more

The Arithmometer's Rocky Road to Success: From Obscurity to Industry Standard

2025-03-22

This paper tells the story of Charles Xavier Thomas de Colmar's arithmometer. While not the first calculating machine, its robust design and mass production capabilities led to its eventual success. The paper traces the machine's journey from its first public appearance in 1820 to its widespread adoption in the 1870s, examining its mechanical development, marketing strategies, and user experiences. The arithmometer underwent significant redesigns, with its design and market positioning continually adjusted. Despite initial slow adoption and setbacks against competitors in exhibitions, consistent improvements and promotional efforts ultimately led to widespread acceptance and its crucial role in the computing industry.

Read more

Kubient CEO Jailed for AI-Fueled Ad Fraud Scheme

2025-03-22
Kubient CEO Jailed for AI-Fueled Ad Fraud Scheme

Paul Roberts, CEO of ad-tech firm Kubient, was sentenced to one year and one day in prison for orchestrating a $1.3 million fraud scheme. Roberts inflated Kubient's IPO and sales of its AI tool, KAI, by engaging in a reciprocal billing scheme with another company and fabricating KAI performance reports. This case highlights the ethical risks in the pursuit of growth within AI companies and underscores the need for investor vigilance in evaluating tech company financials.

Read more

Citizen Lab Exposes Israeli Spyware Maker Paragon's Global Reach

2025-03-22
Citizen Lab Exposes Israeli Spyware Maker Paragon's Global Reach

A new Citizen Lab report reveals that Israeli spyware maker Paragon Solutions, despite claiming to sell only to democracies, has likely sold its Graphite spyware to the governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore. The report, based on analysis of server infrastructure and digital certificates, links Paragon to these governments. Paragon's spyware uniquely targets specific apps, making forensic detection harder. Meta confirmed an indicator linked to Paragon mentioned in the report. The findings raise serious concerns about the misuse of commercial spyware and the need for greater government oversight.

Read more
Tech spyware

The Truth About Anger: Beyond Retribution, Towards Cooperation

2025-03-22
The Truth About Anger: Beyond Retribution, Towards Cooperation

This essay explores the nature and destructiveness of anger. Starting with Aristotle's definition, the author argues that anger stems from significant damage to something one cares about, coupled with a desire for retribution. However, this desire for payback is deemed irrational, as it fails to restore what was lost. Retribution only makes sense when anger focuses on status rather than justice, a narrow and self-centered perspective. The author advocates a 'transition' from retribution to focusing on the future, resolving issues through cooperation and reason. Nelson Mandela's life serves as a powerful example of this transition's importance in both personal and political life.

Read more

Open Source Supply Chain Attack: The xz Backdoor Incident

2025-03-22

In March 2024, a backdoor was discovered in xz, a widely used compression software. A malicious maintainer, using the pseudonym Jia Tan, secretly inserted this backdoor over three years. The backdoor enabled remote code execution on machines with ssh installed. Its discovery was accidental, by a Postgres developer investigating unrelated performance issues. This article details the backdoor's mechanics and proposes using build reproducibility for detection. The backdoor involved modifying the xz build process to inject a malicious object file and leveraging glibc's ifunc mechanism to hook ssh's RSA_public_decrypt function. The author advocates building software from trusted sources and leveraging build reproducibility to enhance software supply chain security, such as comparing GitHub releases with maintainer-provided tarballs and checking binary consistency across build sources.

Read more
(luj.fr)

Vibe Coding: Hype vs. Reality

2025-03-22
Vibe Coding: Hype vs. Reality

The recent social media trend of "Vibe Coding," which relies on Large Language Models (LLMs) to generate code, is criticized in this article. While LLM agents like Cursor can quickly produce code prototypes, the author argues this is merely the surface of Vibe Coding. In reality, LLMs struggle with complex projects, lack attention to detail, and are unsuitable for production software development. The author uses personal experiences and examples to illustrate the limitations of LLM agents, such as making elementary mistakes, handling multiple contexts poorly, and lacking long-term memory. Although LLMs can improve development efficiency, they cannot fully replace human developers, especially in scenarios requiring high reliability and security. The author concludes that Vibe Coding might quickly build prototypes, but reliable software still needs experienced programmers.

Read more
Development

Secure Shell Command Execution: A Novel String Interpolation Approach

2025-03-22

This article explores secure methods for executing shell commands with user input, avoiding command injection vulnerabilities. The author starts with a vulnerable example, then presents three improved solutions: using `execFile` instead of `exec`, passing arguments via environment variables, and employing safe interpolation with JavaScript tagged templates. The article also compares similar approaches in other languages like Python and Swift, culminating in a surprisingly clever (though not production-ready) Python solution using decorators and regular expressions to achieve safe interpolation.

Read more
Development command injection

Matrix Logarithms and Transform Interpolation: Understanding Transforms as Velocity Fields

2025-03-22

This article explores how to smoothly interpolate a transform matrix T to move a point x from its initial position to its position transformed by T. The key is using matrix exponentials and logarithms. By raising T to the power of t (T^t = e^(log(T)*t)), we can obtain the transform T(t) at time t. Interestingly, log(T) represents the velocity field of the transformation; its product with point x gives the velocity vector at that point. The article explains this mathematical principle in detail, providing an interactive example and code links demonstrating transform interpolation and visualizing a matrix as a velocity field.

Read more

Major Polar Vortex Disruption Imminent: Early End to Winter?

2025-03-22
Major Polar Vortex Disruption Imminent: Early End to Winter?

For months, strong polar vortex winds have been circulating the stratospheric polar region. However, forecasts predict a major disruption this weekend, with wind speeds dramatically decreasing and potentially reversing. This could lead to a sudden stratospheric warming, with temperatures potentially rising 25°C in just days. This event may displace the polar vortex or split it, potentially impacting spring weather with colder-than-normal Arctic air. The extent to which this affects the troposphere remains uncertain. This could signal a premature end to the polar vortex season, a phenomenon observed in past years.

Read more

Resurrecting a Caltech DEC Pro 380: A Retro Hardware Upgrade

2025-03-22
Resurrecting a Caltech DEC Pro 380: A Retro Hardware Upgrade

This article details the author's journey upgrading a vintage DEC Professional 380 computer, a relic from Caltech, based on the PDP-11 architecture. This machine represents one of DEC's less successful forays into the personal computer market, but its robust build and unique design remain fascinating. The author meticulously documents the upgrade process, including replacing the aging hard drive with an SSD and upgrading the RAM, alongside experiences using the PRO/VENIX operating system. Interwoven is a compelling history of DEC's struggles in the PC market and the evolution of the PDP-11 architecture, making for a technically detailed and engaging read.

Read more
Hardware

Italian Court Orders Google to Block Pirate Sites, Faces Hefty Fines

2025-03-22
Italian Court Orders Google to Block Pirate Sites, Faces Hefty Fines

An Italian court ruled against Google for failing to promptly block pirate websites identified by the Italian copyright authority, AGCOM. The court's decision, issued without requiring a response from Google, underscores the severity of the violation. This follows a similar case against Cloudflare. The ruling highlights Italy's tough stance against online piracy and its efforts to hold international tech giants accountable for adhering to local laws. Google could face significant daily fines if it fails to comply.

Read more
Tech

AI's Economic Impact: Automation of Labor, Not Just R&D?

2025-03-22
AI's Economic Impact: Automation of Labor, Not Just R&D?

A prevailing view posits that AI's primary economic impact will be through automating R&D. This article challenges that notion, arguing that R&D's economic value is overestimated, contributing far less to productivity growth than commonly believed. The authors contend that AI's economic value will stem primarily from widespread labor automation, leading to significant increases in productivity and output, not solely R&D advancements. While AI will eventually automate R&D, this will likely occur after broader automation, once AI possesses the capabilities to handle a wider array of tasks.

Read more
AI

Claude Code Now Debugs Node.js in Real-time: A MongoDB Connection Case Study

2025-03-22
Claude Code Now Debugs Node.js in Real-time:  A MongoDB Connection Case Study

The `@hyperdrive-eng/mcp-nodejs-debugger` MCP server plugin lets Claude Code debug Node.js code at runtime. This article demonstrates debugging a Node.js app connecting to MongoDB Atlas, showcasing a runtime connection error. By setting breakpoints within Claude Code and executing custom JavaScript, developers can inspect MongoDB config variables to pinpoint issues like incorrect credentials or unauthorized IPs. The solution involves using a local MongoDB instance or correctly configuring MongoDB Atlas network access and credentials.

Read more
Development Node.js debugging

Russia's Shadow War in Europe: 59 Incidents Exposed

2025-03-22
Russia's Shadow War in Europe: 59 Incidents Exposed

Since the invasion of Ukraine, Russia and its proxies have been accused of orchestrating dozens of attacks and incidents across Europe, ranging from cyberattacks and propaganda to assassinations, arson, sabotage, and espionage. The goal: to sow discord, undermine support for Ukraine, and erode public trust in European governments. While the Kremlin denies involvement, mounting evidence points to Russia's culpability. This "bold" campaign highlights a new strategy of hybrid warfare, demanding increased cooperation and intelligence sharing among European nations to counter the threat.

Read more

Oaxaca's Paradise Lost: A String of Disappearances Rocks Mexico's Coast

2025-03-22
Oaxaca's Paradise Lost: A String of Disappearances Rocks Mexico's Coast

The idyllic beaches of Oaxaca, Mexico, have been rocked by a series of disturbing disappearances. Ten young adults from Tlaxcala state, aged 19-29, vanished from Zipolite and Huatulco, with nine bodies later found in an abandoned car hundreds of miles away. The case highlights potential links to drug trafficking, real estate development, and possible police involvement, alongside alleged government attempts to downplay the incidents. This tragedy not only threatens the region's vital tourism industry but also raises serious questions about security in Mexico.

Read more

AmigaDOS String Interpolation: Beyond {} Braces

2025-03-22

This blog post explores the flexibility and quirks of string interpolation in AmigaDOS shell scripts. While AmigaDOS defaults to using `<` and `>` for interpolation, it allows customization via `.BRA` and `.KET` directives. Experiments demonstrate the successful use of various character pairs, including printable and non-printable ASCII characters (like BEL and NAK). This highlights the robustness of the AmigaDOS script parser and its resilience in handling unusual input.

Read more
Development string interpolation

23andMe's Financial Troubles: Californians Can Delete Their Genetic Data

2025-03-22
23andMe's Financial Troubles: Californians Can Delete Their Genetic Data

Facing financial distress, genetic testing company 23andMe has prompted California Attorney General Rob Bonta to remind Californians of their rights under the Genetic Information Privacy Act (GIPA) and the California Consumer Privacy Act (CCPA) to delete their genetic data and destroy samples. Users can delete their accounts and personal information through 23andMe's website, following steps to download data, permanently delete it, and destroy samples.

Read more

Surprisingly Stable: Dyson Spheres and Ringworlds in Binary Systems

2025-03-22
Surprisingly Stable: Dyson Spheres and Ringworlds in Binary Systems

Science fiction staples, Dyson spheres and ringworlds, are typically considered gravitationally unstable and prone to collapse. However, a new study from Colin McInnes at the University of Glasgow reveals that specific configurations of these megastructures near a binary star system can, in fact, be stable. McInnes identified seven equilibrium points around a binary system where a ring structure could maintain stability. This research has significant implications for the Search for Extraterrestrial Intelligence (SETI), potentially guiding future surveys to look for bright stars orbiting with objects exhibiting strong infrared excesses—a potential technosignature indicating such megastructures.

Read more

NYU 2024 Admissions Data Leak: Analysis of Admission Standards Post-Affirmative Action Ban

2025-03-22

A top-secret leak of New York University (NYU) 2024 admissions data reveals that NYU may have continued using race-based admissions criteria after the Supreme Court ruled affirmative action in college admissions illegal. The leaked data, including average SAT, ACT, and GPA scores for different racial groups, raises questions about the fairness of college admissions. The data has been mirrored on Proton and MEGA.

Read more

The Six Waves of Vibe Coding and the Future of Programming

2025-03-22
The Six Waves of Vibe Coding and the Future of Programming

This article explores the evolution of AI coding, from traditional coding to code completion, chat-based coding, coding agents, agent clusters, and finally agent fleets. The author predicts that coding agents will dramatically increase development efficiency but also bring high costs. The future role of programmers will shift to managing and coordinating AI agents. The article highlights that younger programmers are more readily adopting AI than senior developers, reshaping the software development industry's talent structure. The author concludes that learning to effectively utilize coding agents is crucial for future success in the field.

Read more

Mozilla.ai's Open Source Project: Accelerating OpenStreetMap Mapping with AI

2025-03-22
Mozilla.ai's Open Source Project: Accelerating OpenStreetMap Mapping with AI

Mozilla.ai has released an open-source project called the OpenStreetMap AI Helper Blueprint designed to accelerate the mapping process on OpenStreetMap. This project cleverly combines the YOLOv11 object detection model and the SAM2 segmentation model to automatically identify and outline map features (e.g., swimming pools), boosting efficiency. Users train models in provided Colab environments and then verify results manually, significantly improving mapping speed while maintaining quality control. This showcases how lightweight, locally friendly AI models can enhance community-driven projects without relying on large language models.

Read more
Development Mapmaking

The Shocking Origins of Modern Education: Students on an Assembly Line?

2025-03-22
The Shocking Origins of Modern Education: Students on an Assembly Line?

This article exposes the origins of the modern education system, revealing its purpose wasn't to foster learning and creativity, but to mold docile factory workers. From the 18th-century Prussian model to the funding from industrialists like Rockefeller, the system was designed to instill obedience, repetitive work, and discipline, not critical thinking and independent thought. The article argues this "factory model" of education is outdated in today's world and explores the rise of homeschooling and alternative education.

Read more

Trump Admin's JFK Files Release Doxes Hundreds, Sparking Lawsuits

2025-03-22
Trump Admin's JFK Files Release Doxes Hundreds, Sparking Lawsuits

In its rush to release unredacted JFK assassination files, the Trump administration inadvertently published the Social Security numbers and other sensitive personal information of potentially hundreds of former congressional staffers and others. At least one, former Justice Department official Joseph diGenova, plans to sue the National Archives for violating the Privacy Act. The released information stemmed from his involvement in the 1970s Church Committee investigation into CIA and other intelligence agency misconduct. The National Archives posted thousands of pages without a searchable format, making it difficult to assess the full extent of the breach. National security lawyer Mark Zaid confirmed the release impacted hundreds, many still alive, calling the action unnecessary and unhelpful to understanding the assassination. While DiGenova blames the Archives' sloppy review process, he doesn't fault Trump for the release itself.

Read more

Hubble Captures Jupiter's Gigantic Auroras

2025-03-22
Hubble Captures Jupiter's Gigantic Auroras

The Hubble Space Telescope is observing Jupiter's auroras, which are immense, hundreds of times more energetic than Earth's, and continuous. These auroras are created by high-energy particles colliding with atmospheric gas atoms. Combined with data from the Juno spacecraft, this observation will help scientists better understand how the solar wind and other sources influence Jupiter's auroras.

Read more

Standardizing AI Preferences: Addressing Copyright Concerns in AI Training Data

2025-03-22
Standardizing AI Preferences: Addressing Copyright Concerns in AI Training Data

To address copyright concerns arising from the use of internet content for training AI models, the IETF's newly formed AI Preferences Working Group (AIPREF) is working to standardize building blocks for expressing preferences on how content is collected and processed. Currently, AI vendors use a confusing array of non-standard signals (like robots.txt) to guide crawling and training, leading to a lack of confidence among authors and publishers that their preferences will be respected. AIPREF will define a common vocabulary to express authors' and publishers' preferences, methods for attaching this vocabulary to internet content, and a standard mechanism for reconciling multiple preference expressions. The working group's first meeting will be held during IETF 122 in Bangkok.

Read more
AI

The Limits of Scaling in AI: Is Brute Force Reaching Its End?

2025-03-22
The Limits of Scaling in AI: Is Brute Force Reaching Its End?

A survey of 475 AI researchers reveals that simply scaling up current AI approaches is unlikely to lead to Artificial General Intelligence (AGI). Despite massive investments in data centers by tech giants, diminishing returns are evident. OpenAI's latest GPT model shows limited improvement, while DeepSeek demonstrates comparable AI performance at a fraction of the cost and energy consumption. This suggests that cheaper, more efficient methods, such as OpenAI's test-time compute and DeepSeek's 'mixture of experts' approach, are the future. However, large companies continue to favor brute-force scaling, leaving smaller startups to explore more economical alternatives.

Read more
AI

First High-Def Moon Sunset Photos Captured by Private Lander

2025-03-22
First High-Def Moon Sunset Photos Captured by Private Lander

Firefly Aerospace's Blue Ghost lunar lander has captured the first high-definition images of a sunset on the moon, including a shot with Venus in the distance. The first private spacecraft to land upright and complete its entire mission, Blue Ghost collected science data for five hours into the lunar night before succumbing to lack of solar power. One image shows a unique horizon glow, possibly related to a theory about levitating dust proposed decades ago. While the lander's drill didn't reach its planned depth, NASA considers the mission a success. Attempts to reactivate the lander are planned for early April, though success is unlikely.

Read more
1 2 361 362 363 365 367 368 369 596 597