Home

I now assume that all ads on Apple news are scams
cdrnsf about 10 hours ago

I now assume that all ads on Apple news are scams

The article discusses the author's experience with suspicious ads on the Apple News platform, highlighting concerns about the prevalence of scam advertisements and the need for greater scrutiny and regulation of digital advertising on platforms like Apple News.

kirkville.com
868 378
Summary
The Waymo World Model
xnx about 6 hours ago

The Waymo World Model

The article discusses Waymo's development of the Waymo World Model, a new simulation platform for autonomous driving that aims to improve the safety and performance of self-driving cars by creating a highly realistic virtual environment to test and train AI systems.

waymo.com
566 359
Summary
Microsoft open-sources LiteBox, a security-focused library OS
aktau about 7 hours ago

Microsoft open-sources LiteBox, a security-focused library OS

Litebox is an open-source library from Microsoft that provides a lightweight, customizable, and accessible lightbox experience for web applications. It offers a range of features, including support for images, videos, and iframes, as well as keyboard accessibility and responsive design.

github.com
247 127
Summary
An Update on Heroku
lstoll about 7 hours ago

An Update on Heroku

Heroku announces a major update, outlining changes to its platform, pricing, and support for various languages and frameworks. The blog post provides details on the company's new direction and its commitment to supporting developers' evolving needs.

heroku.com
202 159
Summary
NIMBYs aren't just shutting down housing
toomuchtodo about 7 hours ago

NIMBYs aren't just shutting down housing

The article explores how NIMBYism (Not In My Backyard) goes beyond just opposing new housing, and can also manifest in efforts to limit growth, preserve the status quo, and restrict changes to a community. It highlights how NIMBY attitudes can shape broader political and economic decisions, not just local land use.

inpractice.yimbyaction.org
120 258
Summary
Fraud investigation is believing your lying eyes
dangrossman about 5 hours ago

Fraud investigation is believing your lying eyes

This article discusses the steps involved in a fraud investigation, including gathering evidence, conducting interviews, and analyzing financial records. It provides an overview of the process that law enforcement and financial institutions use to detect and investigate fraudulent activities.

bitsaboutmoney.com
102 118
Summary
Show HN: If you lose your memory, how to regain access to your computer?
eljojo about 4 hours ago

Show HN: If you lose your memory, how to regain access to your computer?

Due to bike-induced concussions, I've been worried for a while about losing my memory and not being able to log back in.

I combined shamir secret sharing (hashicorp vault's implementation) with age-encryption, and packaged it using WASM for a neat in-browser offline UX.

The idea is that if something happens to me, my friends and family would help me get back access to the data that matters most to me. 5 out of 7 friends need to agree for the vault to unlock.

Try out the demo in the website, it runs entirely in your browser!

eljojo.github.io
80 78
Summary
I spent 5 years in DevOps – Solutions engineering gave me what I was missing
vmatsiiako about 6 hours ago

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

The article discusses the evolution of the DevOps role into Solutions Engineering, highlighting the growing need for engineers who can bridge the gap between technical and business domains, and provide comprehensive solutions that address both operational and customer-facing aspects of software development.

infisical.com
50 14
Summary
Man who videotaped himself BASE jumping in Yosemite arrested, says it was AI
harambae about 3 hours ago

Man who videotaped himself BASE jumping in Yosemite arrested, says it was AI

A man was videotaped base jumping in Yosemite National Park, which is illegal. He claims the footage was created using AI technology, not actual footage of him committing the crime.

latimes.com
40 60
Summary
Oregon raised spending by 80%, math scores dropped
grantpitt about 1 hour ago

Oregon raised spending by 80%, math scores dropped

The article discusses the recently released National Assessment of Educational Progress (NAEP) results, which show declining academic performance in reading and math across the United States. The author argues that these results highlight the need for significant educational reforms to address the widening achievement gaps and improve student outcomes.

educationnext.org
34 31
Summary
Masked namespace vulnerability in Temporal
bmit about 2 hours ago

Masked namespace vulnerability in Temporal

The article discusses a vulnerability in the Temporal programming language, known as the 'Masked Namespace Vulnerability' (CVE-2025-14986). It explains how the vulnerability could allow attackers to bypass security measures and execute arbitrary code on affected systems.

depthfirst.com
22 2
Summary
Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox
isitcontent about 1 hour ago

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

Example repo: https://github.com/valdanylchuk/breezydemo

The underlying ESP-IDF component: https://github.com/valdanylchuk/breezybox

It is something like Raspberry Pi, but without the overhead of a full server-grade OS.

It captures a lot of the old school DOS era coding experience. I created a custom fast text mode driver, plan to add VGA-like graphics next. ANSI text demos run smooth, as you can see in the demo video featured in the Readme.

App installs also work smoothly. The first time it installed 6 apps from my git repo with one command, felt like, "OMG, I got homebrew to run on a toaster!" And best of all, it can install from any repo, no approvals or waiting, you just publish a compatible ELF file in your release.

Coverage:

Hackaday: https://hackaday.com/2026/02/06/breezybox-a-busybox-like-she...

Hackster.io: https://www.hackster.io/news/valentyn-danylchuk-s-breezybox-...

Reddit: https://www.reddit.com/r/esp32/comments/1qq503c/i_made_an_in...

github.com
18 4
Summary
Controlled Cot: A SystemLevel Design for LLM's Reliable Reasoning
sruthipsr about 5 hours ago

Controlled Cot: A SystemLevel Design for LLM's Reliable Reasoning

The article explores a novel system-level design approach called Controlled CoT (Controlled Complexity of Transformation) for optimizing the performance and efficiency of digital systems. It emphasizes the importance of managing the complexity of transformations within the system to achieve improved power, area, and delay characteristics.

sruthipoddutur.substack.com
9 0
Summary
Waymo exec admits remote operators in Philippines help guide US robotaxis
anigbrowl about 2 hours ago

Waymo exec admits remote operators in Philippines help guide US robotaxis

Waymo, a leading self-driving car company, has revealed that it employs remote human operators in the Philippines to help guide its autonomous vehicles in the United States when they encounter challenging situations.

eletric-vehicles.com
8 1
Summary
There is empirical evidence of AI acting against our instructions
geox about 10 hours ago

There is empirical evidence of AI acting against our instructions

The article discusses concerns raised by AI pioneer Yoshua Bengio, a winner of the Turing Award, about the potential for AI systems to act against human instructions. Bengio cites empirical evidence and calls for greater oversight and safeguards to ensure AI alignment with human values and goals.

english.elpais.com
6 0
Summary
Who entered Epstein's jail tier the night of his death?
belter about 2 hours ago

Who entered Epstein's jail tier the night of his death?

The article discusses the release of records related to Jeffrey Epstein's death, including surveillance footage from outside his jail cell on the day of his apparent suicide. The records shed light on the circumstances surrounding Epstein's death and the handling of the investigation by prison officials and authorities.

cbsnews.com
6 0
Summary
Show HN: A password system with no database, no sync, and nothing to breach
KevinChasse about 6 hours ago

Show HN: A password system with no database, no sync, and nothing to breach

Hi HN, Bastion Enclave is an experiment in removing centralized trust from password management by eliminating server-side state entirely. Instead of storing an encrypted vault or syncing secrets through a backend, Bastion computes credentials deterministically on-the-fly using explicit cryptographic inputs. Given the same master entropy, service name, username, and version counter, the same password is reproduced across platforms. There is no account system, no database, and no persistent server storage — the server serves static code only. Password generation uses domain-separated salts and PBKDF2-HMAC-SHA512 (210k iterations) to produce a byte stream, followed by unbiased rejection sampling to avoid modulo bias when mapping to character sets. Nothing is stored; passwords are derived when needed and discarded immediately after use. When users choose to persist data locally (vault state, notes, file keys), encryption is handled separately using Argon2id (64 MB memory, 3 iterations) to derive a master key, followed by AES-256-GCM for authenticated encryption. All plaintext exists only in volatile memory; closing the tab tears down the runtime. Recovery and key escrow are handled via Shamir Secret Sharing over a large prime field (secp256k1 order) using a hybrid scheme: the secret is encrypted with a random session key, and only that key is split into shards. Invalid or mismatched shards fail cryptographically via AEAD tag verification. The security claim here is architectural, not policy-based: no stored vaults, no encrypted blobs on servers, no sync endpoints, and no recovery infrastructure to subpoena or breach. Attacking Bastion means attacking individual devices, not a centralized honeypot. This design intentionally trades convenience (sync, automated recovery) for reduced attack surface and deterministic guarantees. It assumes a trusted local execution environment and a strong master secret; it does not attempt to defend against a compromised OS or browser runtime. Live demo: https://bastion-enclave.vercel.app Spec / source / threat model: https://github.com/imkevinchasse/Bastion-Enclave-repo-V2 I’d appreciate critique of the threat model and whether this class of design meaningfully removes attack vectors inherent to cloud-based managers.

bastion-enclave.vercel.app
6 3
Summary
Show HN: GitClaw – An AI assistant that runs in GitHub Actions
sawyerjhood about 7 hours ago

Show HN: GitClaw – An AI assistant that runs in GitHub Actions

Gitclaw is a command-line tool that simplifies and automates common Git workflows, providing a user-friendly interface for managing repositories, branches, and other Git operations.

github.com
6 0
Summary
US Accuses China of Secret Nuclear Explosive Tests
ironyman about 9 hours ago

US Accuses China of Secret Nuclear Explosive Tests

The U.S. has accused China of conducting secret nuclear explosive tests in violation of an international treaty, raising concerns about China's nuclear capabilities and the potential impact on global nuclear nonproliferation efforts.

newsweek.com
5 1
Summary
We Moved Object Storage Metadata Off LSM Trees
fractalbits about 9 hours ago

We Moved Object Storage Metadata Off LSM Trees

The article discusses the challenges of using LSM trees for object storage metadata and how the authors at Fractal moved their metadata off LSM trees to improve performance and reduce complexity. They describe their approach and the benefits they achieved.

fractalbits.com
5 0
Summary