A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
Developers push back as GitHub Copilot slips sponsored tips into more than 1.5 million pull requests... GitHub races to shut down the feature after a wave of anger... NASA faces tough questions as the Artemis II heat shield is slammed as not flight ready... A critical F5 BIG-IP flaw comes under active attack, putting key infrastructure on edge... The popular axios package on npm is hijacked to drop remote access malware on developer machines... A new report says bots now outnumber humans on the internet, making the web feel more synthetic... A security study warns that powerful AI agents with tools and cloud access risk spiraling out of control... Researchers say the next boom comes from agentic AI, while Ollama taps Apple MLX to speed Mac models and Google debuts TimesFM for time-series forecasting... As these systems spread, we face a future built on code we barely see.
Copilot quietly turns your pull requests into ads
Developers learned that GitHub Copilot had been slipping sponsored “tips” into over 1.5M pull requests, effectively renting out their code reviews as ad space. The mood is furious: people feel used, and see this as the ugly cash‑grab side of AI.
GitHub kills Copilot pull request ads after fury
After a wave of outrage, GitHub and Microsoft scrapped Copilot’s PR ads almost as fast as they shipped them. The climbdown feels like a rare win for developers, but also a warning that every “helpful” AI feature now needs a monetization microscope.
Artemis II heat shield slammed as not flight ready
A long, biting essay argues NASA’s Artemis II crewed mission is being rushed with a heat shield that still behaves unpredictably. The author says engineers are flying blind on key risks, and many readers agree it feels more like a PR race than real safety.
Hackers rush to hit critical F5 BIG‑IP bug
A nasty new flaw in F5 BIG‑IP APM gear is now under active attack, giving intruders a way into high‑value corporate and government networks. Security folks sound exhausted: yet another "patch now or regret later" moment for the internet’s hidden infrastructure.
Hijacked axios package drops remote access malware
The popular axios library on npm was compromised, shipping versions that install a remote‑access trojan on developer machines. People are frustrated that a single poisoned dependency can still ambush so many apps, despite years of supply‑chain wake‑up calls.
Report says bots now outnumber humans on internet
A new Human Security report claims AI systems and bots now generate more traffic than real people online. It matches what users see daily: spammy signups, fake clicks, and "content" no human asked for. The sense is clear – the modern web feels increasingly synthetic.
Security study warns of out‑of‑control AI agents
This "Agents of Chaos" piece dissects what happens when LLM‑style agents get tools like code execution and cloud access. The takeaway is grim: once you give these helpers real powers, even small mistakes can snowball into data leaks, outages, or costly mischief.
Paper predicts next boom comes from agentic AI
A new research paper argues the real AI explosion won’t be from bigger chatbots, but from swarms of "agentic" systems that work together, call tools, and adapt. It’s exciting and unnerving: readers see huge upside, but also a future of even harder‑to‑control machines.
Ollama taps Apple MLX to speed Mac AI models
Local‑model favorite Ollama now runs on Apple’s MLX framework for Apple Silicon, promising faster, smoother AI on Mac laptops. The crowd loves anything that cuts cloud dependence, but also grumbles that Apple’s best AI tricks still feel oddly buried on device.
Google launches foundation model just for time series
Google Research unveiled TimesFM, a 200M‑parameter model tuned for forecasting time‑based data like sales and demand. It’s niche but important: people see it as another sign that "general" AI is already splintering into specialized tools for every data stream.
FTC slams OkCupid’s secret data‑sharing deals
The FTC is going after OkCupid and Match Group, accusing them of quietly handing intimate dating‑profile data to outside partners. Users already distrusted dating apps; seeing regulators call out creepy tracking just confirms the worst suspicions about love‑through‑apps.
Washington state outlaws noncompete agreements entirely
A new Washington law bans noncompete clauses statewide, going further than the FTC’s stalled national effort. Tech workers are thrilled to see one state finally cut the leash, and hope it starts a race for talent freedom instead of employer control.
US government apps demand creepier phone permissions
A deep dive into so‑called Fedware shows official US government apps, like the FBI and disaster tools, hoovering up GPS, fingerprints, and more. People are understandably salty: the same folks banning foreign apps for spying seem very eager to spy themselves.
Apple quietly kills the pricey Mac Pro tower
Apple has stopped selling the M2 Ultra Mac Pro and says no replacement is planned. Pros feel abandoned yet again, stuck between underpowered laptops and sealed iMacs. It reinforces the sense that Apple loves creators’ cash, but not their need for modular hardware.
Sony pauses memory cards as AI eats all NAND
Sony halted orders for its CFexpress and SD cards, blaming a severe NAND flash shortage driven by huge AI data centers. Photographers and video folks are annoyed to be collateral damage in the silicon arms race, watching basic storage become a luxury item.
Sparked a global developer backlash by quietly injecting ads into over 1.5 million pull requests, seen as a warning shot for how hard AI tools will be monetized.
Microsoft-owned GitHub killed the Copilot pull‑request ad feature within days, showing that angry developers still have real power over platform decisions.
Fresh traffic data claims AI and bots now generate the majority of internet activity, confirming what many suspected: the modern web is flooded with non‑human junk.
New security research warns that tool‑using AI agents can cause real‑world damage when wired into code, clouds, and company data, raising alarm beyond normal chatbot worries.
A detailed critique of NASA’s Artemis II mission argues the Orion capsule’s heat shield is unproven and poorly tested, suggesting the first crewed lunar flyby in decades may be too risky.
A critical flaw in widely used F5 BIG‑IP access gear is now under active exploit, putting governments and enterprises at risk and reminding everyone how fragile internet plumbing really is.
Popular axios JavaScript package was hijacked on npm to drop a remote‑access trojan, another brutal example that one poisoned dependency can silently infect countless apps and companies.
This article analyzes how the demoscene’s pixel art culture evolved around copying and tracing external imagery, emphasizing the value of labor and technique over originality. It explains that early d...
The article presents Eclipse GlassFish, from version 7.0 onward, as a modern, production-ready Java application server that counters old perceptions of being slow, unsupported, or suitable only for de...
Webminal is a long-running, browser-based Linux training platform that has operated since 2011 on a single 8GB RAM CentOS server. It reports resilience through a 2021 datacenter fire that erased 150,0...
A GitHub repository provides the source code for Douglas Lenat’s AM (Automated Mathematician), recovered from the SAILDART archive maintained by Bruce Baumgart. The page links to Lenat’s PhD thesis an...
Human Security’s latest “State of AI Traffic” report concludes that AI- and bot-generated activity now exceeds human traffic on the internet. The firm defines automated traffic as software-driven inte...
A developer describes streamlining blog diagram management with Excalidraw. Initially, updating diagrams required multiple manual steps to export light and dark SVGs per frame, disrupting writing flow...
This article connects Bellman’s discrete-time dynamic programming to its continuous-time formulation, the Hamilton–Jacobi–Bellman (HJB) equation. It begins with a standard Markov decision process (MDP...
Ninja is a compact build system designed for speed. The article details practical ways to obtain and use Ninja across platforms, noting that prebuilt binaries for Linux, Mac, and Windows are available...
An author details how their first technical post intended for LessWrong was rejected for violating the platform’s no-LLM rule for initial submissions after they used an LLM to check grammar and vocabu...
This guidance piece outlines how technologists can remain competitive in 2026 as AI becomes central to the industry. It cautions against applying outdated workflows to new tools and identifies key lev...
This article explores how volcanologists study magma movement between connected volcanoes to sharpen eruption forecasts. A recent example comes from Iceland, where the Fagradalsfjall fissure system er...
This article recounts the earliest public trial of Atari’s Pong in 1972 at Andy Capp’s Tavern in Sunnyvale, California. Positioned on a barrel, the prototype stood out from the tavern’s established pi...
This article profiles Danny Litwhiler (1916–2011), a former Michigan State University baseball coach and MLB player known for more than 100 innovations that improved the game, most notably the pitch s...
“The Alphabetical Clock” is a creative timekeeping project that presents the current time using alphabetized English words rather than standard numeric progression. The clock offers two distinct modes...
Ghostmoon.app is a pre-release macOS menu bar utility designed to make frequently needed system functions accessible in a couple of clicks. It brings together controls and maintenance tasks that are t...
The article analyzes how the Model Context Protocol (MCP) is being used in AI applications and argues that much of the debate stems from conflating distinct use cases. Supporters praise MCP for enabli...
A new paper by Terence C. Tao examines how artificial intelligence, defined as a broad spectrum of computer tools performing increasingly complex cognitive tasks, is reshaping traditional philosophica...
This August 2022 update revisits a 2019 study to benchmark the state of C++ hashmaps. The author evaluates 29 containers and allocator variants combined with six hash functions, forming 174 configurat...
An Ask HN post on Hacker News solicits developer experiences about the practical limits of current AI coding models. The author requests concrete examples and scenarios where these tools struggle or f...
The article examines a potential AI market correction driven by hyperscalers’ defensive capital expenditure and tightening financing for independent labs. It argues that Big Tech’s willingness to anno...
The article examines engineering patterns from Apereo CAS, a large-scale open-source implementation of the Central Authentication Service built on Spring Boot 3.x and Java 21+. Operating in production...
The article details Spain’s response to Operation Epic Fury, the U.S.- and Israeli‑led military campaign against Iran. Spain has closed its airspace to any flights involved in the operation and barred...
This article explains how to convert general-purpose hardware into a functional home router using Linux, motivated by mention of a U.S. policy restricting imports of new consumer routers. The author e...
Phantom is an open-source AI agent designed to function as a persistent co-worker with its own virtual machine. Instead of transient chat sessions, Phantom installs software, creates tools, and mainta...
This article traces the centuries-long push in mathematics to make proofs fully explicit and reliable, from Euclid’s axiomatic beginnings to early 20th-century foundations and modern proof verificatio...
The article contends that modern pharmaceutical dosing practices systematically overlook a key quantum mechanical effect in drug metabolism: tunneling. It explains that standard dosing models calculat...
The article explores how Montgomery County, Maryland’s Agricultural Reserve uses Transferable Development Rights (TDRs) to balance housing growth with farmland preservation. Established in 1980, the R...
F5 disclosed that CVE-2025-53521, a vulnerability in BIG-IP Access Policy Manager (APM), is under active exploitation and has been reclassified from a denial-of-service issue to remote code execution ...
The article examines how AI-native software companies must rapidly evolve from product-led growth to enterprise sales as buyer expectations and market dynamics accelerate. It outlines how prior eras a...
The article details a widespread issue where GitHub Copilot inserted promotional “tips” into pull request (PR) descriptions. One notable line promotes Raycast’s Copilot integration, appearing in over ...
Build123d is a Python-based parametric CAD framework focused on boundary representation (BREP) modeling for both 2D and 3D. Built on the Open Cascade geometric kernel, it provides a fully Pythonic, al...
A century‑plus dataset of 1,357 monthly U.S. CPI observations (BLS data via FRED) shows that the erosion of the dollar’s purchasing power has occurred in concentrated bursts rather than gradually. Sin...
Coasts (Containerized Hosts) is a macOS-focused developer tool that enables multiple isolated instances of full development environments to run on a single machine. It combines a CLI with a local obse...
The Federal Trade Commission filed a complaint and reached a proposed settlement with OkCupid and Match Group Americas, alleging OkCupid deceived users by sharing personal information with an unrelate...
This article explains why a team transitioned their office lab from Proxmox to a FreeBSD-based environment managed with Sylve. The change wasn’t driven by outages but by a desire to reduce operational...
Bitwarden has released an Agent Access SDK that enables AI agents to obtain credentials through a human-approved workflow, aiming to eliminate the need for agents to store API keys in memory. The inte...
This article outlines a practical, hybrid approach to research note-taking that blends digital tools with analog methods. The author’s system includes Pinboard for storing links to PDFs and webpages (...
Cherri is a programming language focused on building Apple Shortcuts at scale, compiling directly into runnable Shortcuts with a design that mirrors Shortcut actions for easier debugging. It supports ...
Washington has enacted a statewide ban on noncompete agreements, signed by Gov. Bob Ferguson and led by Rep. Liz Berry. The law takes effect on June 30, 2027, making restrictive covenants unenforceabl...
A longtime social media practitioner and current publisher (200k+ newsletter and a podcast) critiques the growing use of AI tools that automate posting and commenting on platforms such as LinkedIn and...
Marginalia Search is adding an optional NSFW filter after finding domain-based blocking via UT1 lists insufficient. The project’s primary constraint is speed on CPU, which rules out transformer-based ...
Spain has prohibited U.S. military aircraft engaged in operations against Iran from using Spanish airspace and bases, Spain’s defense minister, Margarita Robles, confirmed, validating earlier reportin...
DigitalOcean has increased its planned underwritten offering to $800 million, expanding from $700 million on March 25 and encompassing more than 10.38 million shares. The transaction was expected to c...
This essay explores parasocial relationships—connections people feel toward individuals they have not met—and argues that blogging can actively foster such ties. It grounds the term in Horton and Wohl...
A talk delivered at QCon London on March 17, 2026 examines how AI is transforming software engineering by absorbing tasks that historically trained junior developers. It contrasts bold forecasts—most ...
This article by Karl Bode critiques a pattern the author calls “CEO said a thing!” journalism, where media outlets repeat executives’ statements without adding context, fact-checking, or critical anal...
The article outlines a straightforward method to visually detect individual nuclear decay events using accessible materials. It explains that while individual atoms are far too small to see directly, ...
This article urges professionals not to let large language models (LLMs) write their documents for them, asserting that writing is a disciplined thinking process that clarifies questions and builds un...
The article catalogs what it terms “Fedware”: U.S. federal Android apps that request wide-ranging device permissions and embed third‑party trackers. Leading with a newly released White House app, it d...
This piece explores how Leonardo of Pisa (Fibonacci) used composed (linked) fractions in Liber Abaci to express mixed‑radix quantities and how his worked examples can be turned into concrete arithmeti...
This piece recounts William Blake’s relocation in autumn 1800 from London to the seaside village of Felpham, Sussex. At 43, Blake sought a new start, traveling with his wife Catherine and 16 boxes tha...
The article positions the electronic spreadsheet—especially Microsoft Excel—as a pivotal yet underappreciated force in computing and economic history. After recalling key figures and milestones from L...
This article examines the concentration behind the S&P 500’s year-to-date decline, noting the index is down 7% but that losses are largely driven by a small set of mega-cap technology-related stocks. ...
This article explains the mechanics and rationale behind offline Bitcoin signing—creating cryptographic transaction signatures on a completely isolated device so private keys never touch an internet‑c...
Project Sistine is a 2018 prototype that turns a MacBook into a touchscreen using approximately $1 worth of materials and classical computer vision. The team placed a small mirror in front of the buil...
The article uses active construction at Ljubljana’s central train station as a lens to describe what defines effective software engineering. Because the station cannot shut down, work is staged and co...
The article explains a practical recovery method for Apple Keychain data after a macOS password reset. The author was locked out of a work MacBook due to confusion between an office Active Directory p...
The article contends that large language model (LLM) coding agents are about to catalyze a step-change in vulnerability research and exploit development. Rather than merely introducing new bugs, these...
The article outlines how roulette computers—concealed electronic devices—are used to predict the likely landing sector of a roulette ball by measuring the speed and deceleration of both ball and wheel...
Cape, a privacy-first mobile carrier, ran a transparency experiment by embedding an Easter egg—a free round-trip getaway to Switzerland—inside its privacy policy. Partnering with Proton, headquartered...
The article contends that a U.S.–Iran war has intensified the risks of a fractured, multipolar world by weakening the U.S.-led alliance system. It argues the conflict has indirectly aided Russia in it...
Archaeologists report a rare Bronze Age textile find at the Cabezo Redondo settlement in Villena (Alicante): a largely wooden loom preserved by a catastrophic fire around 3,500 years ago. Published in...
This article outlines a hands-on, browser-based course designed to teach Claude Code through 11 interactive modules. Spanning beginner to advanced levels, the curriculum emphasizes learning by doing w...
The article examines the growing deployment of LLM-powered agents that not only converse but also execute actions via code, shells, filesystems, browsers, and external services. It centers on OpenClaw...
Nango reports on building an autonomous coding agent system to create external API integrations at scale. By defining a list of interactions (such as create-calendar-event or send-slack-message), the ...
The article explains how the third Gulf war has upended the Middle East’s standing as a dependable source of low-cost oil. With the conflict in its fifth week, the Strait of Hormuz—a crucial conduit f...
This position paper reframes the trajectory of AI progress away from a single superintelligent entity toward a plural, socially organized intelligence. It argues that intelligence emerges through inte...
This article asserts that, in AI-enabled software development, traditional tickets effectively serve as prompts that shape how AI agents interpret scope and reason about solutions. The author reports ...
This essay probes the definition of an interior by revisiting the author’s earlier thesis on object–space relationships. Using simple examples—such as a white chair in a white room or a centered table...
R3 Bio, a stealth biotech startup based in Richmond, California, publicly surfaced to say it raised funds for developing non-sentient monkey “organ sacks” as an alternative to animal testing, naming T...
Google is introducing Android developer verification across both the new Android Developer Console and the Play Console to strengthen app ecosystem safety, following findings that sideloaded sources p...
IronGlass has introduced the Air series, a compact lineup of rehoused, vintage-inspired cine lenses aimed at filmmakers using modern mirrorless cameras. Reported by CineD, the series departs from the ...
30u30.fyi, branded as “The Thirty Under Thirty Fraud Watch,” aggregates and presents high‑profile founder misconduct cases under a satirical framework. The site emphasizes that its “Risk Index” is fic...
The article outlines the central thesis of Jacob Siegel’s forthcoming book, “The Information State: Politics in the Age of Total Control” (Henry Holt, March 2026). Drawing on Siegel’s background as a ...
The article examines how mainstream social media evolved into ad-driven ecosystems that prioritize engagement, often elevating divisive content and diminishing authentic connections. It contends that ...
Apple has discontinued the Mac Pro tower, ending the line with the M2 Ultra model introduced in mid-2023 and stating there is no replacement planned. The decision follows years of uncertainty for the ...
This short “Show HN” explanation introduces and clarifies the notion of “temporal accumulation” in the context of analyzing physical signals. The author imagines an observer that only has access to a ...
A runner outlines the gear and principles guiding a cold early-morning run from a hotel in Lijiang, Yunnan, China. They apply a “dress for the second half” approach with specific temperature threshold...
A drop-in CLAUDE.md configuration file aims to cut Claude’s output verbosity and token usage by roughly 63% without code changes. It suppresses behaviors like sycophantic phrasing, unnecessary restate...
An official trailer announces “Clojure: The Documentary,” with a premiere set for April 16. The teaser frames the film as a comprehensive look at the Clojure programming language, charting its path fr...
Railway reported a caching incident on March 30, 2026, caused by a configuration update to its CDN provider that inadvertently enabled caching on a small subset (~0.05%) of domains where CDN had been ...
A maker outlines a sketch-to-physical workflow that uses an AI coding model to create a 3D‑printable pegboard toy system from a hand‑drawn sketch. By supplying a photo and two key dimensions (40 mm gr...
The article raises safety concerns about NASA’s planned Artemis II mission, which would send four astronauts around the Moon on the first crewed flight of the Orion spacecraft and the second launch of...
StepSecurity reports a supply-chain compromise of the widely used axios library on npm. An attacker hijacked a maintainer’s npm credentials and published malicious axios releases, specifically includi...
Ollama introduced a preview build that runs on Apple Silicon using Apple’s MLX machine learning framework, touting the fastest local performance on macOS for assistants and coding agents. The integrat...
This article details the pivotal role of Swedish artist and art historian Oscar Reutersvärd in the development of “impossible figures,” emphasizing that he created the impossible triangle (1934) and i...
Trip Venturella released Mr. Chatterbox, a 340M-parameter language model trained entirely on out-of-copyright Victorian-era British texts from the British Library (1837–1899). The dataset comprises 28...
Google’s new whitepaper warns that future cryptographically relevant quantum computers could break elliptic-curve cryptography used in many blockchains with fewer resources than previously believed. T...
This article revisits the Rosetta Stone two centuries after the decipherment of Egyptian hieroglyphs, focusing on its discovery, movement, and intellectual impact. It outlines the stone’s tri-lingual ...
Google Research has introduced TimesFM 2.5, the latest iteration of its decoder‑only Time Series Foundation Model for forecasting. The new version scales down to 200M parameters (from 500M in v2.0) wh...
This article highlights a lightweight web tool called “Will AI take my job,” which estimates how artificial intelligence could affect different occupations. The interface is straightforward: users typ...
Sony has temporarily halted accepting orders for its CFexpress (Type A and Type B) and SD (SDXC/SDHC) memory cards, citing an acute shortage of NAND flash. The affected cards rely on TLC 3D NAND, the ...
GitHub has rolled back a recent change to Copilot after developers discovered the AI inserting promotional “tips” into pull requests when invoked, including messages encouraging users to install the R...