A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
Governments rip out Windows and turn to Linux as fears over foreign control grow... Hackers twist Windows Defender with the new BlueHammer attack and grab full system power... Rockstar Games faces another GTA VI drama as attackers threaten a fresh leak... South Korea treats mobile data like a basic utility and hands citizens free gigabytes each month... A quiet Mexican surveillance contractor wires up the US‑Mexico border with cameras and AI‑style tracking tools... Safety researchers torch popular AI benchmarks and show how fragile many leading AI agents really are... Small open models match big-budget Mythos‑style security tricks and raise new alarms for regulators... A global AI job loss tracker starts to map layoffs pinned on automation... Courts keep a Pentagon-linked risk label on Anthropic and signal growing scrutiny of AI vendors... Iran pushes Lego‑style AI propaganda clips as social platforms scramble to react, and we watch the lines blur between play and influence.
France Dumps Windows For Homegrown Government Linux
France’s digital chiefs say relying on Windows and other US tools is a strategic risk, so they’re ripping them out and rolling their own Linux stack. It’s about control, not saving pennies, and other governments are definitely watching.
New Windows Defender Hack Hands Attackers System Keys
A new BlueHammer attack abuses Windows Defender’s own update system to grab full SYSTEM access. Security folks are rattled that the built‑in bodyguard can be turned so easily, and they’re asking how many similar tricks are still undiscovered.
Rockstar Hit Again As Hackers Threaten Massive Leak
Rockstar Games, still scarred from past GTA VI leaks, is reportedly hacked again. Group ShinyHunters claims a huge stash of source code and internal docs and is waving a ransom note. Gamers are furious; security teams are just embarrassed now.
South Korea Makes Mobile Data A Basic Right
South Korea is giving every citizen a chunk of free mobile data each month, treating connectivity like water or electricity. Telecoms will eat some costs, but the message is clear: in a digital economy, being offline is no longer acceptable.
Secretive Mexican Spy Firm Now Watches US Border
A little‑known firm, Grupo Seguritech, is wiring up surveillance systems along the US‑Mexico border with towers, cameras and AI‑style tools. Civil liberties watchers are nervous about yet another unaccountable tech vendor quietly building a panopticon.
Researchers Torch AI Agent Benchmarks As Mostly Fake
A safety group quietly sent its own AI agents at popular coding benchmarks and says they broke nearly every “state‑of‑the‑art” test. Their point: leaderboard scores are a marketing game, and real‑world tools are far more fragile than the hype.
Tiny Open Models Match Fancy Mythos Security Tricks
Researchers threw the same security tasks from Anthropic’s Mythos demo at small, cheap open models and got surprisingly similar results. It undercuts the idea that only giant frontier models can find scary software bugs, which alarms regulators even more.
New Tracker Counts Jobs Blamed On Growing AI
A new AI Job Loss Tracker is logging layoffs where bosses blame automation. The numbers are still fuzzy, but you can see patterns by industry and country. It’s grimly satisfying to watch companies spin this as “innovation” while people lose work.
Court Refuses Anthropic Bid To Ditch Risk Label
An appeals court refused to pause a Pentagon‑linked “supply chain risk” label slapped on Anthropic, which the company says already scares off deals. It’s a warning shot: Washington is ready to put official stigma on AI vendors it doesn’t fully trust.
Iran Pushes War Propaganda With Cute Lego AI Clips
A creator behind viral Lego‑style AI videos for Iran admits the cute clips are meant to sway opinion on war. The mix of toy‑movie nostalgia, AI tools and hard politics shows how propaganda is updating fast while social platforms struggle to respond.
Veteran Engineer Recalls Twenty Wild Years On AWS
A longtime engineer looks back on twenty years living inside AWS, from the wild early S3 days to today’s massive cloud empire. It’s half nostalgia, half rant about how “the cloud” turned from scrappy experiment to confusing, locked‑in utility.
Fresh Star Data Says Cosmic Hubble Tension Real
A big data mash‑up of galaxy and supernova measurements says the infamous Hubble tension isn’t going away. The universe’s expansion rate still doesn’t match our models, hinting that something in our neat picture of cosmology is very wrong.
Human Trials Begin For Bold Cellular Rejuvenation Trick
Scientists are preparing human tests of a gene‑tweaking mix inspired by Yamanaka factors that seemed to rewind cellular ageing in animals. It’s very early and risky, but the idea of medically rolling back your biological clock is hard to ignore.
Obsession Becomes Goldmine Of Ten Thousand Live Shows
A music nerd secretly taped around 10,000 concerts over decades, and volunteers are now rescuing the stash for the Internet Archive. What started as a slightly sketchy hobby has turned into a priceless time machine for live music fans everywhere.
Writer Blasts Apps Built To Rot Your Brain
A sharp essay argues your favorite feeds, shorts and “productivity” apps are really designed to keep your brain in a low‑attention haze. The so‑called Brainrot Industrial Complex isn’t an accident; it’s the business model of modern platforms.
France is ripping US-made Windows out of government PCs and calling American tech a strategic risk. It’s a loud vote for open-source, digital sovereignty, and a warning shot to Microsoft and other US giants.
Researchers showed how “BlueHammer” can turn Windows Defender’s own update system into a backdoor for full SYSTEM control. When the antivirus becomes the threat, every corporate Windows fleet has to worry.
South Korea just rolled out universal basic mobile data, treating connectivity like a public utility. It’s a bold blueprint for countries that claim to care about digital inclusion but still meter the internet like luxury fuel.
Rockstar is reportedly staring down another massive breach, with ShinyHunters claiming source code and internal docs. After the GTA leaks, this feels less like bad luck and more like a chronic security failure in gaming’s big leagues.
A safety group quietly broke most big-name AI agent benchmarks, arguing that shiny leaderboard numbers hide fragile, hackable systems. It undercuts a year’s worth of marketing slides from frontier labs.
A dedicated AI Job Loss Tracker is now counting layoffs where automation gets the blame. It turns vague fears into a public scoreboard, and makes it harder for executives to quietly swap people for prompt engineering.
Anthropic failed to pause a Pentagon-linked supply-chain risk label it says is already scaring off customers. It’s a sign AI vendors are now living in the same regulated world as weapons contractors and telecom gear.
In a personal retrospective, FreeBSD Security Officer and Tarsnap founder Colin Percival describes two decades of involvement with AWS starting in April 2006. Motivated by Amazon S3 to pursue secure o...
The Federal Aviation Administration is launching a targeted ad campaign to draw video gamers into air traffic control careers, aiming to ease a longstanding staffing shortage. The video, which opens w...
This piece examines “productive procrastination,” where engaging, productive tasks displace higher-priority work. The author recounts fast-tracking a newly filmed video because it felt exciting and sa...
The article spotlights a project at Northwestern University’s Transportation Library to digitize and share visually compelling covers from mid-20th-century U.S. government transportation reports. Cura...
Aadam Jacobs, a Chicago music fan, spent four decades recording more than 10,000 live concerts, documenting the rise of indie and alternative music from the 1980s to the early 2000s. His tapes—startin...
This essay challenges the North American convention of marking the start of seasons on the solstices and equinoxes, noting that such definitions conflict with daylight patterns—for example, summer beg...
The article presents WeakC4, a compact, search-free weak solution for optimal first-player play in the standard 7x6 Connect Four. WeakC4 is constructed by identifying a language that specifies perfect...
This webpage maintains a live directory of “cow.txt” files hosted across the web, presenting a consolidated list of URLs and their current availability. It includes a link to read the RFC governing th...
France’s direction interministérielle du numérique (DINUM) has announced a government-wide move to reduce dependence on non‑EU proprietary technologies in favor of open‑source solutions. A central mea...
Pardonned.com is an open-source project providing a searchable database of U.S. pardons. Built to verify claims highlighted in videos by Liz Oyer and to simplify the process of researching pardons, th...
BlueHammer is a disclosed zero-day that abuses Windows Defender’s update workflow to escalate privileges on modern Windows systems. The researcher, using the aliases Chaotic Eclipse and Nightmare Ecli...
This article reflects on a recent Artemis II–related crewed lunar flyby that, according to the author, sent four astronauts farther from Earth than any humans before. It profiles the crew: Commander R...
This explainer outlines how passive radar operates by leveraging existing broadcast signals—such as FM radio and digital TV—to detect objects without transmitting. It emphasizes two fundamental measur...
The article presents a DIY-focused engineering solution for creating custom colors with spray paint without carrying a can for every hue. After observing that aerosol droplets can’t be blended mid-air...
A Guardian investigation examines Polymarket’s wartime and geopolitical prediction markets and the behaviors they incentivize. The piece highlights a high-stakes market—over $500,000—on whether Russia...
The article explains that everyday indoor environments contain significant concentrations of airborne microplastics, much of which originate from synthetic textiles. Actions such as washing, drying, s...
“Presidential Panic: Hormuz Havoc” is showcased in a Show HN post as a satirical political strategy game with a global leaderboard. The post states the game was overrun by AI bots within 24 hours, and...
Cirrus Labs announced it will join OpenAI as part of its Agent Infrastructure team, aligning its future work with tooling for both human and agentic engineers. The company, founded in 2017 without ext...
Bitcoin miners are under acute margin pressure as average production costs, estimated at around $88,000 per coin by Checkonchain’s difficulty regression model (as of March 13), far exceed a market pri...
This article experimentally evaluates how linear memory block size affects processing throughput on a modern CPU. Using a Ryzen 9 7950X3D, the author benchmarks kernels with varying compute intensity ...
South Korea has launched a universal basic mobile data measure to guarantee unlimited 400 kbps access for users once their monthly allowances are exhausted. The Ministry of Science and ICT announced t...
The article recounts a rendering team’s progression from offline-trained, inference-only neural materials to a framework supporting runtime training for small neural networks used in neural radiance c...
This article introduces a series on the decades-old backbone of global airline reservations. It contrasts modern booking speed with the reality that core systems originated in the 1960s and still run ...
This essay examines large language models (LMs) through the lens of representation, likening them to maps that are useful because they compress reality. Drawing on Borges’ parable of an empire-sized m...
This essay argues that companies are increasingly turning to large language models (LLMs) to handle customer interactions, shifting support from human agents to automated systems. It claims LLMs will ...
Surelock is introduced as a pre-release Rust library designed to enforce deadlock-free mutex usage at compile time. The author argues that while Rust eliminates data races, deadlocks remain a common a...
Advanced Mac Substitute (AMS) is an API-level reimplementation of the 1980s-era Mac OS that runs 68K Macintosh applications without requiring an Apple ROM or original system software. Unlike conventio...
A security-focused blog post demonstrates how DNS TXT records—originally intended for arbitrary text—can be repurposed as a globally distributed, publicly accessible file store. The author outlines a ...
Hacker group ShinyHunters claims it accessed Rockstar Games data and is demanding payment by April 14, 2026, threatening to leak what it obtained. The group says it reached Rockstar’s Snowflake cloud ...
Anthropic introduced Claude Mythos Preview alongside Project Glasswing, a consortium aimed at using AI to find and fix vulnerabilities in critical software, backing the effort with up to $100M in usag...
The “Phone Trips” archive announces that all hosted recordings have been converted to MP3, enabling direct playback in modern web browsers and simple downloading via right‑click. The site presents a c...
This article provides practical guidance for maintaining a healthy job queue in PostgreSQL, especially when running alongside other workloads in the same database. It explains why Postgres is a viable...
OSNews highlights that Red Hat, an IBM subsidiary, published a 2024 white paper titled “Compress the kill cycle with Red Hat Device Edge” and later removed it, with current links returning 404 errors....
A report from Ciudad Juárez details how Mexican firm Grupo Seguritech has developed a $1.27 billion surveillance operation that is expanding into the U.S. and Latin America. In Chihuahua, the company’...
This article provides a practical guide to building an external diff driver for Git, prompted by the author’s experience implementing a tool called renovate-packagedata-diff and encountering sparse, h...
This article outlines the evolution of APL from Kenneth E. Iverson’s 1957 mathematical notation at Harvard into a distinct programming language emphasizing array manipulation. It details IBM’s role in...
The article details how a research team built an automated agent that systematically exploited eight widely used AI agent benchmarks—SWE-bench (Verified and Pro), Terminal-Bench, WebArena, FieldWorkAr...
This piece examines why layoffs can feel like a profound personal blow and offers practical advice for navigating the aftermath. Inspired by a LinkedIn post and video that discuss layoff causes and as...
RapidPhoto is introduced as a professional macOS application for high-volume, privacy-first photo processing. It handles up to 500 images per batch and applies uniform or per-image operations, includi...
The article argues that ending extreme poverty is both conceivable and comparatively affordable, contrasting centuries of fatalism with modern evidence and policy. It recounts the substantial progress...
The article explains the formal notion of a “property” in property-based testing (PBT) as a universally quantified assertion expressed as a function returning a Boolean. It demonstrates handling preco...
The article offers a ready-to-run package for revisiting two classic Macintosh titles—Dark Castle and Beyond Dark Castle—on modern PCs. The ZIP includes the Mini vMac emulator, a Mac Plus ROM, and a S...
A research work proposes a post-transistor memory architecture based on single-layer fluorographane (CF), where each fluorine atom’s covalent orientation serves as a binary bit. The study presents ab ...
An intern working with macOS virtual machines on Apple Silicon investigated the widely encountered limit that caps active macOS guest VMs at two. While Apple’s Virtualization.framework emits the error...
Pijul is an open-source (GPL2) distributed version control system that centers on a theory-of-patches model. It emphasizes commutation, enabling independent changes to be applied in any order without ...
An international team has consolidated decades of astronomical distance measurements into a unified, transparent framework to refine the local expansion rate of the Universe. Published on 10 April in ...
Rill’s post introduces Metrics SQL, a SQL-based semantic layer designed to make metrics first-class, queryable objects across analytics systems. The company argues that while metrics like revenue or R...
The article explores the enduring perception that book reviewing is in crisis, contrasting historic complaints about critics’ destructiveness or blandness with today’s challenges. It spotlights the ri...
This personal account chronicles a long-running attachment to durable, serviceable hardware and practical methods for extending device lifespans. The author’s journey starts with a carefully chosen HP...
The Alliance for Secure AI’s AI Job Loss Tracker catalogs newly reported layoffs in which artificial intelligence is a material factor. Covering both U.S. and global announcements, its reporting windo...
This article examines code complexity across two dimensions: machine resources (time and memory) and human factors (cognitive effort and domain knowledge). It starts from the conventional definition o...
Midnight Captain is a new terminal-based file manager that blends the dual-pane workflow of classic Midnight Commander with modern conveniences and Vim-inspired navigation. It emphasizes speed, a focu...
This article introduces slogbox, a structured logging handler for Go designed to retain the most recent N log records in memory using a fixed-size ring buffer. Inspired by Go 1.25’s runtime/trace.Flig...
The article details a major transition for the Eleventy (11ty) static site generator. Font Awesome launched a Kickstarter for Build Awesome and Build Awesome Pro—framed as a rebrand of Eleventy and ef...
A new Pew Research Center survey from October 2025 finds that book reading remains widespread in the United States, with 75% of adults saying they read all or part of at least one book in the past yea...
Earendil details five months of running Absurd, a Postgres-native durable execution system, in production. Absurd’s core is a single SQL file of stored procedures for managing tasks, checkpoints, even...
The BBC’s Top Comment podcast interviewed “Mr Explosive,” a representative of Explosive Media, a small team producing viral AI-generated videos using a Lego-like aesthetic to push pro-Iran narratives....
The Software Preservation Group’s “C++ History Collection,” edited by Paul McJones, aggregates primary materials documenting the origins and evolution of C++. It outlines a broad scope—chronology, ear...
A federal appeals panel in Washington, D.C., declined Anthropic’s emergency request to pause a Department of Defense “supply chain risk” designation while litigation proceeds. In a four-page order, th...
A developer describes building a Z-machine emulator in Elm, the pure functional language known for immutable data structures and absence of side effects. While the Z-machine presumes direct memory acc...
This article presents a Rootly-centric fork of Graphify that transforms incident management data into a queryable knowledge graph. By connecting to the Rootly API, the tool collects incidents, trigger...
This article explores the trade-offs of using extremely simple, non-cryptographic hash functions when adversarial inputs are not a concern. It contrasts robust cryptographic hashes like SHA-256 and MD...
The Fifth U.S. Circuit Court of Appeals in New Orleans struck down a near 158-year-old federal ban on home distilling, ruling it unconstitutional as an improper exercise of Congress’s taxing power. Th...
Researchers are advancing partial cellular reprogramming—brief activation of reprogramming factors to make aged cells biologically younger—toward first-in-human testing. The approach emerged after Yua...
This essay examines the concept of “brainrot,” a term popular among digital natives describing an overstimulated, unfocused mental state driven by constant exposure to high-stimulation, low-substance ...
The New York Times reports that 21 hours of face-to-face negotiations between the United States and Iran in Pakistan ended without a peace agreement to end the war. U.S. Vice President JD Vance said t...
The article outlines the thermodynamic basis and practical implications of reversible computing. It starts with Landauer’s principle, which sets a minimum energy cost for erasing one bit of informatio...