A daily curated digest with the tech news that matter + community vibes, delivered daily, in tabloid style. Like you always wanted.
Tonight, we see core tech take a hard turn... Bun says its runtime is rewritten in Rust in six days and still clears nearly all tests on Linux... admins face fresh patch pressure as Dirty Frag puts another Linux privilege bug on the board... the FCC moves toward real ID checks for phone numbers, while GrapheneOS closes an Android VPN leak that slips past always-on protection... deeper in the stack, storage engineers show how to cut fsync without giving up crash safety... over in AI, Gemini pushes file search beyond text, Subquadratic claims a 12 million token context window, and new warnings say LLMs can quietly distort long documents... the mood shifts again as the backlash on AI coding grows and fast-moving agents make old roadmaps look very small.
Bun's boss said the runtime was rewritten in Rust in six days and still cleared 99.8% of its test suite on Linux. That is either heroic engineering or a dare taken too seriously, but either way it put developer tools back on the front page.
Linux Admins Get Another Patch Panic
A second major Linux privilege bug in just over a week landed like a cold slap. The new Dirty Frag exploit pushed admins toward emergency patching, and nobody sounded eager to keep pretending the basics of system hardening can wait.
Phone Numbers Face an ID Check
The FCC floated a plan that could require real identity checks before getting a phone number. Supporters call it anti-spam cleanup, but it reads like one more brick in a giant tracking wall for VoIP and SIM users.
Android VPN Shield Springs a Leak
GrapheneOS patched an Android VPN leak that reportedly survived even always-on protections, after Google chose not to fix it. That landed badly, because a privacy switch that leaks traffic is the sort of joke nobody enjoys twice.
Storage Engineers Ditch fsync Carefully
One storage team detailed how it removed fsync without giving up crash safety, leaning on O_DIRECT, pre-allocation, and careful journaling. It is catnip for performance obsessives and a reminder that old bottlenecks still run the room.
Gemini Learns to Search More Than Text
Google expanded Gemini API File Search so it can work with images and other mixed media, not just plain text, while adding page citations and custom metadata. The pitch is obvious: make RAG feel less like a science fair project and more like a product.
AI Context Windows Get Comically Huge
Startup Subquadratic claimed a 12 million token context window using selective attention. The numbers are huge enough to make every other model spec sheet look tiny for a day, even if people still want proof that bigger memory also means better answers.
Bots Quietly Mangle Long Documents
A new paper argued that when you let LLMs revise long documents on your behalf, they can quietly mangle the source and drift off course. That is the nightmare version of delegation: the bot sounds smooth, the file looks fine, and the meaning slips away.
The AI Coding Backlash Gets Loud
One blunt essay drew a line in the sand on AI coding, arguing that outsourcing the hard parts weakens craft, judgment, and learning. It hit a nerve because plenty of developers now sound less like evangelists and more like people checking the exits.
Roadmaps Shrink Under Agent Pressure
The idea that the roadmap is dead summed up a growing feeling after agents and Claude Code turned months of planned work into days. It is thrilling if you love speed, and deeply annoying if your job depended on pretending twelve-month plans meant anything.
The Archive Finds a Swiss Backup
A new Internet Archive Switzerland effort promises another home for public memory, research, and even AI-related materials. In a season of link rot and platform amnesia, the idea of storing more of the web before it disappears felt refreshingly sane.
The Dream of a New Web Returns
One essay seriously asked what it would take to fork the web and build an alternative set of rules outside today's standards maze. It is half provocation, half blueprint, and impossible not to read as a sign that browser fatigue has gone fully feral.
One Developer Declares War on Query Strings
A small fight over query strings became a bigger complaint about web clutter, brittle cache busting, and lazy habits. The case against stuffing random version tags into every URL landed well, mostly because everyone has cleaned up that mess before.
Assembly Web Servers Refuse to Behave
An assembly-only web server called ymawky showed off raw AArch64 syscalls on macOS, no libc, no safety rails, and no apology. It is gloriously unnecessary in the best way: part stunt, part lesson, and a nice reminder that systems programming can still be weird.
Web Graphics Chase Movie Lighting
A demo of real-time global illumination on the web used WebGPU and surfels to chase prettier lighting in the browser. It is the kind of graphics work that makes a tab look suspiciously ambitious, and makes the web look harder to dismiss as a toy.
A major JavaScript tool was rebuilt at breakneck speed and still passed almost all of its tests.
Google pushed its developer AI stack closer to real document and media search.
The second Linux root exploit in eight days turned patching into the weekend's main event.
A proposed ID check for phone numbers sparked a privacy alarm far beyond robocalls.
A widely shared refusal to use AI for coding captured the growing fatigue with bot-first programming.
A claimed 12 million token window kept the model arms race focused on scale and spectacle.
Fresh research warned that LLMs can quietly corrupt long documents when asked to edit them.
A report from the European Parliamentary Research Service says VPNs are increasingly being used to bypass online age-verification rules and describes that use as a regulatory loophole. The article pla...
This article is a first-person argument against using AI for coding. The author explains that his position is not only about productivity or technical tradeoffs, but also about the fact that he enjoys...
This article explores the ongoing scientific effort to understand how lightning begins. It centers on physicist Joseph Dwyer, who moved from studying solar flares and energetic particles with NASA’s W...
This article investigates the environmental and public health consequences of PFAS use in Dalton, Georgia, a city known as the “Carpet Capital of the World.” It centers on how the region’s carpet manu...
This article examines how website feature requests change over time and how those changes are often driven by imitation rather than evidence of usefulness. The writer describes a recurring client beha...
This article is a practical tutorial on improving MongoDB query performance through better indexing, demonstrated with VisuaLeaf and a sample payments collection. It argues that slow queries are not a...
This 2019 article by Eduardo Alvarez discusses how to approach C++-level performance in Julia for scientific and high-performance computing. Rather than staying abstract, the post uses a concrete aero...
This article argues that Vladimir Putin is losing his grip on Russia and that his efforts to preserve power are contributing to wider political decay. Written by a former senior official in the Russia...
A Linux kernel patch submitted by Sasha Levin proposes a new mitigation mechanism called Killswitch. The feature is designed for situations where a security issue becomes public before operators can r...
This article explains the technical foundations behind reviving fonts from the IBM Selectric Composer, a mechanically sophisticated typesetting machine introduced by IBM in 1964. Rather than treating ...
Internet Archive Switzerland introduces itself as an independent Swiss non-profit foundation based in St. Gallen with the mission of providing universal access to knowledge. The article explains that ...
This article is an informal technical proposal for building an alternative specification to the Web, beginning with HTML. Rodrigo Arias Mallo frames the effort as a way to preserve useful aspects of t...
This article presents a research benchmark called **DELEGATE-52**, created to measure whether large language models can be trusted in delegated document workflows. The study is motivated by the growin...
This article is a first-hand account of a 2014 visit to YunSun’s LED factory in Shenzhen during a trip to China. The author, writing from the perspective of someone who had sold LEDs for years without...
This article explains how the authors built a narrowly scoped local key-value storage engine that does not call fsync on the durable write path for PUT and DELETE operations. Instead, the design relie...
This article examines Peter Naur’s essay *Programming as Theory Building* and explains its relevance to software development. The central claim presented is that programming is not mainly the act of p...
The article examines a new FCC proposal that would require telecom providers to verify customer identities before activating phone service. Approved unanimously by the agency on April 30, the proposal...
tack. is a free browser-based tool for converting image-based visual information into structured coordinates. According to the article, it allows users to place single points, draw open polylines, and...
This article looks at the Acorn Archimedes and the unusual combination of technologies that surrounded it during the experimental years of home computing. It describes how Acorn Computer Ltd., searchi...
This article examines the ideological roots of the modern internet through a critical look at cyberlibertarianism. It begins by acknowledging the practical benefits the internet brought over pre-digit...
GrapheneOS says it has patched an Android 16 VPN leak that could expose a user’s real IP address even when Android’s Always-On VPN and block-without-VPN protections were enabled. The flaw, disclosed b...
This article profiles a dramatic turn in the career of Washington Post reporter Hannah Natanson. In January, FBI agents searched her home with a warrant and seized her iPhone and other devices as part...
The article examines Subquadratic’s launch of a first AI model that the company says supports a 12 million-token context window, a major increase over the roughly 1 million-token limits common among f...
This article explains why Lwan replaced its long-used hash table implementation and how the new design works. Lwan had been using a heavily modified version of the kmod project’s hash table, but over ...
This article introduces the motivation behind Beaver triples through an example involving four friends choosing where to eat. Each friend privately rates three restaurants using two values: how afford...
Mochi.js is introduced as a Bun-native browser automation library built directly on the Chrome DevTools Protocol. The article frames it as an end-to-end alternative to conventional stealth automation ...
cPanel issued an emergency security update on May 8, 2026, addressing three newly disclosed vulnerabilities in the wake of a major recent attack. The article says the release came only ten days after ...
In this post, Susam Pal explains why he decided not to add query strings to URLs, linking that decision to both Chris Morgan’s writing and his own practical experience building web tools. Pal says Mor...
Zed’s article presents its Theme Builder as a desktop-only feature for customizing the editor’s appearance through a visual interface. The page explicitly tells users that full access to the builder r...
This article documents one developer’s attempt to release a small cross-platform utility for managing Claude Code profiles and the problems encountered specifically on macOS. The tool is written in Go...
Bun’s creator said the project has been ported to Rust in an effort that began six days earlier and covered roughly 960,000 lines of code. According to the post, the Rust rewrite is already functional...
This article takes a closer look at ROKR’s wooden typewriter model kit and concludes that the product is more functional than its initial marketing warning suggested. Although the writer first assumed...
Space CLI is introduced as a command-line interface for managing flashcards from the terminal while keeping review inside the Space app. The article says users must first install the Space app on Mac,...
Jarred Sumner announced on X that Bun’s experimental Rust rewrite now passes 99.8% of the project’s pre-existing test suite on Linux x64 glibc. The update indicates that the rewrite is achieving near-...
The article examines how Meta’s internal push into artificial intelligence is affecting employee morale. According to *The New York Times*, the company told U.S. employees that it would begin tracking...
Jane Street’s video, *Production Engineering When Trading Billions of Dollars a Day*, examines the operational demands of running software that actively trades in stock markets around the world. The a...
The article reports on “Dirty Frag,” an exploit chain targeting the Linux kernel and identified as CVE-2026-43284 plus CVE-2026-43500. It says the issue was publicly disclosed on May 7, 2026, and warn...
FreeBSD has released security advisory FreeBSD-SA-26:13.exec for CVE-2026-7270, a local privilege escalation vulnerability in the `execve(2)` system call. The advisory says all supported FreeBSD versi...
This article is a first-person reflection from a software engineer who says they began their first job after college in July 2023 and reached the title of Senior Software Engineer in January 2026. Rat...
let-go is introduced as a Clojure-like language implemented in Go, built around a bytecode compiler and virtual machine. The project focuses on small size, fast startup, and portable deployment. Accor...
This article is a first-person technical reflection on building a custom programming language. The author says the project began in mid-December 2025 and is currently paused, but has already reached t...
This article argues that the long-used 90-day responsible disclosure policy is becoming less effective because the security landscape has changed. The author says the policy was designed for a time wh...
This article offers a first-person description of Japan’s post-arrest detention process and the conditions inside police-run detention centers. It explains that after arrest, individuals may be held i...
This article presents the view that traditional long-range engineering planning is becoming less reliable in an environment shaped by rapid market shifts and AI-assisted software development. The auth...
rlisp is presented as a tool that lets developers write Rust programs in Lisp-style s-expressions while keeping Rust’s original semantics intact. According to the article, rlisp acts only as a syntax ...
This article examines a familiar problem in embedded hardware work: how to maintain convenient access to UART TTL serial pins without relying on fragile Dupont jumper wires and dangling USB-TTL adapte...
France’s parliamentary intelligence delegation has formally endorsed measures that would allow magistrates and intelligence services to gain targeted access to encrypted communications on major messag...
This article describes an exploit in which a user on X allegedly manipulated Grok and Bankrbot, two AI systems connected to crypto wallets, into transferring about $200,000 worth of DRB tokens. The ar...
This article by Jure Triglav presents a technical exploration of whether **WebGPU** can support **real-time global illumination** on the web using **surfels**, or surface patches, as the underlying re...
Ken Shirriff’s article explores the 1962 Arma Micro Computer as an overlooked milestone in early compact computing. Although it does not qualify as a microcomputer by modern standards because it was b...
The article announces the launch of Chapter 1 of **A History of Visual Basic**, a new series focused on the origins of Visual Basic and the people involved in building it. The author says the project ...
This article examines Robert Redford's deep connection to *Jeremiah Johnson* and the Utah landscape that shaped both the film and his personal life. It opens with a vivid account of a mountain filming...
This article presents a derivation of the column elimination tree for the right-looking sparse Cholesky factorization. Starting from the standard dense Cholesky algorithm for a symmetric positive defi...
This article introduces **ymawky**, a static HTTP web server implemented entirely in **AArch64 assembly** for **macOS**. The project is intentionally minimal and low-level: it uses raw **Darwin syscal...
Google’s article describes a product update to the Gemini API’s File Search tool aimed at developers building retrieval-augmented generation systems. The update adds support for multimodal retrieval, ...
This article profiles Emerich Juettner, an unlikely and highly unconventional counterfeiter who became known as “Mister 880.” Rather than operating a sophisticated criminal enterprise, Juettner was a ...
Daniel Lemire’s article argues that innovation often does not follow a simple path from theory to application. Starting from a quote by Thomas Dullien, the piece says people frequently discover what w...