Featured post what's this? ✨ security - Dirty Frag: Universal Linux LPE Powered by blists - more mailing lists
A recent experience with ChatGPT 5.5 Pro We are all having to keep revising upwards our assessments of the mathematical capabilities of large language models. I have just made a fairly large revision as a result of ChatGPT 5.5 Pro, to whi…
Meta Shuts Down End-to-End Encryption for Instagram Messaging 'Very few people were opting in to end-to-end encrypted messaging in DMs,' Meta says.
AI is Breaking Two Vulnerability Cultures A week ago the Copy Fail vulnerability came out, and Hyunwoo Kim immediately realized that the fixes were insufficient, sharing a patch the same day. In doing this he followed standard procedure for Linux, especially within networking: share the security...
Cartoon Network Flash Games Explore a collection of Cartoon Network browser games inspired by The Powerpuff Girls, Dexter’s Laboratory, Samurai Jack, and other fan-favorite series.
Google Broke reCAPTCHA for De-Googled Android Users The company that decides whether you're a bot now also requires you run its software to prove otherwise.
Code has always been worthless | Blog For forty years we pretended software was the product. SaaS moved the price to the service. AI moved it past zero. The artefact is free now — what's worth paying for is knowing which code to write.
When is your birthday? - The Math Behind Hash Collisions The mathematics behind why encryption works — and why it sometimes doesn’t.
Growth Hacking was an awful idea <p><i>By Mr. Market</i></p> <p>Brand has historically been considered an imprecise, flailing effort, only necessary once you hit a certain size and even the...
Human Typing Habits and Token Counts Normal human habits like swapped letters, fillers, shorthand, pasted IDs, boundary whitespace, and nearby word forms can change token count without changing intent much.
Humanity is self-deprecating A year ago agents were good, but comparing them today is a folly. Today, agents effectively replace junior developers and companies have realized that. I ...
Pair Your Coding Agent with a Reviewer The simplest improvement you can make to your agentic programming workflow is to run two agents instead of one. One writes code in its own worktree; the other, in a parallel worktree, reviews it. They share a task list and talk after every TDD cycle. The ...
Engineering Intelligence from Autocomplete LLMs don't think; they predict the next token. Discover the engineering tricks from RAG to Tree of Thoughts that force a simple autocomplete to behave intelligently.
My first corrupted hard drive problem How I had to deal with a corrupted hard drive on a production server.
Can LLMs model real-world systems in TLA+? Editors’ note: AI has been actively pushing the frontier of applied formal methods for computing systems. In this article, the Specula team wrote about their experience of evaluating LLMs on modeling system code, the basic capability for agentic model che...
Fixing Markdown Syntax Is a Nightmare | mdview.io Explore common Markdown syntax issues and solutions, focusing on rendering challenges across various dialects and fixing LaTeX and Mermaid errors effectively.
AI makes weak engineers less harmful Like other kinds of puzzle-solving, software engineering ability is strongly heavy-tailed. The strongest engineers produce way more useful output than the average, and the weakest engineers often are actively net-negative: instead of moving projects along...
Building a Harper Desktop App We're dedicating the next month to just one thing: getting a Harper desktop app shipped.
Zed is pretty nice | blog.kronis.dev My blog, where I attempt to collect my thoughts and share the occasional interesting topic with others
You gave me a u32. I gave you root. (io_uring ZCRX freelist LPE) · ze3ter Linux 6.15 shipped a new zero-copy receive subsystem for io_uring called ZCRX. It manages a pool of network I/O vectors (niovs) using a stack: freelist[] holds available slot indices, free_count is the depth. There is no upper bound check on free_count. T...
Google Cloud Fraud Defence is just WEI repackaged In May 2026, Google announced “Google Cloud Fraud Defense - the next evolution of reCAPTCHA.” The announcement described a QR code challenge where users scan a
taken. A web page that tells you what your browser gave away the moment you arrived. No login, no form, no permission. Most pages do this. None of them tell you.
Introduction | Meshtastic Discover Meshtastic: a community-driven, open-source project using LoRa radios for long-range, off-grid communication.
OpenAI's WebRTC Problem - Media over QUIC Media over QUIC: There are ways to do voice AI without being traumatized by WebRTC.
HomePod mini feels like magic, but it's just good timing Apple introduced the HomePod mini six years ago, in 2020. I'm not one into smart speakers, but the feature that made me take a closer look was their ability to form stereo pairs, without any direct wired connection. I know there are other speaker manufact...
Hi stranger I'm at home, sitting on the kitchen table. I just took my boys to school and I'm about to start my work. I'm writing this message directly to you. And you are reading it. Hello!