Rivian Support - Support Center - Rivian Vehicle connectivity is a core feature of Rivian vehicles. If you choose to disable all vehicle connectivity, it will prevent data from leaving the vehicle, but it will also limit or disable certain functionality in the vehicle (e.g., navigation, lane kee...
LinkedIn Is Scanning Your Browser Extensions. This Is How They Use the Data. — 404 When companies get caught doing this sort of thing, the response is almost always the same: "we're using this technology to combat fraud," or "ensure positive user experience," or "save computing resources," or some other hog wash. The simple truth, ther...
Shai-Hulud Themed Malware Found in the PyTorch Lightning AI Training Library The PyPI package lightning was compromised in versions 2.6.2 and 2.6.3 with Mini Shai-Hulud themed malicious code to execute credential-stealing malware on import.
Fast .NET CLI ISO Downloader with Integrity Validation | no dogma blog A fast .NET CLI tool for downloading ISO files with built-in integrity validation.
security - Re: CVE-2026-31431: CopyFail: linux local privilege scalation Powered by blists - more mailing lists
The Whistleblower Who Uncovered the NSA’s ‘Big Brother Machine’ An unexpected visitor gave my team the evidence we needed to prove that the government was secretly wiretapping Americans.
GCC 16 Release Series — Changes, New Features, and Fixes This page is a "brief" summary of some of the huge number of improvements in GCC 16. You may also want to check out our Porting to GCC 16 page and the full GCC documentation.
J. Craig Venter, genomics pioneer and founder of JCVI and Diploid Genomics, Inc., dies at 79 La Jolla, California—April 29, 2026—The J. Craig Venter Institute (JCVI) announced that J. Craig Venter, Ph.D., the Institute’s founder, board...
How to Make a 1990s Payphone Work in Your Garage! Find out what's inside a 1990s payphone and how to make one work in your own home or office. Full working example and no unethical hacking! Check out Shop Talk on Dave's Attic! Post a question here and we answer them every Friday! https://youtu.be/iT0...
The Zig project's rationale for their firm anti-AI contribution policy Zig has one of the most stringent anti-LLM policies of any major open source project: No LLMs for issues. No LLMs for pull requests. No LLMs for comments on the …
Where the goblins came from How goblin outputs spread in AI models: timeline, root cause, and fixes behind personality-driven quirks in GPT-5 behavior.
FastCGI: 30 Years Old and Still the Better Protocol for Reverse Proxies For FastCGI's 30th birthday, let's look at how it avoids the security problems inherent in HTTP reverse proxying
Verifying Humans Without Surrendering Identity: A Case Against Government-Issued Online Verification Although government-issued identity verification addresses the genuine challenge of distinguishing humans from automated systems, its widespread implementation commoditises personal identity data and exposes users to inconsistent privacy protections.
Slow Down to Speed Up Why getting faster has always required slowing down first — and why the cycle never really ends. Lessons from the cube, the pool, and the codebase, learned and re-learned.
Back up and running! Thank you for your patience during the recent downtime. We recognize that this disruption has been frustrating—and in some cases costly—particularly for sellers who rely on the platform. This messa…
10Gb/s Ethernet: what I actually did to get it working in my home I already had 2.5Gb/s working. Here's how I upgraded the whole house to 10Gb/s Ethernet -- including real iperf3 numbers, MikroTik switches, scary thermals, and what actually worked.
I accidentally made law enforcement shut down their fake honeypot How I stumbled across a fake booter site run by international police, and how they panicked when I started digging
CLAUDE 2028 — What Is Real Position Paper #4. Reality construction, AI psychosis, and the governance of trust.
Reverse Engineering SimTower Personal website of Patrick Hulin: projects, writing, background, and selected publications.
Taking down a European network with a TLS certificate: my RIPE NCC RPKI exploit chain One click on a malicious, but not suspicious, link. That is all it could take for a network operator to get disconnected from the internet, through a chain of …
Inside a 14-month responsible disclosure with the RIPE NCC This post covers the disclosure process for the vulnerabilities described in my RPKI exploit chain, through RIPE NCC’s Responsible Disclosure Policy. What …
The Scientific Method — James Conroy-Finn Every framework for AI-assisted engineering will be obsolete within a year. The scientific method will not. It is the only discipline that survives contact with a field that changes faster than anyone can document.
I benchmarked caveman against two words Solo developer writing about smart contracts, AI tooling, and the stack that earns daily use.
Search isn't going anywhere Agent search isn't working how it was advertised, the landscape is way too fragmented.
My Visitors Are Not All Human. That Is Fine. I built a traffic dashboard for my own site. What I found wasn't alarming, it was interesting. A publisher's notes on bots, borrowed identities, and editorial agency.
Long-running Agents A long-running agent can keep making progress over hours, days, or weeks. It can do this across many context windows and sandboxes, recover from failure, lea...
Secure signatures without a private key Reproducible builds allow anyone to verify that a binary matches its source code. But what if the build artifact must contain a cryptographic signature? Reproducing the signature requires the private key, which defeats the purpose of reproducibility. In t...
On wintering. The winterer is out of the loop; they're not maintaining a position because they don't have a position to maintain. They can do work that takes longer than a quarter, longer than a year, longer than 5 years, because nobody is auditing the line item.
Your Website Is Your First Agent — Ned Karlovich A question that seems minor but probably isn’t: when an agent is dispatched to evaluate whether someone can do a specific kind of work, what does it read?
The Right Amount of Automation Personal site of Joel Holmes — software engineer, author of Shipping Go, and builder of things.
How I Moved My Digital Stack to Europe On digital sovereignty, and why European cloud is better than you think
Have You Seen the New Excel? Stop coding. Stop hiring. Stop building. While the tech world obsesses over large language models and neural networks, I discovered the real disruptor that has been hiding in plain sight. Mine was o