The Wonders of AI: We Are Retiring Our Bug Bounty Program

https://turso.tech/images/blog/the-wonders-of-ai/image1.png
Turso is retiring its $1,000 bug bounty program due to overwhelming fake submissions from AI-powered "slop machines." The program was intended to encourage genuine bug submissions but became too attractive to bots.

A 0-click exploit chain for the Pixel 10

https://projectzero.google/images/preview_image.png
Researchers found a zero-click root exploit for the Google Pixel 10 using a Dolby UDC vulnerability. They also discovered a VPU driver vulnerability that allowed arbitrary kernel read-write, which was patched within 71 days.

O(x)Caml in Space

https://gazagnaire.org/blog/images/kc-icfp22-roadmap.png
Parsimoni's Borealis project successfully deployed a pure-OCaml CCSDS protocol stack in low Earth orbit, providing end-to-end encryption and post-quantum key rotation. The project showcases OCaml's suitability for space applications due to its safety features and performance, addressing security risks and memory corruption issues in traditional C/C++ codebases.

ASCII by Jason Scott

https://ascii.textfiles.com/wp-content/uploads/2026/05/C4bhiPtWQAAdVvy.jpg
The user saved a collection of 13,000 manuals from being discarded and digitized them, making them available on the Internet Archive after an 11-year effort. The user has moved to a new industrial space to continue their work, which is supported by donations and a Patreon, and is grateful for the opportunity to have a dedicated space for their archiving and digitizing work.

Explore Wikipedia Like a Windows XP Desktop

https://explorer.samismith.com/og.png
The explorer.samismith.com website offers Wikipedia and Wikimedia Commons exploration, with features like desktop background image setting and Earth folder drag-and-drop functionality. It's an open-source project inspired by various web experiences.

High dimensional geometry is transforming the MRI industry(2017) [pdf]

Trade Dollars with other startups. Book it as revenue

https://www.revswap.ai/assets/money-loop-VgqbSpgv.png
ACME paid ZENITH $4M for AI services, while ZENITH paid ACME $4M for AI infrastructure. Several startups reported significant revenue growth and funding.

Show HN: Find the best local LLM for your hardware, ranked by benchmarks

https://raw.githubusercontent.com/Andyyyy64/whichllm/main/assets/demo.gif
whichllm ranks models based on real benchmarks and evidence, not size. It chooses the best model for your hardware from merged live and frozen benchmark sources.

Removing the modem and GPS from my 2024 RAV4 hybrid

https://arkadiyt.com/images/rav4/tools.jpg
The author removed the modem and GPS from their 2024 RAV4 Hybrid to prevent telemetry data from being sent to Toyota. This was done to improve car privacy and security, but may void parts of the warranty.

Radicle: Sovereign {code forge} built on Git

https://radicle.dev/assets/images/web-app-screenshot.png
Radicle is a decentralized, open-source code collaboration platform built on Git, allowing users to control their data and workflow. It enables censorship-resistant collaboration, local-first functionality, and easy data migration with a modular stack and various interfaces.

UK government replaces Palantir software with internally-built refugee system

https://ichef.bbci.co.uk/news/480/cpsprodpb/1b91/live/a4434bd0-4a32-11f1-a70d-c72ff4101914.jpg.webp
A UK government department replaced a Palantir IT system with its own, saving millions of pounds. The new system is more flexible and meets high security standards, reducing reliance on external suppliers.

Too dangerous or just too expensive? The real reason Anthropic is hiding Mythos

Anthropic's restricted release of Claude Mythos Preview is driven by both security concerns and compute constraints. The company's decision to limit access to the model is primarily motivated by the potential risks of its autonomous, real-time discovery and exploitation of zero-day vulnerabilities.

SigNoz (YC W21, open source Datadog) Is hiring for growth and engineering roles

https://app.ashbyhq.com/api/images/org-theme-logo/2f1f7a19-9719-437c-902f-861cf9096134/fcf65159-ffdc-40fa-9a2f-4b400b3d1493/d51eab50-af4c-4a66-808c-efee755b61e9.png
SigNoz Jobs

Check Your Fucking Sources, People

https://brodzinski.com/wp-content/uploads/crow.jpg
The author is frustrated with AI-generated content and fake references in articles, which can be misleading and damage credibility. They recommend readers verify information by reading the actual research papers and applying judgment, rather than relying on AI-generated summaries.

A few words on DS4

DwarfStar 4's popularity stems from its single-model integration and fast, large quasi-frontier model. The project will focus on quality benchmarks, coding agent, hardware setup, ports, and distributed inference.

Details of the Daring Airdrop at Tristan Da Cunha

https://www.tristandc.com/images/oc-2026-05-09-plane-over-village.jpg
The UK Government sent a military team and medical supplies to Tristan da Cunha to help with a suspected hantavirus outbreak. The team parachuted in and delivered the supplies, providing much needed relief to the island's hospital team.

Building ML framework with Rust and Category Theory

Category Theory for Tiny ML in Rust is a working draft that uses category theory as an engineering tool to develop a small, explicit machine-learning system in Rust. The book is open-source and allows feedback, but commercial or organizational reuse requires written permission from the project owners.

RTX 5090 and M4 MacBook Air: Can It Game?

https://scottjg.com/posts/2026-05-05-egpu-mac-gaming/macos-egpu.jpg
A user successfully attached an NVIDIA RTX 5090 GPU to their MacBook Air using a Thunderbolt dock and a USB-C port, but encountered several challenges including macOS not shipping with drivers for NVIDIA or AMD GPUs on Apple Silicon and limited support for different AI models. The user was able to overcome these challenges by using a Linux VM on the MacBook Air, passing through the GPU to the ...

Amazon workers under pressure to up their AI usage–so they're making up tasks

Please enable JS and disable any ad blocker

NanoTDB – Golang Append-Only Time Series DB

https://opengraph.githubassets.com/20955dc61cb27646fd17850102f10f325f6b5c2a8bfa013ab7062f0d6619e6ff/aymanhs/nanotdb
This embedded time-series database is designed for resource-constrained hosts, storing data in plain files with no external dependencies. It supports compression, rollups, and a small HTTP API for querying and importing/exporting data.

First public macOS kernel memory corruption exploit on Apple M5

https://substackcdn.com/image/fetch/$s_!TJW7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c731d5e-68ca-4054-894f-659601de6a66_2048x1536.jpeg
Researchers shared a macOS kernel memory corruption exploit with Apple at their Cupertino office, the first to survive MIE on M5 silicon. The exploit was developed using AI and human expertise, highlighting the potential for AI to discover vulnerabilities that bypass advanced mitigations.

Codex is now in the ChatGPT mobile app

https://images.ctfassets.net/kftzwdyauwt9/4i08f39LTE7HOZ0R3EKaKA/74f6008bbde015cfef96a14209f7673b/16_9.png?w=3840&q=50&fm=webp
Codex is now in the ChatGPT mobile app, allowing users to work with Codex from anywhere. The app enables users to review, approve, and change direction on work in real-time, streamlining collaboration and productivity.

Gyroflow: Video stabilization using gyroscope data

https://raw.githubusercontent.com/gyroflow/gyroflow/master/resources/screenshot.jpg
Gyroflow is a video stabilization application that uses gyroscope data to stabilize footage. It supports various cameras and video editors, including Adobe Premiere and DaVinci Resolve.

Welcome to the Strip Mining Era of OSS Security

https://www.metabase.com/images/posts/exploit-farming.png
Open source software is facing a surge in security vulnerability discoveries due to high-volume, LLM-powered scanning, which will uncover many issues in public codebases. To prepare, developers should assume vulnerabilities are easily discoverable, fix issues promptly, and adopt a proactive approach to security, including frequent patching, monitoring, and access controls.

New Nginx Exploit

https://opengraph.githubassets.com/3769a28a5822a4d244e7a66cb803bdf9d051ba3cb319c2953cc6d53a3d2e9753/DepthFirstDisclosures/Nginx-Rift
A critical heap buffer overflow in NGINX's ngx_http_rewrite_module allows unauthenticated RCE. Exploitation involves cross-request heap manipulation to redirect a cleanup pointer to a fake function invoking system().

Steve Jobs Next Computer: His Forgotten Exile Years

https://spectrum.ieee.org/media-library/illustration-of-three-apple-incorporated-logos-stacked-on-top-of-one-another.jpg?id=66730467&width=1200&height=900
Steve Jobs spent 12 years at NeXT Computer, a company that made significant advancements in software and hardware, and its legacy is the foundation for Apple's operating systems today. His time at NeXT taught him discipline and the importance of software, which he applied to Apple's success, particularly with the iPod, iPhone, and iPad.

Mullvad exit IPs are surprisingly identifying

https://tmctmt.com/posts/mullvad-exit-ips-as-a-fingerprinting-vector/tool.png
Mullvad's exit IP picking algorithm uses a seed-based RNG, not truly random numbers, allowing for correlation attacks. This means users can be deanonymized behind a VPN with >99% accuracy.
https://opengraph.githubassets.com/9414a3014737e5e313ebf19be7427f91da2d80e0970be3149212d95ec669c508/anthropics/claude-for-legal
Claude for Legal is a platform that provides reference agents, skills, and data connectors for various legal workflows. It offers a customizable solution for in-house, firm, and academic legal work, with a focus on automation and efficiency.

Tesla Wall Connector bootloader bypasses the firmware downgrade ratchet

https://www.synacktiv.com/sites/default/files/styles/blog_grid_view/public/2026-04/blogpost.png
Tesla's anti-downgrade mechanism in the Wall Connector Gen 3 was bypassed by exploiting the order of operations between partition table write and slot erase, allowing an old firmware to be written to the active slot without calling routine 0x201. This vulnerability was fixed in a firmware update, but it highlights the importance of enforcing the security ratchet in the bootloader to prevent ...

HDD Firmware Hacking

https://icode4.coffee/wp-content/uploads/hdd_twitter_card-470x140.png
The user was working on an Xbox 360 exploit and needed to modify a hard drive's firmware to introduce a delay in read requests, but instead found a way to exploit the race condition without modifying the firmware. The user then decided to modify the firmware of various hard drives and solid state drives, including Western Digital and Samsung models, to gain a deeper understanding of how they ...