LiteLLM Python package compromised by supply-chain attack

https://opengraph.githubassets.com/b08f0d4bd81d3bfed53bb4a30b44b510d36a01972535db490c3a4839d3d6b313/BerriAI/litellm/issues/24512
A malicious litellm package on PyPI contains a .pth file that steals credentials. Users who installed it via pip should rotate all credentials.

Missile Defense Is NP-Complete

https://smu160.github.io/images/two_interceptors_one_warhead.gif
Missile defense is a hard problem due to unreliable interceptors and a complex allocation problem. The optimal solution is NP-complete, but recent research has developed algorithms to solve instances with thousands of targets and interceptors in seconds.

Microsoft's "Fix" for Windows 11: Flowers After the Beating

https://www.sambent.com/content/images/size/w160/2025/07/370-----Photos-1.png
Microsoft changed the red X button during the GWX campaign in May 2016 to schedule Windows 10 upgrades instead of closing the dialog. The article does not mention how long it took to restore the ability to move the taskbar after it was removed.

Debunking Zswap and Zram Myths

https://chrisdown.name/images/hnr.jpg
Use zswap for most people as it provides automatic tiering between compressed RAM and disk swap, gracefully degrading as memory pressure increases. zram is better suited for embedded systems or specific security requirements, but its block device architecture creates constraints and requires manual setup and management to achieve similar behavior to zswap.

Opera: Rewind The Web to 1996 (Opera at 30)

https://www.web-rewind.com/logos/rewind_logo.webp
An interactive journey through 30 years of the web

curl > /dev/sda: How I made a Linux distro that runs wget | dd

To replace a Linux installation with a new OS, you can pipe a pre-prepared disk image directly to the disk using a command like dd. This works by treating the disk as a file and writing to it directly.

Ripgrep is faster than grep, ag, git grep, ucg, pt, sift (2016)

https://burntsushi.net/stuff/ripgrep1.png
Ripgrep is a fast, cross-platform command line search tool that combines the usability of The Silver Searcher with the raw performance of GNU grep, offering features like Unicode support, regex engine options, and file type filtering. It is designed to be a hybrid of grep-like and ack-like tools, providing both speed and smart default searching capabilities, making it a suitable replacement ...

Box of Secrets: Discreetly modding an apartment intercom to work with Apple Home

https://www.jackhogan.me/_vercel/image?url=_astro%2Fintercom.qcq0z6vp.jpg&w=750&q=100
The user and their friend Hazel hacked into their friend Frank's apartment complex's intercom system to unlock the gate using Apple Home. They used an ESP32 relay board, a Matter library in Rust, and a rectifying regulator to create a discreet device that could unlock the gate with a tap on Frank's phone.

Overcoming the Friendship Recession

https://joeprevite.com/assets/images/bilingual-playdate-tiny.jpg
The author reflects on lost friendships and the difficulty of making new ones as an adult with a family. They experiment with in-person connections through a bilingual play group and coworking initiative.

Log File Viewer for the Terminal

https://lnav.org/assets/images/lnav-front-page.png
lnav automatically detects and processes log files, including compressed ones, with online help and previews. It outperforms standard terminal tools in processing large log files like a 3.3GB access log.

NanoClaw Adopts OneCLI Agent Vault

https://nanoclaw.dev/nanoclaw-flow-dark.gif
NanoClaw adopted OneCLI as its default credential and proxying layer for secure agent access. OneCLI's Agent Vault provides fine-grained controls and policies to limit agent access and prevent potential damage.

MSA: Memory Sparse Attention

https://raw.githubusercontent.com/EverMind-AI/MSA/main/assets/fig1_scaling.png
Researchers present Memory Sparse Attention (MSA), a scalable sparse latent-state memory framework for efficient end-to-end memory model scaling. MSA achieves near-linear complexity and <9% degradation from 16K to 100M tokens.

No-build, no-NPM, SSR-first JavaScript framework if you hate React, love HTML

Qite.js is a lightweight frontend framework that enhances HTML with declarative behavior without requiring a virtual DOM or complex setup. It allows you to write components in plain JavaScript, separate from HTML and CSS, and works naturally with standard CSS transitions and animations.

iPhone 17 Pro Demonstrated Running a 400B LLM

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Autoresearch on an old research idea

https://ykumar.me/blog-images/eclip/agent_loop_light.webp
User tried Autoresearch on a research problem with Claude Code, an LLM agent. The agent improved a Mean Rank metric by modifying a single file, train.py, and reduced the metric by 54% in 42 experiments.

BIO – The Bao I/O Co-Processor

https://www.crowdsupply.com/img/b45c/541def27-116b-49ef-8b91-8428ab5ab45c/pio-utilization_png_md-xl.jpg
The author created an I/O co-processor called BIO, which is a more efficient and flexible alternative to the Raspberry Pi's PIO, consuming about half the area of the PIO and achieving over 4x the clock rate when ported to an ASIC flow. The BIO uses a RISC-V 32-bit core and has a spacious 4 kiB of RAM, allowing for more complex code and higher-level features such as fixed-point math and ...

Secure Domain Name System (DNS) Deployment 2026 Guide [pdf]

Certain equipment, instruments, software, or materials, commercial or non-commercial, are identified in this paper in order to specify the experimental procedure adequately. Such identification does not imply recommendation or endorsement of any product or service by NIST, nor does it imply that the materials or equipment identified are necessarily the best available for the purpose. There ...

FCC updates covered list to include foreign-made consumer routers

A 6502 disassembler with a TUI: A modern take on Regenerator

https://raw.githubusercontent.com/ricardoquesada/regenerator2000/main/docs/regenerator2000_logo.png
The tool is an interactive 6502 disassembler for Commodore 8-bit computers with features like live disassembly and breakpoints. It has a TUI with modern features like x-ref and keyboard-driven navigation.

Show HN: Cq – Stack Overflow for AI coding agents

https://blog.mozilla.ai/content/images/size/w160/2025/08/peter.jpg
Mozilla AI is developing an open-source platform called cq to share knowledge between AI agents, preventing them from wasting resources and energy by learning from each other's experiences. The goal is to create a sustainable and standardized way for AI agents to share knowledge, ensuring that the benefits of AI are accessible to all without relying on a few big companies.

Claude Code Cheat Sheet

Dune3d: A parametric 3D CAD application

https://raw.githubusercontent.com/dune3d/dune3d/main/screenshot.png
The user created Dune 3D, an open-source 3D CAD application, to address dissatisfaction with existing options like FreeCAD and Solvespace. It combines Open CASCADE for geometry and Solvespace's solver for constraints.

Microservices and the First Law of Distributed Objects (2014)

https://martinfowler.com/articles/images/distributed-objects-microservices/local-remote.png
The author of Patterns of Enterprise Application Architecture initially opposed distributed objects due to the difference in behavior between in-process and remote calls. However, microservices don't violate this law as they don't aim for in-process/remote transparency.

The Resolv hack: How one compromised key printed $23M

https://www.chainalysis.com/wp-content/uploads/2026/03/2026-03-attack-on-resolve-2-1500x583.jpg
An attacker exploited Resolv DeFi protocol's off-chain infrastructure by gaining access to a privileged private key, minting 80 million unbacked USR tokens, and extracting $23 million in value. The attack highlights the importance of real-time on-chain threat detection and automated response mechanisms to prevent similar incidents in DeFi systems.

Pompeii's battle scars linked to an ancient 'machine gun'

We’re checking your connection to prevent automated abuse

Finding all regex matches has always been O(n²)

https://iev.ee/_astro/alerts.CyL9QR-X_Z1HhGYd.webp
The quadratic all-matches problem in regex engines has been a long-standing issue since the 1970s, causing worst-case time complexity of O(m * n²) when searching for multiple matches in a large input. A new regex engine called RE# has been developed to solve this problem, offering a hardened mode that guarantees linear time even on adversarial input, and a normal mode that is faster but may ...

Gerd Faltings, who proved the Mordell conjecture, wins the Abel Prize

https://static.scientificamerican.com/dam/m/5688f8133cea51d2/original/GerdFaltings4_AbelPrize2026_Photo_PeterBadge_Typos1_TheAbelPrize_smaller_crop.jpg?m=1773930436.982&w=600
Gerd Faltings, a 71-year-old German mathematician, has been awarded the Abel Prize for his influential work on the Mordell conjecture, now known as Faltings's theorem. The theorem proves that certain curves have a finite number of rational points, a cornerstone of arithmetic geometry.

IRIX 3dfx Voodoo driver and glide2x IRIX port

https://sdz-mods.com/wp-content/uploads/2026/03/S1A-1024x768.jpg
At the moment only SST1 (Voodoo1) is supported on IP32 (O2). Only tested on IRIX 6.5.30 with RM7000C CPU.-driver sources (SST1 and CVG support on IP32) https://github.com/sdz-mods/tdfx_irix-glide2x IRIX port (SST1 on IP32) https://github.com/sdz-mods/glide_irix-hinv wrapper with 3dfx support: https://github.com/sdz-mods/hinv_3dfx

Abusing Customizable Selects

https://i0.wp.com/css-tricks.com/wp-content/uploads/2026/02/image-13.png?resize=703%2C518
The user discusses customizable selects in web browsers, creating demos with new features like stack of folders and card picker, using HTML, CSS, and new syntax like sibling-index() function. The user showcases three demos, each with unique styling and animations, highlighting the capabilities of customizable selects.

Trivy under attack again: Widespread GitHub Actions tag compromise secrets

https://cdn.sanity.io/images/cgdhsj6q/production/3c283698250f6e6a079a96cdd9860cec0bc9b92d-2048x1180.png?w=1600&q=95&fit=max&auto=format
A Trivy supply chain attack compromised GitHub Actions, impacting over 10,000 workflows, and was enabled by a compromised credential with write access to the repository. The attack delivered an infostealer via 75 modified version tags, targeting sensitive data in CI/CD environments.