Amp is shifting away from its coding agent model, citing newer models’ surpassed capabilities, and will remove editor extensions on March 5. Meanwhile, a developer successfully built a high-performance Zig web backend stack, showcasing the language’s potential for performance-critical applications. Researchers have also developed ClawShell to provide process-level isolation for OpenClaw credentials, aiming to prevent prompt injection attacks.
π€ AI & Machine Learning
Inside OpenFGA’s Improved ListObjects Algorithm
OpenFGA’s ListObjects algorithm has been improved with a new pipeline traversal approach, enhancing performance and predictability for authorization model graph traversals. This change addresses the challenges of tail latency and bounded resource usage under varying data distributions. The updated algorithm provides more accurate enumeration of matching object IDs based on user relations and evaluation against stored relationship tuples.
- Inside OpenFGA’s Improved ListObjects Algorithm β auth0.com
Salt: Systems programming, mathematically verified
Salt is a systems programming language that offers verified safety without runtime cost through Z3-proven contracts at build time. Developed to solve challenges in high-performance computing, Salt has been used to develop various projects, including a complete Llama 2 inference engine and a Redis-compatible in-memory data store, both with high performance and mathematical certainty.
- Salt: Systems programming, mathematically verified β salt-lang.dev
Tuple Spaces
A tuple space is a collection of tuples that support various operations for insertion, blocking and nonblocking reads, and deletion. It can be used to implement reusable program components for concurrent access and update of distributed sets, making it suitable for encapsulation in a module. The tuple space abstraction is useful for solving database search problems by allowing multiple tasks to concurrently access and update the search data.
- Tuple Spaces β mcs.anl.gov
OpenClaw is the most fun Iβve had with a computer in 50 years
A computer enthusiast who first encountered a DECwriter in 1975 has rekindled their passion with OpenClaw, an AI-powered assistant, and is experiencing a sense of renewal and excitement reminiscent of their early days playing with computers. The author credits the DECwriter for sparking their interest in computers, which has now led to a new beginning with OpenClaw. This experience feels like a return to the joy of exploration and possibility that came with early computing experiences.
- OpenClaw is the most fun Iβve had with a computer in 50 years β go.theregister.com
“Reddit tests AI-powered product suggestions”
Reddit is testing a new AI-powered search feature that incorporates community recommendations and matches them with products from its advertisers, offering interactive product carousels with pricing, images, and direct where-to-buy links. The feature aims to combine Reddit’s platform with e-commerce capabilities, following recent developments in AI-driven shopping features on other platforms. A small group of users in the US will start to see the results of this new tool.
- “Reddit tests AI-powered product suggestions” β techcrunch.com
India’s AI summit attracts record 250K visitors.
India’s AI Impact Summit, a week-long event featuring 300+ exhibitors and 500 sessions, concluded with significant business deals and investments worth billions of dollars, as well as announcements from entrepreneurs addressing real-world problems. The summit, attended by world leaders and tech giants, aimed to promote India’s artificial intelligence aspirations and explore its potential for solving global issues. Prime Minister Narendra Modi played a key role in hosting the event, which was seen as an opportunity to showcase India’s AI capabilities on the global stage.
- India’s AI summit attracts record 250K visitors. β nytimes.com
Accenture tracks AI usage among senior staff.
Accenture is requiring senior staff to regularly use its AI tools, tracking individual logins to monitor adoption rates, as part of a promotion-linked incentive system. The move aims to combat resistance among some staff members who are less willing to adopt new technology than their junior colleagues. This approach reflects a common strategy employed by consulting firms in the industry.
AI makes you boring
A growing trend in coding projects on platforms like Show HN is leading to a decline in quality and originality, as individuals rely heavily on AI models for their thinking, resulting in unchallenging ideas that lack depth. This phenomenon is affecting the programming discussion community beyond these platforms, stifling opportunities for learning and growth. The reliance on AI models is also hindering true original thinking and creative problem-solving.
- AI makes you boring β marginalia.nu
DOGE Bro’s Grant Review Process Was Literally Just Asking ChatGPT ‘Is This DEI?’
Two inexperienced individuals appointed to review federal grants, Nate Cavanaugh and Justin Fox, used an AI tool called ChatGPT to determine whether proposed projects related to Diversity, Equity, and Inclusion, resulting in the termination of approved grants. The duo’s unorthodox decision-making process was based on a simple yes-or-no question from ChatGPT rather than a thorough review of grant applications.
Gemini 3.1 Pro Preview
Google Cloud Console experienced technical issues loading JavaScript sources from www.gstatic.com, with possible causes including network blockage by administrators or temporary blocking of accounts or networks due to excessive automated requests. Users are advised to contact their network administrator for further assistance.
- Gemini 3.1 Pro Preview β console.cloud.google.com
The future belongs to those who can refute AI, not just generate with AI
As AI-generated code becomes increasingly prevalent in software engineering, the ability to verify and refute its output will become crucial for ensuring reliability and usefulness. The skill of refutation will be more important than generating code itself, with verification playing a central role in determining what code survives and what does not. This shift challenges traditional notions of productivity and creativity in software development.
- The future belongs to those who can refute AI, not just generate with AI β learningloom.substack.com
LatentScore β Type a mood, get procedural/ambient music (open source)
A developer has created an open-source tool called LatentScore that generates procedural/ambient music based on user inputted text descriptions of moods. The software uses sentence embeddings and runs locally without tracking or ads. It is currently in alpha, but suitable for focus music or background atmosphere.
- LatentScore β Type a mood, get procedural/ambient music (open source) β latentscore.com
I made ChatGPT and Google tell I’m a competitive hot-dog-eating world champion
Thomas Germain manipulated ChatGPT and Google into revealing his true identity as a competitive hot-dog-eating world champion by exploiting their natural language processing limitations, and many users have fallen for the prank, spreading false information via AI systems.
A physically-based GPU ray tracer written in Julia
Researchers have successfully ported the pbrt-v4 GPU ray tracer to Julia programming language, enabling users to extend the software with new materials and media. The tool runs on AMD, NVIDIA, CPU, and will also support Metal in the future, allowing for physically-based path tracing capabilities in Makie plots.
- A physically-based GPU ray tracer written in Julia β makie.org
After AI, there is no product
Experts say traditional economics of software as an asset is breaking due to rapid advancements in AI technology, making custom-built software more accessible and less valuable. The focus should be on whether built software remains difficult and scarce, or if it’s simply inventory that can be easily manufactured and sold like a commodity. This shift challenges the traditional SaaS model of amortizing development costs over long periods.
- After AI, there is no product β sidu.in
A Lisp where each function call runs a Docker container
A new Docker image for Lisp allows users to run a functional programming language within a container, providing tools like expression evaluation and tracing. The image is built using Dockerfiles and can be run with the provided scripts. Users can also write their own programs in a Dockerfile format.
- A Lisp where each function call runs a Docker container β github.com
π» Cybersecurity
Linux CVE assignment process
The Linux kernel security team does not publicly announce security fixes but relies on automated processes to assign CVEs. The CNA team focuses on reviewing a “feed of known bugfixes” from the high-volume rate of changes to identify potential security fixes, including those that resolve user-triggered crashes, memory leaks, and secrets leaking from the kernel to userspace. This process helps determine which bugs meet the definition of a vulnerability as per cve.org’s guidelines.
- Linux CVE assignment process β kroah.com
Paged Out! #8
No summary available.
- Paged Out! #8 β pagedout.institute
Eagle Wireless Raises $30M Amid US Shift Away from Chinese Tech
Eagle Wireless, a US-based company producing cellular modules for IoT devices, has secured $30 million in Series B funding from Asymmetric Capital Partners and The O.H.I.O. Fund. This investment is part of the US effort to reduce dependence on China in the rapidly growing cellular module market. The move competes with dominant Chinese-based vendors in the industry.
Sony CEO recalls sparking North Korea’s 2014 cyberattack.
Former Sony Entertainment CEO Michael Lynton shares an exclusive account of the 2014 cyberattack on his company in a new book excerpt, revealing how he underestimated his emotions and let it lead to one of the worst corporate hacks in history. The attack exposed confidential emails and put his family at risk. It was a pivotal moment for Lynton, who has now opened up about his role in the incident.
America vs. Singapore: You Can’t Save Your Way Out of Economic Shocks
A recent survey of Americans and Singaporeans aged 60-74 found that economic shocks, rather than procrastination, are the dominant predictor of wishing one had saved more for retirement. Procrastination did not meaningfully predict saving regret, contrary to traditional assumptions in behavioral economics. This suggests that individual responsibility for retirement savings may be less relevant than previously thought.
- America vs. Singapore: You Can’t Save Your Way Out of Economic Shocks β governance.fyi
DOGE Track
A campaign or movement known as “DOGE” has targeted various government agencies, including numerous federal departments and independent organizations, with the exact nature and purpose of the initiative remaining unclear. The list of targeted agencies includes several prominent US government departments and regulatory bodies. The motivations behind DOGE are not specified in the provided information.
- DOGE Track β dogetrack.info
ShannonMax: A Library to Optimize Emacs Keybindings with Information Theory
ShannonMax is a library that analyzes Emacs usage data using information theory to suggest better keybindings, reducing typing by up to significantly changing command keys. Users can customize parameters like keypress costs and alphabet sizes to tailor the analysis to their keyboard layouts and typing habits. The tool provides recommendations for reassigning infrequently used commands to shorter, more convenient keybindings.
Former Prince Andrew Arrested over Epstein Probe
Former Prince Andrew has been arrested on suspicion of misconduct in public office amid revelations linked to convicted sex offender Jeffrey Epstein. The royal family’s reputation is under scrutiny following the arrest, with King Charles III expressing “deepest concern” but supporting a full investigation. He stated that the law must take its course.
- Former Prince Andrew Arrested over Epstein Probe β wsj.com
Andrew Mountbatten-Windsor arrested on suspicion of misconduct in public office
Queen Camilla was asked if she is concerned about Prince Andrew’s arrest during an engagement in central London, but did not respond to the question as she waved at camera representatives.
European Tech Alternatives
The EU Tech Map is a leading directory that offers a range of GDPR-compliant software companies across 30+ categories, allowing businesses to discover trustworthy technology solutions hosted in Europe. The platform provides over 500 European companies, helping businesses prioritize data sovereignty. It enables users to browse and find suitable alternatives for their business needs.
- European Tech Alternatives β eutechmap.com
π¨ Developer Tools
Healthcare security: Write login details on whiteboard, hope for the best
A user at a UK medical center has exposed their login credentials by writing them on a whiteboard, violating basic security guidelines and rendering access logs redundant. The incident highlights the need for better security measures, with many experts advocating for the use of passkeys as a more secure alternative to traditional passwords. Healthcare organizations are often reminded of their need for password security through such simple yet revealing breaches.
- Healthcare security: Write login details on whiteboard, hope for the best β go.theregister.com
Scopely buys majority stake in Istanbul studio for $1B+.
Mobile gaming company Scopely has acquired a majority stake in Loom, the developer of puzzle game Pixel Flow!, valued at over $1 billion. The deal features a performance-based structure and will expand Scopely’s development capacity in Turkey, known for its vibrant games hub. The acquisition comes after Pixel Flow! gained 10 million players globally since its launch.
- Scopely buys majority stake in Istanbul studio for $1B+. β hollywoodreporter.com
Atlassian’s founders lose $7.2B as SaaS stocks plummet
Atlassian co-founders Michael Cannon-Brookes and Scott Farquhar have lost around $7.2 billion in wealth in 2026 due to a global decline in stock prices threatened by artificial intelligence, making them two of the biggest billionaire losers in software.
- Atlassian’s founders lose $7.2B as SaaS stocks plummet β bloomberg.com
Ledn sells $188M in securitized bitcoin-backed bonds
Crypto lending firm Ledn Inc. has sold $188 million of securitized bonds backed by Bitcoin, becoming the first deal of its kind in the market for asset-backed debt. This milestone marks a significant development in the integration of cryptocurrencies into traditional financial markets. The sale was facilitated by Bloomberg’s financial news platform.
- Ledn sells $188M in securitized bitcoin-backed bonds β bloomberg.com
Famous Signatures Through History
A free online signature creator has been developed, allowing users to create professional-looking handwritten signatures instantly using their mouse, finger, or stylus. The tool offers various export options and has been compared to those used by famous historical figures such as John Hancock and Albert Einstein. Historical signatures are often unique and intricate, with some, like Salvador DalΓ’s, contributing to forgery issues.
- Famous Signatures Through History β signatory.app
Claudebin β Share and resume Claude Code sessions with a single link
A new plugin called Claudebin has been developed to simplify sharing long sessions in the code editor Claude Code. It allows users to export their current session as a URL that includes detailed information such as message threads, file edits, and commands. The tool is open source and can be found on GitHub.
- Claudebin β Share and resume Claude Code sessions with a single link β claudebin.com
Pebble Production: February Update
Pebble is nearing the shipping of its three new hardware products, including Pebble Time 2, Pebble Round 2, and Index 01, with mass production scheduled to begin on March 9. The company has completed a production verification test phase and expects pre-ordered watches to arrive by early June. However, delivery timelines are subject to change due to the complexities of manufacturing and quality control processes.
- Pebble Production: February Update β repebble.com
Coding Tricks Used in the C64 Game Seawolves
A coding technique called combining NMIs and IRQs allows for efficient management of raster time and prevention of stall effects in Commodore 64 games, enabling the creation of dynamic elements like torpedoes and ocean waves. This method provides better control over screen layers and is particularly useful for minimizing the impact of long tasks on game performance. By utilizing timers on the CIA chip, developers can create real-time effects that enhance gameplay experience.
- Coding Tricks Used in the C64 Game Seawolves β kodiak64.co.uk
Mini-Diarium - An encrypted, local, cross-platform journaling app
Mini Diarium is a locally-stored, cross-platform journaling app that encrypts every entry with AES-256-GCM and never connects to the internet. The app allows for zero network access, ensuring no telemetry or update checks are performed on user data. It also features key file authentication and rich text editing capabilities.
Bridging Elixir and Python with Oban
A new micro app called “Badge Forge” demonstrates how to exchange durable jobs between an Elixir app and a Python worker using Oban, allowing for transparent job processing between two different programming languages. The system involves sharing a database and leveraging message queues to enable collaboration between disparate teams. This example showcases the ease of bridging functionality between Elixir and Python through Oban.
- Bridging Elixir and Python with Oban β oban.pro
Old School Visual Effects: The Cloud Tank (2010)
A “cloud tank” is an old visual effect technique used to create billowing clouds in films by releasing paint into a large glass tank filled with two distinct layers of salt and fresh water. The unpredictability of the effect made it challenging to control, requiring multiple shots to capture the desired result. This technique was popularized in classic films such as Close Encounters of the Third Kind and Raiders of the Lost Ark.
- Old School Visual Effects: The Cloud Tank (2010) β singlemindedmovieblog.blogspot.com
Stoolap/Node: A Native Node.js Driver That’s Surprisingly Fast
Stoolap, a Rust-based embedded SQL database, has been benchmarked against SQLite in Node.js and won 47 out of 53 tests, achieving performance gains of up to 138 times faster than SQLite in complex analytical queries. The driver’s native bindings and cost-based query optimization enable its speed advantage. Stoolap excels in features like multi-version concurrency control and semantic query caching that improve performance over traditional SQL solutions.
ποΈ Infrastructure & Ops
ClawShell, Process-Level Isolation for OpenClaw Credentials
Researchers have developed ClawShell, a security tool designed to provide process-level isolation for OpenClaw credentials, aiming to prevent prompt injection attacks that can compromise sensitive data and API keys. The project acts as a privileged protection layer, isolating sensitive operations into a separate process enforced by the operating system, ensuring that even if the agent is hijacked, attackers will only receive a scoped identifier with no actual access to sensitive information.
- ClawShell, Process-Level Isolation for OpenClaw Credentials β github.com
Netbase a port of the netbsd utilities for linux
NetBase is a port of NetBSD’s utilities to Linux, aiming to replicate the original source without modifications. The project provides compatibility libraries that link statically against NetBSD code, allowing users to run NetBSD-compatible tools on various platforms. Compatibility with different systems varies, but results are generally positive for Linux and NetBSD.
- Netbase a port of the netbsd utilities for linux β github.com
Donβt Trust Packet Captures on Firewalls
Packet captures on firewalls can be unreliable for troubleshooting packets that are generated or modified by the firewall itself, such as routing protocols, NAT, IPsec, and TLS interception, due to internal processing of packets before they reach the capture interface. This issue can lead to incorrect packet data and missing headers in the captured traffic. Firewalls may forward packets internally before capturing them, rendering built-in packet captures partially accurate for critical network analysis tasks.
- Donβt Trust Packet Captures on Firewalls β weberblog.net
pg-here: Run a local PostgreSQL instance in your project folder with one command
A new tool called pg-here allows users to run a local PostgreSQL instance within their project folder with just one command. The program can be customized by specifying additional parameters such as username, password, and database name via CLI flags or programmatically. If issues arise during startup, the program offers quick fixes for missing dependencies like libxml2.
An update on upki
Canonical has released version 0.1.0 of upki, a project aiming to bring browser-grade Public Key Infrastructure (PKI) to Linux, providing a reliable and efficient certificate revocation mechanism for system utilities, package managers, and language runtimes. An early version of upki can be installed through the rustup snap on Ubuntu, allowing users to try it out and provide feedback. The project has made significant progress in developing its architecture and is structured around CRLite, an efficient data format for certificate revocation information.
- An update on upki β discourse.ubuntu.com
NYC scraps plan for robotaxis, delaying Waymo’s ride goal.
New York Governor Kathy Hochul has withdrawn a proposal that would have allowed commercial robotaxi services outside of New York City, dealing a setback to Alphabet’s Waymo as it aims to expand its driverless fleet this year. The plan, which would have permitted autonomous-vehicle companies like Waymo to operate without human operators, was confirmed by the governor’s office.
- NYC scraps plan for robotaxis, delaying Waymo’s ride goal. β bloomberg.com
California’s New Bill Requires DOJ-Approved 3D Printers That Report Themselves
California has introduced a new bill requiring 3D printing devices that produce firearms to be DOJ-approved and report themselves, ensuring compliance with regulations. The measure aims to enhance safety and prevent illicit activities. The bill mandates security verification for such printers.
- California’s New Bill Requires DOJ-Approved 3D Printers That Report Themselves β blog.adafruit.com
South Korean ex president Yoon Suk Yeol jailed for life for leading insurrection
Former South Korean President Yoon Suk Yeol has been sentenced to life imprisonment with labor for leading an insurrection by declaring martial law in December 2024, causing significant social costs and dividing society. He is the first elected head of state in South Korea’s democratic era to receive the maximum custodial sentence. The court found him guilty of grave destruction of constitutional order and making a mass confrontation that caused widespread division.
- South Korean ex president Yoon Suk Yeol jailed for life for leading insurrection β theguardian.com
A terminal weather app with ASCII animations driven by real-time weather data
Weathr is a terminal weather app that displays real-time weather data with ASCII animations, including rain, snow, thunderstorms, and day/night cycles. The app can be installed via Cargo or built from source and offers customizable display settings and location coordinates. It also simulates various weather conditions for testing purposes.
Hitler’s Greenland Obsession
Adolf Hitler’s interest in Greenland began during his youth and persisted throughout his life. By 1934, his government had inventoried the island’s population, geography, and resources, including a significant deposit of cryolite essential for American aluminum production. This fascination was part of Hitler’s broader effort to promote economic self-sufficiency and reduce Germany’s reliance on foreign imports.
- Hitler’s Greenland Obsession β theatlantic.com
Micasa β track your house from the terminal
Micasa is a terminal-based home tracking tool that uses a single SQLite file for all its data and features a Vim-style modal UI with various functionalities such as sorting, filtering, and attaching documents. The app was built entirely by AI, with the developer still reviewing the code manually. It’s available now, free of charge, without cloud storage or subscriptions.
- Micasa β track your house from the terminal β micasa.dev
Members-only Philly cop bar has been linked to two DUIs and a third crash
Off-duty Philadelphia Police Officer Gregory Campbell has been linked to two DUIs and a third unreported crash at the members-only bar 7C Lounge, which allegedly failed to monitor his intoxicated state, leading to his arrest, firing, and prison sentence. The incident also resulted in serious injuries to Anna Wakeman and the death of her dog, as well as significant property damage to her home. A lawsuit claims that the bar’s actions were negligent and violated Pennsylvania law.
Alabama offers three tricks to fix poor urban schools
Alabama has seen significant improvements in its urban schools’ performance since the pandemic, with students in southern states now outperforming traditionally strong Democratic states. The state’s success can be attributed to policies implemented during the Trump administration. Adjusted for student poverty, southern states are beating the national average on reading and math test scores.
- Alabama offers three tricks to fix poor urban schools β economist.com
Step 3.5 Flash: Fast Enough to Think. Reliable Enough to Act
Step 3.5 Flash is an open-source foundation model that offers exceptional efficiency, rivaling top-tier proprietary models in intelligence density, while achieving high generation throughput of 100β300 tokens per second. The model’s robustness and stability enable seamless orchestration across tool environments, making it a reliable partner for real-world interactions. It successfully demonstrates its capabilities in various applications, from advanced reasoning to everyday interaction tasks.
- Step 3.5 Flash: Fast Enough to Think. Reliable Enough to Act β static.stepfun.com
π Data Science
Six months of yak shaving a Zig web backend stack
A developer has created a web backend stack using NATS, HTTP server, and client libraries for Memcached, PostgreSQL, and Redis in Zig, replacing blocking sockets with asynchronous I/O and adapting existing libraries to use new networking APIs. This project demonstrates Zig’s suitability for performance-critical applications such as databases and streaming services. The success of this project shows that Zig can be used for building high-performance backends without requiring a drop-down to another language.
- Six months of yak shaving a Zig web backend stack β lalinsky.com
“Selecting Languages for Programming Projects”
A recent discussion highlights that programming language syntax is not the primary deciding factor in choosing a language, with experienced programmers emphasizing behavioral capabilities and ergonomic considerations over aesthetic appeal, and understanding denotational semantics playing a more crucial role than changes to syntax.
- Choosing a Language Based on its Syntax? β gingerbill.org
State of Clojure 2025 Results
The 2025 State of Clojure survey revealed that Clojure has a significant presence globally, particularly in Northern Europe where Finland and Serbia top the list of countries with the highest per-capita concentrations. The community is diverse, attracting developers from various experience levels and industries such as Financial Services and Healthcare. Additionally, Clojure attracts both new and experienced professionals, using it as their primary language or alongside other languages.
- State of Clojure 2025 Results β clojure.org
Indian think tank finds strong hiring for the kind of jobs AI puts at risk
A recent survey by Indian think tank ICRIER found that while AI adoption may impact entry-level jobs, it will primarily complement high-skill technical work in the IT sector. The study suggests that hiring trends are shifting towards roles exposed to AI, with firms experiencing significant productivity gains and expecting net positive employment opportunities. India’s government is advised to address skills shortages and R&D investments to fully harness the potential of AI.
- Indian think tank finds strong hiring for the kind of jobs AI puts at risk β go.theregister.com
Archaeologists find possible first direct evidence of Hannibal’s war elephants
Archaeologists in Spain have uncovered a 2,200-year-old bone believed to be from one of Hannibal’s war elephants used during the Second Punic War. The bone, which is nearly four inches long, dates back to around the third century B.C.E. and could provide direct archaeological evidence of its kind for the first time.
- Archaeologists find possible first direct evidence of Hannibal’s war elephants β smithsonianmag.com
Dinosaur Food: 100M year old foods we still eat today (2022)
Ancient foods have remained largely unchanged for millions of years, including the edible Ginkgo biloba nuts still consumed in East Asian dishes, and other ancient edibles such as horseshoe crab, sago palm, monkey puzzle tree nuts, and horsetail. These foods have been morphologically unchanged since their fossil ages, which date back to the time of dinosaurs over 100 million years ago. Researchers have identified several other ancient foods that are still edible today, highlighting the persistence of some plant species through millions of years.
- Dinosaur Food: 100M year old foods we still eat today (2022) β borischerny.com
Without America to rely on, EU gearing up to be a global power in its own right
The European Union is transforming into a global power following Russia’s invasion of Ukraine and US President Donald Trump’s repositioning of America as an antagonist. In response, the EU has established the Security Action for Europe (SAFE) instrument to fund defense upgrades, prioritizing European-made weapons, and is also shifting away from Chinese suppliers. The EU is taking steps to become more self-reliant in areas such as technology and trade, marking a quiet revolution in its global power dynamics.
- Without America to rely on, EU gearing up to be a global power in its own right β theatlantic.com
π« Ethics & Regulation
The Coding Agent Is Dead - Amp editor extensions are being killed
Amp is abandoning its current coding agent model, recognizing that newer models have surpassed their capabilities. The Amp editor extensions will be removed on March 5 and replaced by the Amp CLI, providing a more flexible interface for users to harness these powerful models. This shift marks a significant change in direction for Amp.
Using the Browserβs for Data Compression
Modern browsers can compress arbitrary data using JavaScript through the Compression Streams API. However, older browsers can be tricked into losslessly compressing pixel data into a PNG file, allowing developers to leverage compression capabilities even in unsupported browsers. This technique involves converting data into an image format that is then compressed and decompressed back into original data.
- Using the Browserβs for Data Compression β jstrieb.github.io
How to build OpenClaw in 400 lines of code
A fully functional agent similar to OpenClaw can be built in 400 lines of code using TypeScript and various libraries, without relying on frameworks or complicated abstractions. The agent responds to messages in Slack, uses skills, remembers facts across conversations, and acts proactively without human intervention. The build process will guide users through each step, illustrating the core principles behind OpenClaw’s functionality.
- How to build OpenClaw in 400 lines of code β hugodutka.com
Clinejection β Compromising Cline’s Production Releases just by Prompting an Issue Triager
A vulnerability in Cline’s issue triage workflow allowed attackers to compromise production releases and publish malware to millions of developers through popular development platforms like Visual Studio Code Marketplace and OpenVSX, exploiting GitHub Actions cache poisoning. The attack was fixed after public disclosure, but users are advised to exercise caution consuming updates until the issue is fully addressed. The incident highlights the importance of secure configuration of GitHub Actions workflows.
- Clinejection β Compromising Cline’s Production Releases just by Prompting an Issue Triager β adnanthekhan.com
Fairstream
The Fairstream library solves common issues with depth-first searching over infinite collections by introducing Fair interleaving, which ensures all branches make progress and prevents any single branch from starving the others. This approach is particularly useful for solving search problems that involve non-deterministic computation or IO effects. The library also includes FairT, a monad transformer that layers fair backtracking on top of any effect monad.
- Fairstream β blog.gluegadget.com
“Google Unveils Enhanced AI Model Gemini 3.1 Pro”
Google has released Gemini 3.1 Pro, its latest AI model that boasts improved reasoning capabilities and multimodal capabilities, surpassing its predecessor in various benchmarks and outperforming rival commercial models in complex problem-solving tasks. The new model is designed to enhance intelligence and creativity across multiple applications, with a focus on data synthesis and creative project development. Available through an API, Gemini 3.1 Pro represents a significant upgrade for Google’s AI offerings.
- Gemini 3.1 Pro β deepmind.google
- Google germinates Gemini 3.1 Pro in ongoing AI model race β go.theregister.com
- Google rolls out Gemini 3.1 Pro with improved core reasoning β 9to5google.com
Spending watchdog tells National Science Foundation CIO to up game on tech procurement
The US Government Accountability Office has issued “open recommendations” to National Science Foundation CIO Clyde Richards, urging him to improve the agency’s cloud procurement and IT management practices. The GAO recommends developing standardized service-level agreements with cloud providers and overhauling contracts for high-value cloud assets. The agency also plans to conduct annual reviews of its IT portfolio to streamline operations and optimize resource allocation.
- Spending watchdog tells National Science Foundation CIO to up game on tech procurement β go.theregister.com
Crims hit a $20M jackpot via malware-stuffed ATMs
Thieves used malware-assisted ATMs to steal over $20 million in 2025 through a technique called ATM jackpotting, which exploits software vulnerabilities in ATMs to bypass bank authorization and dispense cash on demand without detection. This cyber-physical attack has been on the rise, with over 700 incidents reported in 2025 alone. The FBI is warning of an uptick in these attacks across the United States.
- Crims hit a $20M jackpot via malware-stuffed ATMs β go.theregister.com
Don’t believe the hyperscalers! AI can’t cure the climate crisis
A new report by energy analyst Ketan Joshi challenges the claims made about AI’s ability to mitigate the climate crisis, finding that many claims are exaggerated or lack concrete evidence. The report concludes that only a small fraction of AI climate benefits relate to generative AI systems, which require significantly more energy to deploy than traditional AI models. Most climate claims about AI are based on corporate publications and media reports without primary assessable evidence.
- Don’t believe the hyperscalers! AI can’t cure the climate crisis β go.theregister.com
Palantir spent $25M on CEO flights so Alex Karp could do all the talking
Palantir CEO Alex Karp spent approximately $25 million on personal flights over two years, which could fly him around the world over 100 times. This significant expense has raised questions about whether Karp needs such extensive air travel to promote his company’s image and ideas. Karp’s frequent flying is notable compared to other tech CEOs who spend much less on air travel.
- Palantir spent $25M on CEO flights so Alex Karp could do all the talking β go.theregister.com
Android malware taps Gemini to navigate infected devices
A new type of Android malware called PromptSpy has been discovered that uses generative AI (Gemini) to adapt its performance on infected devices, allowing hackers remote control. The malware allows it to navigate different device layouts and operating systems using natural language prompts. Its effectiveness remains unclear, with cybersecurity experts considering it possibly a proof of concept rather than a real-world attack.
- Android malware taps Gemini to navigate infected devices β go.theregister.com
DOGE bites taxman
The IRS has significantly downsized its IT department, with around 40% of IT staff and 80% of tech leaders departing under a reorganization effort aimed at improving efficiency. The agency now faces challenges in meeting its digitization goals, including falling behind in processing paper returns. Despite assurances from officials that AI will not displace employees, critics have questioned the wisdom of the restructuring.
- DOGE bites taxman β go.theregister.com
DEF CON bans three Epstein-linked men from future events
DEF CON has banned three men named in the Epstein files from attending future events: Pablos Holman, Vincenzo Iozzo, and Joichi “Joi” Ito, due to their association with convicted sex offender Jeffrey Epstein. The ban is not based on evidence of wrongdoing by the individuals involved, but rather their connections to Epstein. Emails show ties between these men and Epstein dating back to the 2010s.
- DEF CON bans three Epstein-linked men from future events β go.theregister.com
AI agents can’t teach themselves new tricks β only people can
AI agents are unable to teach themselves new skills or improve performance without human input, according to a recent study. In contrast, AI agents that receive curated skills from humans perform significantly better, with an average increase of 16.2% in task completion rates. The study’s findings highlight the limitations of self-generated skills in augmenting AI agent performance.
- AI agents can’t teach themselves new tricks β only people can β go.theregister.com
AI chatbots waffle on GOV.UK queries, then get facts wrong when told to zip it
Researchers tested 11 large language models on GOV.UK queries, finding they often provided inaccurate information when asked to be concise, burying facts or making mistakes. The models rarely refused to answer questions, even when unable to provide accurate information, which can lead to the spread of misinformation. The study highlights the need for users to critically evaluate AI chatbot responses and understand where technology can be trusted.
- AI chatbots waffle on GOV.UK queries, then get facts wrong when told to zip it β go.theregister.com
Poland bans camera-packing cars made in China from military bases
Poland has banned camera-equipped cars made in China from entering its military bases due to concerns over data acquisition and use. The ban is not permanent and allows carmakers to undergo a security assessment for exemptions. This move follows similar restrictions on Chinese technology seen in other countries, including the US.
- Poland bans camera-packing cars made in China from military bases β go.theregister.com
“Gay Tech Mafia Exposed: Influence in Silicon Valley”
Gay men have dominated the upper ranks of Silicon Valley in recent years, with some investors and entrepreneurs attributing this phenomenon to a perceived “gay tech mafia.” The phenomenon has been observed by industry insiders for years, but it gained more attention when a venture capitalist complained that he was struggling to raise his fund due to discrimination. Despite its origins as a rumor, the concept of a gay-dominated Silicon Valley has become an accepted notion among some in the tech industry.
- “Gay Tech Mafia Exposed: Influence in Silicon Valley” β wired.com
“US Cuts Funding for Global Internet Initiative”
The US has significantly reduced funding for its Internet Freedom programme, a $500m initiative aimed at supporting grassroots technologies to evade government internet controls, with no new grants issued in 2025 due to severe cuts. This move poses a significant threat to digital rights and freedoms globally, particularly in countries such as Iran, China, and Myanmar that relied on the program’s funding. The cuts have effectively gutted the programme, which has been critical in helping people circumvent censorship and surveillance.
- US effectively guts $500M Internet Freedom program. β theguardian.com
Uber bars drivers with violent felony & sex crimes convictions.
Uber is implementing new background check policies to bar drivers convicted of violent felonies, sexual offenses, and child abuse from driving for the company. The changes come after a New York Times investigation revealed that Uber previously allowed drivers with many types of convictions, including those related to these serious offenses. The exact timing and implementation of the new policies have not been specified by the company.
- Uber bars drivers with violent felony & sex crimes convictions. β nytimes.com
“Tech Giants Avoid Hand-Holding at Indian Summit”
Global tech leaders including Sam Altman and Dario Amodei declined to hold hands with Prime Minister Narendra Modi at the India AI Summit 2026, drawing criticism online as they attended alongside other prominent figures from Google and Meta. The gesture was part of a photo op where some attendees showed solidarity through hand-holding, but its significance remains unclear. Modi’s presence sparked mixed reactions among rival tech leaders.
- Sam Altman (OpenAI) and Dario Amodei (Anthropic) Refuse to Hold Hands β xcancel.com
- “India’s AI Summit: Modi avoids hand-holding with some tech leaders” β bloomberg.com
Bill Gates cancels AI summit speech due to Epstein controversy
Bill Gates has withdrawn from speaking at India’s AI Impact Summit due to controversy surrounding his ties to Jeffrey Epstein. The decision comes after new files released by the US Department of Justice implicated Gates in connection with Epstein, although he denies any wrongdoing. The summit will proceed without Gates, featuring other prominent speakers including Sundai Pichai and Narendra Modi.
Russian forces face communications crisis amid SpaceX ban and Telegram crackdown
Russian forces in Ukraine are experiencing communications disruptions due to restricted access to Starlink and a crackdown on Telegram, reportedly hampering frontline operations. The loss of these services is corroborated by Ukrainian and European diplomats and analysts. Russian forces are said to be suffering heavier losses according to Kyiv’s allies.
Podcasts shift to video focus with Apple’s new venture
Apple has launched an update to its video podcasts on Apple Podcasts, marking a significant shift from an audio-centric medium to a more visually-focused platform, beating rivals YouTube and Spotify to the market. The move is seen as a major turning point in the industry, offering new features such as swappable ads. This marks the first time a major audio-centric podcast platform has made video podcasts a core focus.
- Podcasts shift to video focus with Apple’s new venture β bloomberg.com
Tech billionaires to join US recruitment force for software engineers.
The US government is recruiting tech industry experts, including billionaires like Elon Musk, to train elite government coders as part of its ‘US Tech Force’ initiative that aims to recruit 1,000 software engineers. The program’s goal is to enhance cybersecurity and technology capabilities in the federal government.
US judge says ex-Palantir employees broke confidentiality, non-solicitation agreements.
A US judge has ruled that three former Palantir employees likely breached confidentiality and non-solicitation agreements by founding AI startup Percepta, but did not halt their work at the new company. The judgment targeted Hirsh Jain, a Percepta co-founder, and two other former Palantir executives who also defected to Percepta. The ruling allows them to continue working at Percepta.
- US judge says ex-Palantir employees broke confidentiality, non-solicitation agreements. β bloomberg.com
“New Law Cracks Down on Abusive Images Online”
The UK government has proposed new rules requiring tech firms to remove non-consensual abusive content, including intimate images, within 48 hours or face fines of up to 10% of global revenue. The measure aims to combat online misogyny and prevent the spread of revenge porn and child abuse material on social media platforms. Tech companies must also ensure that flagged images are removed from all their platforms immediately.
- UK proposes new rule: remove non-consensual content within 48hrs β theguardian.com
- Tech firms will have 48 hours to remove abusive images under new law β bbc.co.uk
Why applicant tracking systems are broken by design
Applicant tracking systems (ATS) have become “structurally broken” due to misaligned incentives and a lack of focus on product quality. The industry’s emphasis on compliance has inadvertently stifled innovation in HR technology, with regulators creating barriers that other industries like fintech have navigated successfully despite strict regulations. This mismatch between domain experts and technical talent has also contributed to the stagnation.
Against Theory-Motivated Experimentation
A new article has been published, titled “Against Theory-Motivated Experimentation”, which critiques experimental approaches driven by theoretical motivations and advocates for more practical and evidence-based research methods. The article argues that this shift in approach can lead to more reliable and impactful findings. Details of the article are currently unavailable due to ongoing security verification processes.
- Against Theory-Motivated Experimentation β journals.sagepub.com
Freedom Is Coming
A new initiative is promoting the importance of freedom of expression, emphasizing that access to information is a fundamental human right. The campaign aims to empower individuals to reclaim their right to express themselves freely. It encourages people to be prepared for this shift in emphasis on freedom and self-expression.
- Freedom Is Coming β freedom.gov
Germany’s Merz calls for real names on the internet
German Chancellor Friedrich Merz has called for users to post under their real names on the internet to increase transparency and protect liberal democracy from manipulation. He warned that anonymity can be used to undermine vulnerable populations like children and teenagers, and undermine a free society. Merz believes real names online would help prevent targeted influence campaigns.
- Germany’s Merz calls for real names on the internet β dpa-international.com
Anthropic officially bans using subscription auth for third party use
Anthropic has officially banned using subscription authentication for third-party use, restricting the use of OAuth tokens and API keys to authenticate with their servers exclusively for internal purposes. This change aims to prevent unauthorized access and maintain security and trust for users. The company encourages reporting of security vulnerabilities through its HackerOne platform.
- Anthropic officially bans using subscription auth for third party use β code.claude.com
π° Other News
Minecraft Java is switching from OpenGL to Vulkan
Mojang developers are planning to switch Minecraft Java’s rendering from OpenGL to Vulkan in the upcoming Vibrant Visuals update, aiming to improve performance and visual quality on modern systems while maintaining compatibility with older PCs. The transition will involve rolling out Vulkan alongside OpenGL in snapshots during summer 2026. Modders may need to update their code to use Vulkan instead of OpenGL.
- Minecraft Java is switching from OpenGL to Vulkan β gamingonlinux.com
15 years of FP64 segmentation, and why the Blackwell Ultra breaks the pattern
Nvidia has successfully segmented its consumer GPUs market from enterprise hardware, resulting in a gradual decline of FP64 performance on consumer devices over the past decade. This strategy allowed the company to differentiate between markets and create a price gap between consumer and datacenter GPUs. The recent AI boom is quietly dismantling this logic, reducing the need for FP64 capabilities in modern computing.
- 15 years of FP64 segmentation, and why the Blackwell Ultra breaks the pattern β nicolasdickenmann.com
Grandson of Reese’s Peanut Butter Cups inventor says Hershey is cutting corners
Brad Reese, grandson of Reese’s Peanut Butter Cups inventor H.B. Reese, accuses Hershey Co. of cutting corners by replacing milk chocolate and peanut butter with cheaper alternatives like compound coatings and peanut crΓ¨me in some products. Hershey acknowledges some recipe changes but maintains that they aim to meet consumer demand for innovation. Some international versions of Reese’s products also have different ingredients than their US counterparts.