Front-page articles summarized hourly.
A writer revisits the 1922 film Häxan and experiments with glitching its video to add color. Three attempts: (1) nulling every 10th h264 frame yields odd artifacts without color; (2) transcoding to raw yuv420p with added noise creates color but is inefficient and inconsistent; (3) final method tweaks only I-frames by randomly mutating least-significant bits toward chroma data, producing color flashes and melting text while editing only 1 in 4 frames. The process uses a Python script häx.py and ffmpeg, in three steps: extract h264, glitch it, then reassemble the mp4; results vary by run.
WireGuard is two things: a VPN app and a cryptographic protocol for encrypting UDP datagrams. The protocol is stateless, uses Noise_IKpsk2 for key exchange and ChaCha20-Poly1305 for encryption, and can be used as a library independent of VPNs. Proxylity's wg-client (.NET) library makes this easy for apps to send UDP payloads encrypted without VPNs or PKI, handling handshakes and key rotation automatically. The MIT-licensed library is ~800 lines and pairs with Proxylity Listener/UDP Gateway for end-to-end encrypted delivery.
WebPKI is the web’s public key infrastructure, a social and political system of CAs, root stores, and browsers that enables HTTPS but is prone to misissuance and revocation chaos. The post explains certificate types (DV/OV/EV), Certificate Transparency, and how CT guards against fraud. It recounts high-profile incidents (DigiNotar, Trustico, Entrust, Microsoft delrev) and the revocation challenges (CRLs, OCSP, OCSP stapling, CRLite). It argues for shorter cert lifetimes, tighter CA controls, and the idea of private/internal CAs for critical infra, plus ARI/ACME for renewal as practical fixes.
Iran-backed hacktivist group Handala claims a mass data-wipe against Stryker, erasing data from more than 200,000 devices across 79 countries, reportedly using Microsoft Intune to issue a remote wipe. Stryker, a $25 billion medtech company with about 56,000 employees in 61 countries, allegedly forced 5,000 Cork staff home as Irish operations were disrupted and devices wiped. Handala says the attack is retaliation for Iran’s missile strike. Palo Alto Networks ties Handala to Iran’s MOIS and calls the operation opportunistic and supply-chain oriented. U.S. hospital disruption remains unconfirmed by AHA.
Ben Ehrenreich’s piece peels back the "dismal trade" of death in Los Angeles, showing how mortality maps life. With about 60,000 deaths in L.A. County yearly, the coroner’s office identifies remains, probes natural vs. suspicious deaths, and often hands the body to private mortuaries. Autopsies have declined; cremation has surged as cheaper, and consolidation has reshaped the funeral industry. The story follows mortuary workers, embalmers, and transporters—like Patrick and Schenk—through the rituals of embalming, cremation, or burial, the economics of space and memory, and the search for meaning in a highly segregated city.
The piece describes diagnosing memory pressure and lock contention in a Matrix Rust SDK Room List. The core issue was frequent reads of a large LatestEventValue under a read lock during sorting, causing many allocations. The fix uses Data-oriented Design: aggregate room data into a compact RoomListItem cached data layout and prefetch data for all sorters, reducing lock usage. Result: allocations drop and performance soars; bench shows 78× speedup (18.8K→1.48M elems/s) and 98.7% time reduction (53 ms→676 µs). A later patch also fixes an infinite-loop bug from VectorDiff::Set with shallow clones. DoD improves cache locality and eliminates most contention.
Repeated HTTP 403 Forbidden messages indicating that access to the requested resource is denied.
DHS Contracts Explorer is a web interface exposing hacked data from DHS's Office of Industry Partnership, published by DDoSecrets on March 1, 2026. It offers filters for program, all award types, phase type, state, start year range, and minimum award amount, plus a state map where bubble size shows total award amount. The dataset includes companies, contracts, total award and total obligation, contract award IDs, and details such as start/end dates, program, phase, award type, and state.
Apple's security content for iOS 15.8.7 and iPadOS 15.8.7 describes backported fixes for older devices addressing several CVE-listed vulnerabilities. Kernel: a use-after-free could allow arbitrary code with kernel privileges (Coruna exploit; previously fixed in iOS 17). WebKit: type confusion and memory corruption in malicious web content (CVE-2024-23222; CVE-2023-43000; CVE-2023-43010). Affected devices: iPhone 6s/7, iPhone SE (1st gen), iPad Air 2, iPad mini 4, iPod touch (7th gen). Release date: March 11, 2026.
The article critiques misusing SRP to fragment systems and urges “minimize code, maximize use cases” to boost reuse and maintainability. It presents Siedersleben’s Blood Group Law (Quasar style): Group 0 (generic), Group T (technical), Group A (domain), and Group AT (an anti-pattern where T uses A). The goal is to move as much code as possible into 0/T, generalize or open-source domain logic, and avoid AT, yielding reusable, scalable architecture.
lcamtuf examines Hacker News to gauge AI’s share in Feb 2026. By sampling the daily top five, AI dominated four of five slots on Feb 4 and 12 and filled most of Feb 5; several other days also featured AI-heavy lines. He used Pangram to flag likely AI-written posts, finding the detector generally aligns with his judgments despite some false negatives. The comments section is also affected. The result: AI-driven content dominates HN’s February feed, with some caveats about detector accuracy.
sAT Protocol (s@) is a decentralized social network on static sites. Each user hosts encrypted data on their domain; a browser client aggregates feeds by decrypting followed users’ posts. No servers or relays; data moves directly from one site to another. Identity is the domain, authenticated via HTTPS. Discovery uses domain/satellite/satproto.json; an optional satproto_root.json can override the path. Data model: posts/index.json (plaintext) lists IDs; posts/{id}.json.enc stores encrypted posts; follows/index.json lists follows. Each user’s content key encrypts posts with XChaCha20-Poly1305 and is sealed per follower. Key rotation on unfollow. Publishing writes encrypted posts to the static site (e.g., via GitHub).
Tested: How many times can DVD±RW be rewritten? Part 2 covers methodology and results. Using Opti Drive Control with automated pyautogui scripts on two Lite-On iHAS120 drives, the author ran long burn/verify/quality tests across multiple disc types. Most discs failed well before 1000 cycles; only TDK 2x DVD-RW hit 1000+ cycles (around 2000 counting full erase), and JVC Victor 6x DVD-RW reached ~1200. Others ranged 100–400 cycles; some 850 cycles for 4x discs. DC Erase briefly revived a disc but didn’t sustain gains. Conclusion: endurance is typically a few hundred rewrites, highly dependent on disc and drive; sample size is limited.
Building Better Country Selects argues that native HTML country dropdowns are ill-suited for high-cardinality lists. They are slow to scan, hard to filter, poorly suited for mobile, and misorder people’s likely choices due to alphabetical sorting and formal names. The article advocates replacing simple selects with a modal picker that supports filtering, smarter sorting, matching on codes/aliases, browser locale hints, and multi-column layouts. A full dataset and browser-native dialog improve UX. Conclusion: treat country selection as a UI problem, not a simple menu.
Could not summarize article.
nah is a context-aware safety guard for Claude Code that replaces simple per-tool allow/deny with a fast contextual classifier plus optional LLM for ambiguous cases. It intercepts every tool call (bash, read/write/edit, glob, grep, MCP tools) via a PreToolUse hook, classifies action types, and applies policies (allow/deny/ask) possibly scoped by path/project. It guards sensitive paths, contents, and project boundaries, logs decisions, and can route unresolved decisions to an LLM. Install with pip install nah; configure via ~/.config/nah/config.yaml and per-project .nah.yaml; demo at /nah-demo; MIT license.
Ensue is the Shared Memory Network for AI Agents, a collaborative project (autoresearch@home) where agents share GPU resources to improve language models. Join on GitHub; documentation at ensue.dev.
New longitudinal study across 40 companies (Nov 2024–Feb 2026) finds AI adoption boosts engineering activity (PR usage) by about 65%, but PR throughput rises only ~10% (9.97%), after removing teams with engineered throughput targets. Thus AI productivity gains cluster around 8–12%, not 2–3x as claimed by vendors. The explanation: coding tasks are accelerated, but planning, scoping, reviews, and handoffs—major time sinks—are little changed, so the overall bottleneck remains human-heavy. The team plans to continue the study to understand variability and how leaders can close the gap.
Britain will eject hereditary peers from the unelected House of Lords within weeks, ending 700 years of hereditary rule in Parliament. Legislation passed in the Commons and backed by the government will remove dukes, earls and viscounts who inherited seats; a small number may be recycled as life peers. The Lords, about 800 members, are mostly life peers; hereditary members now make up roughly 10%. In 1999 most hereditary peers were evicted, with a compromise to keep some as life peers. The bill becomes law after royal assent; Labour aims to replace the Lords with a more representative chamber.
Made by Johno Whitaker using FastHTML