Front-page articles summarized hourly.
Raymond Chen explains how to intercept ESC in a standard dialog by hooking into IsDialogMessage with a message filter for MSGF_DIALOGBOX. Register a hook (SetWindowsHookEx WM_MSGFILTER) to inspect messages before IsDialogMessage processes them. If the ESC is detected (IsDialogESC), send a DM_ESC_PRESSED to the dialog; the dialog can block or allow default handling by returning TRUE and setting DWLP_MSGRESULT. Install the hook around DialogBox, using thread_local to avoid cross-thread issues; discuss multi-copy dialogs and other pitfalls to be addressed later.
Argues AI should replace CEOs, not just developers. Proposes an AI Executive Officer (AEO) with AxOs replacing the C-suite, handling strategy synthesis, capital allocation, monitoring, reporting, and coordination; humans manage relationship, regulation, crisis decisions, and rare uncertainty. Total A-suite cost around $3M, yielding about $14M annual savings vs median CEO pay, plus more by eliminating the C-suite ecosystem. The blast-radius of top leadership mistakes is far larger than developer failures, and governance resists this shift.
Google and iVerify uncovered Coruna, a sophisticated iPhone-hacking toolkit exploiting 23 iOS vulnerabilities to silently install malware when visiting compromised websites. It includes five techniques and has appeared in three campaigns: Russian espionage against Ukrainians, a crypto–theft campaign against Chinese-language sites, and an earlier surveillance-era version. The toolkit may have originated as a US government tool built for a contractor and leaked; some components echo the Triangulation framework, though the origin remains uncertain. Apple patched the exploits in iOS up to 17.2.1; Lockdown Mode can block some. iVerify estimates ~42,000 infections in the crypto campaign; tens of thousands overall.
Explains CRDTs (Conflict-free Replicated Data Types), focusing on state-based CRDTs. Defines a CRDT interface: value, state, merge, with merge properties: commutativity, associativity, idempotence. Introduces LWW Register as a simple CRDT using timestamps and peer IDs to resolve conflicts. Shows code and behavior scenarios. Extends to LWW Map, a map of keys to LWW Registers, with state and value getters, set/get/delete, tombstones, and a delete caveat: CRDTs grow monotonically. Emphasizes composition: complex CRDTs built by nesting primitives. Teases building a collaborative pixel art editor in next post.
Two error types: expected and unexpected. Expected errors occur in normal operation (e.g., invalid user input, network outages, missing permissions); they aren’t the developer’s fault and should be recoverable, returning an error result and logging WARN/INFO. Unexpected errors are bugs that shouldn’t be recovered from—crash or panic, with ERROR/FATAL logs. The boundary depends on context; production code should treat more errors as expected, while prototypes may treat almost everything as unexpected. Language ecosystems differ in classification, and the author leans toward stricter tooling for reliability.
Bilawal Sidhu’s WorldView is a browser-based spy‑satellite simulator that overlays live feeds—OpenSky, ADS‑B, real satellite orbits, CCTV—onto photoreal 3D city models. Using Google 3D Tiles and shaders (night vision, FLIR, CRT scanlines, anime cel‑shading), it lets you explore London or Austin from an intelligence‑analyst perspective. It’s built as a prototype with multiple AI agents, not hand‑coded, to illustrate ‘spatial intelligence’: AI that understands the world as space and time. The demo emphasizes accessibility over proprietary data and points to SpatialOS as the underlying infrastructure.
An online directory of self-hosted software, organized by broad categories (administrative utilities, CMS, media, development, security, etc.). It lists dozens of projects with brief descriptions, licenses, and alternatives, highlighting tools for privacy and on-premises control. The page explains how to use the list, submit software, and what qualifies for inclusion; it notes both free and proprietary options. The author, John Rush, presents the Self-Hosted Software List as a curated resource for discovering and hosting self-hosted solutions, with entries that often include installation notes and links.
An audit of dev tools (jsonformatter.org, diffchecker, base64decode.org, codebeautify.org, regex101.com) found pervasive tracking and data exfiltration. Many sites contact dozens of ad networks, trackers, and data brokers; some store inputs server-side; others use fingerprinting, URL/title leakage, or forced redirects. Highlights: jsonformatter.org contacts 20+ ad networks; diffchecker stores diffs on its servers and exposes data in the page title; base64decode.org lists 1,570 partners across 96 domains; codebeautify.org sets hundreds of cookies across 205 domains. regex101.com is more privacy-friendly (client-side WASM, self-hosted analytics). Conclusion: pasted keys and code can become data. Remedies: use ad blockers, DevTools, privacy-first tools, or CLI tools.
Ed Elson argues the Epstein scandal exposes an elite “Epstein Club” wielding immense wealth and influence to dodge accountability, redefining American royalty. He contrasts Europe’s recent perp walks against Epstein associates with America’s inaction, criticizes the DoJ for blurring lines between those connected to Epstein and victims, and urges a high‑visibility perp walk of a powerful figure to restore justice, credibility, and trust for the victims and the public.
explain-my-curl is a local-first CLI that explains a curl command's DNS, TLS, and HTTP behavior. It includes a parser, a TUI, execution telemetry for DNS/TCP/TLS/TTFB, secret redaction, and an evidence-label model (Observed, Inferred, Estimated) with a transparency contract. Quick-starts show explain, tui, doctor, and version commands. The project uses GoReleaser for releases, embeds build metadata, and is MIT-licensed. Current status: telemetry, split-pane UI, redaction, tests, and release automation.
CuencaHighLife argues that payment fees shape pricing and survival for small merchants more than people think. In Cuenca, taxi drivers use QR-based systems (Deuna, JEP, Jardín Azuayo) that feel free to merchants, yet costs exist. Card networks (Visa/Mastercard) impose fees that erode margins, and in Ecuador 15% IVA is charged on the full price, making card fees effectively a tax on tax. QR transfers bypass intermediaries, often arriving immediately and with minimal costs. Brazil’s Pix shows rapid, cheap transfers. Overall, payment tech influences prices, profits, and resilience; QR payments offer an economical alternative to card terminals.
Iran War Cost Tracker provides a live U.S. taxpayer cost estimate for Operation Epic Fury after strikes began Feb 28, 2026. A three-phase bottom-up model projects about $380M/day (Days 0–3), $220M/day (Days 3–10), and $155M/day (Day 10+), covering personnel, naval/air operations, fuel, ordnance, C4ISR/cyber/space, and overhead. Naval+air costs run ~ $70M/day; discrete one‑time costs (e.g., 3 friendly-fire aircraft losses) are added separately. Context: post‑9/11 wars total ~ $8T over 20 years (~$300M/day); true costs exceed the estimate due to hidden and long‑term factors.
GitHub reports an incident affecting Copilot, Actions, and Issues with degraded performance across Webhooks, API Requests, Pull Requests, Codespaces, and related services. Investigations began around 18:59 UTC; a mitigation was identified by 19:17 UTC and recovery is under way. API Requests are now normal, with continued monitoring for full restoration.
Intel unveiled Xeon 6+ 'Clearwater Forest', the first data-center CPUs built on the 18A 1.8nm process. The uniprocessor system scales to 288 Darkmont cores (576 in dual-socket) across 12 compute tiles, using Foveros Direct 3D packaging with EMIB. It features a large last-level cache (>1 GB), 12 memory channels of DDR5-8000, and 96 PCIe 5.0 lanes (64 with CXL 2.0). With Advanced Matrix Extensions, QAT, and vRAN Boost, it's aimed at telecom, cloud, and edge AI workloads; shipments later this year.
The piece argues that Claude’s Electron origin isn’t solely about costs or LLM gaps; native apps today offer little due to cumbersome APIs, hostile OS-native tooling, and loss of UI consistency. The web dominates, performance isn’t guaranteed by native, and many issues stem from design and process flaws—the “slop” and lack of care—rather than the chosen stack. Rewriting in SwiftUI won’t fix deeper problems; better tooling won’t cure a culture that tolerates sloppy software.
A Git guide in nolasoft/okgit (README) covering daily workflows from basics to advanced. It explains core concepts (commits, branches, history) and commands across levels: basic (status, commit), intermediate (fetch, diff, merge/rebase, push), and advanced (amend, rebase, interactive rebase, reflog, worktrees). It addresses conflicts, fast-forward strategies, restoring to past commits, and safe collaboration with practical examples and workflow recommendations for teams.
AI is rapidly rewriting the world’s software, but verification lags. Without formal proofs, AI-generated code risks security and correctness at scale. The proposed cure is a verification platform: a small trusted kernel, independent reimplementations, open source, and a system that is both a programming language and a theorem prover (Lean) with a rich library and extensible tactics. AI writes and proves inside the same platform; proofs inform design and expose assumptions. Phase one: verify existing code in Lean; phase two: build the stack with proofs from scratch. Early success: machine-checked zlib; goal: a fully verified open software stack.
TorchLean is a Lean 4 framework that makes neural networks first-class mathematical objects with a single formal semantics shared by execution and verification. It fuses a PyTorch-style verified API (eager and compiled modes) that lowers to a common op-tagged SSA/DAG IR, with explicit Float32 IEEE-754 semantics and proof-relevant rounding models. Verification uses IBP and CROWN/LiRPA-style bound propagation with certificate checking. Demonstrated through certified robustness, PINN residual bounds, Lyapunov-style neural controller verification, and a universal approximation theorem. System: frontend, runtime semantics, and verification modules share semantics end-to-end.
Frank Lantz argues that despite AI's impact on development, there have been no truly groundbreaking AI-based games five years in. He surveys examples: AI Dungeon, Death by AI, Suck Up!, AI engines, and finds them underwhelming and not genuinely novel. He offers three explanations: (1) business models and API costs hinder releasing and monetizing such games; (2) culture wars mean players reject generative AI in games; (3) AI’s improvisational logic isn’t inherently fun, and real fun comes from simple, deterministic rules and emergence. He remains hopeful AI will enable wild gameplay, but not as a straightforward upgrade to genres.
Made by Johno Whitaker using FastHTML