Front-page articles summarized hourly.
Marcin Wichary recalls Lightroom’s automatic mouse-pointer movement after clicking Disable, a moment he finds disturbing: if the pointer is an extension of the user, having the app move it feels like the app seizing the hand. He argues some interactions should be sacred—unhindered focus, deliberate scrolling, and safe undo/copy/paste. Yet he acknowledges cases where hijacking the cursor can be acceptable or even delightful, citing Neal Agarwal’s project and early Figma experiments, leaving the verdict to readers.
Why phpc.tv: after burnout and frustration with centralized, ad-driven platforms like YouTube, the author wanted a federated, open alternative for the PHP community. They launched phpc.tv on Jan 17, 2026, built on PeerTube, inspired by phpc.social (Mastodon). A month in, it hosts about 2,200 videos (1,447 hours, ~1.2 TB). The site aims for no ads, no censorship, and crowdfundable creator projects, with community moderation and open governance. It links to OpenCollective for funding and emphasizes collaboration rather than solo effort. Future article will cover operational challenges.
The Frog Game (Kaeru no Tame ni Kane wa Naru) is a 1992 Japan-only Game Boy title by Nintendo and Intelligent Systems. The author discovers it after Link’s Awakening, noting shared sprites/music and nods to Nintendo (Nantendo, Mamicon). An English fan patch (2011) exists; the author patches and plays on a ROM via Delta emulator. The game is short (about 7 hours), humorous, with top-down exploration and side-scrolling dungeons; combat auto-resolves and no player leveling. Three factions—humans, frogs, snakes—pursue a quest to lift curses and defeat Lord Delarin for Princess Tiramisu. Rumors of a Link’s Awakening engine are dismissed.
That Privacy Guy argues Google Chrome silently downloads a 4 GB Gemini Nano on-device LLM to user machines without consent. The weights.bin file sits in OptGuideOnDeviceModel and is installed across devices regardless of AI feature use. macOS evidence via the kernel’s fseventsd, Chrome’s Local State, and updater logs corroborates the install. The AI Mode pill is cloud-backed; the on-device model appears unused by visible features. Climate impact estimates for a single push range from 6k to 60k tonnes CO2e on a billion devices. Calls for consent prompts, removal options, disclosure, and regulatory scrutiny, echoing Anthropic.
Rust embedded engineer Dion argues async Rust bloats binaries, especially on microcontrollers, and calls for compiler-level fixes. He explains async blocks become MIR state machines (Unresumed, Suspend0/1, Returned, Panicked) and that panics hinder optimization. Proposals: in non-debug/release with panic=abort, poll futures without panicking (return Pending); inline and collapse identical states; avoid per-await state machines for blocks without awaits; improve inlining for single-await futures. Early results show 2–5% binary-size savings on embedded, 0.2% with no awaits, and ~3% x86 perf gain. Seeks about €30k funding via a Rust Project Goal ([email protected]).
Biscuit is a custom firmware for the Xteink X4 e‑paper device (ESP32‑C3) that turns the reader into a general‑purpose smart device with wireless tools, security features, and utilities while preserving e‑reader functionality. It runs on 4.26" 800×480 mono e‑ink, 7 physical buttons, WiFi/BLE, and microSD storage. The home screen is a tile dashboard; apps cover Reader, Recon (passive scans), Offense/Defense, Comms, Tools, Productivity, Tracking & Logging, and Creative, plus settings. Features include network discovery, vulnerability checks, beacon tests, data capture, Ghost Mode, mesh chat, and offline cryptography. Built atop CrossPoint Reader (MIT license); install via web flasher or PlatformIO.
Peter Raven, a conservationist and coauthor of coevolution, died at 89. As director of the Missouri Botanical Garden (1971-2010), he expanded the herbarium and added the Japanese Garden, the Doris I. Schnuck Children's Garden, and the Kemper Center for Home Gardening. He forged international collaborations, helped popularize coevolution with Paul Ehrlich, and earned a MacArthur Fellowship, the National Medal of Science, and Time's Hero for the Planet.
The piece offers 10 guidelines for agentic coding with AI copilots. When code is cheap, implement to learn: build early, rebuild often, and explore by forking ideas. Invest in end-to-end tests to define behavioral contracts. Document intent and keep specs updated as you progress. Seek hard problems—design, performance, security, resilience—where value lies. Automate easy tasks to focus on the hard stuff. Develop domain knowledge and taste to guide prompts. Recognize agents amplify experience, but maintenance and security remain costly.
Lund University researchers show the red-necked nightjar’s annual cycle tracks the moon. Over more than ten years in Doñana National Park, using multi-sensor data loggers, they found full-moon nights boost insect hunting, while dark nights trigger energy-saving cooling and monthly quiet spells. Spring migration typically begins about two weeks after a full moon; eggs are timed for peak nocturnal insects. The study, published in Science Advances, warns that light pollution and climate change threaten this nocturnal forager and calls for understanding artificial light impacts for conservation.
Internet Matters finds UK kids easily bypass online age checks under the Online Safety Act. In a survey of 1,000+ children and parents, 46% say checks are easy to bypass; 17% find them hard or neutral. Tricks include video-game character verification tricks, fake birthdays, borrowed IDs, and drawing a mustache to fool facial filters. Only 32% report successfully bypassing. A quarter of parents admit helping or turning a blind eye. The report calls for stronger government/industry action to embed safety by design, as 49% of youths report encountering harmful content.
Describes a collection of 939 two-dimensional mathematical curves and five ways to locate a curve: by name (A–Z); by full-text search; by equation type (algebraic: polynomials in x and y; line, conic, cubic, quartic, sextic, octic; other; transcendental: discrete, exponential, fractal, gamma and related, isochronous, power, exponential, spiral, trigonometric); by derivation (barycentric, caustic, cissoid, conchoid, curvature, cyclic, derivative, envelope, hyperbolism, inverse, isoptic, parallel, pedal, pursuit, reflecting, wall, roulette, strophoid, tractrix); and by its form. Backgrounds and other information. Copyright by Jan Wassenaar; last update: 2013-09-21.
Hand‑drawn a version‑1 QR code (21×21) on grid paper. The URL was 23 bytes, so he used the alphanumeric set by uppercasing to fit into version 1; a reader later noted that a full domain can fit in all caps. Created with Python's qrcode package (echo -n). Drew the corner position patterns and timing lines; scanning improved as data was added, and a small data mistake didn't matter at low error correction. Scanning was finicky on curling paper but worked when flat or hung from a monitor. Inspires grid‑based experimentation.
Two University of Melbourne engineering students revived an 18th‑century concept by Sir William Hamilton to recreate a Mount Vesuvius eruption. Using an 1775 sketch and the 1771 watercolour Night view of a current of lava by Pietro Fabris, they built a modern mechanism with laser-cut timber and acrylic, programmable LEDs, and electronics to mimic lava flows and explosive bursts. Supervised by Dr. Richard Gillespie, Xinyu Xu and Yuji Zeng built it in three months for The Grand Tour exhibition at Baillieu Library, on display until June 28, 2026.
Train Your Own LLM From Scratch is a hands-on workshop that lets you build a GPT-style model from scratch, without black-box libraries, and train a ~10M-parameter model on a laptop in under an hour. You write all components: tokenizer, transformer, training loop, and text generation, to produce Shakespeare-like text. Prereqs: any PC/Mac, Python 3.12+, runs on Apple Silicon, CUDA, or CPU; Colab supported. The workshop covers six parts: tokenization, transformer architecture, training loop, inference, integration, and competition training. Uses character-level tokenization (vocab ~65) for small data; references nanoGPT and GPT papers. Configs: Tiny, Small, Medium.
Empty Screenings is a site that flags AMC showings with zero sold tickets—about 10% of screenings—allowing users to glimpse 'private theaters.' It supports searching by ZIP code and lists screenings with times and remaining seats (often 0). Examples include AMC Mercado (Santa Clara), AMC NewPark 12 (Newark), AMC DINE-IN Sunnyvale, and AMC Eastridge 15 (San Jose). The page is created by Riley Walz and isn’t affiliated with AMC Theaters.
Using FAO Food Balance Sheets and WWF Livewell diet, the study assesses national self-sufficiency for seven food groups. Among 186 countries, 154 meet 2–5 groups domestically; only Guyana is self-sufficient for all seven, and six Middle Eastern countries meet none. Meat self-sufficiency is relatively high (65%), but dairy is difficult in Sub-Saharan Africa; fish/seafood self-sufficiency is low (25%). Regions differ: fruits excel in Latin America, vegetables are weak in Sub-Saharan Africa; intra-union trade modestly boosts self-sufficiency, while reliance on few partners increases risk. Projections to 2032 show gains in legumes, staples and meat, but dairy and fish remain challenging.
claw is a tiny MIT-licensed LLM agent for Linux that runs from a single POSIX shell script with no dependencies beyond curl and jq. It works on Alpine, busybox ash, VMs, and cheap VPS boxes. Features: streaming chat, shell tool calls (<shell> blocks), rolling memory stored as JSONL, mentor-mode for critique, multi-provider support (OpenAI/Anthropic), named sessions, and pluggable knowledge via .md files. Install by downloading the script to /usr/local/bin/claw, chmod +x, set your API key, then run claw. Demo shows using shell tools to inspect/modify /var/log.
Andrea Veri's post analyzes CVE-2026-31431 "Copy Fail" in a lab with rootless Podman. It dissects the exploit’s shellcode, a compressed ELF that overwrites /usr/bin/su in the page cache and uses setuid(0)/execve to spawn a shell. In a rootless container, the attack achieves root inside the namespace but is limited by user namespaces: UID 0 inside maps to host UID 1000, so host privileges aren’t gained. The author uses eBPF to observe the kernel, since ptrace blocks the SUID step. Conclusion: rootless containers enclose LPEs; enable user namespaces in OpenShift.
PGX now provides continuity support for pgBackRest under the name pgxbackup. With pgBackRest maintenance winding down, pgxbackup will deliver critical bug fixes, PostgreSQL-version compatibility, and functional continuity (existing backups and config remain usable). It is open-source under the same license, welcomes outside contributors, and the repository is github.com/pgexperts/pgxbackup. The name change follows David Steele’s request that forks avoid using the pgBackRest name.
The car has become a data-driven advertising platform, not just a purchase. From the 1986 Buick touchscreen to the 2012 Tesla Model S and on through OTA updates, vehicles replaced mechanical links with software that can remove or unlock features and gather telemetry. Advertising now permeates the journey—from GSTV at the pump to Gulp Radio in stores to promoted map pins in Google Maps—and even the car’s voice layer is being shaped by Google, Amazon, and Spotify. Privacy and security remain weak, with lagging regulation, consent gaps, and CAN-bus exploits. Projections put in-vehicle ads in the billions by 2034.
Made by Johno Whitaker using FastHTML