Front-page articles summarized hourly.
Escrow security for iCloud Keychain uses clusters of hardware security modules (HSMs) behind iCloud to guard escrow records. To recover, a user authenticates with their iCloud account, responds to an SMS, and provides their iCloud security code; SRP verifies the code without sending it. A majority of the HSMs must agree to unwrap the escrow and decrypt the keychain from CloudKit. Only 10 attempts are allowed; after the tenth failed attempt the escrow record is destroyed and the keychain is lost, protecting against brute-force at the cost of data loss. Firmware tampering and admin-access attempts trigger key destruction.
Gus O’Connor reviews David Streitfeld’s Western Star: The Life and Legends of Larry McMurtry, arguing McMurtry spent a career deconstructing the West’s romance while showing its myths are inseparable from history. Through novels like Horseman, Pass By; The Last Picture Show; Lonesome Dove and films such as Brokeback Mountain, he treated the West with irony and realism, turning it into a comic-tragic landscape. Streitfeld also reveals McMurtry’s own life myths and fabrications. McMurtry’s legacy, the piece suggests, is teaching Americans to read the West as legend, reality, and advertising.
Use a rolling time window to compute FPS rather than a single frame or fixed-frame-average. FPS should reflect frames produced in the last window (typically 1 second). The article critiques common approaches (latest frame, N-frame average, per-second reset) as misleading and favors rolling-window methods: track frame timestamps (or frame events with processing times) within the window and derive FPS from that history. Include guidance on precise timers (e.g., SDL_GetPerformanceCounter or chrono), fixed-capacity buffers, and decoupling display updates from the window length. A bonus approach updates the display twice per second.
WUPHF is an open-source, self-hosted multi-agent office that lets AI agents—Claude Code, Codex, and OpenClaw—collaborate in a shared brain while preserving context. Each agent has a private notebook plus a team wiki-backed memory graph. Memory backends include markdown (default), Nex, GBrain, or none. Agents use per-agent tools, bridge to Telegram or OpenClaw, and support two action providers (local CLI or Composio). Install via npx wuphf or go build; memory backend is configurable. MIT-licensed for self-hosted use.
Researchers Bar-Natan and van der Veen introduce a new knot invariant that is both strong and computable. Each knot is described by a hexagonal QR code that uniquely fingerprints it. Grounded in a traffic-flow metaphor that generalizes the Alexander polynomial, the invariant can be computed for knots with hundreds of crossings (some cases >600). It significantly outpaces classical invariants in discriminating knots (≈97% of 18-crossing knots) and is believed to be equivalent to the two-loop polynomial, potentially linking to the Kontsevich integral.
PCR is a decades-old method; speed gains come from cycles, enzymes, or ramp rates. In practice, cutting cycles isn’t helpful because primers and nucleotides aren’t limiting; faster polymerases help but only so much; the main bottleneck is ramping temperatures. Photonic PCR—heating tiny droplets with LEDs or lasers—can run 40 cycles in about six minutes, but even with instantaneous ramping the total time drops only from ~60 to ~50 minutes. Adoption is hampered by cost, trust in cheap hardware, and switching costs. Open PCR attempts failed. Conclusion: PCR remains near-optimal; systemic changes are needed for bigger gains.
Geerling tests RTL8159-based 10G USB 3.2 adapters, focusing on an $80 WisdPi model. In four machines, full 10 Gbps only on a desktop with a USB 3.2 Gen 2x2 port; other PCs hit ~6–7 Gbps due to port limits. MacOS auto-detects; Windows requires the Realtek driver. Thermals are modest (about 0.86 W at USB2 speed; ~42.5°C during testing). Verdict: full 10 Gbps worth it only if you have a USB 3.2 Gen2x2 port; otherwise 2.5/5 Gbps remains better value, and Thunderbolt remains best for true 10G with non-Gen2x2 USB.
On ENIAC’s 80th anniversary, Naomi Most recalls that ENIAC’s programmers and its loom-like wiring wove computing into weather prediction and other narratives, not merely calculation. Co-inventors John Mauchly and J. Presper Eckert built ENIAC to speed ballistic tables, while Kay McNulty and five other women learned to program by hand, devising subroutines and routes through vacuum tubes. Upgrades by von Neumann and Metropolis finally yielded the world’s first computer-assisted weather forecast in 1950. Today, computers are narrative engines—like looms—whose capabilities emerge through use.
Panic launched a fan mail rewards program after finishing their games, inspired by an Activision promo, where players send a stamped return envelope from the credits to receive a patch. Since mid-2024, Panic has received hundreds of pieces of mail—drawings, needlework, wedding invites, money, a dead fly, and even a tooth—and sent back patches. A comic strip in the credits encouraged players to write notes to the developers. The effort has turned Panic’s office into a 'Christmas mailroom' and deepened connections with players, often highlighting personal stories and gratitude.
Clad's photo-free 3D body method uses eight questions feeding a small MLP to predict 58 Anny blendshape parameters. Mass and height targets are enforced via the Anny forward pass in the loss, making gradients propagate through volume params. Trained on tens of thousands of synthetic bodies (20 inputs, 58 outputs; separate male/female), it outperforms photo-based approaches: height MAE ~0.3 cm, mass ~0.3 kg, BWH ~3–4 cm; p95-aware losses. Beyond height/weight, features like build, shape, cup size, and ancestry carry signal; real-world mass needs density conventions. Live demo and API available; not final.
tvision is a modern cross-platform port of Turbo Vision 2.0 with Unicode (UTF-8) support. It preserves API compatibility while adding Unicode input/output, 24-bit color, and extended palette via new types (TColorAttr, TAttrPair) and TStringView. It includes numerous UI views updated for Unicode, a system clipboard via TClipboard, and improved input/mouse handling. Build options cover Linux (ncurses), Windows (MSVC/MinGW), Borland C++, and CMake/vcpkg integration. Documentation covers usage, builds, API changes, and examples. The project aims to keep backward compatibility and ease porting old Turbo Vision apps.
Cosmology with Geometry Nodes explains using Blender's Geometry Nodes to perform cosmology computations and visualizations, focusing on CMB data stored on HEALPix spheres. The author shows injecting pixel data into a HEALPix mesh, color-mapping temperatures, rotating while preserving pixelation, and simulating aberration and Doppler boosts, plus visualizing weak gravitational lensing on the mesh and capturing sky regions as square images for ML. It also covers Mollweide unwrapping, parallel computation of spherical harmonics, and float64 emulation in Geo Nodes, with potential broader physics applications.
An in-depth look at reverse‑engineering infrared ESLs. The author argues ESLs often aren’t eco-friendly and mainly save labor and enable rapid price changes. The focus is the infrared system, which dominates with fast, interference‑free updates and a line‑of‑sight network: a store server, base stations, transceivers, and ESLs. It details the IR PHY (940 nm bursts, 1.25 MHz carrier, Pulse Position Modulation PP4/PP16), frame format ([VER][PLID][CMD][PARAMS][KEY][CRC]), and commands (84 page update, 85 wake, image updates). It covers image formats (raw and RLE), and hardware notes (RAM-based firmware, ASIC MCU, NFC tag, potential security gaps).
Could not summarize article.
URANDOM_DEMO.md documents patching projecteleven.py to replace the IBM Quantum backend with os.urandom to test if quantum hardware is needed for ECDLP key recovery. The patch preserves the rest of the code; if quantum signal mattered, recoveries should fail, but they do not. The author’s CLI still recovers private keys using random inputs, with results indistinguishable from hardware runs. It covers 4- to 17-bit challenges, showing that with enough shots, random noise suffices for recovery. Conclusion: this is classical verification, not quantum-assisted ECDLP.
Blog discusses the enduring appeal of plain text and ASCII diagramming tools (Mockdown, Wiretext, Monodraw). These tools attract users who prefer minimal visuals for embedding in code and as gateways to AI. The piece frames such constraints as a design exercise with continued relevance as computing advances—monospace text is portable and a powerful editing interface. It also notes that ASCII art can be fun and that constraint-practice may grow in importance with AI.
Firefox 149 quietly ships Brave’s adblock-rust engine, but it’s disabled by default with no UI or built-in filter lists. The Rust engine blocks ads/tracking and uses uBlock Origin–compatible filter syntax; Waterfox has adopted it. To test, disable Enhanced Tracking Protection for the site, set privacy.trackingprotection.content.protection.enabled to true in about:config, and add EasyList and EasyPrivacy URLs to privacy.trackingprotection.content.protection.test_list_urls. Visit a site with ads to see content blocked (ads may render as placeholders).
DeepSeek-V4 Preview Release is live and open-sourced, featuring DeepSeek-V4-Pro (1.6T total, 49B active) and DeepSeek-V4-Flash (284B total, 13B active). Both models support 1M context, Thinking/Non-Thinking modes, and OpenAI/Anthropic APIs. Pro leads in agentic coding, math/STEM reasoning, and world knowledge; Flash offers faster, cost-effective performance close to Pro. Innovations include token-wise compression and DeepSeek Sparse Attention, enabling ultra-high context efficiency. 1M context applies across services; deprecation of deepseek-chat/reasoner after July 24, 2026. API available today at chat.deepseek.com.
Advocates setting a proper user-agent and obeying robots.txt, with links to a Wikimedia policy page and a related Phabricator task.
Made by Johno Whitaker using FastHTML