Magician Forgets Password To His Own Hand After RFID Chip Implant
A magician who implanted an RFID chip in his hand lost access to it after forgetting the password, leaving him effectively locked out of the tech embedded in his own body. The Register reports: “It turns out,” said [said magician Zi Teng Wang], “that pressing someone else’s phone to my hand repeatedly, trying to figure out where their phone’s … ⌘ Read more
Clang 21 Delivering Nice Performance Gains On AMD EPYC Zen 4 With HBM3
One of the areas I’ve been meaning to run more benchmarks on this season has been for the recently released Clang 21 compiler. Back in September when LLVM Clang 21 was debuting I ran some initial benchmarks and found it to deliver some nice performance gains on AMD EPYC Zen 5 but then have been busy with other benchmarks/articles for expanding that testing. Recently with having some spare cycles and gratis access still to the Microsoft A … ⌘ Read more
How to Disable Camera Lock Screen Swipe on iPhone
iPhone users have been able to access the iPhone camera through the Lock Screen by a swipe left gesture, which some people find to be very convenient, while others have noticed the swipe gesture can lead to inadvertent camera access and taking dozens of pocket pictures. If you’re in the latter camp, or you just … Read More ⌘ Read more
Mexico Partially Lifts Longstanding Website Ban On Tor Network
Mexico has finally lifted its long-running Tor ban for the main government portal, allowing privacy-focused users, journalists, and activists to access gob.mx again after more than a decade of blocking. That said, the open data portal and the former Tor-compatible whistleblower system remain inaccessible. CyberInsider reports: The development follows … ⌘ Read more
IRS Accessed Massive Database of Americans Flights Without a Warrant
An anonymous reader shares a report: The IRS accessed a database of hundreds of millions of travel records, which show when and where a specific person flew and the credit card they used, without obtaining a warrant, according to a letter signed by a bipartisan group of lawmakers and shared with 404 Media. The country’s major airlines, inc … ⌘ Read more
NetChoice Sues Virginia To Block Its One-Hour Social Media Limit For Kids
NetChoice is suing Virginia to block a new law that limits kids under 16 to one hour of daily social media use unless parents approve more time, arguing the rule violates the First Amendment and introduces serious privacy risks through mandatory age-verification. The Verge reports: In addition to restricting access to legal speech … ⌘ Read more
OAK 4 D and OAK 4 S Standalone Edge Vision Cameras with PoE and 48MP Imaging
Luxonis has opened early access preorders for the OAK 4 D and OAK 4 S, two standalone edge-processing cameras designed for computer vision tasks. Both systems provide a 48MP RGB sensor with optional autofocus or wide-angle variants, USB 3 and PoE connectivity, IP67-rated enclosures, and on-device inference capabilities. Both devices are built around the RVC4 […] ⌘ Read more
Woman Pleads Guilty to Lying About Astronaut Accessing Bank Account From International Space Station
It was the first allegation of a crime committed in space — back in 2019. But by 2020 it had led to
charges of lying to federal authorities.
And now a former Air Force intelligence officer “has pleaded guilty to lying to a federal agent,” reports CNBC, “by falsely claiming th … ⌘ Read more
Russia Imposes 24-Hour Mobile Internet Blackout For Travelers Returning Home
An anonymous reader quotes a report from The Record: Russian telecom operators have begun cutting mobile internet access for 24 hours for citizens returning to the country from abroad, in what officials say is an effort to prevent Ukrainian drones from using domestic SIM cards for navigation. “When a SIM card enters Russia … ⌘ Read more
JPMorgan Chase Wins Fight With Fintech Firms Over Fees To Access Customer Data
According to CNBC, JPMorgan Chase has secured deals ensuring it will get paid by the fintech firms responsible for nearly all the data requests made by third-party apps connected to customer bank accounts. From the report: The bank has signed updated contracts with the fintech middlemen that make up more than 95% of th … ⌘ Read more
Jack Dorsey Funds diVine, a Vine Reboot That Includes Vine’s Video Archive
An anonymous reader quotes a report from TechCrunch: As generative AI content starts to fill our social apps, a project to bring back Vine’s six-second looping videos is launching with Twitter co-founder Jack Dorsey’s backing. On Thursday, a new app called diVine will give access to more than 100,000 archived Vine videos, restor … ⌘ Read more
@bender@twtxt.net Hmm, didn’t find anything. But you mean a giant bucketload of access_log /home/$USER/logs/access.log if=… where the condition matches the requested path for said user? Yeah, that gets annoying very quickly. :-D
@bender@twtxt.net Sounds about right.
I had a brainfart yesterday, though. For whatever reason I thought of subdomains, which are modeled with server entries in nginx. So, each could define its own access_log location. However, there are no subdomains in place! Searching around, I didn’t find any solution to give each user their own access log file.
One way would be a cronjob, aeh, systemd timer as I learned the other day, that greps the main access log and writes all user access log files with only the relevant stuff.
OpenFGA Becomes a CNCF Incubating Project
The CNCF Technical Oversight Committee (TOC) has voted to accept OpenFGA as a CNCF incubating project. What is OpenFGA? OpenFGA is an authorization engine that addresses the challenge of implementing complex access control at scale in… ⌘ Read more
This new robot has a clever spin on lunar mining
Work continues on designs for robots that can help assist the first human explorers on the moon in over half a century. One of the most important aspects of that future trip will be utilizing the resources available on the moon’s surface, known as in-situ resource utilization (ISRU). This would give the explorers access to materials like water, structural metals, and propellant, but only if they can recover it from the rock and regolith that make up the moon’s surfa … ⌘ Read more
access.log files. Hence they’ll never see followers, unless we notify them out of band. 🫤
I mean, granting everyone read access, maybe?
access.log files. Hence they’ll never see followers, unless we notify them out of band. 🫤
@movq@www.uninformativ.de Actually, @threatcat@tilde.club popped up in my own access log first. That’s how I discovered the feed. :-) So I figured that this feed author actually sees my reply. The hope is that with the next mention of my feed in threatcat’s feed, the other tilde users, who are following threatcat, are then also informed of my existence. :-)
I don’t know how tilde.club is set up. But it should be relatively easy to give all users access to their nginx access logs. Not sure if somebody already requested that or not. But I’d encourage tilde users to ask for that. Maybe also just for twtxt.txt and/or in a custom, reduced log format.
@lyse@lyse.isobeef.org There’s a couple of new users on https://tilde.club, but since this is a shared host, I doubt that they have access to their access.log files. Hence they’ll never see followers, unless we notify them out of band. 🫤
Nonprofit Releases Thousands of Rare American Music Recordings Online
The nonprofit Dust-to-Digital Foundation is making thousands of historic songs accessible to the public for free through a new partnership with the University of California, Santa Barbara. The songs represent “some of the rarest and most uniquely American music borne from the Jazz Age and the Great Depression,” according to the … ⌘ Read more
Show HN: LLM Onestop – Access ChatGPT, Claude, Gemini, and more in one interface
Comments ⌘ Read more
Account Takeover via IDOR: From UserID to Full Access ⌘ Read more
Ryzen AI Software 1.6.1 Advertises Linux Support
Ryzen AI Software as AMD’s collection of tools and libraries for AI inferencing on AMD Ryzen AI class PCs has Linux support with its newest point release. Though this “early access” Linux support is restricted to registered AMD customers… ⌘ Read more
GTK Adds “Reduced Motion” Accessibility Option To Follow macOS, Windows & Others
In addition to GNOME’s Mutter compositor removing its X11 back-end support to focus exclusively on Wayland while keeping around XWayland client support, another notable GNOME change this week was the GTK toolkit adding a “reduced motion” accessibility option… ⌘ Read more
Denmark’s Government Aims To Ban Access To Social Media For Children Under 15
An anonymous reader quotes a report from the Associated Press: Denmark’s government on Friday announced an agreement to ban access to social media for anyone under 15, ratcheting up pressure on Big Tech platforms as concerns grow that kids are getting too swept up in a digitized world of harmful content and commercial int … ⌘ Read more
Self-Hosted Human and Machine Identities in Keycloak 26.4
Keycloak is a leading open source solution in the cloud-native ecosystem for Identity and Access Management, a key component of accessing applications and their data. With the release of Keycloak 26.4, we’ve added features for both… ⌘ Read more
Dynamic MCPs with Docker: Stop Hardcoding Your Agents’ World
The MCP protocol is almost one year old and during that time, developers have built thousands of new MCP servers. Thinking back to MCP demos from six months ago, most developers were using one or two local MCP servers, each contributing just a handful of tools. Six months later and we have access to thousands… ⌘ Read more
The Louvre’s Video Surveillance Password Was ‘Louvre’
A bungled October 18 heist that saw $102 million of crown jewels stolen from the Louvre in broad daylight has exposed years of lax security at the national art museum. From trivial passwords like ‘LOUVRE’ to decades-old, unsupported systems and easy rooftop access, the job was made surprisingly easy. PC Gamer reports: As Rogue cofounder and former Polygon arch-jester Cass … ⌘ Read more
T-Mobile Brings Free 911 Emergency Texting To AT&T and Verizon Customers
An anonymous reader shares a report: T-Mobile is opening up access to its Starlink-powered emergency texting service. The carrier announced on Wednesday that anyone with a compatible phone – even AT&T and Verizon customers – can sign up to text 911 over satellite for free.
In July, T-Mobile launched its “T-Satellite” service … ⌘ Read more
@movq@www.uninformativ.de Gemini liked your opinion very much. Here is how it countered:
1. The User Perspective (Untrustworthiness)The criticism of AI as untrustworthy is a problem of misapplication, not capability.
- AI as a Force Multiplier: AI should be treated as a high-speed drafting and brainstorming tool, not an authority. For experts, it offers an immense speed gain, shifting the work from slow manual creation to fast critical editing and verification.
- The Rise of AI Literacy: Users must develop a new skill—AI literacy—to critically evaluate and verify AI’s probabilistic output. This skill, along with improving citation features in AI tools, mitigates the “gaslighting” effect.
The fear of skill loss is based on a misunderstanding of how technology changes the nature of work; it’s skill evolution, not erosion.
- Shifting Focus to High-Level Skills: Just as the calculator shifted focus from manual math to complex problem-solving, AI shifts the focus from writing boilerplate code to architectural design and prompt engineering. It handles repetitive tasks, freeing humans for creative and complex challenges.
- Accessibility and Empowerment: AI serves as a powerful democratizing tool, offering personalized tutoring and automation to people who lack deep expertise. While dependency is a risk, this accessibility empowers a wider segment of the population previously limited by skill barriers.
The legal and technical flaws are issues of governance and ethical practice, not reasons to reject the core technology.
- Need for Better Bot Governance: Destructive scraping is a failure of ethical web behavior and can be solved with better bot identification, rate limits, and protocols (like enhanced
robots.txt). The solution is to demand digital citizenship from AI companies, not to stop AI development.
Norway reviews cybersecurity after remote-access feature found in Chinese buses
Comments ⌘ Read more
“This is not a Chinese bus problem. It is a problem for all types of vehicles and devices with Chinese electronics built in.”, says in the article.
Sorry but no. The truth is that “This is not an all types of vehicles and devices with Chinese electronics built in problem. It is a problem for all types of remotely accessible vehicles.”
Introducing the CNCF End User Contributor Program: Earn Access, Influence, and Recognition
The cloud native ecosystem runs on the contributions from many sources– including vendors, developers, academics, and importantly, end users. The real-world production experience of end-user organizations is essential for project evolution and growth. If your organization… ⌘ Read more
Reduce Transparency Does Not Work in macOS Tahoe 26.1?
Some Mac users have discovered that the “Reduce Transparency” and “Increase Contrast” accessibility toggles no longer work completely after installing the macOS Tahoe 26.1 update, as transparency remains prominent throughout the interface. Toggling the Accessibility switch on for ‘Reduce Transparency’ in MacOS Tahoe 26.1 might reduce the transparency in the menu bar and Control Center … [Read More](https://osxdaily.com/2025/1 … ⌘ Read more
Benchmarking The AMD EPYC 9V64H: Azure HBv5’s Custom AMD CPU With HBM3
Nearly one year ago Microsoft announced the HBv5 virtual machines powered by a custom-designed AMD 4th Gen EPYC processor with high bandwidth memory (HBM3). Finally today the Azure HBv5 series is reaching general availability for those with memory-intensive HPC applications and other workloads. Microsoft kindly provided Phoronix with HBv5 access in advance to begin testing these new VMs with the AMD EPYC 9V64H CPUs featuring HBM memory, so … ⌘ Read more
Design trends I think will take off in 2026
but tierlist

S - move from flat design to more detailed, 3D, more complex logos.
A - glass, not just liquid, Windows Vista, 7, 11,… accessibility concerns, but I like to see it.
B-/C+ - black and white icons, favicons. I did it before it was cool, but it’s getting overused.
E - gradientslop, barely started, already all blends together.
Bangladesh’s accession to the UN Water Convention has a ripple effect that could cause problems with India
When Bangladesh became the first country in South Asia to join the U.N.’s Water Convention earlier this year, it was presented as a win-win. ⌘ Read more
Checkup time for Fido? The wait to get an appointment might be longer in rural areas
Most people can get their pets in for veterinary visits relatively quickly, but access to care could be improved in rural areas, suggests a recent study. ⌘ Read more
Event gives access to small wineries in Tasmania
The owners of around forty vineyards in the south of the state are hoping the weather holds out for the next few days as they prepare to open the gates for the annual Spring in the Vines. ⌘ Read more
Meta and TikTok are obstructing researchers’ access to data, EU commission rules
Comments ⌘ Read more
ICE contract could bring controversial surveillance tech to American streets
Ja’han Jones, - MSBNC
_Stephan: Dictator Trump has now authorized ICE to take the next step in its Gestapo tactics. Trump has authorized ICE to use a spyware programn called Pegasus on the phones of people who oppose him. You won’t know it has happened to your phone, but ICE will then have access to everything on your phone, and everthing your phone is connected to. IC … ⌘ Read more
Using Homebrew to Distribute Early Access Binaries from Private Github Repositories
Comments ⌘ Read more
Trump ends Canada access at shared border library ⌘ Read more
KDE Plasma 6.5 released
KDE is on a roll lately, and keeps on rolling with today’s release of KDE Plasma 6.5. As the project itself notes, this release focuses on relatively small improvements, refinements, and other niceties, without making any massive changes. With Linux desktops taking accessibility more seriously lately than ever before, I want to focus on the accessibility improvements first. The Orca screen reader now announces caps lock state changes, and screen readers will now describe the Shortcut … ⌘ Read more
Applying RBAC to databases on Kubernetes: Practical, real-world examples
Introduction Role-Based Access Control (RBAC) is one of the most important security features in any cloud native platform. It determines who can do what inside the Kubernetes Cluster, helping teams give the right access to the… ⌘ Read more
Study highlights supply and demand gaps in after-school programs
After-school programs are in high demand among families, but mismatches in cost, location and program type can prevent students from accessing the opportunities they need most, according to a new USC study. ⌘ Read more