The Automated Daily - Hacker News Edition

Post-quantum crypto in orbit & Local LLM selection and tooling - Hacker News (May 15, 2026)

10 min · Gisteren10 min
aflevering Post-quantum crypto in orbit & Local LLM selection and tooling - Hacker News (May 15, 2026) cover

Beschrijving

Please support this podcast by checking out our sponsors: - Discover the Future of AI Audio with ElevenLabs - https://try.elevenlabs.io/tad [https://try.elevenlabs.io/tad] - Lindy is your ultimate AI assistant that proactively manages your inbox - https://try.lindy.ai/tad [https://try.lindy.ai/tad] - Consensus: AI for Research. Get a free month - https://get.consensus.app/automated_daily [https://get.consensus.app/automated_daily] Support The Automated Daily directly: Buy me a coffee: https://buymeacoffee.com/theautomateddaily [https://buymeacoffee.com/theautomateddaily] TODAY'S TOPICS: POST-QUANTUM CRYPTO IN ORBIT - BOREALIS, A PURE OCAML CCSDS STACK, REPORTEDLY BOOTED IN LOW EARTH ORBIT WITH BPV7 + BPSEC AND POST-QUANTUM OTAR USING ML-DSA-65—HIGHLIGHTING MEMORY SAFETY AND KEY MANAGEMENT IN SPACE. LOCAL LLM SELECTION AND TOOLING - TWO LOCAL-AI STORIES: WHICHLLM RANKS MODELS BASED ON REAL HARDWARE CONSTRAINTS AND BENCHMARK FRESHNESS, WHILE DWARFSTAR 4 SIGNALS AN INFLECTION POINT WHERE NEAR-FRONTIER QUALITY MAY BE PRACTICAL ON HIGH-END LOCAL MACHINES. OPEN SOURCE FACES VULNERABILITY FLOOD - METABASE WARNS LLM-ASSISTED SECURITY SCANNING IS SHARPLY INCREASING VULNERABILITY REPORT VOLUME AND QUALITY, CHANGING RESPONSIBLE DISCLOSURE TIMELINES AND PUSHING MAINTAINERS TOWARD FASTER PATCHING AND STRONGER DEPENDENCY HYGIENE. CONNECTED CAR PRIVACY HARDWARE MODS - A TOYOTA OWNER REMOVED THE CELLULAR MODEM AND GPS TO STOP TELEMETRY, ILLUSTRATING THE PRIVACY VS. SAFETY TRADEOFFS OF CONNECTED VEHICLES AND RAISING RIGHT-TO-REPAIR AND DATA-COLLECTION CONCERNS. UK REPLACES PALANTIR REFUGEE SYSTEM - THE UK GOVERNMENT SAYS IT SAVED MILLIONS BY REPLACING A PALANTIR FOUNDRY-BASED PLATFORM WITH AN IN-HOUSE SYSTEM FOR THE HOMES FOR UKRAINE PROGRAM—FUELING THE DEBATE OVER PROCUREMENT, LOCK-IN, AND “SOVEREIGN TECH.” WIKIPEDIA AS A FILE EXPLORER - WIKIPEDIA FILE EXPLORER REIMAGINES WIKIMEDIA BROWSING AS A DESKTOP-STYLE FOLDER SYSTEM, MAKING DISCOVERY MORE INTUITIVE WHILE REVEALING GAPS IN CATEGORIZATION AND METADATA. STEVE JOBS, NEXT, AND APPLE - AN IEEE SPECTRUM INTERVIEW ARGUES STEVE JOBS’ NEXT YEARS SHAPED APPLE’S LATER SUCCESS, AND FRAMES THOSE LESSONS AGAINST A RUMORED APPLE CEO TRANSITION AND THE COMPANY’S POSITIONING ON AI. -Pure OCaml CCSDS Stack Goes Live in Orbit with Encrypted Bundles and Post-Quantum Rekeying [https://gazagnaire.org/blog/2026-05-14-borealis.html] -New Web Tool Lets Users Browse Wikipedia and Wikimedia Commons Like Files and Folders [https://explorer.samismith.com/] -whichllm CLI ranks the best local LLMs for your hardware using recency-aware benchmarks [https://github.com/Andyyyy64/whichllm] -New Book Recasts Steve Jobs’s NeXT Years as the Blueprint for Modern Apple [https://spectrum.ieee.org/steve-jobs-next-computer] -Metabase Warns LLM-Powered Scanners Are ‘Strip Mining’ Open Source for Vulnerabilities [https://www.metabase.com/blog/strip-mining-era-of-open-source-security] -SigNoz Lists New Hiring Openings Across Engineering, Growth, and Customer Success [https://signoz.io/careers] -RAV4 Owner Removes Cellular Modem and GPS to Stop Vehicle Telemetry [https://arkadiyt.com/2026/05/13/removing-the-modem-and-gps-from-my-rav4/] -UK replaces Palantir in Homes for Ukraine system, citing millions in savings [https://www.bbc.com/news/articles/c2l2j1lxdk5o] -github.com [https://github.com/GlycemicGPT/GlycemicGPT] -Antirez on DS4’s Rapid Rise and the Push Toward Serious Local AI [https://antirez.com/news/165] Episode Transcript Post-quantum crypto in orbit In space and security news, an OCaml implementation of parts of the CCSDS space communications stack—codenamed Borealis—has reportedly booted and started operating in low Earth orbit aboard DPhi Space’s ClusterGate‑2 hosted payload module. The interesting angle isn’t just “a new protocol stack in space.” It’s the security posture: Borealis treats its communications link like a delay‑tolerant network, wrapping traffic into BPv7 bundles, and protecting it with BPSec encryption and authentication. Why does that matter? Hosted payloads are essentially multi‑tenant compute in orbit. If you’re running alongside other software on shared satellite hardware, you have to assume isolation can fail—especially when Linux kernel privilege escalation and container escape bugs keep showing up, and patching in orbit is slow, risky, or sometimes impossible. The project is betting that memory-safe OCaml plus strong cryptography reduces the blast radius if anything goes sideways. And the headline-worthy claim: Borealis includes over‑the‑air rekeying for long‑lived post‑quantum signing keys—specifically ML‑DSA‑65. If this is indeed the first publicly described in‑orbit post‑quantum OTAR demo, it’s a meaningful marker that “future-proof” crypto isn’t just a lab exercise anymore—it’s being tested where recovery is hardest: in space. Local LLM selection and tooling Staying with the “secure software meets real-world constraints” theme, the Borealis author also previewed a planned move to Jane Street’s OxCaml to reduce latency jitter on packet dispatch paths. That’s a reminder of a practical truth: in embedded and space systems, it’s not enough to be correct—you also need predictable performance. If shifting allocation strategies can cut tail latency and reduce garbage collection hiccups, that can translate into fewer missed windows and more reliable operations over noisy links. The broader story here is that satellite payload software is slowly adopting cloud-style thinking: tighter security boundaries, better key management, and operational designs that assume things will break—but aim to fail safely. Open source faces vulnerability flood On local AI, a new open-source command-line tool called whichllm is taking on a problem a lot of people quietly struggle with: choosing a local model that actually runs well on your machine and still delivers good results. The local LLM world is overflowing with variants, quantizations, and benchmark claims—and “pick the biggest model that fits in VRAM” often leads to a sluggish setup or disappointing output. What makes this approach notable is the emphasis on practical scoring: it tries to account for the real memory costs that show up at runtime, and it discounts stale or low-confidence benchmark data, so older leaderboard results don’t dominate the rankings forever. If that works as advertised, it nudges local AI toward something more like an engineering decision—fit, speed, quality, evidence—rather than a guessing game driven by hype. And importantly, it points to a bigger shift: local AI is maturing from hobby tinkering to repeatable workflows that teams can script, audit, and standardize. Connected car privacy hardware mods Related to that, Redis creator Salvatore Sanfilippo—better known as antirez—wrote about his local AI project DwarfStar 4 gaining unexpected momentum. The key claim is simple but provocative: this is the first time he’s been able to rely on a local model for serious tasks he’d normally send to cloud LLMs. The timing, he argues, is about models finally getting fast enough—plus quantization techniques that make bigger capabilities feasible on high-end personal machines. Whether you buy the specific branding or not, the signal is interesting: we may be entering an era where “local-first AI” isn’t just about privacy or offline use. It’s about a credible alternative to hosted services for a meaningful slice of work—especially for developers who want control over cost, data exposure, and latency. If local inference keeps improving, it could reshape everything from developer tooling to compliance-heavy industries that have been hesitant to put sensitive data into third-party AI APIs. UK replaces Palantir refugee system Now to open source security—where the tone is a bit more ominous. Metabase published a post warning that LLM-powered security scanning is rapidly increasing both the volume and usefulness of vulnerability reports. Their claim is that what used to be a trickle of mostly low-quality submissions has turned into a steady stream, and many findings are legitimate. The underlying dynamic is worth paying attention to: once automated tools can read a repository like a human would—understand patterns, trace flows, spot footguns—public code becomes a mineable resource. Not in the sense of stealing it, but in the sense of repeatedly extracting new layers of vulnerabilities with enough compute and persistence. Why does that matter? It shifts the practical meaning of responsible disclosure. If one scanner can find a bug today, a dozen others may find it tomorrow. That compresses patch timelines, increases maintainer stress, and may push some commercial open source teams toward closing code—while smaller, volunteer-run projects get squeezed the hardest. For everyone who depends on open source, the implication is clear: assume more frequent disclosures, invest in fast upgrades, and reduce impact with least-privilege setups and solid logging—because “we’ll patch next quarter” is going to age badly in this environment. Wikipedia as a file explorer On consumer privacy, a security blogger described physically removing the cellular modem module and built-in GPS from a 2024 Toyota RAV4 Hybrid to stop the vehicle from transmitting telemetry. That’s an extreme move, but it puts the tradeoffs in sharp focus. Modern cars can collect sensitive data—location, driving behavior, and potentially audio or camera-derived signals depending on the model and configuration. The author’s point is that even if you trust the manufacturer today, breaches happen, policies change, and data-sharing arrangements aren’t always obvious. But the other side of the ledger is real: removing connectivity can break cloud services, disable over-the-air updates, and even impact emergency calling features. That turns privacy into a safety and maintenance decision, not just a preference toggle. The bigger takeaway is that “right to repair” is becoming “right to control data.” As vehicles become more software-defined, policy and design choices will determine whether owners can meaningfully opt out—or whether connectivity becomes mandatory by default. Steve Jobs, NeXT, and Apple In government tech, the UK says it’s saving millions of pounds a year by replacing a Palantir-built platform used for the Homes for Ukraine refugee housing scheme with a system developed in-house. Palantir initially provided a Foundry-based solution quickly—starting free—then the contracts grew into multi-million-pound deals. A National Audit Office report raised concerns about procurement dynamics and the desire to avoid dependency. According to officials, the replacement has been live since September 2025, and they’re framing it as more flexible, more secure, and—crucially—giving the department greater control over data and code. Why this matters beyond one project: governments everywhere are wrestling with vendor lock-in, especially with high-leverage platforms that can become hard to unwind once operational processes depend on them. This story is being used to argue for “sovereign technology”—not necessarily rejecting US vendors outright, but proving that exits are possible and that internal capability can be a strategic asset, not just a cost center. Story 8 For something lighter—Wikipedia browsing, reimagined. A project called Wikipedia File Explorer turns Wikipedia and Wikimedia Commons into a desktop-style file explorer. Categories become folders, articles open like documents, and media browsing feels closer to rummaging through a well-organized drive than clicking around a web of links. It’s a small UI twist, but it highlights an important idea: discovery is a product feature, even for public knowledge. A more visual, exploratory interface can make Wikipedia feel less like a reference book and more like a place to wander—potentially lowering the barrier for new contributors who don’t already know where to start. The project also exposes Wikipedia’s limits: not everything is categorized well, and missing metadata becomes painfully obvious when you try to navigate it like a file system. That’s a good reminder that information architecture—categories, tags, structure—is part of the infrastructure of knowledge. Story 9 And finally, a bit of tech history with present-day implications. IEEE Spectrum interviewed journalist Geoffrey Cain about a forthcoming book arguing that Steve Jobs’ years running NeXT—from 1985 to 1997—weren’t a footnote, but a training ground that shaped what he later did at Apple. The claim is that the popular narrative—Jobs gets fired, disappears, returns fully formed—is too neat. At NeXT, he made expensive mistakes, learned market discipline, and ultimately shifted toward the strategic value of software over hardware bets. NeXT’s software work, including tools that influenced modern Apple operating systems, becomes the connective tissue in that story. What makes this feel timely is the framing against reports of an eventual Apple CEO transition and the question of what “the next era” looks like for a company already operating at massive scale. Cain’s angle suggests Apple may lean into its hardware strengths while embedding AI more quietly—less as a headline and more as a baseline capability. Whether or not that prediction holds, it’s a useful lens: big tech companies rarely reinvent themselves with a single breakthrough moment. The groundwork—tools, platforms, operational lessons—often gets laid in the years people later describe as the detour. Subscribe to edition specific feeds: - Space news * Apple Podcast English [https://apple.co/4cLLrdt] * Spotify English [https://spoti.fi/4jN8Dui] * RSS English [https://bit.ly/the_automated_daily_space] Spanish [https://theautomateddaily.com/space_es/feed.xml] French [https://theautomateddaily.com/space_fr/feed.xml] - Top news * Apple Podcast English [https://apple.co/3PTvdUF] Spanish [https://apple.co/3ECCMgk] French [https://apple.co/4hmcxbB] * Spotify English [https://spoti.fi/3ZYXAW2] Spanish [https://spoti.fi/414h4JD] French [https://spoti.fi/3Di0jDe] * RSS English [https://bit.ly/the_automated_daily_news] Spanish [https://bit.ly/the_automated_daily_news_es] French [https://bit.ly/the_automated_daily_news_fr] - Tech news * Apple Podcast English [https://apple.co/3RYWbg4] Spanish [https://apple.co/4i0WqRM] French [https://apple.co/4bEAXMm] * Spotify English [https://spoti.fi/3S089pG] Spanish [https://spoti.fi/3EE2Fwv] Spanish [https://spoti.fi/3DlObRE] * RSS English [https://bit.ly/the_automated_daily_tech] Spanish [https://bit.ly/the_automated_daily_tech_es] French [https://bit.ly/the_automated_daily_tech_fr] - Hacker news * Apple Podcast English [https://apple.co/48QWyzj] Spanish [https://apple.co/4ke9jtE] French [https://apple.co/41E1qFd] * Spotify English [https://spoti.fi/45zD1kf] Spanish [https://spoti.fi/4hF8h81] French [https://spoti.fi/3QY26Ak] * RSS English [https://bit.ly/the_automated_daily_hacker_news] Spanish [https://bit.ly/the_automated_daily_hacker_news_es] French [https://bit.ly/the_automated_daily_hacker_news_fr] - AI news * Apple Podcast English [https://apple.co/3M6Tg1o] Spanish [https://apple.co/4315L7Y] French [https://apple.co/3DkZbPb] * Spotify English [https://spoti.fi/3tzOfrz] Spanish [https://spoti.fi/416m40q] French [https://spoti.fi/41HuJGW] * RSS English [https://bit.ly/the_automated_daily_hackernews_ai] Spanish [https://bit.ly/the_automated_daily_hackernews_es_ai] French [https://bit.ly/the_automated_daily_hackernews_fr_ai] Visit our website at https://theautomateddaily.com/ [ https://theautomateddaily.com/] Send feedback to feedback@theautomateddaily.com Youtube [https://www.youtube.com/@TheAutomatedDaily] LinkedIn [https://www.linkedin.com/in/the-automated-daily/] X (Twitter) [https://x.com/automated_daily]

Reacties

0

Wees de eerste die een reactie plaatst

Meld je nu aan en word lid van de The Automated Daily - Hacker News Edition community!

Begin hier

2 maanden voor € 1

Daarna € 9,99 / maand · Elk moment opzegbaar.

  • Podcasts die je alleen op Podimo hoort
  • 20 uur luisterboeken / maand
  • Gratis podcasts
Begin hier

Alle afleveringen

100 afleveringen

aflevering AI breaks open CTF contests & Lightweight LLM memory without context - Hacker News (May 16, 2026) artwork

AI breaks open CTF contests & Lightweight LLM memory without context - Hacker News (May 16, 2026)

Please support this podcast by checking out our sponsors: - Lindy is your ultimate AI assistant that proactively manages your inbox - https://try.lindy.ai/tad [https://try.lindy.ai/tad] - Effortless AI design for presentations, websites, and more with Gamma - https://try.gamma.app/tad [https://try.gamma.app/tad] - KrispCall: Agentic Cloud Telephony - https://try.krispcall.com/tad [https://try.krispcall.com/tad] Support The Automated Daily directly: Buy me a coffee: https://buymeacoffee.com/theautomateddaily [https://buymeacoffee.com/theautomateddaily] TODAY'S TOPICS: AI BREAKS OPEN CTF CONTESTS - A SECURITY RESEARCHER ARGUES FRONTIER AI AGENTS ARE RESHAPING PUBLIC CAPTURE THE FLAG COMPETITIONS, MAKING LEADERBOARDS REFLECT AUTOMATION AND TOKEN SPEND MORE THAN HUMAN SKILL. KEYWORDS: CTF, AI AGENTS, CHEATING, RECRUITING SIGNALS, COMMUNITY. LIGHTWEIGHT LLM MEMORY WITHOUT CONTEXT - A NEW ARXIV PAPER PROPOSES B4-MEM, AN ONLINE ASSOCIATIVE MEMORY THAT UPDATES DURING USE AND NUDGES ATTENTION WITH LOW-RANK CORRECTIONS, IMPROVING LONG-HORIZON RECALL WITHOUT EXTENDING CONTEXT. KEYWORDS: LLM MEMORY, DELTA-RULE LEARNING, ATTENTION, LONG INTERACTIONS, COMPUTE-EFFICIENT. EUROPE’S SOVEREIGN CLOUD SILICON RISK - EUROPEAN “SOVEREIGN CLOUD” EFFORTS MAY STILL HINGE ON NON-EUROPEAN CPUS WITH DEEP MANAGEMENT SUBSYSTEMS, RAISING QUESTIONS ABOUT FIRMWARE-LEVEL TRUST AND LEGAL EXPOSURE. KEYWORDS: SOVEREIGN CLOUD, INTEL ME, AMD PSP, CLOUD ACT, RISAA 2024. FREE CULTURE: ACCELERANDO AND LICENSES - CHARLES STROSS’ NOVEL ACCELERANDO IS LEGALLY SHAREABLE ONLINE UNDER A CREATIVE COMMONS LICENSE, ILLUSTRATING AN AUTHOR-LED MODEL THAT COEXISTS WITH TRADITIONAL PUBLISHING. KEYWORDS: CREATIVE COMMONS, ONLINE EDITION, DIGITAL DISTRIBUTION, ATTRIBUTION, NONCOMMERCIAL. PUBLIC-DOMAIN ACCESS VIA PROJECT GUTENBERG - PROJECT GUTENBERG CONTINUES TO EXPAND FREE ACCESS TO PUBLIC-DOMAIN BOOKS AND RELATED AUDIOBOOKS, POWERED BY VOLUNTEERS AND LONG-RUNNING PRESERVATION WORKFLOWS. KEYWORDS: PUBLIC DOMAIN, FREE EBOOKS, DISTRIBUTED PROOFREADERS, EPUB, LIBRIVOX. FUTHARK EXAMPLES FOR GPU-STYLE COMPUTING - FUTHARK’S REFRESHED “BY EXAMPLE” GUIDE USES PRACTICAL, COMMENTED PROGRAMS TO TEACH DATA-PARALLEL FUNCTIONAL PROGRAMMING WITH PERFORMANCE-ORIENTED USE CASES. KEYWORDS: FUTHARK, GPU, ARRAYS, BENCHMARKING, AUTOMATIC DIFFERENTIATION. GUT MICROBIOME THERAPY AND AUTISM - SMALL STUDIES FROM ASU SUGGEST FECAL MICROBIOTA TRANSPLANT-BASED THERAPY MAY PRODUCE LASTING IMPROVEMENTS FOR SOME AUTISM PATIENTS WITH GI ISSUES, BUT LARGER TRIALS ARE NEEDED. KEYWORDS: MICROBIOME, GUT–BRAIN AXIS, AUTISM, CLINICAL TRIAL, FDA. -b4-mem Adds Compact Online Memory to Boost LLM Long-Term Recall [https://arxiv.org/abs/2605.12357] -Charles Stross Posts "Accelerando" Online Under Creative Commons License [https://www.antipope.org/charlie/blog-static/fiction/accelerando/accelerando.html] -Futhark Releases Expanded ‘Futhark by Example’ Guide and Project Showcase [https://futhark-lang.org/examples.html] -Project Gutenberg Showcases 75,000+ Free Public-Domain Ebooks and Audiobooks [https://www.gutenberg.org/] -ASU Gut Microbiome Transplant Therapy Shows Long-Lasting Symptom Improvements in Autism Studies [https://refractor.io/adhd-autism/fecal-transplants-for-autism-delivers-success-in-clinical-trials/] -CTF Veteran Says Frontier AI Has Broken Open Online Capture The Flag Competitions [https://kabir.au/blog/the-ctf-scene-is-dead] -Kyber Seeks Founding Marketer to Scale Content and Community Growth [https://www.ycombinator.com/companies/kyber/jobs/1rLQAro-founding-marketer-content-community] -Europe’s Sovereign Cloud Push Runs Into Intel and AMD Management-Engine Blind Spot [https://www.theregister.com/systems/2026/05/16/europe-built-sovereign-clouds-to-escape-us-control-then-forgot-about-the-processors/5237735] -Fictional ‘WKRP in Cincinnati’ Call Letters Revived as Real FM Station [https://www.openculture.com/2026/05/nearly-50-years-later-wkrp-in-cincinnati-becomes-a-real-radio-station.html] -Ploopy Opens Preorders for Open-Source Bean Pointing Stick Mouse [https://ploopy.co/shop/bean-pointing-stick/] Episode Transcript AI breaks open CTF contests Let’s start with AI and how it’s reshaping two very different worlds: competitive security and long-running assistants. A longtime CTF competitor, Kabir Acharya, argues that open online Capture The Flag competitions are effectively “broken” by frontier AI. The claim isn’t just that models can solve puzzles—it’s that agentic tooling can industrialize the process. In that world, public scoreboards stop reflecting who learned the most, and start reflecting who automated the most. If that’s accurate, it matters beyond bragging rights: CTFs have been a training ground and a recruiting signal, and the community may need new formats that still reward understanding, not just throughput. Lightweight LLM memory without context On the more constructive side of AI news, there’s a new arXiv paper introducing something called b4-mem: a lightweight online memory mechanism meant to help LLMs retain and reuse information across long interactions—without simply extending the context window. The key idea is pragmatic: keep the underlying model frozen, then add a compact memory state that updates as the conversation progresses. Instead of stuffing more text into the prompt or doing expensive fine-tuning, the memory produces small, targeted adjustments to the model’s attention while it generates. The authors report meaningful gains, especially on benchmarks that stress long-term recall, while mostly keeping general capabilities intact. Why it matters: this is the kind of “cheap persistence” you’d want for assistants and agents that need to remember ongoing projects, preferences, or past decisions—without multiplying compute costs every time the chat gets longer. Europe’s sovereign cloud silicon risk Next up: cloud sovereignty, and an uncomfortable gap between policy goals and the hardware reality. One piece argues that Europe’s big investments in “sovereign cloud” programs—meant to reduce exposure to US legal reach—often focus on certifications, operators, and legal structures, while skating past a deeper dependency: the silicon. Many certified setups still rely on mainstream Intel and AMD processors that include highly privileged management subsystems running below the OS and hypervisor. The concern is simple even if the details are thorny: if the most trusted layer is outside your visibility and outside your jurisdictional control, sovereignty becomes a partial promise. The article also points to recent legal changes in the US that could expand who can be compelled in secret. Even if you think the most extreme scenarios are reserved for nation-state threats, the broader takeaway stands—trust isn’t just a cloud contract; it’s a supply chain. Free culture: Accelerando and licenses Shifting gears to the open web as a library—and the difference between “free to read” and “free to share.” Charles Stross’ science-fiction novel Accelerando is available as a complete, free online edition under a Creative Commons license that allows redistribution with attribution, but not commercial reuse or modifications. Alongside the text, the page documents how the novel grew out of earlier magazine stories and then became a traditionally published book. Why this is interesting in 2026: it’s an early, durable example of hybrid publishing—print on one track, legal online circulation on another. For readers, it’s access. For authors and publishers, it’s a case study in how licensing choices can keep a work culturally alive without fully giving up control. Public-domain access via Project Gutenberg Staying with access: Project Gutenberg is highlighting a collection now exceeding 75,000 free eBooks, largely built from works whose US copyrights have expired. Gutenberg’s pitch remains refreshingly plain: no fees, no accounts, and common formats that work on typical devices. The bigger story is longevity—this is digital preservation as a decades-long habit, powered by volunteers and a pipeline that turns scanned pages into usable text. It also points to a growing ecosystem around the texts, including audiobooks. In a moment when information access is often mediated by subscriptions, app stores, or walled gardens, Gutenberg continues to be a reminder that “public domain” can be a living resource, not a historical footnote. Futhark examples for GPU-style computing For developers, there’s an updated “Futhark by Example” page—essentially a guided tour through a data-parallel functional language aimed at high-performance array computing. Rather than selling Futhark with lofty claims, the page leans on real, commented programs that gradually move from fundamentals into practical work: performance-minded patterns, numerical tasks, and examples that feel closer to what you’d actually want on a GPU-like workload. It also highlights automatic differentiation examples, which is especially relevant right now as more domains—AI included—depend on efficient math tooling. The significance here is educational leverage: languages like this can be intimidating, and a well-curated example set can be the difference between curiosity and adoption. Gut microbiome therapy and autism Finally, a health story that’s been circulating for years, but continues to draw attention because the potential upside is so large—and the evidence is still developing. Researchers at Arizona State University report sustained improvements in autism-related symptoms in a subset of patients using a microbiota-based approach involving fecal microbiota transplants, particularly among individuals who also have significant gastrointestinal issues. They point to small studies with follow-ups suggesting symptom reductions over time, and mention progress toward more controlled trials. Why it matters—and why caution matters too: if the gut–brain connection turns into a validated clinical pathway for a specific subgroup, that could reshape treatment strategies. But the current base is still limited by study size and the need for larger, rigorous trials to confirm both efficacy and safety. Subscribe to edition specific feeds: - Space news * Apple Podcast English [https://apple.co/4cLLrdt] * Spotify English [https://spoti.fi/4jN8Dui] * RSS English [https://bit.ly/the_automated_daily_space] Spanish [https://theautomateddaily.com/space_es/feed.xml] French [https://theautomateddaily.com/space_fr/feed.xml] - Top news * Apple Podcast English [https://apple.co/3PTvdUF] Spanish [https://apple.co/3ECCMgk] French [https://apple.co/4hmcxbB] * Spotify English [https://spoti.fi/3ZYXAW2] Spanish [https://spoti.fi/414h4JD] French [https://spoti.fi/3Di0jDe] * RSS English [https://bit.ly/the_automated_daily_news] Spanish [https://bit.ly/the_automated_daily_news_es] French [https://bit.ly/the_automated_daily_news_fr] - Tech news * Apple Podcast English [https://apple.co/3RYWbg4] Spanish [https://apple.co/4i0WqRM] French [https://apple.co/4bEAXMm] * Spotify English [https://spoti.fi/3S089pG] Spanish [https://spoti.fi/3EE2Fwv] Spanish [https://spoti.fi/3DlObRE] * RSS English [https://bit.ly/the_automated_daily_tech] Spanish [https://bit.ly/the_automated_daily_tech_es] French [https://bit.ly/the_automated_daily_tech_fr] - Hacker news * Apple Podcast English [https://apple.co/48QWyzj] Spanish [https://apple.co/4ke9jtE] French [https://apple.co/41E1qFd] * Spotify English [https://spoti.fi/45zD1kf] Spanish [https://spoti.fi/4hF8h81] French [https://spoti.fi/3QY26Ak] * RSS English [https://bit.ly/the_automated_daily_hacker_news] Spanish [https://bit.ly/the_automated_daily_hacker_news_es] French [https://bit.ly/the_automated_daily_hacker_news_fr] - AI news * Apple Podcast English [https://apple.co/3M6Tg1o] Spanish [https://apple.co/4315L7Y] French [https://apple.co/3DkZbPb] * Spotify English [https://spoti.fi/3tzOfrz] Spanish [https://spoti.fi/416m40q] French [https://spoti.fi/41HuJGW] * RSS English [https://bit.ly/the_automated_daily_hackernews_ai] Spanish [https://bit.ly/the_automated_daily_hackernews_es_ai] French [https://bit.ly/the_automated_daily_hackernews_fr_ai] Visit our website at https://theautomateddaily.com/ [ https://theautomateddaily.com/] Send feedback to feedback@theautomateddaily.com Youtube [https://www.youtube.com/@TheAutomatedDaily] LinkedIn [https://www.linkedin.com/in/the-automated-daily/] X (Twitter) [https://x.com/automated_daily]

16 mei 20266 min
aflevering Post-quantum crypto in orbit & Local LLM selection and tooling - Hacker News (May 15, 2026) artwork

Post-quantum crypto in orbit & Local LLM selection and tooling - Hacker News (May 15, 2026)

Please support this podcast by checking out our sponsors: - Discover the Future of AI Audio with ElevenLabs - https://try.elevenlabs.io/tad [https://try.elevenlabs.io/tad] - Lindy is your ultimate AI assistant that proactively manages your inbox - https://try.lindy.ai/tad [https://try.lindy.ai/tad] - Consensus: AI for Research. Get a free month - https://get.consensus.app/automated_daily [https://get.consensus.app/automated_daily] Support The Automated Daily directly: Buy me a coffee: https://buymeacoffee.com/theautomateddaily [https://buymeacoffee.com/theautomateddaily] TODAY'S TOPICS: POST-QUANTUM CRYPTO IN ORBIT - BOREALIS, A PURE OCAML CCSDS STACK, REPORTEDLY BOOTED IN LOW EARTH ORBIT WITH BPV7 + BPSEC AND POST-QUANTUM OTAR USING ML-DSA-65—HIGHLIGHTING MEMORY SAFETY AND KEY MANAGEMENT IN SPACE. LOCAL LLM SELECTION AND TOOLING - TWO LOCAL-AI STORIES: WHICHLLM RANKS MODELS BASED ON REAL HARDWARE CONSTRAINTS AND BENCHMARK FRESHNESS, WHILE DWARFSTAR 4 SIGNALS AN INFLECTION POINT WHERE NEAR-FRONTIER QUALITY MAY BE PRACTICAL ON HIGH-END LOCAL MACHINES. OPEN SOURCE FACES VULNERABILITY FLOOD - METABASE WARNS LLM-ASSISTED SECURITY SCANNING IS SHARPLY INCREASING VULNERABILITY REPORT VOLUME AND QUALITY, CHANGING RESPONSIBLE DISCLOSURE TIMELINES AND PUSHING MAINTAINERS TOWARD FASTER PATCHING AND STRONGER DEPENDENCY HYGIENE. CONNECTED CAR PRIVACY HARDWARE MODS - A TOYOTA OWNER REMOVED THE CELLULAR MODEM AND GPS TO STOP TELEMETRY, ILLUSTRATING THE PRIVACY VS. SAFETY TRADEOFFS OF CONNECTED VEHICLES AND RAISING RIGHT-TO-REPAIR AND DATA-COLLECTION CONCERNS. UK REPLACES PALANTIR REFUGEE SYSTEM - THE UK GOVERNMENT SAYS IT SAVED MILLIONS BY REPLACING A PALANTIR FOUNDRY-BASED PLATFORM WITH AN IN-HOUSE SYSTEM FOR THE HOMES FOR UKRAINE PROGRAM—FUELING THE DEBATE OVER PROCUREMENT, LOCK-IN, AND “SOVEREIGN TECH.” WIKIPEDIA AS A FILE EXPLORER - WIKIPEDIA FILE EXPLORER REIMAGINES WIKIMEDIA BROWSING AS A DESKTOP-STYLE FOLDER SYSTEM, MAKING DISCOVERY MORE INTUITIVE WHILE REVEALING GAPS IN CATEGORIZATION AND METADATA. STEVE JOBS, NEXT, AND APPLE - AN IEEE SPECTRUM INTERVIEW ARGUES STEVE JOBS’ NEXT YEARS SHAPED APPLE’S LATER SUCCESS, AND FRAMES THOSE LESSONS AGAINST A RUMORED APPLE CEO TRANSITION AND THE COMPANY’S POSITIONING ON AI. -Pure OCaml CCSDS Stack Goes Live in Orbit with Encrypted Bundles and Post-Quantum Rekeying [https://gazagnaire.org/blog/2026-05-14-borealis.html] -New Web Tool Lets Users Browse Wikipedia and Wikimedia Commons Like Files and Folders [https://explorer.samismith.com/] -whichllm CLI ranks the best local LLMs for your hardware using recency-aware benchmarks [https://github.com/Andyyyy64/whichllm] -New Book Recasts Steve Jobs’s NeXT Years as the Blueprint for Modern Apple [https://spectrum.ieee.org/steve-jobs-next-computer] -Metabase Warns LLM-Powered Scanners Are ‘Strip Mining’ Open Source for Vulnerabilities [https://www.metabase.com/blog/strip-mining-era-of-open-source-security] -SigNoz Lists New Hiring Openings Across Engineering, Growth, and Customer Success [https://signoz.io/careers] -RAV4 Owner Removes Cellular Modem and GPS to Stop Vehicle Telemetry [https://arkadiyt.com/2026/05/13/removing-the-modem-and-gps-from-my-rav4/] -UK replaces Palantir in Homes for Ukraine system, citing millions in savings [https://www.bbc.com/news/articles/c2l2j1lxdk5o] -github.com [https://github.com/GlycemicGPT/GlycemicGPT] -Antirez on DS4’s Rapid Rise and the Push Toward Serious Local AI [https://antirez.com/news/165] Episode Transcript Post-quantum crypto in orbit In space and security news, an OCaml implementation of parts of the CCSDS space communications stack—codenamed Borealis—has reportedly booted and started operating in low Earth orbit aboard DPhi Space’s ClusterGate‑2 hosted payload module. The interesting angle isn’t just “a new protocol stack in space.” It’s the security posture: Borealis treats its communications link like a delay‑tolerant network, wrapping traffic into BPv7 bundles, and protecting it with BPSec encryption and authentication. Why does that matter? Hosted payloads are essentially multi‑tenant compute in orbit. If you’re running alongside other software on shared satellite hardware, you have to assume isolation can fail—especially when Linux kernel privilege escalation and container escape bugs keep showing up, and patching in orbit is slow, risky, or sometimes impossible. The project is betting that memory-safe OCaml plus strong cryptography reduces the blast radius if anything goes sideways. And the headline-worthy claim: Borealis includes over‑the‑air rekeying for long‑lived post‑quantum signing keys—specifically ML‑DSA‑65. If this is indeed the first publicly described in‑orbit post‑quantum OTAR demo, it’s a meaningful marker that “future-proof” crypto isn’t just a lab exercise anymore—it’s being tested where recovery is hardest: in space. Local LLM selection and tooling Staying with the “secure software meets real-world constraints” theme, the Borealis author also previewed a planned move to Jane Street’s OxCaml to reduce latency jitter on packet dispatch paths. That’s a reminder of a practical truth: in embedded and space systems, it’s not enough to be correct—you also need predictable performance. If shifting allocation strategies can cut tail latency and reduce garbage collection hiccups, that can translate into fewer missed windows and more reliable operations over noisy links. The broader story here is that satellite payload software is slowly adopting cloud-style thinking: tighter security boundaries, better key management, and operational designs that assume things will break—but aim to fail safely. Open source faces vulnerability flood On local AI, a new open-source command-line tool called whichllm is taking on a problem a lot of people quietly struggle with: choosing a local model that actually runs well on your machine and still delivers good results. The local LLM world is overflowing with variants, quantizations, and benchmark claims—and “pick the biggest model that fits in VRAM” often leads to a sluggish setup or disappointing output. What makes this approach notable is the emphasis on practical scoring: it tries to account for the real memory costs that show up at runtime, and it discounts stale or low-confidence benchmark data, so older leaderboard results don’t dominate the rankings forever. If that works as advertised, it nudges local AI toward something more like an engineering decision—fit, speed, quality, evidence—rather than a guessing game driven by hype. And importantly, it points to a bigger shift: local AI is maturing from hobby tinkering to repeatable workflows that teams can script, audit, and standardize. Connected car privacy hardware mods Related to that, Redis creator Salvatore Sanfilippo—better known as antirez—wrote about his local AI project DwarfStar 4 gaining unexpected momentum. The key claim is simple but provocative: this is the first time he’s been able to rely on a local model for serious tasks he’d normally send to cloud LLMs. The timing, he argues, is about models finally getting fast enough—plus quantization techniques that make bigger capabilities feasible on high-end personal machines. Whether you buy the specific branding or not, the signal is interesting: we may be entering an era where “local-first AI” isn’t just about privacy or offline use. It’s about a credible alternative to hosted services for a meaningful slice of work—especially for developers who want control over cost, data exposure, and latency. If local inference keeps improving, it could reshape everything from developer tooling to compliance-heavy industries that have been hesitant to put sensitive data into third-party AI APIs. UK replaces Palantir refugee system Now to open source security—where the tone is a bit more ominous. Metabase published a post warning that LLM-powered security scanning is rapidly increasing both the volume and usefulness of vulnerability reports. Their claim is that what used to be a trickle of mostly low-quality submissions has turned into a steady stream, and many findings are legitimate. The underlying dynamic is worth paying attention to: once automated tools can read a repository like a human would—understand patterns, trace flows, spot footguns—public code becomes a mineable resource. Not in the sense of stealing it, but in the sense of repeatedly extracting new layers of vulnerabilities with enough compute and persistence. Why does that matter? It shifts the practical meaning of responsible disclosure. If one scanner can find a bug today, a dozen others may find it tomorrow. That compresses patch timelines, increases maintainer stress, and may push some commercial open source teams toward closing code—while smaller, volunteer-run projects get squeezed the hardest. For everyone who depends on open source, the implication is clear: assume more frequent disclosures, invest in fast upgrades, and reduce impact with least-privilege setups and solid logging—because “we’ll patch next quarter” is going to age badly in this environment. Wikipedia as a file explorer On consumer privacy, a security blogger described physically removing the cellular modem module and built-in GPS from a 2024 Toyota RAV4 Hybrid to stop the vehicle from transmitting telemetry. That’s an extreme move, but it puts the tradeoffs in sharp focus. Modern cars can collect sensitive data—location, driving behavior, and potentially audio or camera-derived signals depending on the model and configuration. The author’s point is that even if you trust the manufacturer today, breaches happen, policies change, and data-sharing arrangements aren’t always obvious. But the other side of the ledger is real: removing connectivity can break cloud services, disable over-the-air updates, and even impact emergency calling features. That turns privacy into a safety and maintenance decision, not just a preference toggle. The bigger takeaway is that “right to repair” is becoming “right to control data.” As vehicles become more software-defined, policy and design choices will determine whether owners can meaningfully opt out—or whether connectivity becomes mandatory by default. Steve Jobs, NeXT, and Apple In government tech, the UK says it’s saving millions of pounds a year by replacing a Palantir-built platform used for the Homes for Ukraine refugee housing scheme with a system developed in-house. Palantir initially provided a Foundry-based solution quickly—starting free—then the contracts grew into multi-million-pound deals. A National Audit Office report raised concerns about procurement dynamics and the desire to avoid dependency. According to officials, the replacement has been live since September 2025, and they’re framing it as more flexible, more secure, and—crucially—giving the department greater control over data and code. Why this matters beyond one project: governments everywhere are wrestling with vendor lock-in, especially with high-leverage platforms that can become hard to unwind once operational processes depend on them. This story is being used to argue for “sovereign technology”—not necessarily rejecting US vendors outright, but proving that exits are possible and that internal capability can be a strategic asset, not just a cost center. Story 8 For something lighter—Wikipedia browsing, reimagined. A project called Wikipedia File Explorer turns Wikipedia and Wikimedia Commons into a desktop-style file explorer. Categories become folders, articles open like documents, and media browsing feels closer to rummaging through a well-organized drive than clicking around a web of links. It’s a small UI twist, but it highlights an important idea: discovery is a product feature, even for public knowledge. A more visual, exploratory interface can make Wikipedia feel less like a reference book and more like a place to wander—potentially lowering the barrier for new contributors who don’t already know where to start. The project also exposes Wikipedia’s limits: not everything is categorized well, and missing metadata becomes painfully obvious when you try to navigate it like a file system. That’s a good reminder that information architecture—categories, tags, structure—is part of the infrastructure of knowledge. Story 9 And finally, a bit of tech history with present-day implications. IEEE Spectrum interviewed journalist Geoffrey Cain about a forthcoming book arguing that Steve Jobs’ years running NeXT—from 1985 to 1997—weren’t a footnote, but a training ground that shaped what he later did at Apple. The claim is that the popular narrative—Jobs gets fired, disappears, returns fully formed—is too neat. At NeXT, he made expensive mistakes, learned market discipline, and ultimately shifted toward the strategic value of software over hardware bets. NeXT’s software work, including tools that influenced modern Apple operating systems, becomes the connective tissue in that story. What makes this feel timely is the framing against reports of an eventual Apple CEO transition and the question of what “the next era” looks like for a company already operating at massive scale. Cain’s angle suggests Apple may lean into its hardware strengths while embedding AI more quietly—less as a headline and more as a baseline capability. Whether or not that prediction holds, it’s a useful lens: big tech companies rarely reinvent themselves with a single breakthrough moment. The groundwork—tools, platforms, operational lessons—often gets laid in the years people later describe as the detour. Subscribe to edition specific feeds: - Space news * Apple Podcast English [https://apple.co/4cLLrdt] * Spotify English [https://spoti.fi/4jN8Dui] * RSS English [https://bit.ly/the_automated_daily_space] Spanish [https://theautomateddaily.com/space_es/feed.xml] French [https://theautomateddaily.com/space_fr/feed.xml] - Top news * Apple Podcast English [https://apple.co/3PTvdUF] Spanish [https://apple.co/3ECCMgk] French [https://apple.co/4hmcxbB] * Spotify English [https://spoti.fi/3ZYXAW2] Spanish [https://spoti.fi/414h4JD] French [https://spoti.fi/3Di0jDe] * RSS English [https://bit.ly/the_automated_daily_news] Spanish [https://bit.ly/the_automated_daily_news_es] French [https://bit.ly/the_automated_daily_news_fr] - Tech news * Apple Podcast English [https://apple.co/3RYWbg4] Spanish [https://apple.co/4i0WqRM] French [https://apple.co/4bEAXMm] * Spotify English [https://spoti.fi/3S089pG] Spanish [https://spoti.fi/3EE2Fwv] Spanish [https://spoti.fi/3DlObRE] * RSS English [https://bit.ly/the_automated_daily_tech] Spanish [https://bit.ly/the_automated_daily_tech_es] French [https://bit.ly/the_automated_daily_tech_fr] - Hacker news * Apple Podcast English [https://apple.co/48QWyzj] Spanish [https://apple.co/4ke9jtE] French [https://apple.co/41E1qFd] * Spotify English [https://spoti.fi/45zD1kf] Spanish [https://spoti.fi/4hF8h81] French [https://spoti.fi/3QY26Ak] * RSS English [https://bit.ly/the_automated_daily_hacker_news] Spanish [https://bit.ly/the_automated_daily_hacker_news_es] French [https://bit.ly/the_automated_daily_hacker_news_fr] - AI news * Apple Podcast English [https://apple.co/3M6Tg1o] Spanish [https://apple.co/4315L7Y] French [https://apple.co/3DkZbPb] * Spotify English [https://spoti.fi/3tzOfrz] Spanish [https://spoti.fi/416m40q] French [https://spoti.fi/41HuJGW] * RSS English [https://bit.ly/the_automated_daily_hackernews_ai] Spanish [https://bit.ly/the_automated_daily_hackernews_es_ai] French [https://bit.ly/the_automated_daily_hackernews_fr_ai] Visit our website at https://theautomateddaily.com/ [ https://theautomateddaily.com/] Send feedback to feedback@theautomateddaily.com Youtube [https://www.youtube.com/@TheAutomatedDaily] LinkedIn [https://www.linkedin.com/in/the-automated-daily/] X (Twitter) [https://x.com/automated_daily]

Gisteren10 min
aflevering Apple’s $599 iPhone-chip MacBook & Anonymous DNS via ODoH - Hacker News (May 14, 2026) artwork

Apple’s $599 iPhone-chip MacBook & Anonymous DNS via ODoH - Hacker News (May 14, 2026)

Please support this podcast by checking out our sponsors: - Discover the Future of AI Audio with ElevenLabs - https://try.elevenlabs.io/tad [https://try.elevenlabs.io/tad] - Prezi: Create AI presentations fast - https://try.prezi.com/automated_daily [https://try.prezi.com/automated_daily] - Invest Like the Pros with StockMVP - https://www.stock-mvp.com/?via=ron [https://www.stock-mvp.com/?via=ron] Support The Automated Daily directly: Buy me a coffee: https://buymeacoffee.com/theautomateddaily [https://buymeacoffee.com/theautomateddaily] TODAY'S TOPICS: APPLE’S $599 IPHONE-CHIP MACBOOK - APPLE’S MACBOOK NEO USES THE A18 PRO IPHONE CHIP AT $599, WITH STRONG SHORT-BURST SPEED BUT STEEP THERMAL THROTTLING AND TIGHT 8GB UNIFIED MEMORY LIMITS. ANONYMOUS DNS VIA ODOH - NUMA V0.14 SHIPS AN OBLIVIOUS DNS OVER HTTPS (ODOH) CLIENT PLUS RELAY, IMPROVING DNS PRIVACY BY SPLITTING WHO SEES YOUR IP VERSUS YOUR QUERY AND EXPANDING RELAY DIVERSITY. THE /DEV/URANDOM MYTH PERSISTS - A DEEP DIVE ARGUES /DEV/URANDOM IS TYPICALLY SAFE FOR CRYPTOGRAPHY, WHILE /DEV/RANDOM’S BLOCKING CAN HARM RELIABILITY AND PUSH BAD SECURITY WORKAROUNDS—ESPECIALLY OUTSIDE EARLY-BOOT EDGE CASES. LINUX GAMING BREAKS 5% STEAM - STEAM’S MARCH 2026 DATA SHOWS LINUX SURPASSING 5% SHARE, WITH KERNEL-LEVEL NTSYNC REDUCING WINE/PROTON COMPATIBILITY FRICTION AND MAKING MORE WINDOWS GAMES FEEL STABLE ON LINUX. WINDOWS 7 LOOK ON WINDOWS 10 - CLASSIC 7 RE-SKINS WINDOWS 10 IOT ENTERPRISE LTSC TO MIMIC WINDOWS 7, REFLECTING ONGOING DEMAND FOR FAMILIAR UI WHILE RAISING QUESTIONS ABOUT MAINTENANCE, TRUST, AND LONG-TERM SUPPORT. CLASSIC GAME REVIVED IN BROWSER - A SCORCHED EARTH 2000 HTML PORT APPEARS TO BE RUNNING IN-BROWSER, AND ITS EXPOSED DEBUG CONSOLE HINTS AT ACTIVE DEVELOPMENT AND THE CONTINUING APPEAL OF PRESERVING CLASSIC GAMES ON THE WEB. FREE U.S. LOCALITY DOMAIN NAMES - A GUIDE DOCUMENTS HOW TO REGISTER CERTAIN CITY.STATE.US LOCALITY DOMAINS FOR FREE, REVEALING LEGACY .US DELEGATION RULES, MANUAL APPROVALS, AND THE PRACTICAL HURDLES OF OLD-SCHOOL DNS ADMINISTRATION. BARLOW ON THE EARLY INTERNET - JOHN PERRY BARLOW’S ESSAY FRAMES CYBERSPACE AS A NEW FRONTIER AND EXPLAINS WHY GROUPS LIKE EFF FORMED—HIGHLIGHTING HOW ARCHITECTURE, NOT JUST LAW, SHAPES PRIVACY AND SPEECH ONLINE. KOROWAI TREE HOUSES AND MEDIA - A REPORTED TRIP TO PAPUA SHOWS HOW KOROWAI TREE HOUSES BECAME A FEEDBACK LOOP BETWEEN TOURISM AND WESTERN MEDIA, A CASE STUDY IN HOW NARRATIVES CAN RESHAPE THE REALITY THEY CLAIM TO DOCUMENT. -Anthropic Launches Claude for Small Business With Integrations and Ready-Made Workflows [https://www.anthropic.com/news/claude-for-small-business] -Numa v0.14 Ships ODoH Client and Relay in One Binary to Enable Account-Free Anonymous DNS [https://numa.rs/blog/posts/odoh-anonymous-dns-without-an-account.html] -Article Debunks Persistent Myths About /dev/urandom vs /dev/random [https://www.2uo.de/myths-about-urandom/] -Scorched Earth 2000 HTML Port Displays In-Game Debug Snapshot [http://www.scorch2000.com/web/] -Linux Kernel Adds Windows-Style Sync Features to Boost Proton Gaming Performance [https://www.xda-developers.com/linux-gaming-is-getting-faster-because-windows-apis-are-becoming-linux-kernel-features/] -Classic 7 Project Recreates a Windows 7-Like Experience on Windows 10 LTSC [https://classic7.lol/] -Robert Moor’s Journey to Papua and the Tourist-Made Myth of Korowai Tree Houses [https://www.laphamsquarterly.org/roundtable/tree-house] -Guide Shows How to Register Free U.S. Locality Domains Under *.city.state.us [https://fredchan.org/blog/locality-domains-guide/] -John Perry Barlow on Leaving the Physical World for Cyberspace [https://www.eff.org/pages/leaving-physical-world] -MacBook Neo Analysis: A18 Pro Brings Fast Bursts but Sharp Throttling, 8GB Limit [https://www.jdhodges.com/blog/macbook-neo-benchmarks-analysis/] Episode Transcript Apple’s $599 iPhone-chip MacBook First up: Apple’s newest budget play, the MacBook Neo. The headline is simple—$599, and instead of an M‑series chip, Apple used the A18 Pro from the iPhone 16 Pro. On quick, interactive tasks, that looks clever: single-core bursts can be genuinely snappy, sometimes even flattering in benchmarks. But the more interesting part is sustained performance. In a fanless design, this machine reportedly runs full tilt for about a minute, then hits a major slowdown once heat soaks in—so big jobs like long builds, exports, or extended GPU-heavy workloads can turn into a slog. Why it matters: it’s a reminder that “fast” depends on time. Apple’s also showing how supply chain strategy can shape product design—reusing mature iPhone silicon at massive scale to hit a price point, while memory constraints and a broader DRAM squeeze reshape what “entry-level” means in 2026. Anonymous DNS via ODoH Staying with infrastructure and performance—but on the other side of the stack—Linux gaming just crossed a psychological milestone. Steam’s March 2026 numbers put Linux over 5% of users for the first time. Some of that is the Steam Deck continuing to normalize Linux as a gaming platform, and some is Windows 10 end-of-support pressure nudging people to reconsider their setups. The more technical angle in today’s discussion is NTSYNC, a Linux kernel driver that implements Windows-style synchronization primitives more natively. Why it matters: compatibility layers like Wine and Valve’s Proton have long carried the burden of making Windows games run well. Moving certain behaviors into the kernel can reduce weird edge cases—stutters, deadlocks, or the “this one game is cursed” effect. The payoff may be modest for many titles, but for the games that struggled before, stability improvements are exactly what turns a curiosity into a real platform choice. The /dev/urandom myth persists And if you’re the kind of person who wants the future… but with the past’s interface, there’s a Windows story too. A fan-made project called Classic 7 aims to recreate the Windows 7 experience on top of Windows 10 IoT Enterprise LTSC 2021—visuals, UI behavior, even pieces of the old vibe like Aero-like styling and media-era nostalgia. Why it matters: whether you call it comfort, productivity, or muscle memory, there’s persistent demand for classic UI patterns. It also highlights an ongoing tension: people want modern security and app compatibility, but they don’t want every workflow reimagined. Projects like this fill that gap—while also reminding everyone to think carefully about trust, updates, and what you’re installing when you step outside official channels. Linux gaming breaks 5% Steam From operating systems to browser nostalgia: an HTML port of the classic artillery game Scorched Earth 2000 appears to be live—though what’s surfaced is a debug-heavy view rather than a polished announcement. Even in that form, it’s a neat snapshot of how preservation often happens: not as a grand release, but as something running, iterating, and slowly getting sanded down from “developer console chaos” into something people can actually play. Why it matters: the web remains one of the best distribution platforms for keeping older games accessible, especially when original binaries and platforms age out. The challenge is less about raw compute now, and more about long-term maintainability—keeping old ideas playable in new environments. Windows 7 look on Windows 10 Now, let’s pivot to privacy—starting with DNS, the part of the internet that quietly reveals far more about you than most people realize. Numa v0.14 adds support for Oblivious DNS over HTTPS, or ODoH. The core idea is splitting knowledge so no single party can easily tie “who you are” to “what you looked up.” The relay sees your IP address but not your DNS query in plaintext; the target resolver sees the query but only the relay’s IP. Why it matters: ODoH has been stuck in a chicken-and-egg problem—too few relays to create meaningful diversity, and not enough users to justify more relays. Shipping a usable relay, and focusing on practical hardening like hostname validation and avoiding single-operator pairing, helps make the ecosystem less theoretical and more deployable. It won’t magically erase tracking, but it meaningfully raises the bar for passive correlation. Classic game revived in browser And while we’re talking about security: there’s a myth-busting piece making the rounds again—/dev/urandom versus /dev/random. The argument is that the popular fear—“/dev/urandom is unsafe”—is mostly outdated in practice on modern Unix-like systems. Both interfaces draw from the kernel’s cryptographically secure PRNG; the big behavioral difference is that /dev/random can block when the kernel thinks entropy is low, while /dev/urandom does not. Why it matters: blocking sounds safer, but availability is part of security. If a system hangs during startup or under load, engineers will route around it—sometimes in ways that genuinely reduce safety. The real risks are more specific: early-boot entropy issues, VM cloning, and snapshots that replicate RNG state. The fix there is better seeding and operational hygiene, not simply swapping one device file for another and hoping for “truer randomness.” Free U.S. locality domain names Next: a bit of Internet archaeology with real-world usefulness. A guide explains that certain U.S. “locality domains” under .us—think city and state style domains—can still be registered for free under a system that dates back to the early 1990s. The catch is that it’s not a slick modern checkout flow. It’s eligibility rules, delegated zone managers, manual review, and, importantly, you typically need to show up with working authoritative nameservers before you can even apply. Why it matters: this is a reminder that the internet isn’t one unified, modern platform—it’s layers of policy, contracts, legacy delegation, and human processes that never quite got replaced. For civic projects, local groups, or community services, a meaningful geographic domain can be valuable branding. But the bureaucracy and constraints also explain why most people never discover this path. Barlow on the early Internet Two readings today broaden the lens beyond day-to-day engineering. First, an essay by John Perry Barlow—written for a conference in Japan—about his shift from rural Wyoming life into what he called “Cyberspace,” and how early online communities shaped his thinking. He frames the network as a new frontier with unclear norms, and he connects that to why digital rights groups like the EFF emerged: because the architecture of the internet can decide what privacy and free expression look like in practice. Why it matters: it’s an early articulation of a debate we’re still having—whether rights online are mainly a legal issue or a systems design issue. His core warning holds up: when borders get fuzzy, power often moves into the infrastructure. Korowai tree houses and media And finally, a reported piece about the Korowai of Papua and the famous tree houses that captured Western imagination through iconic photography. The writer describes traveling to see these structures firsthand and discovering a more complicated reality: rapid change driven by settlement programs, missionaries, and cash economies—and also a feedback loop where the most dramatic tree houses are sometimes built to meet tourist and media expectations. The “image” influences the behavior, and the behavior reinforces the image. Why it matters: it’s a clean case study in how stories, incentives, and outside attention can reshape the thing being documented. In tech terms, it’s the social version of an algorithmic loop—except the stakes are culture, identity, and autonomy rather than engagement metrics. Subscribe to edition specific feeds: - Space news * Apple Podcast English [https://apple.co/4cLLrdt] * Spotify English [https://spoti.fi/4jN8Dui] * RSS English [https://bit.ly/the_automated_daily_space] Spanish [https://theautomateddaily.com/space_es/feed.xml] French [https://theautomateddaily.com/space_fr/feed.xml] - Top news * Apple Podcast English [https://apple.co/3PTvdUF] Spanish [https://apple.co/3ECCMgk] French [https://apple.co/4hmcxbB] * Spotify English [https://spoti.fi/3ZYXAW2] Spanish [https://spoti.fi/414h4JD] French [https://spoti.fi/3Di0jDe] * RSS English [https://bit.ly/the_automated_daily_news] Spanish [https://bit.ly/the_automated_daily_news_es] French [https://bit.ly/the_automated_daily_news_fr] - Tech news * Apple Podcast English [https://apple.co/3RYWbg4] Spanish [https://apple.co/4i0WqRM] French [https://apple.co/4bEAXMm] * Spotify English [https://spoti.fi/3S089pG] Spanish [https://spoti.fi/3EE2Fwv] Spanish [https://spoti.fi/3DlObRE] * RSS English [https://bit.ly/the_automated_daily_tech] Spanish [https://bit.ly/the_automated_daily_tech_es] French [https://bit.ly/the_automated_daily_tech_fr] - Hacker news * Apple Podcast English [https://apple.co/48QWyzj] Spanish [https://apple.co/4ke9jtE] French [https://apple.co/41E1qFd] * Spotify English [https://spoti.fi/45zD1kf] Spanish [https://spoti.fi/4hF8h81] French [https://spoti.fi/3QY26Ak] * RSS English [https://bit.ly/the_automated_daily_hacker_news] Spanish [https://bit.ly/the_automated_daily_hacker_news_es] French [https://bit.ly/the_automated_daily_hacker_news_fr] - AI news * Apple Podcast English [https://apple.co/3M6Tg1o] Spanish [https://apple.co/4315L7Y] French [https://apple.co/3DkZbPb] * Spotify English [https://spoti.fi/3tzOfrz] Spanish [https://spoti.fi/416m40q] French [https://spoti.fi/41HuJGW] * RSS English [https://bit.ly/the_automated_daily_hackernews_ai] Spanish [https://bit.ly/the_automated_daily_hackernews_es_ai] French [https://bit.ly/the_automated_daily_hackernews_fr_ai] Visit our website at https://theautomateddaily.com/ [ https://theautomateddaily.com/] Send feedback to feedback@theautomateddaily.com Youtube [https://www.youtube.com/@TheAutomatedDaily] LinkedIn [https://www.linkedin.com/in/the-automated-daily/] X (Twitter) [https://x.com/automated_daily]

14 mei 20268 min
aflevering Static x86 to ARM translation & Europe-first digital sovereignty stack - Hacker News (May 13, 2026) artwork

Static x86 to ARM translation & Europe-first digital sovereignty stack - Hacker News (May 13, 2026)

Please support this podcast by checking out our sponsors: - Prezi: Create AI presentations fast - https://try.prezi.com/automated_daily [https://try.prezi.com/automated_daily] - Effortless AI design for presentations, websites, and more with Gamma - https://try.gamma.app/tad [https://try.gamma.app/tad] - KrispCall: Agentic Cloud Telephony - https://try.krispcall.com/tad [https://try.krispcall.com/tad] Support The Automated Daily directly: Buy me a coffee: https://buymeacoffee.com/theautomateddaily [https://buymeacoffee.com/theautomateddaily] TODAY'S TOPICS: STATIC X86 TO ARM TRANSLATION - AN ARXIV PAPER UNVEILS ELEVATOR, A STATIC BINARY TRANSLATION SYSTEM THAT CONVERTS X86-64 EXECUTABLES TO AARCH64 WITHOUT SOURCE OR SYMBOLS, ENABLING PRE-DEPLOYMENT TESTING, CERTIFICATION, AND SIGNING. EUROPE-FIRST DIGITAL SOVEREIGNTY STACK - A DETAILED MIGRATION STORY SHOWS HOW SWAPPING US CLOUD AND SAAS TOOLS FOR EUROPEAN AND SWISS PROVIDERS IMPROVES DATA JURISDICTION CONTROL, REDUCES VENDOR DEPENDENCE, AND MAKES “VALUES-BASED” INFRASTRUCTURE PRACTICAL. OPEN-SOURCE BAMBU PRINTER CONNECTIVITY - A NEW FORK OF ORCASLICER RESTORES FULL BAMBUNETWORK REMOTE PRINTING FOR BAMBU LAB PRINTERS, HIGHLIGHTING THE ONGOING TUG-OF-WAR BETWEEN VENDOR LOCK-DOWNS AND COMMUNITY-DRIVEN DEVICE CONTROL. SEAWATER ELECTROLYSIS STAINLESS BREAKTHROUGH - RESEARCHERS REPORT SS-H2, A STAINLESS STEEL ALLOY WITH DUAL-PASSIVATION THAT SURVIVES HARSH SEAWATER ELECTROLYSIS VOLTAGES—POTENTIALLY LOWERING GREEN HYDROGEN COSTS BY REPLACING TITANIUM COMPONENTS. PIXTER HANDHELD PRESERVATION AND EMULATION - A REVERSE-ENGINEERING EFFORT DOCUMENTS FISHER-PRICE/MATTEL PIXTER HARDWARE, DUMPS ROMS AND CARTRIDGES, AND DELIVERS WORKING EMULATORS—PRESERVING EARLY-2000S KIDS’ SOFTWARE THAT WAS CLOSE TO VANISHING. TINY ON-DEVICE FUNCTION-CALLING AI - NEEDLE IS AN OPEN 26M-PARAMETER MODEL DISTILLED FROM GEMINI AIMED AT RELIABLE SINGLE-SHOT FUNCTION CALLING ON SMALL DEVICES, PUSHING PRIVATE, LOW-LATENCY TOOL USE CLOSER TO PHONES AND EDGE HARDWARE. BELL LABS UNSUNG OPERATIONS WORK - A FIRST-PERSON BELL LABS INTERVIEW SPOTLIGHTS APPLIED OPERATIONS RESEARCH—INVENTORY CONTROL, PBX SIMULATION, AND PRACTICAL TOOLING—SHOWING HOW DISCIPLINED OPTIMIZATION KEPT TELECOM SYSTEMS EFFICIENT. WHY SCI-FI FONTS LOOK FUTURISTIC - A TYPOGRAPHY PIECE EXPLAINS THE REPEATABLE VISUAL CUES—SLANTS, CUTS, TIGHT KERNING, METALLIC GLOW—THAT INSTANTLY SIGNAL “THE FUTURE,” REVEALING HOW SCI-FI DESIGN HAS BECOME A CODIFIED SHORTHAND. -Author Migrates Digital Infrastructure to European Providers to Boost Digital Sovereignty [https://monokai.com/articles/how-i-moved-my-digital-stack-to-europe/] -Elevator proposes deterministic static x86-64 to AArch64 whole-program translation without heuristics [https://arxiv.org/abs/2605.08419] -OrcaSlicer Fork Releases With Restored BambuNetwork Remote Printing for Bambu Lab Printers [https://github.com/FULU-Foundation/OrcaSlicer-bambulab] -HKU Develops Dual-Passivation Stainless Steel for Seawater Hydrogen Electrolyzers [https://www.sciencedaily.com/releases/2026/05/260510030950.htm] -Reverse Engineering Brings Full Emulation and Preservation to Fisher-Price Pixter Devices [https://dmitry.gr/] -Google Teases AI-Focused Googlebook Laptops Powered by Gemini, Due Fall 2026 [https://googlebook.google/] -Substrate seeks Technical Success Manager to scale AI-driven healthcare billing operations [https://www.ycombinator.com/companies/substrate/jobs/T2fMBhD-technical-success-manager] -Cactus Compute Open-Sources Needle, a 26M-Parameter On-Device Function-Calling Model [https://github.com/cactus-compute/needle] -Inside Bell Labs’ Applied Division: The Unglamorous Work Behind Telecom Innovation [https://acesounderglass.com/2025/11/15/the-boring-part-of-bell-labs/] -Six Common Typography Tricks Films Use to Make Text Look ‘Futuristic’ [https://typesetinthefuture.com/2016/02/18/futuristic/] Episode Transcript Static x86 to ARM translation Let’s begin with research that could reshape how we move software across CPU architectures. A new arXiv paper introduces “Elevator,” a static binary translation system that converts complete x86-64 executables into AArch64 binaries—without needing source code, symbols, or convenient assumptions about how the original binary is laid out. What makes it stand out is the philosophy: instead of guessing what ambiguous bytes mean and patching things up at runtime, Elevator explores the plausible interpretations ahead of time and keeps multiple paths when necessary, only discarding paths that would clearly crash. The payoff is big for security and compliance-minded environments: the resulting ARM binary is fully determined before deployment, so you can test and validate the exact code that will execute, then sign it. The cost is larger output binaries, but the paper claims performance that can compete with, or even beat, established dynamic approaches like user-mode QEMU—while shrinking the runtime “translator” surface area you’d otherwise have to trust. Europe-first digital sovereignty stack Staying with the theme of control and trust, another popular story is a first-person account of migrating a personal and business “digital stack” away from mostly US-based services and toward European—often Swiss—providers to improve digital sovereignty. This isn’t framed as anti-American tech; it’s about jurisdiction, policy risk, and reducing the chance that a vendor decision or legal shift suddenly changes the rules for your data. The author swapped Google Analytics for a self-hosted Matomo setup, moved email and password management into Proton’s ecosystem, and shifted compute and storage off US clouds and onto providers like Scaleway and OVH. They also replaced several developer-facing building blocks—transactional email, error tracking, even some OpenAI API usage—arguing that Europe’s ecosystem is more mature than many people assume. What’s most useful here is the realism: they kept exceptions where network effects and feature gaps still dominate, like Cloudflare for edge security and Stripe for payments, plus some US-based AI tooling. The broader takeaway is that “values-based infrastructure” is no longer a purely ideological slogan—it can be a manageable, mostly planning-heavy project that results in a professional, reliable setup. Open-source Bambu printer connectivity On the maker and device-control front, there’s a new fork of OrcaSlicer from the FULU Foundation aimed at restoring full BambuNetwork support for Bambu Lab 3D printers—specifically, remote printing over the internet instead of being restricted to LAN-only use. This matters because it sits right at the intersection of convenience, ownership, and security. Remote printing is a major workflow feature for many people, but it also raises questions about who controls the connectivity layer—users, the vendor, or the community. The project is early, but the intent is clear: bring back a prior “normal” workflow that some users feel was taken away. Expect plenty of debate around tradeoffs—because the same features that add convenience can also expand the attack surface if they’re not designed carefully. Seawater electrolysis stainless breakthrough Now to energy and materials science: researchers at the University of Hong Kong report a new stainless steel alloy, SS-H2, designed for the punishing conditions of seawater electrolysis for green hydrogen. The headline is durability. Seawater is corrosive, and the voltages involved in splitting water can destroy conventional stainless steel protection layers. This team claims their alloy forms a second protective layer at higher electrical potentials—driven by manganese—which is surprising because manganese is usually associated with worse corrosion resistance in stainless steel. If this holds up in real industrial designs, it could reduce cost by letting electrolyzers use cheaper, easier-to-manufacture stainless components instead of relying on expensive titanium in key places. The group says they’ve moved toward commercialization with patents and pilot-scale wire production, though turning that into full electrolyzer parts is still an engineering journey. Still, it’s a notable example of “boring” materials breakthroughs unlocking practical climate-tech gains. Pixter handheld preservation and emulation One of the most delightful preservation stories today comes from a reverse-engineering project focused on Fisher-Price and Mattel’s Pixter handhelds. The author describes what may be the first comprehensive effort to document the Pixter line—hardware, ROM and cartridge dumping, and emulators spanning multiple generations. Why it matters: Pixter wasn’t just a toy; it’s a time capsule of early-2000s kids’ software, custom cartridge ecosystems, and quirky hardware design. And it had a reputation for being hard to emulate and poorly documented. The project uncovered that many games run on custom virtual machines rather than native code, and it tackled unusual hurdles like preserving cartridge audio that relied on separate “melody chip” blobs. The end result—open tools and emulators—means this ecosystem doesn’t have to disappear as aging devices and cartridges fail. It’s a reminder that digital history isn’t only about famous consoles; it’s also about the everyday tech a generation grew up with. Tiny on-device function-calling AI In AI, there’s a smaller-is-the-new-useful story: Cactus Compute released “Needle,” an open 26-million-parameter model designed mainly for reliable, single-shot function calling on very small devices. The significance isn’t that it’s a general-purpose chatbot. It’s that it aims to do one job—tool use—predictably, in a footprint that starts to make on-device assistants and local automation feel more realistic on constrained hardware. And because the weights and dataset-generation tooling are open, developers can inspect it, tune it, and test how it behaves in their own environments. If this trend continues, we’ll likely see more AI components that are narrow, auditable, and fast—rather than one giant model trying to be everything. Bell Labs unsung operations work Two culture-and-craft notes to close. First, a first-person interview with a Bell Labs veteran highlights the applied, less-glamorous side of the legendary institution—work like PBX simulations, inventory control for expensive circuit packs, and practical tools that helped teams make decisions before modern software was everywhere. The story is a good counterweight to the usual Bell Labs mythology: breakthroughs mattered, but so did rigorous operations research and the day-to-day optimization that kept enormous systems reliable and affordable. And finally, a typography piece breaks down why sci-fi logos so often look the same. It argues there are familiar visual cues—slanted forms, sharp cuts, fused letters, missing strokes, metallic textures—that instantly communicate “the future,” even when the underlying design is pretty conventional. It’s interesting because it frames futuristic type not as prophecy, but as a shared design language that’s become a shortcut for genre signaling. Subscribe to edition specific feeds: - Space news * Apple Podcast English [https://apple.co/4cLLrdt] * Spotify English [https://spoti.fi/4jN8Dui] * RSS English [https://bit.ly/the_automated_daily_space] Spanish [https://theautomateddaily.com/space_es/feed.xml] French [https://theautomateddaily.com/space_fr/feed.xml] - Top news * Apple Podcast English [https://apple.co/3PTvdUF] Spanish [https://apple.co/3ECCMgk] French [https://apple.co/4hmcxbB] * Spotify English [https://spoti.fi/3ZYXAW2] Spanish [https://spoti.fi/414h4JD] French [https://spoti.fi/3Di0jDe] * RSS English [https://bit.ly/the_automated_daily_news] Spanish [https://bit.ly/the_automated_daily_news_es] French [https://bit.ly/the_automated_daily_news_fr] - Tech news * Apple Podcast English [https://apple.co/3RYWbg4] Spanish [https://apple.co/4i0WqRM] French [https://apple.co/4bEAXMm] * Spotify English [https://spoti.fi/3S089pG] Spanish [https://spoti.fi/3EE2Fwv] Spanish [https://spoti.fi/3DlObRE] * RSS English [https://bit.ly/the_automated_daily_tech] Spanish [https://bit.ly/the_automated_daily_tech_es] French [https://bit.ly/the_automated_daily_tech_fr] - Hacker news * Apple Podcast English [https://apple.co/48QWyzj] Spanish [https://apple.co/4ke9jtE] French [https://apple.co/41E1qFd] * Spotify English [https://spoti.fi/45zD1kf] Spanish [https://spoti.fi/4hF8h81] French [https://spoti.fi/3QY26Ak] * RSS English [https://bit.ly/the_automated_daily_hacker_news] Spanish [https://bit.ly/the_automated_daily_hacker_news_es] French [https://bit.ly/the_automated_daily_hacker_news_fr] - AI news * Apple Podcast English [https://apple.co/3M6Tg1o] Spanish [https://apple.co/4315L7Y] French [https://apple.co/3DkZbPb] * Spotify English [https://spoti.fi/3tzOfrz] Spanish [https://spoti.fi/416m40q] French [https://spoti.fi/41HuJGW] * RSS English [https://bit.ly/the_automated_daily_hackernews_ai] Spanish [https://bit.ly/the_automated_daily_hackernews_es_ai] French [https://bit.ly/the_automated_daily_hackernews_fr_ai] Visit our website at https://theautomateddaily.com/ [ https://theautomateddaily.com/] Send feedback to feedback@theautomateddaily.com Youtube [https://www.youtube.com/@TheAutomatedDaily] LinkedIn [https://www.linkedin.com/in/the-automated-daily/] X (Twitter) [https://x.com/automated_daily]

13 mei 20267 min
aflevering TanStack npm supply-chain compromise & Architecture shaped by incentives - Hacker News (May 12, 2026) artwork

TanStack npm supply-chain compromise & Architecture shaped by incentives - Hacker News (May 12, 2026)

Please support this podcast by checking out our sponsors: - Consensus: AI for Research. Get a free month - https://get.consensus.app/automated_daily [https://get.consensus.app/automated_daily] - Discover the Future of AI Audio with ElevenLabs - https://try.elevenlabs.io/tad [https://try.elevenlabs.io/tad] - KrispCall: Agentic Cloud Telephony - https://try.krispcall.com/tad [https://try.krispcall.com/tad] Support The Automated Daily directly: Buy me a coffee: https://buymeacoffee.com/theautomateddaily [https://buymeacoffee.com/theautomateddaily] TODAY'S TOPICS: TANSTACK NPM SUPPLY-CHAIN COMPROMISE - TANSTACK DISCLOSED A MAY 11, 2026 NPM SUPPLY-CHAIN INCIDENT INVOLVING MALICIOUS RELEASES, HIGHLIGHTING CI/CD TRUST BOUNDARIES, GITHUB ACTIONS RISKS, AND CREDENTIAL ROTATION URGENCY. ARCHITECTURE SHAPED BY INCENTIVES - MATKLAD ARGUES ARCHITECTURE IS LEARNED IN REAL PROJECTS AND IS DRIVEN BY INCENTIVES AND CONWAY’S LAW AS MUCH AS BY BEST PRACTICES—USEFUL CONTEXT FOR WHY “SCIENTIFIC CODE” DIFFERS FROM INDUSTRY SYSTEMS. AI CHANGES PROGRAMMING LANGUAGE TRADEOFFS - A NEW ESSAY CLAIMS AI CODING TOOLS REDUCE THE FRICTION OF RUST/GO, SHIFTING LANGUAGE CHOICE TOWARD RUNTIME EFFICIENCY AND REVIEWABILITY, AND CHANGING OPEN-SOURCE DYNAMICS (TESTS/DOCS OVER PATCHES). WASM VS BLOATED CONTAINER DEPLOYS - A DEVELOPER SHOWED A FULL GODOT 4 3D ENGINE BUILD AS A SMALL WEBASSEMBLY ARTIFACT, REIGNITING DEBATE ON WHY WASM ISN’T THE DEFAULT FOR DISTRIBUTION DESPITE SIZE AND PORTABILITY BENEFITS. EU TARGETS ADDICTIVE SOCIAL DESIGN - THE EUROPEAN COMMISSION SIGNALED TOUGHER ENFORCEMENT ON TIKTOK AND INSTAGRAM ‘ADDICTIVE DESIGN’ LIKE AUTOPLAY AND ENDLESS SCROLL, WITH AGE VERIFICATION AND DIGITAL SERVICES ACT PRESSURE INCREASING. WHY SOCIAL FEEDS MISLEAD OPINION - “THE NOISY ROOM” ARGUES A SMALL, HYPERACTIVE MINORITY PLUS RANKING ALGORITHMS DISTORTS PERCEIVED PUBLIC OPINION; PROPOSES A “COMMUNITY CHECK” TO ADD REPRESENTATIVE POLLING CONTEXT UNDER POSTS. VISUAL HISTORY OF DESKTOP UIS - RETROTECHNOLOGY MEDIA’S “TYPEWRITTEN SOFTWARE” PRESERVES ACCURATE SCREENSHOTS OF 1980S–2000S GUIS, DOCUMENTING CONSTRAINTS AND THE EVOLUTION OF DESKTOP CONVENTIONS ACROSS COMPETING PLATFORMS. SATIRICAL AD BLOCKING WITH OVERLAYS - A HOBBY FORK OF UBLOCK ORIGIN LITE REPLACES BLOCKED AD SPACE WITH ‘THEY LIVE’ SLOGANS, TURNING AD REAL ESTATE INTO VISIBLE SATIRE AND SPARKING CONVERSATION ABOUT HOW MUCH SCREEN SPACE ADS OCCUPY. -matklad on Learning Software Architecture: Practice, Incentives, and Conway’s Law [https://matklad.github.io/2026/05/12/software-architecture.html] -Typewritten Software gallery documents classic GUIs from Visi On to early Mac OS X [http://www.typewritten.org/Media/] -TanStack Details May 2026 npm Supply-Chain Attack via GitHub Actions Cache Poisoning and OIDC Token Theft [https://tanstack.com/blog/npm-supply-chain-compromise-postmortem] -EU targets TikTok and Instagram over ‘addictive design’ features affecting children [https://www.cnbc.com/2026/05/12/tiktok-instagram-social-media-addictive-eu-crack-down.html] -Fork of uBlock Origin Lite Replaces Blocked Ads With ‘They Live’ Slogans [https://github.com/davmlaw/they_live_adblocker] -Text Blaze Launches ‘No AI Summer’ Internship to Train Junior Full-Stack Engineers [https://www.ycombinator.com/companies/text-blaze/jobs/P4CCN62-the-blaze-no-ai-summer-internship] -AI Coding Tools Are Making Rust and Go Competitive With Python for New Projects [https://medium.com/@NMitchem/if-ai-writes-your-code-why-use-python-bf8c4ba1a055] -Essay Proposes “Community Check” to Counter Social Media’s Loud-Minority Distortion [https://thenoisyroom.com/] -Coursera Completes Merger with Udemy to Build a Unified Skills Platform [https://blog.coursera.org/coursera-and-udemy-are-now-one-company-creating-the-worlds-most-comprehensive-skills-platform/] -Developer Compares WebAssembly and Docker Sizes, Questions Why WASM Adoption Lags [https://bogomolov.work/blog/posts/wasm-vs-docker/] Episode Transcript TanStack npm supply-chain compromise First up: a supply-chain scare in the TanStack ecosystem. TanStack reported that an attacker managed to publish a burst of malicious versions across dozens of @tanstack packages in minutes. The payload aimed to steal developer and cloud credentials during install, and it was spotted quickly by an external researcher—fast enough that the response became as important as the attack. The bigger lesson is how modern CI can be weaponized. This wasn’t just “someone stole an npm token.” It’s a reminder that GitHub Actions permissions, cache boundaries, and release workflows are part of your security perimeter. If you installed impacted versions during the window, the advice is blunt: assume the machine could be compromised and rotate reachable credentials. Architecture shaped by incentives In software engineering culture, one of the most grounded takes today comes from matklad—responding to a physicist asking how to learn software architecture. The argument is simple: you don’t absorb architecture from a single course or book; you earn it by shipping real systems and living with the consequences. What’s especially useful is the emphasis on incentives. Codebases often look the way they do because of org structure and Conway’s Law, not because the team hasn’t heard of “best practices.” His practical advice splits in two: sometimes you can nudge incentives, but most of the time you have to accept constraints and design within them. He uses rust-analyzer as a case study: keep a stable, high-quality core that protects users, and isolate riskier feature areas so casual contributors can help without turning every change into a potential incident. And he warns that optimizing for today’s reality can backfire if an experiment quietly becomes a long-lived system. AI changes programming language tradeoffs That dovetails with another conversation: AI is changing what “fast to build” even means. An essay making the rounds argues that the old tradeoff—Python or TypeScript for speed, Rust or Go for rigor—is getting blurrier because AI-assisted coding reduces the pain of strongly typed, compiler-driven workflows. If that holds, it affects more than syntax preferences. It could change how teams think about maintainability, hiring, and open source. The essay’s provocative point is that porting might get cheaper than patching, and that tests, documentation, and clear interfaces become the real leverage—because humans increasingly review and steer AI-produced code rather than writing every line by hand. WASM vs bloated container deploys On the web platform front, here’s a surprisingly tangible comparison: a developer compiled a full 3D Godot 4 engine build into a relatively small WebAssembly artifact that runs directly in the browser—no install, no container pull. The post contrasts that with how hefty everyday container deployments have become, and it asks the uncomfortable question: if WASM can be compact and easy to distribute, why isn’t it the default? The answer isn’t that WASM is bad—it’s that ecosystems and platform capabilities still lag in key places. But the significance is clear: as bandwidth, cold starts, and supply-chain complexity keep biting teams, smaller, more portable artifacts start to look less like a novelty and more like an operational advantage. EU targets addictive social design Now to platforms and policy, with two stories that rhyme. The European Commission says it wants to curb “addictive design” patterns on TikTok and Meta’s Instagram—things like endless scrolling, autoplay, and aggressive notifications—especially where minors are concerned. There’s also renewed pressure around whether platforms are meaningfully enforcing age limits. What matters here is the regulatory focus shift: not only “what content is allowed,” but “what interface mechanics keep people locked in.” The EU is also floating stronger age verification via an app that can integrate with member-state digital identity efforts, tightening the compliance screws under the Digital Services Act framework. Why social feeds mislead opinion The second platform story is more social science than law: an interactive essay called “The Noisy Room.” It argues that social media feeds systematically mislead us about public opinion because a small fraction of highly active users produces outsized content—and ranking algorithms amplify it. One striking takeaway is that people can wildly overestimate how common severe toxicity is, even if only a small minority generates that kind of content. And the essay claims the downstream effects are real: mainstream users self-censor, extremists feel like a majority, and politicians respond to a distorted “room.” The proposed fix is a “Community Check” that attaches representative polling context beneath contentious posts—trying to make the silent majority visible in a way that becomes common knowledge, not just a fact buried in a report. Visual history of desktop UIs For a breather, let’s jump back in time. Retrotechnology Media’s “Typewritten Software” is a curated gallery of screenshots spanning early 1980s through 2000s graphical systems—Windows, OS/2, Sun workstations, DEC environments, NeXT, Amiga, early BeOS, and a lot more. This isn’t just nostalgia; it’s a visual record of constraints that shaped today’s UI conventions: weird resolutions, limited color, performance bottlenecks, and even legal pressures that nudged interface designs in specific directions. For anyone building modern UI, it’s a reminder that conventions aren’t inevitable—they’re the residue of hardware limits, competition, and policy battles. Satirical ad blocking with overlays Finally, a small project with big commentary energy: “They Live Adblocker,” a hobby fork of uBlock Origin Lite. Instead of simply hiding ads, it replaces blocked ad areas with stark white tiles and slogans pulled from John Carpenter’s film—making the ad real estate impossible to ignore. Why it’s interesting isn’t the gimmick alone. It highlights a truth many users forget: even when ads are blocked, the layout—and the business model behind it—still shapes the web. This flips ad blocking from invisible cleanup into visible critique, and it’s a clever reminder of how much screen space is up for auction every time you load a page. Subscribe to edition specific feeds: - Space news * Apple Podcast English [https://apple.co/4cLLrdt] * Spotify English [https://spoti.fi/4jN8Dui] * RSS English [https://bit.ly/the_automated_daily_space] Spanish [https://theautomateddaily.com/space_es/feed.xml] French [https://theautomateddaily.com/space_fr/feed.xml] - Top news * Apple Podcast English [https://apple.co/3PTvdUF] Spanish [https://apple.co/3ECCMgk] French [https://apple.co/4hmcxbB] * Spotify English [https://spoti.fi/3ZYXAW2] Spanish [https://spoti.fi/414h4JD] French [https://spoti.fi/3Di0jDe] * RSS English [https://bit.ly/the_automated_daily_news] Spanish [https://bit.ly/the_automated_daily_news_es] French [https://bit.ly/the_automated_daily_news_fr] - Tech news * Apple Podcast English [https://apple.co/3RYWbg4] Spanish [https://apple.co/4i0WqRM] French [https://apple.co/4bEAXMm] * Spotify English [https://spoti.fi/3S089pG] Spanish [https://spoti.fi/3EE2Fwv] Spanish [https://spoti.fi/3DlObRE] * RSS English [https://bit.ly/the_automated_daily_tech] Spanish [https://bit.ly/the_automated_daily_tech_es] French [https://bit.ly/the_automated_daily_tech_fr] - Hacker news * Apple Podcast English [https://apple.co/48QWyzj] Spanish [https://apple.co/4ke9jtE] French [https://apple.co/41E1qFd] * Spotify English [https://spoti.fi/45zD1kf] Spanish [https://spoti.fi/4hF8h81] French [https://spoti.fi/3QY26Ak] * RSS English [https://bit.ly/the_automated_daily_hacker_news] Spanish [https://bit.ly/the_automated_daily_hacker_news_es] French [https://bit.ly/the_automated_daily_hacker_news_fr] - AI news * Apple Podcast English [https://apple.co/3M6Tg1o] Spanish [https://apple.co/4315L7Y] French [https://apple.co/3DkZbPb] * Spotify English [https://spoti.fi/3tzOfrz] Spanish [https://spoti.fi/416m40q] French [https://spoti.fi/41HuJGW] * RSS English [https://bit.ly/the_automated_daily_hackernews_ai] Spanish [https://bit.ly/the_automated_daily_hackernews_es_ai] French [https://bit.ly/the_automated_daily_hackernews_fr_ai] Visit our website at https://theautomateddaily.com/ [ https://theautomateddaily.com/] Send feedback to feedback@theautomateddaily.com Youtube [https://www.youtube.com/@TheAutomatedDaily] LinkedIn [https://www.linkedin.com/in/the-automated-daily/] X (Twitter) [https://x.com/automated_daily]

12 mei 20266 min