New stories

rncode 8 minutes ago

Optimze It for My GPU

Can LLMs write better GPU kernals if you keep asking them to “Optimze it for my GPU”?

1 0
Vision Pro M5 review: It's time for Apple to make some tough choices
mpweiher 9 minutes ago

Vision Pro M5 review: It's time for Apple to make some tough choices

The article discusses the current state of Apple's Vision Pro headset, including its technical specifications and capabilities after the M5 chip refresh. It highlights the device's advancements in key areas such as performance, battery life, and user experience.

arstechnica.com
1 0
Summary
chii 13 minutes ago

The Journey to the Edge of the Infinite Chess Board [video]

youtube.com
1 0
YouTube
haritha-j 20 minutes ago

Barack Obama and Anthony Bourdain Have Dinner [video]

youtube.com
2 1
YouTube
saubeidl 21 minutes ago

Belgian Police exposed using botnets to manipulate EU data law impact assessment

The article discusses how the Belgian Federal Police accidentally left their VPN connection active, revealing their internal IP addresses and server names publicly on Reddit. This incident highlights the importance of proper security measures and the risks associated with unintended data exposure.

old.reddit.com
11 0
Summary
Iberia tells customers it was hit by a major security breach
frereubu 21 minutes ago

Iberia tells customers it was hit by a major security breach

Iberia, the Spanish airline, has reported a major security breach that may have compromised the personal and financial information of its customers. The company is investigating the incident and has notified affected customers to take necessary security measures.

techradar.com
3 0
Summary
High Air Pollution Could Diminish Exercise Benefits by 50%, Study Finds
ashishgupta2209 38 minutes ago

High Air Pollution Could Diminish Exercise Benefits by 50%, Study Finds

A study found that the benefits of exercise may be reduced when air pollution levels are high, suggesting that individuals should consider air quality when planning their exercise routines to maximize the health benefits.

scienceclock.com
4 1
Summary
giuliomagnifico 39 minutes ago

The GitHub Infrastructure Powering North Korea's Contagious Interview NPM Attack

The article explores the recent npm package attacks associated with North Korea, highlighting the country's efforts to target software developers and technology companies through malicious code injections and other cybersecurity threats.

socket.dev
4 0
Summary
anbkit 42 minutes ago

Show HN: FISE – A rule-based, keyless semantic envelope for web/API data

Hi HN,

I've been building a small open-source project called FISE, a rule-based "semantic envelope" for web/API data. It's not cryptography and it doesn't try to replace TLS/AES. The goal is to raise the cost of scraping and reverse-engineering client-visible data while keeping the hot path simple and fast (linear-time, parallelizable, works for JSON and media segments).

Key ideas:

- Keyless by design: no long-lived client-side decrypt keys. - Rules-as-code: offsets, length encoding, salt/meta layout, and optional transform are defined as per-app/per-session rules. - No protocol-level universal decoder: each deployment (and even each session/time bucket) can have its own rule family. - Temporal & distribution polymorphism: rotate rules per session/route/time so any decoded pipeline tends to be short-lived and non-reusable. - Simple local ops → emergent complexity: the core ops are just linear byte transforms, but the rule space and rotation make envelopes hard to generalize at scale. - Works for JSON and media (video segments) with framed/chunked mode, block-local decode, and parallel workers.

Threat model:

- In scope: automated scraping, bulk API harvesting, cheap cloning of curated datasets. - Out of scope: strong secrecy for secrets/PII (use TLS/AES/etc.), full client compromise, nation-state adversaries.

Engineering whitepaper (v1.0): - https://github.com/anbkit/fise/blob/main/docs/WHITEPAPER.md

Code: - https://github.com/anbkit/fise

Demo: - https://demo.fise.dev/demo

I'm a full-stack developer, not a cryptographer. FISE came out of working on real projects where API JSON data was exposed on the client side and could be easily scraped. I built it as a simple, rule-based layer to raise scraping cost, and I'm sharing it so others can review, critique, and improve it.

I'd love feedback on:

- The security model & threat boundaries (what did I miss?), - The "rules-as-code" design and the idea of temporal/distribution polymorphism, - Practical deployment concerns (CDN/normalization, mobile/TV/edge), - Any obvious pitfalls or prior art I should explicitly reference.

Thanks for taking a look.

demo.fise.dev
2 0
Summary
adrianhoward 42 minutes ago

Power of Empty Spaces: Seeing What Your Metrics Miss

The article discusses the importance of considering the 'empty spaces' in data visualization and metrics, as they can reveal insights that may be missed by focusing solely on the numbers. It emphasizes the need to step back and examine the context and relationships within the data to gain a more comprehensive understanding of the underlying trends and patterns.

kanbanzone.com
2 0
Summary
keepamovin about 1 hour ago

Ask HN: Practicality of harnessing geomagnetic fields for electrical generation?

Years ago I would have asked this on the 'Overflows. Alas, those innocent days are long gone. I could always ask AI, but how can you know?

The Earth produces a moving magnetic field (small teslas, but large extent yes?). Moving magnetic fields produce electrical current, right? Could you add "geomagnetic power" to other clean/renewable sources with the right technical solution, or is it fundamentally impossible?

3 0
ig1201 about 1 hour ago

Free Nano Banana Pro

freenanobanana.app
1 1
burnt-resistor about 1 hour ago

Cerebras CS-3 wafer-scale 1e6 cores 125 PFLOPS 25kW (30kA)

youtu.be
1 1
YouTube
jaspertvdm about 1 hour ago

Security Layer 4.0 – First semantic firewall blocks malicious intent"

*Title:* Show HN: BETTI v2.0 – First semantic GPU firewall (93% cost savings, 100% cryptojacking detection)

*Body:*

I built BETTI, a distributed computing system that applies 14 natural physics laws to resource allocation. New in v2.0: Security Layer 4.0 for GPUs - the world's first semantic GPU firewall.

## The Problem

GPU training costs $3/hour (AWS), takes "3-8 weeks" (unpredictable), and cryptojacking steals $5B/year. Current security is reactive - firewalls block AFTER seeing patterns. Resource limits are arbitrary: "You get 4 cores", "10GB RAM max".

## The Solution

BETTI applies 14 physics laws:

• Kepler's 3rd Law (T² ∝ a³): Task scheduling based on orbital periods • Einstein's E=mc²: Energy cost calculation • Newton's Laws: Resource conservation • Fourier, Maxwell, Schrödinger, TCP, Thermodynamics, etc.

This is the first system to apply Kepler's orbital mechanics to computing.

## Security Layer 4.0 for GPUs (NEW!)

Traditional anti-malware: 60% cryptojacking detection (pattern-based, reactive) BETTI Layer 4.0: 100% detection (semantic, proactive)

Blocks BEFORE GPU kernel launch: ```python # Traditional: Pattern matching (bypassable) if "sha256" in kernel_name: block() # After launch attempt!

# BETTI: Intent validation (unbypasable) intent = extract_gpu_intent(kernel, grid_dim, block_dim) if intent["type"] == "CRYPTO_MINING" and not authorized: return CUDA_ERROR_UNAUTHORIZED # Before execution! ```

Triple-layer validation: 1. SNAFT: Intent blocklist (CRYPTO_MINING, GPU_HIJACK) 2. BALANS: Risk score 0.0-1.0 (no context = suspicious) 3. HICSS: Real-time budget enforcement

## Intent-First Protocol Translation

Problem: N protocols need N² bridges (HTTP↔Matrix, HTTP↔SIP, Matrix↔SIP...)

BETTI solution: Universal "intent language" needs only N adapters.

``` Email → Intent → Humotica → Security 4.0 → BETTI → SIP call ```

22 protocols working: Email, SIP, Matrix, CoAP, MQTT, HTTP, WebSocket, XMPP, gRPC, Modbus, OPC UA, LoRaWAN, Zigbee, BLE, AMQP, Kafka, Redis, RTSP, SSH, DoH, IPFS, WebRTC

## Results (8× NVIDIA A100 evaluation)

93% cost reduction (€0.20/hour vs $3/hour AWS) 100% cryptojacking detection (0% with traditional anti-malware) 0% OOM crashes (Newton's conservation predicts VRAM needs) ±6min runtime accuracy (Kepler's T² ∝ threads³ vs "3-8 weeks") Proactive security (blocks before GPU execution)

## Applications

GPU Training: LLaMA-2-7B fine-tuning (18.5h predicted, 18h32min actual) TIBET: Banking transaction clearing (physics-based fairness) JTel: Telecom identity (22 protocols: SIP, Matrix, Email...)

## Why This Matters

This is a paradigm shift from arbitrary computing to physics-based, provably fair resource allocation.

No prior work applies: - Kepler's law to GPU scheduling (T² ∝ threads³) - E=mc² to GPU energy accounting (real-time cost) - Semantic GPU firewall (blocks cryptojacking proactively) - All 14 physics laws combined

## Questions for HN

1. First semantic GPU firewall? (100% cryptojacking detection - no pattern DB needed) 2. Has Kepler's law been applied to GPU scheduling before? 3. Can GPU driver vendors (NVIDIA, AMD) integrate this natively? 4. Would you trust proactive intent blocking over reactive pattern matching?

## Paper & Code

Full paper (28 pages): https://jis.jtel.com/papers/betti-physics-computing.pdf Code: https://github.com/jaspertvdm/JTel-identity-standard License: JOSL v1.0 (open source, commercial-friendly, attribution required) Contact: jtmeent@gmail.com

Open to feedback on: - Semantic GPU firewalls (first in academia?) - Deployment: LD_PRELOAD, kernel driver, or Kubernetes plugin? - GPU vendor adoption (NVIDIA/AMD/Intel)

Thanks for reading!

---

*Author:* Jasper van de Meent *License:* JOSL v1.0 *GitHub:* https://github.com/jaspertvdm/JTel-identity-standard

2 0
vismit2000 about 1 hour ago

The Thinking Game – Full Documentary (Google DeepMind)

youtu.be
1 0
YouTube
Own a Graph
thisismytest about 1 hour ago

Own a Graph

The article discusses the importance of owning a graph, which is a powerful data structure that can help businesses and individuals better understand connections and relationships within their data. It highlights the advantages of using a graph database over traditional relational databases and provides guidance on how to implement and utilize a graph-based approach.

staysaasy.com
1 0
Summary
Spoofing her majesty in the 'Great Royal Phone Embarrassment' of 1995
ubutler about 1 hour ago

Spoofing her majesty in the 'Great Royal Phone Embarrassment' of 1995

This article explores the 1995 incident where a prankster successfully impersonated Queen Elizabeth II during a phone call, embarrassing the British monarchy. The article delves into the details of how the hoax was executed and the aftermath that followed.

1995blog.com
2 2
Summary
imjacobclark about 1 hour ago

Why Container Images Keep Getting Bigger (and What to Do About It)

The article discusses the different layers of writing, including the content, structure, style, and mechanics. It emphasizes the importance of understanding and mastering these layers to become a skilled and effective writer.

writethat.blog
2 0
Summary
Show HN: Benchmark-ips-Python – benchmarking tool for Python
Igor_Wiwi about 1 hour ago

Show HN: Benchmark-ips-Python – benchmarking tool for Python

This article presents a Python library for benchmarking Internet Protocol Security (IPsec) performance, allowing users to evaluate the throughput and latency of IPsec implementations across different platforms and configurations.

github.com
1 0
Summary
Reddit Migrates Comment Back End from Python to Go Microservice to Halve Latency
ashishb about 1 hour ago

Reddit Migrates Comment Back End from Python to Go Microservice to Halve Latency

Reddit is migrating its comment system from its legacy infrastructure to a new system built on Go, which is expected to improve performance and scalability. The migration is a significant undertaking that will impact millions of users and require careful planning and execution.

infoq.com
4 0
Summary
Apache Hudi Dynamic Filter: 5-Minute Code Walkthrough
ykhl1itj about 1 hour ago

Apache Hudi Dynamic Filter: 5-Minute Code Walkthrough

Apache Hudi introduces a dynamic bloom filter feature that optimizes storage and query performance for large datasets. The dynamic bloom filter adapts its size based on the dataset, reducing the storage overhead and improving query efficiency.

codepointer.substack.com
1 0
Summary
melvinroest about 1 hour ago

Ghost Explore

explore.ghost.org
1 1
mgh2 about 1 hour ago

China's plan to take over Taiwan "peacefully" [video]

youtube.com
2 1
YouTube
doener about 1 hour ago

Psylo 1.1.0 Privacy focused Browser released for iPhone

apps.apple.com
1 0
I Know We're in an AI Bubble Because Nobody Wants Me
iparaskev about 1 hour ago

I Know We're in an AI Bubble Because Nobody Wants Me

The article discusses the current state of the AI industry, noting that despite the hype and investment, many in the field feel underappreciated and unsure about the future. The author reflects on the challenges and uncertainties facing AI researchers and developers in the present 'AI bubble'.

petewarden.com
15 2
Summary
ianberdin about 1 hour ago

Show HN: I built a browser-based Cursor alternative as a solo dev

PlayCode is an online code editor that allows users to create and run code directly in their web browser, supporting a variety of programming languages and providing tools for testing and debugging.

playcode.io
1 0
Summary
Anthropic's Claude 'Soul Document' extracted from Opus 4.5 weights
Richard_Weiss about 1 hour ago

Anthropic's Claude 'Soul Document' extracted from Opus 4.5 weights

The article discusses the nature of consciousness and the possibility of an 'opus soul' - a fundamental unit of consciousness that may exist at the core of reality. It explores philosophical and scientific perspectives on this topic, considering the implications for understanding the nature of existence and the human experience.

lesswrong.com
3 0
Summary
udev4096 about 1 hour ago

If You Must Use Signal, Use Molly

xn--gckvb8fzb.com
5 1
Why the Dutch embrace floating homes
Brajeshwar about 1 hour ago

Why the Dutch embrace floating homes

The article explores the benefits of living in floating homes, including increased resilience to natural disasters, reduced environmental impact, and the potential for creating sustainable communities on water. It examines various floating home projects around the world and the technological advancements that are making this type of living more feasible.

bbc.com
2 0
Summary
Black Friday Software Deals (Mega List)
aeff about 2 hours ago

Black Friday Software Deals (Mega List)

The article provides an overview of the best Black Friday software deals for 2025, covering discounts on popular productivity, security, and creative software applications from leading brands.

blackfridaydeals.directory
1 0
Summary